
From nobody Wed Feb  5 12:41:56 2020
Return-Path: <session-request@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C913120824; Wed,  5 Feb 2020 12:41:54 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: netmod-chairs@ietf.org, ibagdona@gmail.com, kent+ietf@watsen.net, netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.116.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158093531407.12827.6547324858132241619.idtracker@ietfa.amsl.com>
Date: Wed, 05 Feb 2020 12:41:54 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/c-Mpx78YCjS4EmJOzdSibVQjp0E>
Subject: [netmod] netmod - Update to a Meeting Session Request for IETF 107
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Feb 2020 20:41:54 -0000

An update to a meeting session request has just been submitted by Kent Watsen, a Chair of the netmod working group.


---------------------------------------------------------
Working Group Name: Network Modeling
Area Name: Operations and Management Area
Session Requester: Kent Watsen

Number of Sessions: 2
Length of Session(s):  2 Hours, 1 Hour
Number of Attendees: 100
Conflicts to Avoid: 
 Chair Conflict: netconf
 Technology Overlap: rtgwg i2rs teas
 Key Participant Conflict: saag


People who must be present:
  Lou Berger
  Joel Jaeggli
  Kent Watsen
  Ignas Bagdonas
  Robert Wilton

Resources Requested:

Special Requests:
  Please place the first session in the first half of the week (i.e., M-W).
---------------------------------------------------------


From nobody Sun Feb  9 01:19:01 2020
Return-Path: <hongji.zhao@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CBC4A120058; Sun,  9 Feb 2020 01:18:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, PLING_QUERY=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Od9RNurqu3BI; Sun,  9 Feb 2020 01:18:55 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150042.outbound.protection.outlook.com [40.107.15.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F98112001E; Sun,  9 Feb 2020 01:18:55 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZbzLgh8dPS/x/o2BUUgeUJWgQSOlgzW/811+7CGUQqbXKGn7SvZ7B8rzodDAzmuxuGoW0in0ymjjRlwOiLzl8RPXjTHIn4CQbI6J5VgezYsliETHokRMKKV3RuMp/tZZe47c8hCf6MGj3kYHv5OGijg1ZkOna1B/L/G4SEx5Km+PNHiXYor4EQiKQhoBIdBBAnzc8kP8dhSupHHVQEFTByJ5Jp3OBlMrBNWyEw/ocvqHVYjJvwRic5uaHLl54s/UKsywtYdifVRzMafyv5aS8uPAeKXL5QcnbhQZhrSZAIxRvfLssmgQ0P7RQ5VdNH9NCRqq+YGwaP0uGaGakgOXZA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QtlTyyFqG+NDe246CpOLszskuEfF6GaOUWYzZypMTsU=; b=LvAp+KzR4TzrECN2X2yJM7Gl8/LzjLP48o0WNgW+ADzuQfgmi/wZH3WDgnvjV/2wB1UIQgyqmZwoasSAJX6ALBj8T8K3Gr7ODWRcZxNML+2a6c6+tZ20bda33F0E7eddKLIulRrEdxHl67EvBDTy64c52POaa0H8z44ab5oTTYV69h44R9V9RjaU81HaASqWg4Y/RW/i5hzosahYLaJcDC3yenlwvrFCrmhLdz87UBvwnqZqzclbAQNk6uqbYXunb+ZD5JQKxMzh1adj2XJYcQvCzla+ZXy6cHzGpR6TRqb2joIadU6fTzlqJzMn2dquPIELJ89mij/q2mvuRErpFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QtlTyyFqG+NDe246CpOLszskuEfF6GaOUWYzZypMTsU=; b=mP4IJbS1MMqiLoQS0bubL6+MCh1hGy1hYujdX5EXFFDL4KAJbQWiZVwOso2I7KdyCW8OlDca/g8sD5VCBC8LesUiw1I3Rh9qRD0V4ZN3LGbIzlHro9VLIskRnCXdLv77+UZeuU2dS6ChMflLPzoNrggrWddpv0wpUGAwhyWPKEY=
Received: from HE1PR07MB3148.eurprd07.prod.outlook.com (10.170.247.15) by VE1SPR01MB0008.eurprd07.prod.outlook.com (20.179.193.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.12; Sun, 9 Feb 2020 09:18:50 +0000
Received: from HE1PR07MB3148.eurprd07.prod.outlook.com ([fe80::95b6:84d4:100f:8760]) by HE1PR07MB3148.eurprd07.prod.outlook.com ([fe80::95b6:84d4:100f:8760%5]) with mapi id 15.20.2729.010; Sun, 9 Feb 2020 09:18:50 +0000
From: Hongji Zhao <hongji.zhao@ericsson.com>
To: Benoit Claise <bclaise@cisco.com>
CC: "netmod@ietf.org" <netmod@ietf.org>, Alvaro Retana <aretana.ietf@gmail.com>, "pim-chairs@ietf.org" <pim-chairs@ietf.org>, Xufeng Liu <xufeng.liu.ietf@gmail.com>, "draft-ietf-pim-igmp-mld-snooping-yang@ietf.org" <draft-ietf-pim-igmp-mld-snooping-yang@ietf.org>, "ibagdona@gmail.com" <ibagdona@gmail.com>
Thread-Topic: Hi Benoit. I am the author of draft-ietf-pim-igmp-mld-snooping-yang. Now datatracker shows YANG validation errors, and it augments IEEE YANG model. Could you please help me how to deal with them? Thanks a lot!
Thread-Index: AdXfKF+4HqQo3AynShqa+4tkUoSoyQ==
Date: Sun, 9 Feb 2020 09:18:50 +0000
Message-ID: <HE1PR07MB3148E2D48C70155648CBC4F7961E0@HE1PR07MB3148.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=hongji.zhao@ericsson.com; 
x-originating-ip: [120.244.62.150]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 668a7728-8254-4424-c4af-08d7ad41134b
x-ms-traffictypediagnostic: VE1SPR01MB0008:
x-microsoft-antispam-prvs: <VE1SPR01MB00080B7765BE846D677A841F961E0@VE1SPR01MB0008.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0308EE423E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(376002)(346002)(39860400002)(136003)(199004)(189003)(9326002)(66476007)(64756008)(966005)(66556008)(66446008)(478600001)(7696005)(55016002)(9686003)(6916009)(2906002)(5660300002)(44832011)(76116006)(52536014)(66946007)(316002)(54906003)(8936002)(8676002)(81156014)(81166006)(26005)(86362001)(6506007)(33656002)(4326008)(186003)(71200400001)(182903001); DIR:OUT; SFP:1101; SCL:1; SRVR:VE1SPR01MB0008; H:HE1PR07MB3148.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 8sIA3kTuQgZcIII2l0LMEPFlnbyfqgqwxf3vFV00nW8ySNhYDy1J4k98mUVNC7Xa1ON3qWiBS6g35jPZluhA+5vhkQwyr7LhVzUuTfOvPOSBtT9ATzcaaEpJsXQnPlPIlWRh1F0Gn6SeFKirNHJ0Iw82Z0XptDtTi1HA0L7/OYjbr+eim+ZcUWwZ8xvfh8IiOEfZgs75PQqi7HBkqB8mevPwADCw6UDPTtp9M/bSEADufbP3RFwseIqL9xhRnfsvcwXY3OEXrMICu2RWlCREBNu7jRMQ7MYVpZIASUPedaZtLrmnt/xkJsIYk+PgjmOC422Do4mmOokTZCAxmLs4Z3tMcFIq9lCUOH/HELf2Cpsea39I3Sf5BDrrggS/OxXIQWrwD+EjSpz3ASrFg5MFd88i6BUBckdh1gOaWjRVouVDpg88d8ZnRl8npE238WIr92qWK64rnlg5rKTVmJvRa/wBd0n8Y04gepgnwg+vAkeAwxEF56hIqev7MGYzKfzGxvGoqilmiI+BhPlstUMWOpBfj7/3+EpFqd4Xwko5+v6lXTtXvvY1K1Lfekkm119W
x-ms-exchange-antispam-messagedata: QsgxVjenpBblywt6v59Ej/p5L6oATpneBCdq52yc6MYzTWWGe0WnqHJ3b4lgZfeHQnaeCoDzLBt3HRN95bB2EreQaqltWUQx1ktvr9asaN2unO3WhSoSRO2/qZQCeS1Y4iSmr2jxMus8rLp6XZ4stQ==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_HE1PR07MB3148E2D48C70155648CBC4F7961E0HE1PR07MB3148eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 668a7728-8254-4424-c4af-08d7ad41134b
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Feb 2020 09:18:50.3667 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +iIIAQx/hfsTIlyVIuEtlFbQrcmwJAwkQlksWCl5RT9oHmAnGaPY0d9UYg1ccKY/Liw91bJXfg+1gtohmiImQWnd5UaJNBc5Rrf6TcfYqsg=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1SPR01MB0008
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Bx7GY6PE_bzznNyT9fLEDWAF0Y0>
Subject: [netmod] Hi Benoit. I am the author of draft-ietf-pim-igmp-mld-snooping-yang. Now datatracker shows YANG validation errors, and it augments IEEE YANG model. Could you please help me how to deal with them? Thanks a lot!
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Feb 2020 09:18:59 -0000

--_000_HE1PR07MB3148E2D48C70155648CBC4F7961E0HE1PR07MB3148eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


Hi Benoit,

The draft-ietf-pim-igmp-mld-snooping-yang is about IGMP & MLD Snooping yang=
 module.
https://datatracker.ietf.org/doc/draft-ietf-pim-igmp-mld-snooping-yang/


1) Now this draft has passed WGLC, but datatracker is still showing several=
 YANG Validation errors. It's saying it can't find the ietf-l2vpn, ietf-pse=
udowires, ieee802-dot1q-bridge module.
   It was suggested that the errors are a tool issue.   How to deal with it=
?

2) This draft imports and augments an IEEE YANG model (ieee802-dot1q-bridge=
 module). Is there any specific process we need to follow when augments an =
IEEE YANG model?

Thanks a lot!


***************************************************************************=
******************************************************************
Error details:
draft-ietf-pim-igmp-mld-snooping-yang-09.txt:
xym 0.4:
Extracting 'ietf-igmp-mld-snooping'
   Getting YANG file name from module name: ietf-igmp-mld-snooping.yang
   Removed 10 empty lines


ietf-igmp-mld-snooping@2019-06-04.yang:
pyang 2.1.1: pyang --verbose --ietf -p {libs} {model}:
# read ietf-igmp-mld-snooping@2019-06-04.yang (CL)
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-ine=
t-types.yang
# read /a/www/ietf-ftp/yang/draftmod/ietf-inet-types@2019-11-04.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-yan=
g-types.yang
# read /a/www/ietf-ftp/yang/draftmod/ietf-yang-types@2019-11-04.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-int=
erfaces.yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-interfaces@2018-02-20.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-rou=
ting.yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-routing@2018-03-13.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-rou=
ting-types.yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-routing-types@2017-12-04.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-net=
work-instance.yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-network-instance@2019-01-21.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-ip.=
yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-ip@2018-02-22.yang
# read /a/www/ietf-datatracker/6.117.0/env/share/yang/modules/ietf/ietf-yan=
g-schema-mount.yang
# read /a/www/ietf-ftp/yang/rfcmod/ietf-yang-schema-mount@2019-01-14.yang
ietf-igmp-mld-snooping@2019-06-04.yang:27: error: module "ietf-l2vpn" not f=
ound in search path
ietf-igmp-mld-snooping@2019-06-04.yang:34: error: module "ietf-pseudowires"=
 not found in search path
ietf-igmp-mld-snooping@2019-06-04.yang:38: error: module "ieee802-dot1q-bri=
dge" not found in search path

yanglint 0.14.80: yanglint --verbose -p {rfclib} -p {draftlib} -p {tmplib} =
{model} -i:
err : Data model "ietf-l2vpn" not found.
err : Importing "ietf-l2vpn" module into "ietf-igmp-mld-snooping" failed.
err : Module "ietf-igmp-mld-snooping" parsing failed.

***************************************************************************=
******************************************************************

module ietf-igmp-mld-snooping {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-igmp-mld-snooping";

  prefix ims;

  import ietf-inet-types {
    prefix "inet";
  }

  ...

  import ieee802-dot1q-bridge {
    prefix "dot1q";
  }

  ...


  augment "/dot1q:bridges/dot1q:bridge" {
    description
      "Reference IGMP & MLD snooping instance in BRIDGE scenario";

    leaf igmp-snooping-instance {
      type igmp-mld-snooping-instance-ref;

      description
        "Configure IGMP snooping instance under bridge view";
    }
    leaf mld-snooping-instance {
      type igmp-mld-snooping-instance-ref;

      description
        "Configure MLD snooping instance under bridge view";
    }
  }


BR/Hongji


--_000_HE1PR07MB3148E2D48C70155648CBC4F7961E0HE1PR07MB3148eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:DengXian;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@DengXian";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Hi Benoit,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">The draft-ietf-pim-igmp-mld-snooping-yang is about I=
GMP &amp; MLD Snooping yang module.
<o:p></o:p></p>
<p class=3D"MsoNormal">https://datatracker.ietf.org/doc/draft-ietf-pim-igmp=
-mld-snooping-yang/<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">1) Now this draft has passed WGLC, but datatracker i=
s still showing several YANG Validation errors. It's saying it can't find t=
he ietf-l2vpn, ietf-pseudowires, ieee802-dot1q-bridge module.
<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;It was suggested that the errors a=
re a tool issue.&nbsp;&nbsp; How to deal with it?<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">2) This draft imports and augments an IEEE YANG mode=
l (ieee802-dot1q-bridge module). Is there any specific process we need to f=
ollow when augments an IEEE YANG model?
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks a lot!<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">****************************************************=
***************************************************************************=
**************<o:p></o:p></p>
<p class=3D"MsoNormal">Error details:<o:p></o:p></p>
<p class=3D"MsoNormal">draft-ietf-pim-igmp-mld-snooping-yang-09.txt:<o:p></=
o:p></p>
<p class=3D"MsoNormal">xym 0.4:<o:p></o:p></p>
<p class=3D"MsoNormal">Extracting 'ietf-igmp-mld-snooping'<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Getting YANG file name from module name=
: ietf-igmp-mld-snooping.yang<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp; Removed 10 empty lines<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">ietf-igmp-mld-snooping@2019-06-04.yang:<o:p></o:p></=
p>
<p class=3D"MsoNormal">pyang 2.1.1: pyang --verbose --ietf -p {libs} {model=
}:<o:p></o:p></p>
<p class=3D"MsoNormal"># read ietf-igmp-mld-snooping@2019-06-04.yang (CL)<o=
:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-inet-types.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/draftmod/ietf-inet-types=
@2019-11-04.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-yang-types.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/draftmod/ietf-yang-types=
@2019-11-04.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-interfaces.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-interfaces@2=
018-02-20.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-routing.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-routing@2018=
-03-13.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-routing-types.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-routing-type=
s@2017-12-04.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-network-instance.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-network-inst=
ance@2019-01-21.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-ip.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-ip@2018-02-2=
2.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-datatracker/6.117.0/env/share/yan=
g/modules/ietf/ietf-yang-schema-mount.yang<o:p></o:p></p>
<p class=3D"MsoNormal"># read /a/www/ietf-ftp/yang/rfcmod/ietf-yang-schema-=
mount@2019-01-14.yang<o:p></o:p></p>
<p class=3D"MsoNormal">ietf-igmp-mld-snooping@2019-06-04.yang:27: error: mo=
dule &quot;ietf-l2vpn&quot; not found in search path<o:p></o:p></p>
<p class=3D"MsoNormal">ietf-igmp-mld-snooping@2019-06-04.yang:34: error: mo=
dule &quot;ietf-pseudowires&quot; not found in search path<o:p></o:p></p>
<p class=3D"MsoNormal">ietf-igmp-mld-snooping@2019-06-04.yang:38: error: mo=
dule &quot;ieee802-dot1q-bridge&quot; not found in search path<o:p></o:p></=
p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">yanglint 0.14.80: yanglint --verbose -p {rfclib} -p =
{draftlib} -p {tmplib} {model} -i:<o:p></o:p></p>
<p class=3D"MsoNormal">err : Data model &quot;ietf-l2vpn&quot; not found.<o=
:p></o:p></p>
<p class=3D"MsoNormal">err : Importing &quot;ietf-l2vpn&quot; module into &=
quot;ietf-igmp-mld-snooping&quot; failed.<o:p></o:p></p>
<p class=3D"MsoNormal">err : Module &quot;ietf-igmp-mld-snooping&quot; pars=
ing failed.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">****************************************************=
***************************************************************************=
**************<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">module ietf-igmp-mld-snooping {<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; yang-version 1.1;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; namespace &quot;urn:ietf:params:xml:ns:yang:i=
etf-igmp-mld-snooping&quot;;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp; prefix ims;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;import ietf-inet-types {<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; prefix &quot;inet&quot;;<o:p></o:=
p></p>
<p class=3D"MsoNormal">&nbsp; }<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;...<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;import ieee802-dot1q-bridge { <o:p></o:p=
></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;prefix &quot;dot1q&quot;;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;}&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;...<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;augment &quot;/dot1q:bridges/dot1q:bridg=
e&quot; {<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; description <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&quot;Reference =
IGMP &amp; MLD snooping instance in BRIDGE scenario&quot;;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;leaf igmp-snooping-instance =
{<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; type igmp-mld-snoopin=
g-instance-ref;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;description <o:p=
></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&quo=
t;Configure IGMP snooping instance under bridge view&quot;;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; }<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; leaf mld-snooping-instance {<o:p>=
</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; type igmp-mld-snoopin=
g-instance-ref;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;description <o:p=
></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&quo=
t;Configure MLD snooping instance under bridge view&quot;;<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp; }<o:p></o:p></p>
<p class=3D"MsoNormal">&nbsp; }<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">BR/Hongji<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_HE1PR07MB3148E2D48C70155648CBC4F7961E0HE1PR07MB3148eurp_--


From nobody Mon Feb 10 08:00:25 2020
Return-Path: <010001702b618021-ade19230-3c05-4d0f-be88-e735dad32390-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77493120071; Sun,  9 Feb 2020 11:16:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Drq1YysFmR6S; Sun,  9 Feb 2020 11:16:16 -0800 (PST)
Received: from a48-95.smtp-out.amazonses.com (a48-95.smtp-out.amazonses.com [54.240.48.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B053120047; Sun,  9 Feb 2020 11:16:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581275775; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=ION/rCYavkkFisl7BTdCEQK1CW05wsyn/cG727jCIG4=; b=hAKb114ddsSVc/hzwk2gGGuPhqkcG2H1K9HbI4hDhYRR4jhGW9mJiDThhuUcsLYq CKSdpWXkkQmsOxAaJgsM3L7cNOaoXvI3nd14PmOrlcmOyBjaXbH1cY2FyZxRCinma5I zgcgNre9iipG/6zsk1FTLm5HSWEIE1frmn40JKmk=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <010001702b618021-ade19230-3c05-4d0f-be88-e735dad32390-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_42844381-9007-4FBA-8B0D-5AE8385ACD51"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sun, 9 Feb 2020 19:16:15 +0000
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA962BD87@dggeml511-mbx.china.huawei.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>
To: draft-ietf-netmod-factory-default <draft-ietf-netmod-factory-default@ietf.org>
References: <B8F9A780D330094D99AF023C5877DABAA9629F8D@dggeml511-mbx.china.huawei.com> <010001700b8532d3-24b47a66-44ab-425b-a8a3-53b326a33cee-000000@email.amazonses.com> <B8F9A780D330094D99AF023C5877DABAA962BD87@dggeml511-mbx.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.09-54.240.48.95
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/-Hu9EV6qzgFOOYDq3ul-RocFyTg>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-09.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Feb 2020 19:16:20 -0000

--Apple-Mail=_42844381-9007-4FBA-8B0D-5AE8385ACD51
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

[catching up on an old shepherd action item]


Authors,

While processing the shepherd writeup, I discovered some issues that =
should be fixed before this draft is forwarded to the IESG.  Please =
submit an update so that I can continue the review.

WG,

How is it that so many issues got through the Last-Call process?!


Comments by Section:

1) The abstract and Introduction both say =E2=80=9CWhen resetting a =
datastore, =E2=80=A6=E2=80=9D, but this isn=E2=80=99t the case anymore, =
I mean, we only reset the device, right?=20

2) The Abstract says =E2=80=9C=E2=80=A6datastore=E2=80=A6that contains =
data that will be copied over to the running datastore at reset.=E2=80=9D =
 This is inconsistent with what is stated elsewhere about the contents =
going into all conventional datastores.  Recommendation is to instead =
say that it contains the factory default configuration for the device.

3) The Introduction says "This datastore can also be used in <get-data> =
operation=E2=80=9D - missing the word =E2=80=9Cthe=E2=80=9D before =
<get-data>.

4) The Introduction=E2=80=99s 4th paragraph serves no purpose and =
asymmetrically calls out NETCONF.  Please delete.

6) Section 1.1 says "A read-only configuration datastore holding a =
preconfigured minimal initial configuration that can be used to =
initialize the configuration of a server.=E2=80=9D  Remove the word =
=E2=80=9Cminimal=E2=80=9D and replace =E2=80=9Ccan be=E2=80=9D with =
=E2=80=9Cis=E2=80=9D.

7) Section 1.1 says "The content of the datastore is usually static, but =
MAY depend on external factors like available HW.=E2=80=9D  This is not =
true.  The contents are static, full stop.  However, the application of =
the contents may vary based on factors such as HW present.   But since =
this is always true, I recommend the entire sentence be removed. =20

8) Section 2 says "The contents of the <operational> datastore MUST be =
reset back to an appropriate factory-default state.=E2=80=9D  I think =
words =E2=80=9Creset=E2=80=9D and "factory-default state=E2=80=9D are =
misleading.  Better would be to say =E2=80=9C=E2=80=A6MUST reflect the =
operational state of the device after applying the factory default =
configuration."

9) Section 2 says =E2=80=9C...MUST restore storage to factory condition, =
including remove log files, remove temporary files (from datastore or =
elsewhere).=E2=80=9D  This is both grammatically incorrect and =
confusing.  Recommend replacing with =E2=80=9C...MUST restore =
non-volatile storage to factory condition.  Depending on the system, =
this may entail deleting dynamically generated files, such as those =
containing keys (e.g., /etc/ssl/private), certificates (e.g., /etc/ssl), =
and logs (e.g., /var/log), temporary files (/tmp/*).

10) After applying the fix from (9) above, the following two sentences =
could be replaced with =E2=80=9CAll security sensitive data (i.e., =
private keys, passwords, etc.) SHOULD be overwritten with zeros or a =
pattern before deletion."

11) Section 3: "Following guidelines for defining...=E2=80=9D should be =
"Following the guidelines for defining=E2=80=A6"

12) Section 3: replace 'factory-default=E2=80=99 with =
"factory-default=E2=80=9D.  That is, use double-quotes. The only time =
single-quotes are used is when needing to quote something inside a YANG =
string.

13) Section 3:apply the same change described in (6) above wrt =
=E2=80=9Cminimal=E2=80=9D and =E2=80=9Ccan be=E2=80=9D.

14) Section 3: remove the word =E2=80=9Conly=E2=80=9D from "A device MAY =
only implement the <factory-reset> RPC without implementing the =
'factory-default=E2=80=99 datastore=E2=80=9D, or replace =E2=80=9Cwithout=E2=
=80=9D with =E2=80=9C, i.e., without=E2=80=9D.

15) Section 3: replace "which make it lose the ability to see what =
configuration the device would be reset back to=E2=80=9D with =E2=80=9Cwhi=
ch would only eliminate the ability to programmatically determine the =
factory default configuration=E2=80=9D.

16) Section 3; replace "RESTCONF,the CLI etcunless=E2=80=9D with =
=E2=80=9CRESTCONF, the CLI, etc. unless=E2=80=9D=20

17) Section 3 needs to also mention that <candidate>, if present, is =
initialized to the contents of <factory-default>

18) Section 3: the word =E2=80=9Cusually=E2=80=9D in the sentence "The =
datastore content is usually defined by the device vendor.=E2=80=9D =
Should either be removed or explained how it could ever not be the case. =
 (I recommend the former)

19) Section 3: apply the same change described in (7) above.

20) both of the =E2=80=98import=E2=80=99 statements are missing =
=E2=80=98reference=E2=80=99 statements.=E2=80=9D

21) Section 4: the module=E2=80=99s =E2=80=9Cdescription=E2=80=9D =
statement is both incomplete and hard to read. How about replacing it =
with =E2=80=9CThis YANG module defines an RPC called =
=E2=80=98factory-reset=E2=80=99, a datastore identity called =
=E2=80=98factory-default=E2=80=99, and and identity called =
'factory-default-datastore=E2=80=99."

22) Section 4, in the "factory-reset=E2=80=9D RPC: replace =
"(i.e.,<running> , <startup>,and <candidate>)=E2=80=9D with  "(i.e., =
<running> , <startup>, and <candidate>)=E2=80=9D. =20

23) Section 4, in the description statement for the "factory-default=E2=80=
=9D identity, apply the same change from (2) above.  Also, =E2=80=9Cof =
the=E2=80=9D should be =E2=80=9Cof the=E2=80=9D.

24) Section 5, why are the registrations triple-spaced?

25) Section 6: replace the 2nd paragraph with =E2=80=9CAccess to the =
<factory-reset> RPC operation is considered sensitive in and therefore =
has been restricted using the 'default-deny-all=E2=80=99 access control =
defined in [RFC8341].=E2=80=9D



Comments Not Bound to Specific Sections:

A) The =E2=80=98<factory-default>=E2=80=99 notation should be introduced =
before first use, which occurs inside a parentheses in Section 2.

B) =E2=80=9Cfactory-default=E2=80=9D and =E2=80=9Cfactory default=E2=80=9D=
 (without the hyphen) are used inconsistently.  Recommend using the =
hyphenated form when referring to YANG node, i.e., "the =
=E2=80=98factory-default=E2=80=99 datastore=E2=80=9D and =
"<factory-default>=E2=80=9D.

C) =E2=80=9Cfactory-reset=E2=80=9D and =E2=80=9Cfactory reset" (without =
the hyphen) are used inconsistently.  Recommend using the hyphenated =
form when referring to YANG node, i.e., "the =E2=80=98factory-reset=E2=80=99=
 RPC=E2=80=9D and "<factory-reset>=E2=80=9D.

D) Replace =E2=80=9CHW=E2=80=9D with =E2=80=9Chardware=E2=80=9D (occurs =
three places in the draft).


Thanks,
Kent // as shepherd



--Apple-Mail=_42844381-9007-4FBA-8B0D-5AE8385ACD51
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">[catching up on an old shepherd action item]</div><div =
class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div>Authors,<br class=3D""><div class=3D""><br =
class=3D""></div><blockquote style=3D"margin: 0 0 0 40px; border: none; =
padding: 0px;" class=3D""><div class=3D"">While processing the shepherd =
writeup, I discovered some issues that should be fixed before this draft =
is forwarded to the IESG. &nbsp;Please submit an update so that I can =
continue the review.</div></blockquote><div class=3D""><br =
class=3D""></div><div class=3D"">WG,</div><div class=3D""><br =
class=3D""></div><blockquote style=3D"margin: 0 0 0 40px; border: none; =
padding: 0px;" class=3D""><div class=3D"">How is it that so many issues =
got through the Last-Call process?!</div></blockquote><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">Comments by Section:</div><div class=3D""><br =
class=3D""></div><div class=3D"">1) The abstract and Introduction both =
say =E2=80=9CWhen resetting a datastore, =E2=80=A6=E2=80=9D, but this =
isn=E2=80=99t the case anymore, I mean, we only reset the =
device,&nbsp;right?&nbsp;</div><div class=3D""><div class=3D""><br =
class=3D""></div><div class=3D"">2) The Abstract says =
=E2=80=9C=E2=80=A6datastore=E2=80=A6that contains data that will be =
copied over to the running datastore at reset.=E2=80=9D &nbsp;This is =
inconsistent with what is stated elsewhere about the contents going into =
all conventional datastores. &nbsp;Recommendation is to instead say that =
it contains the factory default configuration for the device.</div><div =
class=3D""><br class=3D""></div><div class=3D"">3) The Introduction says =
"This datastore can also be used in &lt;get-data&gt; operation=E2=80=9D =
- missing the word =E2=80=9Cthe=E2=80=9D before =
&lt;get-data&gt;.</div><div class=3D""><br class=3D""></div><div =
class=3D"">4) The Introduction=E2=80=99s 4th paragraph serves no purpose =
and asymmetrically calls out NETCONF. &nbsp;Please delete.<br =
class=3D""></div><div class=3D""><br class=3D""></div><div class=3D""><div=
 class=3D"">6) Section 1.1 says "A read-only configuration datastore =
holding a preconfigured minimal initial configuration that can be used =
to initialize the configuration of a server.=E2=80=9D &nbsp;Remove the =
word =E2=80=9Cminimal=E2=80=9D and replace =E2=80=9Ccan be=E2=80=9D with =
=E2=80=9Cis=E2=80=9D.</div></div><div class=3D""><br class=3D""></div><div=
 class=3D""><div class=3D"">7) Section 1.1 says "The content of the =
datastore is usually static, but MAY depend on external factors like =
available HW.=E2=80=9D &nbsp;This is not true. &nbsp;The contents are =
static, full stop. &nbsp;However, the application of the contents may =
vary based on factors such as HW present. &nbsp; But since this is =
always true, I recommend the entire sentence be removed. =
&nbsp;</div></div><div class=3D""><br class=3D""></div><div =
class=3D""><div class=3D"">8) Section 2 says "The contents of the =
&lt;operational&gt; datastore MUST be reset back to an appropriate =
factory-default state.=E2=80=9D &nbsp;I think words =E2=80=9Creset=E2=80=9D=
 and "factory-default state=E2=80=9D are misleading. &nbsp;Better would =
be to say =E2=80=9C=E2=80=A6MUST reflect the operational state of the =
device after applying the factory default =
configuration."</div></div><div class=3D""><div class=3D""><br =
class=3D""></div></div><div class=3D"">9) Section 2 says =E2=80=9C...MUST =
restore storage to factory condition, including remove log files, remove =
temporary files (from&nbsp;datastore or elsewhere).=E2=80=9D &nbsp;This =
is both grammatically incorrect and confusing. &nbsp;Recommend replacing =
with =E2=80=9C...MUST restore non-volatile storage to factory condition. =
&nbsp;Depending on the system, this may entail deleting dynamically =
generated files, such as those containing keys (e.g., /etc/ssl/private), =
certificates (e.g., /etc/ssl), and logs (e.g., /var/log), temporary =
files (/tmp/*).</div><div class=3D""><br class=3D""></div><div =
class=3D"">10) After applying the fix from (9) above, the following two =
sentences could be replaced with =E2=80=9CAll security sensitive data =
(i.e., private keys, passwords, etc.) SHOULD be overwritten with zeros =
or a pattern before deletion."</div><div class=3D""><br =
class=3D""></div><div class=3D"">11) Section 3: "Following guidelines =
for defining...=E2=80=9D should be "Following the guidelines for =
defining=E2=80=A6"</div><div class=3D""><br class=3D""></div><div =
class=3D"">12) Section 3: replace&nbsp;'factory-default=E2=80=99 with =
"factory-default=E2=80=9D. &nbsp;That is, use double-quotes. The only =
time single-quotes are used is when needing to quote something inside a =
YANG string.</div><div class=3D""><br class=3D""></div><div class=3D"">13)=
 Section 3:apply the same change described in (6) above wrt =
=E2=80=9Cminimal=E2=80=9D and =E2=80=9Ccan be=E2=80=9D.</div><div =
class=3D""><br class=3D""></div><div class=3D"">14) Section 3: remove =
the word =E2=80=9Conly=E2=80=9D from "A device MAY only implement the =
&lt;factory-reset&gt; RPC without implementing the 'factory-default=E2=80=99=
 datastore=E2=80=9D, or replace =E2=80=9Cwithout=E2=80=9D with =E2=80=9C, =
i.e., without=E2=80=9D.</div><div class=3D""><br class=3D""></div><div =
class=3D"">15) Section 3: replace "which make it lose the ability to see =
what configuration the device would be reset back to=E2=80=9D with =
=E2=80=9Cwhich would only eliminate the ability to programmatically =
determine the factory default configuration=E2=80=9D.</div><div =
class=3D""><br class=3D""></div><div class=3D"">16) Section 3; replace =
"RESTCONF,the CLI etcunless=E2=80=9D with =E2=80=9CRESTCONF, the CLI, =
etc. unless=E2=80=9D&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">17) Section 3 needs to also mention that &lt;candidate&gt;, =
if present, is initialized to the contents of =
&lt;factory-default&gt;</div><div class=3D""><br class=3D""></div><div =
class=3D"">18) Section 3: the word =E2=80=9Cusually=E2=80=9D in the =
sentence "The datastore content is usually defined by the device =
vendor.=E2=80=9D Should either be removed or explained how it could ever =
not be the case. &nbsp;(I recommend the former)</div><div class=3D""><br =
class=3D""></div><div class=3D"">19) Section 3: apply the same change =
described in (7) above.</div><div class=3D""><br class=3D""></div><div =
class=3D"">20) both of the =E2=80=98import=E2=80=99 statements are =
missing =E2=80=98reference=E2=80=99 statements.=E2=80=9D</div><div =
class=3D""><br class=3D""></div><div class=3D"">21) Section 4: the =
module=E2=80=99s =E2=80=9Cdescription=E2=80=9D statement is both =
incomplete and hard to read. How about replacing it with =E2=80=9CThis =
YANG module defines an RPC called =E2=80=98factory-reset=E2=80=99, a =
datastore identity called =E2=80=98factory-default=E2=80=99, and and =
identity called 'factory-default-datastore=E2=80=99."</div><div =
class=3D""><br class=3D""></div><div class=3D"">22) Section 4, in the =
"factory-reset=E2=80=9D RPC: replace "(i.e.,&lt;running&gt; , =
&lt;startup&gt;,and &lt;candidate&gt;)=E2=80=9D with&nbsp;&nbsp;"(i.e., =
&lt;running&gt; , &lt;startup&gt;, and &lt;candidate&gt;)=E2=80=9D. =
&nbsp;</div><div class=3D""><br class=3D""></div><div class=3D"">23) =
Section 4, in the description statement for the "factory-default=E2=80=9D =
identity, apply the same change from (2) above. &nbsp;Also, =E2=80=9Cof =
the=E2=80=9D should be =E2=80=9Cof the=E2=80=9D.</div><div class=3D""><br =
class=3D""></div><div class=3D"">24) Section 5, why are the =
registrations triple-spaced?</div><div class=3D""><br =
class=3D""></div><div class=3D"">25) Section 6: replace the 2nd =
paragraph with =E2=80=9CAccess to the &lt;factory-reset&gt; RPC =
operation is considered sensitive in and therefore has been restricted =
using the '<span style=3D"color: rgb(0, 0, 0); font-size: 13.3333px; =
orphans: 2; widows: 2;" class=3D"">default-deny-all</span>=E2=80=99 =
access control defined in [RFC8341].=E2=80=9D</div></div><div =
class=3D""><br class=3D""><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D"">Comments Not Bound to =
Specific Sections:</div><div class=3D""><br class=3D""></div><div =
class=3D""><div class=3D"">A)&nbsp;The =E2=80=98&lt;factory-default&gt;=E2=
=80=99 notation should be introduced before first use, which occurs =
inside a parentheses in Section 2.</div></div><div class=3D""><br =
class=3D""></div><div class=3D"">B) =E2=80=9Cfactory-default=E2=80=9D =
and =E2=80=9Cfactory default=E2=80=9D (without the hyphen) are used =
inconsistently. &nbsp;Recommend using the hyphenated form when referring =
to YANG node, i.e., "the =E2=80=98factory-default=E2=80=99 datastore=E2=80=
=9D and "&lt;factory-default&gt;=E2=80=9D.</div><div class=3D""><br =
class=3D""></div><div class=3D""><div class=3D"">C) =E2=80=9Cfactory-reset=
=E2=80=9D and =E2=80=9Cfactory&nbsp;reset" (without the hyphen) are used =
inconsistently. &nbsp;Recommend using the hyphenated form when referring =
to YANG node, i.e., "the =E2=80=98factory-reset=E2=80=99 RPC=E2=80=9D =
and "&lt;factory-reset&gt;=E2=80=9D.</div><div class=3D""><br =
class=3D""></div>D) Replace =E2=80=9CHW=E2=80=9D with =E2=80=9Chardware=E2=
=80=9D (occurs three places in the draft).<br class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D"">Kent // as shepherd</div><div =
class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_42844381-9007-4FBA-8B0D-5AE8385ACD51--


From nobody Mon Feb 10 08:00:28 2020
Return-Path: <010001702b67d068-d2ad4872-84a9-44c7-823e-6813e7434211-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8EED12007A for <netmod@ietfa.amsl.com>; Sun,  9 Feb 2020 11:23:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id juxAPQYB47SK for <netmod@ietfa.amsl.com>; Sun,  9 Feb 2020 11:23:10 -0800 (PST)
Received: from a48-92.smtp-out.amazonses.com (a48-92.smtp-out.amazonses.com [54.240.48.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30612120047 for <netmod@ietf.org>; Sun,  9 Feb 2020 11:23:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581276188; h=From:Content-Type:Content-Transfer-Encoding:Mime-Version:Subject:Date:References:To:In-Reply-To:Message-Id:Feedback-ID; bh=GqX0cGa3wYxvSAd/O5nyh1Z5gjUQ1ciTk27glNkiBew=; b=at8MCvt+h2XF7/lI1qWyTxzzXSTA3muZyNtlzqgKJQ5Ca200GTc+4oSXUJ3302dF BUlSP8VgVSGEWnRNyRHHZ1i2dA9/u8wo83Ay7tgjXzFla1sdirR6N1XkNfS0DoAzr0h 2uKHCaJNGcJ3J8IKCkq//18OxrjG01P/Xs57p3EA=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sun, 9 Feb 2020 19:23:08 +0000
References: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com>
To: "netmod@ietf.org" <netmod@ietf.org>
In-Reply-To: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com>
Message-ID: <010001702b67d068-d2ad4872-84a9-44c7-823e-6813e7434211-000000@email.amazonses.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.09-54.240.48.92
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/CmzROUDr2hXIKBc6RsNHyzrTU_U>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 09 Feb 2020 19:23:12 -0000

This message closes the WGLC.

Authors, please respond to Juergen=E2=80=99s message from Jan 20, =
ultimately posting an update to the draft.

Thanks,
Kent // as shepherd



> On Jan 7, 2020, at 7:41 AM, Kent Watsen <kent+ietf@watsen.net> wrote:
>=20
>=20
> This begins a two-week Working Group Last Call (WGLC) on =
draft-ietf-netmod-yang-instance-file-format-06.  The WGLC ends on Jan =
21.  Please send your comments to the working group mailing list.
>=20
> Positive comments, e.g., "I've reviewed this document and believe it =
is ready for publication", are welcome!  This is useful and important, =
even from authors.  Objections, concerns, and suggestions are also =
welcomed at this time.
>=20
> Thank you,
> NETMOD Chairs
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Mon Feb 10 08:02:53 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97275120091; Sun,  9 Feb 2020 19:44:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VwfCK6llPqHE; Sun,  9 Feb 2020 19:44:23 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D535212008C; Sun,  9 Feb 2020 19:44:22 -0800 (PST)
Received: from lhreml705-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 3C9B6178C3004D70D7F2; Mon, 10 Feb 2020 03:44:20 +0000 (GMT)
Received: from DGGEML402-HUB.china.huawei.com (10.3.17.38) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 10 Feb 2020 03:44:19 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.52]) by DGGEML402-HUB.china.huawei.com ([fe80::fca6:7568:4ee3:c776%31]) with mapi id 14.03.0439.000; Mon, 10 Feb 2020 11:44:15 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, draft-ietf-netmod-factory-default <draft-ietf-netmod-factory-default@ietf.org>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-09.txt
Thread-Index: AdXfwyK0JLSi2UxiRF6STzrC5sXmTw==
Date: Mon, 10 Feb 2020 03:44:15 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA96514D0@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA96514D0dggeml511mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/yIy-V0E3q2PpBVA-WObXBtWNuFQ>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-09.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 03:44:27 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA96514D0dggeml511mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

VGhhbmtzIEtlbnQgZm9yIHNoZXBoZXJkIHJldmlldyBjb21tZW50cyBhbmQgd2lsbCBpc3N1ZSBu
ZXcgdmVyc2lvbiBzb29uIHRvIGFkZHJlc3MgdGhlc2UgY29tbWVudHMuDQoNCuWPkeS7tuS6ujog
S2VudCBXYXRzZW4gW21haWx0bzprZW50K2lldGZAd2F0c2VuLm5ldF0NCuWPkemAgeaXtumXtDog
MjAyMOW5tDLmnIgxMOaXpSAzOjE2DQrmlLbku7bkuro6IGRyYWZ0LWlldGYtbmV0bW9kLWZhY3Rv
cnktZGVmYXVsdCA8ZHJhZnQtaWV0Zi1uZXRtb2QtZmFjdG9yeS1kZWZhdWx0QGlldGYub3JnPg0K
5oqE6YCBOiBuZXRtb2RAaWV0Zi5vcmcNCuS4u+mimDogUmU6IEktRCBBY3Rpb246IGRyYWZ0LWll
dGYtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wOS50eHQNCg0KW2NhdGNoaW5nIHVwIG9uIGFuIG9s
ZCBzaGVwaGVyZCBhY3Rpb24gaXRlbV0NCg0KDQpBdXRob3JzLA0KDQpXaGlsZSBwcm9jZXNzaW5n
IHRoZSBzaGVwaGVyZCB3cml0ZXVwLCBJIGRpc2NvdmVyZWQgc29tZSBpc3N1ZXMgdGhhdCBzaG91
bGQgYmUgZml4ZWQgYmVmb3JlIHRoaXMgZHJhZnQgaXMgZm9yd2FyZGVkIHRvIHRoZSBJRVNHLiAg
UGxlYXNlIHN1Ym1pdCBhbiB1cGRhdGUgc28gdGhhdCBJIGNhbiBjb250aW51ZSB0aGUgcmV2aWV3
Lg0KDQpXRywNCg0KSG93IGlzIGl0IHRoYXQgc28gbWFueSBpc3N1ZXMgZ290IHRocm91Z2ggdGhl
IExhc3QtQ2FsbCBwcm9jZXNzPyENCg0KW1Fpbl06IEkgYmVsaWV2ZSBtYW55IG9mIHRoZW0gYXJl
IHdvcmRzbWl0aCBpbnB1dCwgSSBhbSBoYXBweSB0byBhY2NlcHQgdGhlbSwgdGhhbmtzIEtlbnQu
DQpDb21tZW50cyBieSBTZWN0aW9uOg0KDQoxKSBUaGUgYWJzdHJhY3QgYW5kIEludHJvZHVjdGlv
biBib3RoIHNheSDigJxXaGVuIHJlc2V0dGluZyBhIGRhdGFzdG9yZSwg4oCm4oCdLCBidXQgdGhp
cyBpc27igJl0IHRoZSBjYXNlIGFueW1vcmUsIEkgbWVhbiwgd2Ugb25seSByZXNldCB0aGUgZGV2
aWNlLCByaWdodD8NCg0KW1Fpbl06WWVzLCB3aWxsIHVwZGF0ZSB0aGUgZHJhZnQgdG8gcmVmbGVj
dCB0aGlzLg0KMikgVGhlIEFic3RyYWN0IHNheXMg4oCc4oCmZGF0YXN0b3Jl4oCmdGhhdCBjb250
YWlucyBkYXRhIHRoYXQgd2lsbCBiZSBjb3BpZWQgb3ZlciB0byB0aGUgcnVubmluZyBkYXRhc3Rv
cmUgYXQgcmVzZXQu4oCdICBUaGlzIGlzIGluY29uc2lzdGVudCB3aXRoIHdoYXQgaXMgc3RhdGVk
IGVsc2V3aGVyZSBhYm91dCB0aGUgY29udGVudHMgZ29pbmcgaW50byBhbGwgY29udmVudGlvbmFs
IGRhdGFzdG9yZXMuICBSZWNvbW1lbmRhdGlvbiBpcyB0byBpbnN0ZWFkIHNheSB0aGF0IGl0IGNv
bnRhaW5zIHRoZSBmYWN0b3J5IGRlZmF1bHQgY29uZmlndXJhdGlvbiBmb3IgdGhlIGRldmljZS4N
Cg0KW1Fpbl06R29vZCBzdWdnZXN0aW9uIHRvIGFkZHJlc3MgaW5jb25zaXN0ZW5jeSBpc3N1ZS4g
VGhhbmtzLg0KMykgVGhlIEludHJvZHVjdGlvbiBzYXlzICJUaGlzIGRhdGFzdG9yZSBjYW4gYWxz
byBiZSB1c2VkIGluIDxnZXQtZGF0YT4gb3BlcmF0aW9u4oCdIC0gbWlzc2luZyB0aGUgd29yZCDi
gJx0aGXigJ0gYmVmb3JlIDxnZXQtZGF0YT4uDQpbUWluXTogT2theS4NCjQpIFRoZSBJbnRyb2R1
Y3Rpb27igJlzIDR0aCBwYXJhZ3JhcGggc2VydmVzIG5vIHB1cnBvc2UgYW5kIGFzeW1tZXRyaWNh
bGx5IGNhbGxzIG91dCBORVRDT05GLiAgUGxlYXNlIGRlbGV0ZS4NCltRaW5dOiBXb3JrcyBmb3Ig
bWUuDQo2KSBTZWN0aW9uIDEuMSBzYXlzICJBIHJlYWQtb25seSBjb25maWd1cmF0aW9uIGRhdGFz
dG9yZSBob2xkaW5nIGEgcHJlY29uZmlndXJlZCBtaW5pbWFsIGluaXRpYWwgY29uZmlndXJhdGlv
biB0aGF0IGNhbiBiZSB1c2VkIHRvIGluaXRpYWxpemUgdGhlIGNvbmZpZ3VyYXRpb24gb2YgYSBz
ZXJ2ZXIu4oCdICBSZW1vdmUgdGhlIHdvcmQg4oCcbWluaW1hbOKAnSBhbmQgcmVwbGFjZSDigJxj
YW4gYmXigJ0gd2l0aCDigJxpc+KAnS4NCltRaW5dOk9rYXkuDQo3KSBTZWN0aW9uIDEuMSBzYXlz
ICJUaGUgY29udGVudCBvZiB0aGUgZGF0YXN0b3JlIGlzIHVzdWFsbHkgc3RhdGljLCBidXQgTUFZ
IGRlcGVuZCBvbiBleHRlcm5hbCBmYWN0b3JzIGxpa2UgYXZhaWxhYmxlIEhXLuKAnSAgVGhpcyBp
cyBub3QgdHJ1ZS4gIFRoZSBjb250ZW50cyBhcmUgc3RhdGljLCBmdWxsIHN0b3AuICBIb3dldmVy
LCB0aGUgYXBwbGljYXRpb24gb2YgdGhlIGNvbnRlbnRzIG1heSB2YXJ5IGJhc2VkIG9uIGZhY3Rv
cnMgc3VjaCBhcyBIVyBwcmVzZW50LiAgIEJ1dCBzaW5jZSB0aGlzIGlzIGFsd2F5cyB0cnVlLCBJ
IHJlY29tbWVuZCB0aGUgZW50aXJlIHNlbnRlbmNlIGJlIHJlbW92ZWQuDQpbUWluXTogV29ya3Mg
Zm9yIG1lLg0KOCkgU2VjdGlvbiAyIHNheXMgIlRoZSBjb250ZW50cyBvZiB0aGUgPG9wZXJhdGlv
bmFsPiBkYXRhc3RvcmUgTVVTVCBiZSByZXNldCBiYWNrIHRvIGFuIGFwcHJvcHJpYXRlIGZhY3Rv
cnktZGVmYXVsdCBzdGF0ZS7igJ0gIEkgdGhpbmsgd29yZHMg4oCccmVzZXTigJ0gYW5kICJmYWN0
b3J5LWRlZmF1bHQgc3RhdGXigJ0gYXJlIG1pc2xlYWRpbmcuICBCZXR0ZXIgd291bGQgYmUgdG8g
c2F5IOKAnOKApk1VU1QgcmVmbGVjdCB0aGUgb3BlcmF0aW9uYWwgc3RhdGUgb2YgdGhlIGRldmlj
ZSBhZnRlciBhcHBseWluZyB0aGUgZmFjdG9yeSBkZWZhdWx0IGNvbmZpZ3VyYXRpb24uIg0KW1Fp
bl06R29vZCBzdWdnZXN0aW9uLg0KOSkgU2VjdGlvbiAyIHNheXMg4oCcLi4uTVVTVCByZXN0b3Jl
IHN0b3JhZ2UgdG8gZmFjdG9yeSBjb25kaXRpb24sIGluY2x1ZGluZyByZW1vdmUgbG9nIGZpbGVz
LCByZW1vdmUgdGVtcG9yYXJ5IGZpbGVzIChmcm9tIGRhdGFzdG9yZSBvciBlbHNld2hlcmUpLuKA
nSAgVGhpcyBpcyBib3RoIGdyYW1tYXRpY2FsbHkgaW5jb3JyZWN0IGFuZCBjb25mdXNpbmcuICBS
ZWNvbW1lbmQgcmVwbGFjaW5nIHdpdGgg4oCcLi4uTVVTVCByZXN0b3JlIG5vbi12b2xhdGlsZSBz
dG9yYWdlIHRvIGZhY3RvcnkgY29uZGl0aW9uLiAgRGVwZW5kaW5nIG9uIHRoZSBzeXN0ZW0sIHRo
aXMgbWF5IGVudGFpbCBkZWxldGluZyBkeW5hbWljYWxseSBnZW5lcmF0ZWQgZmlsZXMsIHN1Y2gg
YXMgdGhvc2UgY29udGFpbmluZyBrZXlzIChlLmcuLCAvZXRjL3NzbC9wcml2YXRlKSwgY2VydGlm
aWNhdGVzIChlLmcuLCAvZXRjL3NzbCksIGFuZCBsb2dzIChlLmcuLCAvdmFyL2xvZyksIHRlbXBv
cmFyeSBmaWxlcyAoL3RtcC8qKS4NCltRaW5dOiBNYWtlIHNlbnNlLCB0aGFua3MuDQoxMCkgQWZ0
ZXIgYXBwbHlpbmcgdGhlIGZpeCBmcm9tICg5KSBhYm92ZSwgdGhlIGZvbGxvd2luZyB0d28gc2Vu
dGVuY2VzIGNvdWxkIGJlIHJlcGxhY2VkIHdpdGgg4oCcQWxsIHNlY3VyaXR5IHNlbnNpdGl2ZSBk
YXRhIChpLmUuLCBwcml2YXRlIGtleXMsIHBhc3N3b3JkcywgZXRjLikgU0hPVUxEIGJlIG92ZXJ3
cml0dGVuIHdpdGggemVyb3Mgb3IgYSBwYXR0ZXJuIGJlZm9yZSBkZWxldGlvbi4iDQpbUWluXTog
T2theS4NCjExKSBTZWN0aW9uIDM6ICJGb2xsb3dpbmcgZ3VpZGVsaW5lcyBmb3IgZGVmaW5pbmcu
Li7igJ0gc2hvdWxkIGJlICJGb2xsb3dpbmcgdGhlIGd1aWRlbGluZXMgZm9yIGRlZmluaW5n4oCm
Ig0KW1Fpbl06T2theS4NCjEyKSBTZWN0aW9uIDM6IHJlcGxhY2UgJ2ZhY3RvcnktZGVmYXVsdOKA
mSB3aXRoICJmYWN0b3J5LWRlZmF1bHTigJ0uICBUaGF0IGlzLCB1c2UgZG91YmxlLXF1b3Rlcy4g
VGhlIG9ubHkgdGltZSBzaW5nbGUtcXVvdGVzIGFyZSB1c2VkIGlzIHdoZW4gbmVlZGluZyB0byBx
dW90ZSBzb21ldGhpbmcgaW5zaWRlIGEgWUFORyBzdHJpbmcuDQpbUWluXTpPa2F5Lg0KMTMpIFNl
Y3Rpb24gMzphcHBseSB0aGUgc2FtZSBjaGFuZ2UgZGVzY3JpYmVkIGluICg2KSBhYm92ZSB3cnQg
4oCcbWluaW1hbOKAnSBhbmQg4oCcY2FuIGJl4oCdLg0KW1Fpbl06T2theS4NCjE0KSBTZWN0aW9u
IDM6IHJlbW92ZSB0aGUgd29yZCDigJxvbmx54oCdIGZyb20gIkEgZGV2aWNlIE1BWSBvbmx5IGlt
cGxlbWVudCB0aGUgPGZhY3RvcnktcmVzZXQ+IFJQQyB3aXRob3V0IGltcGxlbWVudGluZyB0aGUg
J2ZhY3RvcnktZGVmYXVsdOKAmSBkYXRhc3RvcmXigJ0sIG9yIHJlcGxhY2Ug4oCcd2l0aG91dOKA
nSB3aXRoIOKAnCwgaS5lLiwgd2l0aG91dOKAnS4NCltRaW5dOk9rYXkuDQoxNSkgU2VjdGlvbiAz
OiByZXBsYWNlICJ3aGljaCBtYWtlIGl0IGxvc2UgdGhlIGFiaWxpdHkgdG8gc2VlIHdoYXQgY29u
ZmlndXJhdGlvbiB0aGUgZGV2aWNlIHdvdWxkIGJlIHJlc2V0IGJhY2sgdG/igJ0gd2l0aCDigJx3
aGljaCB3b3VsZCBvbmx5IGVsaW1pbmF0ZSB0aGUgYWJpbGl0eSB0byBwcm9ncmFtbWF0aWNhbGx5
IGRldGVybWluZSB0aGUgZmFjdG9yeSBkZWZhdWx0IGNvbmZpZ3VyYXRpb27igJ0uDQpbUWluXTpP
a2F5Lg0KMTYpIFNlY3Rpb24gMzsgcmVwbGFjZSAiUkVTVENPTkYsdGhlIENMSSBldGN1bmxlc3Pi
gJ0gd2l0aCDigJxSRVNUQ09ORiwgdGhlIENMSSwgZXRjLiB1bmxlc3PigJ0NCltRaW5dOkdvb2Qg
Y2F0Y2ggZm9yIHRoZSB0eXBvLCB3aWxsIGZpeC4NCjE3KSBTZWN0aW9uIDMgbmVlZHMgdG8gYWxz
byBtZW50aW9uIHRoYXQgPGNhbmRpZGF0ZT4sIGlmIHByZXNlbnQsIGlzIGluaXRpYWxpemVkIHRv
IHRoZSBjb250ZW50cyBvZiA8ZmFjdG9yeS1kZWZhdWx0Pg0KW1Fpbl06T2theS4NCjE4KSBTZWN0
aW9uIDM6IHRoZSB3b3JkIOKAnHVzdWFsbHnigJ0gaW4gdGhlIHNlbnRlbmNlICJUaGUgZGF0YXN0
b3JlIGNvbnRlbnQgaXMgdXN1YWxseSBkZWZpbmVkIGJ5IHRoZSBkZXZpY2UgdmVuZG9yLuKAnSBT
aG91bGQgZWl0aGVyIGJlIHJlbW92ZWQgb3IgZXhwbGFpbmVkIGhvdyBpdCBjb3VsZCBldmVyIG5v
dCBiZSB0aGUgY2FzZS4gIChJIHJlY29tbWVuZCB0aGUgZm9ybWVyKQ0KW1Fpbl06T2theS4NCjE5
KSBTZWN0aW9uIDM6IGFwcGx5IHRoZSBzYW1lIGNoYW5nZSBkZXNjcmliZWQgaW4gKDcpIGFib3Zl
Lg0KW1Fpbl06T2theS4NCjIwKSBib3RoIG9mIHRoZSDigJhpbXBvcnTigJkgc3RhdGVtZW50cyBh
cmUgbWlzc2luZyDigJhyZWZlcmVuY2XigJkgc3RhdGVtZW50cy7igJ0NCltRaW5dOk9rYXkuDQoy
MSkgU2VjdGlvbiA0OiB0aGUgbW9kdWxl4oCZcyDigJxkZXNjcmlwdGlvbuKAnSBzdGF0ZW1lbnQg
aXMgYm90aCBpbmNvbXBsZXRlIGFuZCBoYXJkIHRvIHJlYWQuIEhvdyBhYm91dCByZXBsYWNpbmcg
aXQgd2l0aCDigJxUaGlzIFlBTkcgbW9kdWxlIGRlZmluZXMgYW4gUlBDIGNhbGxlZCDigJhmYWN0
b3J5LXJlc2V04oCZLCBhIGRhdGFzdG9yZSBpZGVudGl0eSBjYWxsZWQg4oCYZmFjdG9yeS1kZWZh
dWx04oCZLCBhbmQgYW5kIGlkZW50aXR5IGNhbGxlZCAnZmFjdG9yeS1kZWZhdWx0LWRhdGFzdG9y
ZeKAmS4iDQpbUWluXTpPa2F5Lg0KMjIpIFNlY3Rpb24gNCwgaW4gdGhlICJmYWN0b3J5LXJlc2V0
4oCdIFJQQzogcmVwbGFjZSAiKGkuZS4sPHJ1bm5pbmc+ICwgPHN0YXJ0dXA+LGFuZCA8Y2FuZGlk
YXRlPinigJ0gd2l0aCAgIihpLmUuLCA8cnVubmluZz4gLCA8c3RhcnR1cD4sIGFuZCA8Y2FuZGlk
YXRlPinigJ0uDQpbUWluXTpPa2F5Lg0KMjMpIFNlY3Rpb24gNCwgaW4gdGhlIGRlc2NyaXB0aW9u
IHN0YXRlbWVudCBmb3IgdGhlICJmYWN0b3J5LWRlZmF1bHTigJ0gaWRlbnRpdHksIGFwcGx5IHRo
ZSBzYW1lIGNoYW5nZSBmcm9tICgyKSBhYm92ZS4gIEFsc28sIOKAnG9mIHRoZeKAnSBzaG91bGQg
YmUg4oCcb2YgdGhl4oCdLg0KW1Fpbl06T2theS4NCjI0KSBTZWN0aW9uIDUsIHdoeSBhcmUgdGhl
IHJlZ2lzdHJhdGlvbnMgdHJpcGxlLXNwYWNlZD8NCltRaW5dOk9rYXkuDQoyNSkgU2VjdGlvbiA2
OiByZXBsYWNlIHRoZSAybmQgcGFyYWdyYXBoIHdpdGgg4oCcQWNjZXNzIHRvIHRoZSA8ZmFjdG9y
eS1yZXNldD4gUlBDIG9wZXJhdGlvbiBpcyBjb25zaWRlcmVkIHNlbnNpdGl2ZSBpbiBhbmQgdGhl
cmVmb3JlIGhhcyBiZWVuIHJlc3RyaWN0ZWQgdXNpbmcgdGhlICdkZWZhdWx0LWRlbnktYWxs4oCZ
IGFjY2VzcyBjb250cm9sIGRlZmluZWQgaW4gW1JGQzgzNDFdLuKAnQ0KW1Fpbl06T2theS4NCg0K
DQpDb21tZW50cyBOb3QgQm91bmQgdG8gU3BlY2lmaWMgU2VjdGlvbnM6DQoNCkEpIFRoZSDigJg8
ZmFjdG9yeS1kZWZhdWx0PuKAmSBub3RhdGlvbiBzaG91bGQgYmUgaW50cm9kdWNlZCBiZWZvcmUg
Zmlyc3QgdXNlLCB3aGljaCBvY2N1cnMgaW5zaWRlIGEgcGFyZW50aGVzZXMgaW4gU2VjdGlvbiAy
Lg0KW1Fpbl06IFdpbGwgYWRkIGEgdGVybSBpbiB0aGUgdGVybWlub2xvZ3kgc2VjdGlvbi4NCkIp
IOKAnGZhY3RvcnktZGVmYXVsdOKAnSBhbmQg4oCcZmFjdG9yeSBkZWZhdWx04oCdICh3aXRob3V0
IHRoZSBoeXBoZW4pIGFyZSB1c2VkIGluY29uc2lzdGVudGx5LiAgUmVjb21tZW5kIHVzaW5nIHRo
ZSBoeXBoZW5hdGVkIGZvcm0gd2hlbiByZWZlcnJpbmcgdG8gWUFORyBub2RlLCBpLmUuLCAidGhl
IOKAmGZhY3RvcnktZGVmYXVsdOKAmSBkYXRhc3RvcmXigJ0gYW5kICI8ZmFjdG9yeS1kZWZhdWx0
PuKAnS4NCltRaW5dOk9rYXkuDQpDKSDigJxmYWN0b3J5LXJlc2V04oCdIGFuZCDigJxmYWN0b3J5
IHJlc2V0IiAod2l0aG91dCB0aGUgaHlwaGVuKSBhcmUgdXNlZCBpbmNvbnNpc3RlbnRseS4gIFJl
Y29tbWVuZCB1c2luZyB0aGUgaHlwaGVuYXRlZCBmb3JtIHdoZW4gcmVmZXJyaW5nIHRvIFlBTkcg
bm9kZSwgaS5lLiwgInRoZSDigJhmYWN0b3J5LXJlc2V04oCZIFJQQ+KAnSBhbmQgIjxmYWN0b3J5
LXJlc2V0PuKAnS4NCltRaW5dOk9rYXkuDQpEKSBSZXBsYWNlIOKAnEhX4oCdIHdpdGgg4oCcaGFy
ZHdhcmXigJ0gKG9jY3VycyB0aHJlZSBwbGFjZXMgaW4gdGhlIGRyYWZ0KS4NCltRaW5dOk9rYXku
DQoNClRoYW5rcywNCktlbnQgLy8gYXMgc2hlcGhlcmQNCg0KDQo=

--_000_B8F9A780D330094D99AF023C5877DABAA96514D0dggeml511mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA96514D0dggeml511mbxchi_--


From nobody Mon Feb 10 08:02:59 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 733CA120020; Sun,  9 Feb 2020 20:25:45 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158130874533.13454.8955744324264214359@ietfa.amsl.com>
Date: Sun, 09 Feb 2020 20:25:45 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/3ofK1OaCM2zTxnT54inX7tKErmk>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 04:25:46 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Factory Default Setting
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-10.txt
	Pages           : 11
	Date            : 2020-02-09

Abstract:
   This document defines a method to reset a server to its factory-
   default content.  The reset operation may be used, e.g., when the
   existing configuration has major errors so re-starting the
   configuration process from scratch is the best option.

   A new factory-reset RPC is defined.  When resetting a device, all
   previous configuration settings will be lost and replaced by the
   factory-default content.

   A new optional "factory-default" read-only datastore is defined, that
   contains the factory default configuration for the device.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-10
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Feb 10 08:03:04 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72B8712007C for <netmod@ietfa.amsl.com>; Sun,  9 Feb 2020 20:28:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s9N5QBNue75I for <netmod@ietfa.amsl.com>; Sun,  9 Feb 2020 20:28:14 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A99A9120020 for <netmod@ietf.org>; Sun,  9 Feb 2020 20:28:14 -0800 (PST)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id C2608C86DB5411DC7E82 for <netmod@ietf.org>; Mon, 10 Feb 2020 04:28:12 +0000 (GMT)
Received: from lhreml728-chm.china.huawei.com (10.201.108.79) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 10 Feb 2020 04:28:12 +0000
Received: from lhreml728-chm.china.huawei.com (10.201.108.79) by lhreml728-chm.china.huawei.com (10.201.108.79) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 10 Feb 2020 04:28:12 +0000
Received: from DGGEML424-HUB.china.huawei.com (10.1.199.41) by lhreml728-chm.china.huawei.com (10.201.108.79) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Mon, 10 Feb 2020 04:28:11 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.52]) by dggeml424-hub.china.huawei.com ([10.1.199.41]) with mapi id 14.03.0439.000; Mon, 10 Feb 2020 12:28:05 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: New Version Notification for draft-ietf-netmod-factory-default-10.txt
Thread-Index: AdXfyntjRQVzQJSeTSmFeUgK+LE5SA==
Date: Mon, 10 Feb 2020 04:28:04 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA9651B70@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/zyeXJxEBfIe00S5CGB5Ncty1X-c>
Subject: Re: [netmod] New Version Notification for draft-ietf-netmod-factory-default-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 04:28:16 -0000

VGhlIHYtMTAgaXMgcG9zdGVkIHRvIGFkZHJlc3MgY29tbWVudHMgcmFpc2VkIGluIFNoZXBoZXJk
IGRvY3VtZW50IHJldmlldy4NClRoZSBkaWZmIGlzOg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvcmZj
ZGlmZj91cmwyPWRyYWZ0LWlldGYtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0xMA0KDQotUWluDQot
LS0tLemCruS7tuWOn+S7ti0tLS0tDQrlj5Hku7bkuro6IGludGVybmV0LWRyYWZ0c0BpZXRmLm9y
ZyBbbWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZ10gDQrlj5HpgIHml7bpl7Q6IDIwMjDl
ubQy5pyIMTDml6UgMTI6MjYNCuaUtuS7tuS6ujogTml1eWUgPG5pdXllQGh1YXdlaS5jb20+OyBR
aW4gV3UgPGJpbGwud3VAaHVhd2VpLmNvbT47IFFpbiBXdSA8YmlsbC53dUBodWF3ZWkuY29tPjsg
QmFsYXpzIExlbmd5ZWwgPGJhbGF6cy5sZW5neWVsQGVyaWNzc29uLmNvbT4NCuS4u+mimDogTmV3
IFZlcnNpb24gTm90aWZpY2F0aW9uIGZvciBkcmFmdC1pZXRmLW5ldG1vZC1mYWN0b3J5LWRlZmF1
bHQtMTAudHh0DQoNCg0KQSBuZXcgdmVyc2lvbiBvZiBJLUQsIGRyYWZ0LWlldGYtbmV0bW9kLWZh
Y3RvcnktZGVmYXVsdC0xMC50eHQNCmhhcyBiZWVuIHN1Y2Nlc3NmdWxseSBzdWJtaXR0ZWQgYnkg
UWluIFd1IGFuZCBwb3N0ZWQgdG8gdGhlIElFVEYgcmVwb3NpdG9yeS4NCg0KTmFtZToJCWRyYWZ0
LWlldGYtbmV0bW9kLWZhY3RvcnktZGVmYXVsdA0KUmV2aXNpb246CTEwDQpUaXRsZToJCUZhY3Rv
cnkgRGVmYXVsdCBTZXR0aW5nDQpEb2N1bWVudCBkYXRlOgkyMDIwLTAyLTA5DQpHcm91cDoJCW5l
dG1vZA0KUGFnZXM6CQkxMQ0KVVJMOiAgICAgICAgICAgIGh0dHBzOi8vd3d3LmlldGYub3JnL2lu
dGVybmV0LWRyYWZ0cy9kcmFmdC1pZXRmLW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMTAudHh0DQpT
dGF0dXM6ICAgICAgICAgaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0
Zi1uZXRtb2QtZmFjdG9yeS1kZWZhdWx0Lw0KSHRtbGl6ZWQ6ICAgICAgIGh0dHBzOi8vdG9vbHMu
aWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMTANCkh0bWxp
emVkOiAgICAgICBodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9odG1sL2RyYWZ0LWll
dGYtbmV0bW9kLWZhY3RvcnktZGVmYXVsdA0KRGlmZjogICAgICAgICAgIGh0dHBzOi8vd3d3Lmll
dGYub3JnL3JmY2RpZmY/dXJsMj1kcmFmdC1pZXRmLW5ldG1vZC1mYWN0b3J5LWRlZmF1bHQtMTAN
Cg0KQWJzdHJhY3Q6DQogICBUaGlzIGRvY3VtZW50IGRlZmluZXMgYSBtZXRob2QgdG8gcmVzZXQg
YSBzZXJ2ZXIgdG8gaXRzIGZhY3RvcnktDQogICBkZWZhdWx0IGNvbnRlbnQuICBUaGUgcmVzZXQg
b3BlcmF0aW9uIG1heSBiZSB1c2VkLCBlLmcuLCB3aGVuIHRoZQ0KICAgZXhpc3RpbmcgY29uZmln
dXJhdGlvbiBoYXMgbWFqb3IgZXJyb3JzIHNvIHJlLXN0YXJ0aW5nIHRoZQ0KICAgY29uZmlndXJh
dGlvbiBwcm9jZXNzIGZyb20gc2NyYXRjaCBpcyB0aGUgYmVzdCBvcHRpb24uDQoNCiAgIEEgbmV3
IGZhY3RvcnktcmVzZXQgUlBDIGlzIGRlZmluZWQuICBXaGVuIHJlc2V0dGluZyBhIGRldmljZSwg
YWxsDQogICBwcmV2aW91cyBjb25maWd1cmF0aW9uIHNldHRpbmdzIHdpbGwgYmUgbG9zdCBhbmQg
cmVwbGFjZWQgYnkgdGhlDQogICBmYWN0b3J5LWRlZmF1bHQgY29udGVudC4NCg0KICAgQSBuZXcg
b3B0aW9uYWwgImZhY3RvcnktZGVmYXVsdCIgcmVhZC1vbmx5IGRhdGFzdG9yZSBpcyBkZWZpbmVk
LCB0aGF0DQogICBjb250YWlucyB0aGUgZmFjdG9yeSBkZWZhdWx0IGNvbmZpZ3VyYXRpb24gZm9y
IHRoZSBkZXZpY2UuDQoNCiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg
ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICANCg0KDQpQbGVhc2Ugbm90
ZSB0aGF0IGl0IG1heSB0YWtlIGEgY291cGxlIG9mIG1pbnV0ZXMgZnJvbSB0aGUgdGltZSBvZiBz
dWJtaXNzaW9uIHVudGlsIHRoZSBodG1saXplZCB2ZXJzaW9uIGFuZCBkaWZmIGFyZSBhdmFpbGFi
bGUgYXQgdG9vbHMuaWV0Zi5vcmcuDQoNClRoZSBJRVRGIFNlY3JldGFyaWF0DQoNCg==


From nobody Mon Feb 10 08:10:29 2020
Return-Path: <010001702fc09a71-4c62925a-1d46-4163-9157-866d574d96c4-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79AFB120255 for <netmod@ietfa.amsl.com>; Mon, 10 Feb 2020 07:38:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l8Aqo3L05aBo for <netmod@ietfa.amsl.com>; Mon, 10 Feb 2020 07:38:38 -0800 (PST)
Received: from a48-93.smtp-out.amazonses.com (a48-93.smtp-out.amazonses.com [54.240.48.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A9FC120232 for <netmod@ietf.org>; Mon, 10 Feb 2020 07:38:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581349116; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:Feedback-ID; bh=DUpNOyGA/Ket6pbm4ajL5HpK2AR21g/Bv4qApWPw3C0=; b=STOB5ur48pdyr5z7pgeenYhmv7ihHvxRmIZUpZBgWEiuK+nG0ifdqijSOVcuVc2v PBXwF2IUKeBVL/7bJCWYofHDefT76ZqgkvMwnsCswA0iqkflmP4rGSgIxdv0DWus+Mn NTrA8VmJxsRarbVmw5cRA6Ku68OuXq1RDUjHHSvQ=
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Kent Watsen <kent+ietf@watsen.net>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA9651B70@dggeml511-mbx.china.huawei.com>
Date: Mon, 10 Feb 2020 15:38:36 +0000
Cc: "netmod@ietf.org" <netmod@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-ID: <010001702fc09a71-4c62925a-1d46-4163-9157-866d574d96c4-000000@email.amazonses.com>
References: <B8F9A780D330094D99AF023C5877DABAA9651B70@dggeml511-mbx.china.huawei.com>
To: Qin Wu <bill.wu@huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.10-54.240.48.93
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DK3DIQMCyB5KQhFoIUz_CIZwsT8>
Subject: Re: [netmod] New Version Notification for draft-ietf-netmod-factory-default-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2020 15:38:40 -0000

Thanks for the update, Qin.

BTW, my previous email to the =E2=80=9Cnetmod=E2=80=9D list did not get =
reflected back to me, and I don=E2=80=99t see either of out emails in =
the archives, so there is a chance that we=E2=80=99re having this =
conversation in isolation, even though =E2=80=9Cnetmod=E2=80=9D is =
CC-ed=E2=80=A6.

Regardless, looking at the diffs, I have the following comments:

- I=E2=80=99m not happy with the new =E2=80=9Cfactory-default=E2=80=9D =
term.  Please remove it and review all uses of =E2=80=9Cfactory-default=E2=
=80=9D to see if they should be =E2=80=9Cfactory default=E2=80=9D =
(without the hyphen).  Again, the hyphen should only be used when =
referring to the YANG node; in all other cases it should not be =
hyphenated.  Please beware that I see I the diff you made an attempt to =
hyphenate a number of instances of what should be =E2=80=9Cfactory =
default=E2=80=9D.  Please undo all these.  Again, the hyphen should only =
be present when referring to the YANG node, otherwise the hyphen should =
not be present.

- In Section 2, replace ", and logs (e.g., /var/log), temporary files =
(e.g., /tmp/*)=E2=80=9D with ", logs (e.g., /var/log), and temporary =
files (e.g., /tmp/*).=E2=80=9D  That is, move the =E2=80=9Cand=E2=80=9D =
to the end...

- In the YANG module, you must=E2=80=99ve copy/pasted the description =
incompletely=E2=80=A6please add the last stanza from my previous email =
(=E2=80=9Ci.e., beginning with =E2=80=9Cand=E2=80=9D) to "This module =
defines an RPC called 'factory-reset', a datastore identity called =
'factory-default-datastore=E2=80=99=E2=80=9D.

- in Section 6:

  a) s/sensitive in and therefore/sensitive and therefore//
  b) s/default- deny-all/default-deny-all/
  c) s/in . [RFC8341]/in [RFC8341]./


Kent // as Shepherd


> On Feb 9, 2020, at 11:28 PM, Qin Wu <bill.wu@huawei.com> wrote:
>=20
> The v-10 is posted to address comments raised in Shepherd document =
review.
> The diff is:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-factory-default-10=

>=20
> -Qin
> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
> =E5=8F=91=E4=BB=B6=E4=BA=BA: internet-drafts@ietf.org =
[mailto:internet-drafts@ietf.org]=20
> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2020=E5=B9=B42=E6=9C=8810=E6=97=A5=
 12:26
> =E6=94=B6=E4=BB=B6=E4=BA=BA: Niuye <niuye@huawei.com>; Qin Wu =
<bill.wu@huawei.com>; Qin Wu <bill.wu@huawei.com>; Balazs Lengyel =
<balazs.lengyel@ericsson.com>
> =E4=B8=BB=E9=A2=98: New Version Notification for =
draft-ietf-netmod-factory-default-10.txt
>=20
>=20
> A new version of I-D, draft-ietf-netmod-factory-default-10.txt
> has been successfully submitted by Qin Wu and posted to the IETF =
repository.
>=20
> Name:		draft-ietf-netmod-factory-default
> Revision:	10
> Title:		Factory Default Setting
> Document date:	2020-02-09
> Group:		netmod
> Pages:		11
> URL:            =
https://www.ietf.org/internet-drafts/draft-ietf-netmod-factory-default-10.=
txt
> Status:         =
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/
> Htmlized:       =
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-10
> Htmlized:       =
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default
> Diff:           =
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netmod-factory-default-10
>=20
> Abstract:
>   This document defines a method to reset a server to its factory-
>   default content.  The reset operation may be used, e.g., when the
>   existing configuration has major errors so re-starting the
>   configuration process from scratch is the best option.
>=20
>   A new factory-reset RPC is defined.  When resetting a device, all
>   previous configuration settings will be lost and replaced by the
>   factory-default content.
>=20
>   A new optional "factory-default" read-only datastore is defined, =
that
>   contains the factory default configuration for the device.
>=20
>=20
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission until the htmlized version and diff are available at =
tools.ietf.org.
>=20
> The IETF Secretariat
>=20


From nobody Mon Feb 10 18:40:23 2020
Return-Path: <oscar.gonzalezdedios@telefonica.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3432A1200B6; Mon, 10 Feb 2020 18:40:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nWtYMBbHsSdH; Mon, 10 Feb 2020 18:40:18 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150137.outbound.protection.outlook.com [40.107.15.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 801BF120058; Mon, 10 Feb 2020 18:40:17 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lJ1dre3n1xk/BGNVZd6YF72QaCX2UpG/iH1QjofSx1d4mqFtoTqGHK8O4Bqol4cC78/cZv/6HtIBUKL2lddgJQZd/3rzQAd1ICHC9tsY2tv3MYnSUOyEknWC0U0YsHNtrhtSPznLdJXcxiWSSEijsK6OA0xBqu4hGIykfRmJps6zIQOzRhkjuLsg3rhnXWaxkuwEpDQsRYNBSn7VHtG2tP8SHwqbR6+QJo0M9d6OdMYvT1JjNYff3V6CgFMTxKyeexUAiFqs8kIOUqtzcTZW2eTTB8Q0PDReBFbfsGnGwmcDxkF7QByTy0y05XiOdtyu1m3KheBo//s0UUq0IxKtBg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qMP0bqIhFzHRe8/4q0BZRzm6TDCAWf6Q3xnvkn2rLig=; b=UAbfKGhhr3qy1Q9yFh/ImNXUpy5yNQ49bcNeGYXIdlq22mtioSILU3yy/JpCdcjmyua9aW1R3nDxiesDsQmRAR6VOYvdXeweXB4a6Gzep8G/CHBh+sPLZ94fAfWqenU7U/vE8MutBc6khiZfAAM3zXDHI4zS+6yMX5OleiuJ7rnrC8TxyPlbYTOdTXo4buRGmdW2v/SUY7eCUwmq/yQgpntJvGizgFnMzV/sIO/ofPJZVuvUWRbe1IeczNmI0BKZu+OQsZmNkJ8W2Yf/eEc4QatOuTFcowFjv/fvrAvc30SCKb0ZlQkF7Lw0TWwcQSHnYfl09+Q+5CqvwqLcVPuFVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qMP0bqIhFzHRe8/4q0BZRzm6TDCAWf6Q3xnvkn2rLig=; b=pN1ZajncVFszuujdU327/29I8Fu/rsIlcJXif0nUcQB0aTA1nyvZi76iAImhNFhgs+TXJiyyvHbS28/2D/ItMGI8T2cV1ibBdUV4ziRRKfRRONskkgC8QGwgotEIFFdur3efoUHt1vKHl2hOby6QAx2AwF/RIK69s/Sl1YH6Ki4=
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com (20.178.93.90) by AM6PR06MB5062.eurprd06.prod.outlook.com (20.177.191.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.27; Tue, 11 Feb 2020 02:40:14 +0000
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5]) by AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5%7]) with mapi id 15.20.2707.030; Tue, 11 Feb 2020 02:40:14 +0000
From: =?iso-8859-1?Q?Oscar_Gonz=E1lez_de_Dios?= <oscar.gonzalezdedios@telefonica.com>
To: "opsawg@ietf.org" <opsawg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: Question on how to design a Yang model to reflect auto-asignment of a give leaf
Thread-Index: AdXgf2dbJ6WUxXgzRxKVGs1XfT3HEw==
Date: Tue, 11 Feb 2020 02:40:14 +0000
Message-ID: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oscar.gonzalezdedios@telefonica.com; 
x-originating-ip: [186.231.32.211]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: b72a324b-b456-48ee-34f8-08d7ae9bb944
x-ms-traffictypediagnostic: AM6PR06MB5062:
x-microsoft-antispam-prvs: <AM6PR06MB506229B97EBC8F5412822BFEFD180@AM6PR06MB5062.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0310C78181
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39860400002)(366004)(136003)(346002)(376002)(396003)(189003)(199004)(186003)(52536014)(7696005)(86362001)(71200400001)(478600001)(5660300002)(450100002)(8676002)(9686003)(316002)(6506007)(786003)(66946007)(33656002)(76116006)(66476007)(81156014)(81166006)(66556008)(66446008)(64756008)(110136005)(26005)(8936002)(55016002)(19627235002)(66574012)(2906002)(9010500006); DIR:OUT; SFP:1102; SCL:1; SRVR:AM6PR06MB5062; H:AM6PR06MB5653.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: m3YrrUd/Jn6UqQEAeF2wmArqWOH7mY9usHcHbqo9TAIvCDcSkW0MOC1zwzXBqQv8MK+fDkJ42d6sFUp+7h9kcaUSKhY2hGL789wt8i105s1dgaKXJqtmKyNjGXlFoJ/TZE3tRvNgjvJ7Popi+/2xY/dYREqrfQRTUmfeg16uLyUyoCe5KsyaP6BMdC9VYOGdxdzIB/LSw4hEwAlAhEHFVkZYdjGECxeinnby+jX08uQ3iTyssMrXEMU9k0M9hMkzJZ+HzuRQ0F80Z7XV78bl95dYcJhHkWy7+P/vDcg69Gy7YL/s4m2uBYJWjxZJ+RGonHd2uEWJHVxHGt0RXEq8vwQToRbFd0UruptIHI5UocmAGzrtztGusF3/P8SCnARdb0YOas4oJ0DFTtjoeBtGinLk0mJ+NzuP4i0LSirTTYnQI1oIA/U6pV0FN/TLZs6hZsohkzlyUp9B7mjikEAuBVSb5ajjI/N14OsHQ2+wxhz76u1bEJTBNBPOj7iVWpqd
x-ms-exchange-antispam-messagedata: GYCCfyZWyJSZTWgi726FLWnxuh1aqR8wVc4qy1pqBME/3kkgXYCuN0fGY8dAUGOJ2Pei6QOwGl0VWHyjikyVl0rNNl5CdhEn03rQh97WeqkNf11e30owvepM01/zdThWAMvEX0ekUPltELLDcj2X8Q==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM6PR06MB5653DFBCFC89E54F28E45AECFD180AM6PR06MB5653eurp_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b72a324b-b456-48ee-34f8-08d7ae9bb944
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2020 02:40:14.6424 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: iRNzeEKSlXgnJ8smHUQWT0ZlefnSZhdcEqs6YCYCDEMTEYyKGVgJpuWmEllrDLx8sj+gSJ/QAsp9ZogOh2w4J+jt5aRWY6Bbw1ygk7lSozZKVbK5zd6Q9vrLHKmkEFzs
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR06MB5062
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/mElWAKCNRCdJiVDLckRAvXEC9Dw>
Subject: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 02:40:21 -0000

--_000_AM6PR06MB5653DFBCFC89E54F28E45AECFD180AM6PR06MB5653eurp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Dear OPSAWG and Netmod colleagues,

                During last IETF Opsawg meeting we raised a question (and t=
here was some discussion during the meeting) that we have found yet no good=
 answer and we would like to discuss it with operations and Yang experts.

                The use case is the following:  We have a yang module which=
 holds certain optional leafs. The behaviors that we would like to have (an=
d distinguish between them) are:


a)       The user does not provide the value and such value is auto-assigne=
d by the system (a  device (if it is a device module) or a controller (if i=
t is a network/service module)).

b)      The user does not provide a value and wants that such value IS NOT =
set by the system (as assigning a value has implications). That is, intenti=
onally it is aimed at being left "empty" and should not be expanded. So, ei=
ther the value is set or should remain empty

What is the best way to model this behavior? I see that some yang modules h=
ave added an "auto-assignment" leaf to express if auto-assignment is desire=
d or not. (hence, auto-assignment false, and leaf not set, would  do not as=
sign).

Which is the "default" rule for a leaf that is not set? It is that the syst=
em is free to create it (via template or any means of auto-assignment) or s=
hould leave it as is, that is, empty?

In NMDA, the system is allowed to expand a given configuration. This fact, =
in my personal view,  implies that by "default" any system could implement =
the "auto-assignment" behavior being compliant with Neconf/Restconf/NMDA ru=
les (but I am not sure if the interpretation is correct).

Best Regards,

                =D3scar

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la lectura, utilizaci=F3n, divulgaci=F3n y/o=
 copia sin autorizaci=F3n puede estar prohibida en virtud de la legislaci=
=F3n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo =
comunique inmediatamente por esta misma v=EDa y proceda a su destrucci=F3n.

The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination, distribution or copying of this co=
mmunication is strictly prohibited. If you have received this transmission =
in error, do not read it. Please immediately reply to the sender that you h=
ave received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a leitura, utiliza=E7=E3o, div=
ulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode estar proibida em virtude=
 da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro, rogamos-lhe =
que nos o comunique imediatamente por esta mesma via e proceda a sua destru=
i=E7=E3o

--_000_AM6PR06MB5653DFBCFC89E54F28E45AECFD180AM6PR06MB5653eurp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.EstiloCorreo17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:991759453;
	mso-list-type:hybrid;
	mso-list-template-ids:-756410648 -82426768 201981977 201981979 201981967 2=
01981977 201981979 201981967 201981977 201981979;}
@list l0:level1
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:53.25pt;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:89.25pt;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:125.25pt;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:161.25pt;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:197.25pt;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:233.25pt;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:269.25pt;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:305.25pt;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:341.25pt;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ES" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Dear OPSAWG and Netmod colleagu=
es,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; During last IET=
F Opsawg meeting we raised a question (and there was some discussion during=
 the meeting) that we have found yet no good answer and we would like to di=
scuss it with operations and Yang experts.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The use case is=
 the following:&nbsp; We have a yang module which holds certain optional le=
afs. The behaviors that we would like to have (and distinguish between them=
) are:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:53.25pt;text-indent:-18.=
0pt;mso-list:l0 level1 lfo1">
<![if !supportLists]><span lang=3D"EN-US"><span style=3D"mso-list:Ignore">a=
)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US">The user does not provi=
de the value and such value is auto-assigned by the system (a &nbsp;device =
(if it is a device module) or a controller (if it is a network/service modu=
le)).
<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:53.25pt;text-indent:-18.=
0pt;mso-list:l0 level1 lfo1">
<![if !supportLists]><span lang=3D"EN-US"><span style=3D"mso-list:Ignore">b=
)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US">The user does not provi=
de a value and wants that such value IS NOT set by the system (as assigning=
 a value has implications). That is, intentionally it is aimed at being lef=
t &#8220;empty&#8221; and should not be expanded.
 So, either the value is set or should remain empty<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">W=
hat is the best way to model this behavior? I see that some yang modules ha=
ve added an &#8220;auto-assignment&#8221; leaf to express if auto-assignmen=
t is desired or not. (hence, auto-assignment false,
 and leaf not set, would&nbsp; do not assign). <o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">&=
nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">W=
hich is the &#8220;default&#8221; rule for a leaf that is not set? It is th=
at the system is free to create it (via template or any means of auto-assig=
nment) or should leave it as is, that is, empty?
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">I=
n NMDA, the system is allowed to expand a given configuration. This fact, i=
n my personal view, &nbsp;implies that by &#8220;default&#8221; any system =
could implement the &#8220;auto-assignment&#8221; behavior being compliant
 with Neconf/Restconf/NMDA rules (but I am not sure if the interpretation i=
s correct).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">B=
est Regards,<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; =D3scar
<o:p></o:p></span></p>
</div>
<br>
<hr>
<font face=3D"Arial" color=3D"Gray" size=3D"1"><br>
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la
 lectura, utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede e=
star prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este m=
ensaje por error, le rogamos que nos lo comunique inmediatamente por esta m=
isma v=EDa y proceda a su destrucci=F3n.<br>
<br>
The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination,
 distribution or copying of this communication is strictly prohibited. If y=
ou have received this transmission in error, do not read it. Please immedia=
tely reply to the sender that you have received this communication in error=
 and then delete it.<br>
<br>
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a
 leitura, utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o p=
ode estar proibida em virtude da legisla=E7=E3o vigente. Se recebeu esta me=
nsagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mes=
ma via e proceda a sua destrui=E7=E3o<br>
</font>
</body>
</html>

--_000_AM6PR06MB5653DFBCFC89E54F28E45AECFD180AM6PR06MB5653eurp_--


From nobody Tue Feb 11 01:29:20 2020
Return-Path: <adrian@olddog.co.uk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57A3B1201E0; Tue, 11 Feb 2020 01:29:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level: 
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PhohsT1tPBSJ; Tue, 11 Feb 2020 01:29:12 -0800 (PST)
Received: from mta7.iomartmail.com (mta7.iomartmail.com [62.128.193.157]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E5F1120020; Tue, 11 Feb 2020 01:29:11 -0800 (PST)
Received: from vs2.iomartmail.com (vs2.iomartmail.com [10.12.10.123]) by mta7.iomartmail.com (8.14.4/8.14.4) with ESMTP id 01B9T9Iw009440; Tue, 11 Feb 2020 09:29:09 GMT
Received: from vs2.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5B0E82204A; Tue, 11 Feb 2020 09:29:09 +0000 (GMT)
Received: from asmtp3.iomartmail.com (unknown [10.12.10.224]) by vs2.iomartmail.com (Postfix) with ESMTPS id 44A0522048; Tue, 11 Feb 2020 09:29:09 +0000 (GMT)
Received: from LAPTOPK7AS653V (089144205224.atnat0014.highway.webapn.at [89.144.205.224]) (authenticated bits=0) by asmtp3.iomartmail.com (8.14.4/8.14.4) with ESMTP id 01B9T8j7007329 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 11 Feb 2020 09:29:08 GMT
Reply-To: <adrian@olddog.co.uk>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: "=?iso-8859-1?Q?'Oscar_Gonz=E1lez_de_Dios'?=" <oscar.gonzalezdedios@telefonica.com>,  <opsawg@ietf.org>, <netmod@ietf.org>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
In-Reply-To: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
Date: Tue, 11 Feb 2020 09:29:07 -0000
Organization: Old Dog Consulting
Message-ID: <05b201d5e0bd$b6072520$22156f60$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05B3_01D5E0BD.B6072520"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-gb
Thread-Index: AQMbx7ZisvSDR1EI+zVXCf/lvNieh6WJ67IQ
X-Originating-IP: 89.144.205.224
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.0.0.1623-8.2.0.1013-25224.005
X-TM-AS-Result: No--19.789-10.0-31-10
X-imss-scan-details: No--19.789-10.0-31-10
X-TMASE-Version: IMSVA-9.0.0.1623-8.2.1013-25224.005
X-TMASE-Result: 10--19.788600-10.000000
X-TMASE-MatchedRID: yebcs53SkkDxIbpQ8BhdbMzSKGx9g8xhqb3/o5s+OcNZ+YxyNxdzR1+N xwaxRYfvZJ+1U5CKLArxfWM+PIJa9uyt+a9Mtf+e8sc9oYKBve0+8WcgUjQUwiVJ1X9ZfHjXjQb 0ZijHcXA3Opzody2+qtfks/hPGgP5oQB3WAEpQLBUtFP653DHOLPgPvvwZyAROFiq9T5j3bWm2A O8c0o94kyabxvG0VndZok17GuDVgto/KGUV8ExqKroPbyANljgNRgcGqeB7b17uKMeruD2hrxcn Qq9vpcj4UVrO0h/WPxNspS/wQzGfYEA1AgGhA6pRBpDaTjP17ZQYo4xNF42Pi1fxFk3nlsuIw64 a0XgvUQYN30K9opVtdpLCq43Ert9y8DgNDt52YPPt0BCUKvjb5T90Kmx3bAeNs6rkdfjKVonp08 UAE0Wd73DiVsmUFdzelWcbd+lNvA8EsNqyZ1CzkS06t+EwLFSo+Qf8eUQWkePidi1OtopYyxCxM 8fgRh8Ps+FZHj2fJroPgRaUWjEzSztlhHSitjbxMxd/ZbO4GrPb1ynRkjJR3UayEpPvCHIej2V/ C8k9MaSsoEmD0IX6/d/G8vPpfqdvgWKYfsc+010KSA6l/GyKr5z1PmtbhtDcLmqoDKWuTAH2v62 8TAejK1zvtrcSIIrX18uUCAKL1X1f6EBkUtKaVHmrymVJ0uQtHpusXAVaAzc9KE2iwgwHhvPK7H JN6/Eenf1BR7Ur2M90zXgxkIfv6x9MD7jDQlWfY+iJfFQBxctxMagbN9/PAzvg1/q1MH2i8AKIR x0BCaUIK5oH9AEyYbQBKvu5aGu0bMgNH2rplKeAiCmPx4NwGmRqNBHmBve4vrbb+Cbm+mw7M6dy uYKgwDJmNK5f3bTb9mqLPX9lwfHa5sKNdYV6FxpOLYQuCsiTFL1glziFeA=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-12:0,22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/UR_ZxKZ2emkn4L0wSiJhmBjQyow>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 09:29:15 -0000

This is a multipart message in MIME format.

------=_NextPart_000_05B3_01D5E0BD.B6072520
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Isn=92t it possible to handle case b) by defining a value to have the =
meaning
=93no value has been assigned=94 and then the user an explicitly set =
that value?

=20

Adrian

=20

From: netmod <netmod-bounces@ietf.org> On Behalf Of Oscar Gonz=E1lez de =
Dios
Sent: 11 February 2020 02:40
To: opsawg@ietf.org; netmod@ietf.org
Subject: [netmod] Question on how to design a Yang model to reflect
auto-asignment of a give leaf

=20

Dear OPSAWG and Netmod colleagues,

=20

                During last IETF Opsawg meeting we raised a question =
(and
there was some discussion during the meeting) that we have found yet no =
good
answer and we would like to discuss it with operations and Yang experts.

=20

                The use case is the following:  We have a yang module =
which
holds certain optional leafs. The behaviors that we would like to have =
(and
distinguish between them) are:

=20

a.	The user does not provide the value and such value is auto-assigned
by the system (a  device (if it is a device module) or a controller (if =
it
is a network/service module)).=20
b.	The user does not provide a value and wants that such value IS NOT
set by the system (as assigning a value has implications). That is,
intentionally it is aimed at being left =93empty=94 and should not be =
expanded.
So, either the value is set or should remain empty

=20

What is the best way to model this behavior? I see that some yang =
modules
have added an =93auto-assignment=94 leaf to express if auto-assignment =
is
desired or not. (hence, auto-assignment false, and leaf not set, would  =
do
not assign).=20

=20

Which is the =93default=94 rule for a leaf that is not set? It is that =
the
system is free to create it (via template or any means of =
auto-assignment)
or should leave it as is, that is, empty?=20

=20

In NMDA, the system is allowed to expand a given configuration. This =
fact,
in my personal view,  implies that by =93default=94 any system could =
implement
the =93auto-assignment=94 behavior being compliant with =
Neconf/Restconf/NMDA
rules (but I am not sure if the interpretation is correct).

=20

Best Regards,

=20

                =D3scar=20

=20

  _____ =20


Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario,
puede contener informaci=F3n privilegiada o confidencial y es para uso
exclusivo de la persona o entidad de destino. Si no es usted. el
destinatario indicado, queda notificado de que la lectura, =
utilizaci=F3n,
divulgaci=F3n y/o copia sin autorizaci=F3n puede estar prohibida en =
virtud de la
legislaci=F3n vigente. Si ha recibido este mensaje por error, le rogamos =
que
nos lo comunique inmediatamente por esta misma v=EDa y proceda a su
destrucci=F3n.

The information contained in this transmission is privileged and
confidential information intended only for the use of the individual or
entity named above. If the reader of this message is not the intended
recipient, you are hereby notified that any dissemination, distribution =
or
copying of this communication is strictly prohibited. If you have =
received
this transmission in error, do not read it. Please immediately reply to =
the
sender that you have received this communication in error and then =
delete
it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu =
destinat=E1rio,
pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso =
exclusivo
da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o =
destinat=E1rio
indicado, fica notificado de que a leitura, utiliza=E7=E3o, =
divulga=E7=E3o e/ou
c=F3pia sem autoriza=E7=E3o pode estar proibida em virtude da =
legisla=E7=E3o vigente.
Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique
imediatamente por esta mesma via e proceda a sua destrui=E7=E3o


------=_NextPart_000_05B3_01D5E0BD.B6072520
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1"><meta name=3DGenerator content=3D"Microsoft Word =
15 (filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:991759453;
	mso-list-type:hybrid;
	mso-list-template-ids:-756410648 -82426768 201981977 201981979 =
201981967 201981977 201981979 201981967 201981977 201981979;}
@list l0:level1
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:53.25pt;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:89.25pt;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:125.25pt;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:161.25pt;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:197.25pt;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:233.25pt;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:269.25pt;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:305.25pt;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:341.25pt;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Isn&#8217;t it possible to handle case b) by defining =
a value to have the meaning &#8220;no value has been assigned&#8221; and =
then the user an explicitly set that value?<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Adrian<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal><b><span lang=3DEN-US =
style=3D'mso-fareast-language:EN-GB'>From:</span></b><span lang=3DEN-US =
style=3D'mso-fareast-language:EN-GB'> netmod =
&lt;netmod-bounces@ietf.org&gt; <b>On Behalf Of </b>Oscar Gonz=E1lez de =
Dios<br><b>Sent:</b> 11 February 2020 02:40<br><b>To:</b> =
opsawg@ietf.org; netmod@ietf.org<br><b>Subject:</b> [netmod] Question on =
how to design a Yang model to reflect auto-asignment of a give =
leaf<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
lang=3DEN-US>Dear OPSAWG and Netmod colleagues,<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
lang=3DEN-US>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; During last IETF Opsawg meeting we raised =
a question (and there was some discussion during the meeting) that we =
have found yet no good answer and we would like to discuss it with =
operations and Yang experts.<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
lang=3DEN-US>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The use case is the following:&nbsp; We =
have a yang module which holds certain optional leafs. The behaviors =
that we would like to have (and distinguish between them) =
are:<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US><o:p>&nbsp;</o:p></span></p><ol style=3D'margin-top:0cm' =
start=3D1 type=3Da><li class=3DMsoListParagraph =
style=3D'margin-left:17.25pt;mso-list:l0 level1 lfo2'><span =
lang=3DEN-US>The user does not provide the value and such value is =
auto-assigned by the system (a &nbsp;device (if it is a device module) =
or a controller (if it is a network/service module)). =
<o:p></o:p></span></li><li class=3DMsoListParagraph =
style=3D'margin-left:17.25pt;mso-list:l0 level1 lfo2'><span =
lang=3DEN-US>The user does not provide a value and wants that such value =
IS NOT set by the system (as assigning a value has implications). That =
is, intentionally it is aimed at being left &#8220;empty&#8221; and =
should not be expanded. So, either the value is set or should remain =
empty<o:p></o:p></span></li></ol><p class=3DMsoNormal><span =
lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span lang=3DEN-US>What is the best way to =
model this behavior? I see that some yang modules have added an =
&#8220;auto-assignment&#8221; leaf to express if auto-assignment is =
desired or not. (hence, auto-assignment false, and leaf not set, =
would&nbsp; do not assign). <o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span lang=3DEN-US>Which is the =
&#8220;default&#8221; rule for a leaf that is not set? It is that the =
system is free to create it (via template or any means of =
auto-assignment) or should leave it as is, that is, empty? =
<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span =
lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span lang=3DEN-US>In NMDA, the system is =
allowed to expand a given configuration. This fact, in my personal view, =
&nbsp;implies that by &#8220;default&#8221; any system could implement =
the &#8220;auto-assignment&#8221; behavior being compliant with =
Neconf/Restconf/NMDA rules (but I am not sure if the interpretation is =
correct).<o:p></o:p></span></p><p class=3DMsoNormal><span =
lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span lang=3DEN-US>Best =
Regards,<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span =
lang=3DEN-US><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal =
style=3D'margin-left:35.25pt'><span =
lang=3DEN-US>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =D3scar <o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DES =
style=3D'mso-fareast-language:EN-GB'><o:p>&nbsp;</o:p></span></p><div =
class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><span =
lang=3DES style=3D'mso-fareast-language:EN-GB'><hr size=3D2 =
width=3D"100%" align=3Dcenter></span></div><p class=3DMsoNormal><span =
lang=3DES =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:gray;mso-fa=
reast-language:EN-GB'><br>Este mensaje y sus adjuntos se dirigen =
exclusivamente a su destinatario, puede contener informaci=F3n =
privilegiada o confidencial y es para uso exclusivo de la persona o =
entidad de destino. Si no es usted. el destinatario indicado, queda =
notificado de que la lectura, utilizaci=F3n, divulgaci=F3n y/o copia sin =
autorizaci=F3n puede estar prohibida en virtud de la legislaci=F3n =
vigente. Si ha recibido este mensaje por error, le rogamos que nos lo =
comunique inmediatamente por esta misma v=EDa y proceda a su =
destrucci=F3n.<br><br>The information contained in this transmission is =
privileged and confidential information intended only for the use of the =
individual or entity named above. If the reader of this message is not =
the intended recipient, you are hereby notified that any dissemination, =
distribution or copying of this communication is strictly prohibited. If =
you have received this transmission in error, do not read it. Please =
immediately reply to the sender that you have received this =
communication in error and then delete it.<br><br>Esta mensagem e seus =
anexos se dirigem exclusivamente ao seu destinat=E1rio, pode conter =
informa=E7=E3o privilegiada ou confidencial e =E9 para uso exclusivo da =
pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o =
destinat=E1rio indicado, fica notificado de que a leitura, =
utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode =
estar proibida em virtude da legisla=E7=E3o vigente. Se recebeu esta =
mensagem por erro, rogamos-lhe que nos o comunique imediatamente por =
esta mesma via e proceda a sua destrui=E7=E3o</span><span lang=3DES =
style=3D'mso-fareast-language:EN-GB'><o:p></o:p></span></p></div></body><=
/html>
------=_NextPart_000_05B3_01D5E0BD.B6072520--


From nobody Tue Feb 11 02:00:42 2020
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC65C120241; Tue, 11 Feb 2020 02:00:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1BfA8_WyaG3B; Tue, 11 Feb 2020 02:00:37 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id EC22F120220; Tue, 11 Feb 2020 02:00:36 -0800 (PST)
Received: from localhost (unknown [173.38.220.37]) by mail.tail-f.com (Postfix) with ESMTPSA id 20F251AE018B; Tue, 11 Feb 2020 11:00:35 +0100 (CET)
Date: Tue, 11 Feb 2020 10:59:56 +0100 (CET)
Message-Id: <20200211.105956.997059335051594687.mbj@tail-f.com>
To: oscar.gonzalezdedios@telefonica.com
Cc: opsawg@ietf.org, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
X-Mailer: Mew version 6.8 on Emacs 25.2
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/0ZLKmHtVUWJ8mjZ9xz7ASwewSNA>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 10:00:39 -0000

Hi,

Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:
> Dear OPSAWG and Netmod colleagues,
> =

>                 During last IETF Opsawg meeting we raised a question =
(and
>                 there was some discussion during the meeting) that we=
 have
>                 found yet no good answer and we would like to discuss=
 it with
>                 operations and Yang experts.
> =

>                 The use case is the following: We have a yang module =
which
>                 holds certain optional leafs. The behaviors that we w=
ould like
>                 to have (and distinguish between them) are:
> =

> =

> a) The user does not provide the value and such value is auto-assigne=
d
> by the system (a device (if it is a device module) or a controller (i=
f
> it is a network/service module)).

I assume that this value not a static default value?

> b) The user does not provide a value and wants that such value IS NOT=

> set by the system (as assigning a value has implications). That is,
> intentionally it is aimed at being left "empty" and should not be
> expanded. So, either the value is set or should remain empty

Do you mean that you want (a) and (b) at the same time for the same
leaf?

> What is the best way to model this behavior? I see that some yang
> modules have added an "auto-assignment" leaf to express if
> auto-assignment is desired or not. (hence, auto-assignment false, and=

> leaf not set, would do not assign).
> =

> Which is the "default" rule for a leaf that is not set? It is that th=
e
> system is free to create it (via template or any means of
> auto-assignment) or should leave it as is, that is, empty?
> =

> In NMDA, the system is allowed to expand a given configuration. This
> fact, in my personal view, implies that by "default" any system could=

> implement the "auto-assignment" behavior being compliant with
> Neconf/Restconf/NMDA rules (but I am not sure if the interpretation i=
s
> correct).

There are (at least) three ways to interpret "auto-assign".  The
client writes to running, and then the server auto-assigns X:

  (a) in running
  (b) in intended
  (c) in the operational state

(c) is uncontroversial and simple to implement in all servers, and
simple to understand.

(b) is allowed by NMDA but requires more of the server implementation;
specifically it requires the server to support that intended is
different from running.

(a) is not recommended in general; running should be fully owned by
the client(s) and not modified by the server.



/martin



> =

> Best Regards,
> =

>                 =D3scar
> =

> ________________________________
> =

> Este mensaje y sus adjuntos se dirigen exclusivamente a su
> destinatario, puede contener informaci=F3n privilegiada o confidencia=
l y
> es para uso exclusivo de la persona o entidad de destino. Si no es
> usted. el destinatario indicado, queda notificado de que la lectura,
> utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede estar=

> prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este
> mensaje por error, le rogamos que nos lo comunique inmediatamente por=

> esta misma v=EDa y proceda a su destrucci=F3n.
> =

> The information contained in this transmission is privileged and
> confidential information intended only for the use of the individual
> or entity named above. If the reader of this message is not the
> intended recipient, you are hereby notified that any dissemination,
> distribution or copying of this communication is strictly
> prohibited. If you have received this transmission in error, do not
> read it. Please immediately reply to the sender that you have receive=
d
> this communication in error and then delete it.
> =

> Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confidenci=
al e =E9
> para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vos=
sa
> senhoria o destinat=E1rio indicado, fica notificado de que a leitura,=

> utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode =
estar proibida
> em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por er=
ro,
> rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> proceda a sua destrui=E7=E3o


From nobody Tue Feb 11 09:15:34 2020
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E2F612081D for <netmod@ietfa.amsl.com>; Tue, 11 Feb 2020 09:15:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrQrwwTi2fuw for <netmod@ietfa.amsl.com>; Tue, 11 Feb 2020 09:15:28 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2082.outbound.protection.outlook.com [40.107.20.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C3F112082E for <netmod@ietf.org>; Tue, 11 Feb 2020 09:15:28 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GnBI6bHbCaMOX7qr07X324w8mLrJMzCa14H9mx225rDnQZ+xEdIgf7H00RM7ak677tjomJf35poIbMqoIH2KdG4Ty4e5pKLci67k3L2Ea3PL/PTmgoWysZSVnCUaVwdZDC9LB8UCsXC3WO6fJSALAX+czJ6R3Ljo0QSj0ai2We3/0B9mIYGXQXOp6Tga1Up6jfMUqqVaJuMgxqTdVcfjwjG6YuL9YSckaC10WbggVL1vcz+mQCGMoRdHIL9g8P3VvoPC5bSQ0YfxMLfXFh6gq2TQNnf9ucT2odAeLjreTusVdGpswRAnMI+ni1ZPqgEWLU/s5R6ySMe6BMVSByFWPQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZU+6hN/USjDkhcmsBfidwYla1HvjwjSiGsEZp+LK7kQ=; b=Msoddd482dqdU0ZXfPN3ztudKmDyU9DCcBI0BndMgey3z0MOQ5i5x+0GB0YU/SSc79D3doiQLNDtm88pbkg2IwHzfaldUfhffztawUmSz/Zh2mF0gWwn0IMJRPj+QjX/1zf/q5ZGWV5zXCHYxCsQpN6AnGrqM3W5owuYZpj9ioEPJYrHP/rxDoDMD5MJUNaL/ScvJBin0D63WFcEceCtXe7BFtrmJTMWnOiVqv40RMQL6eOxABVWIarWyIH6f+sDDAJpQLvo0WrsZ2RFcspM6rasn5o45IMxPG8PFKH5dZ2NMCUXEQU/5Dt6AYT0fcRgw7n6C22C+y8Om8KCaeXcvQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZU+6hN/USjDkhcmsBfidwYla1HvjwjSiGsEZp+LK7kQ=; b=guShHBQ8e7r4UDW/Dtg8UBSajMQWXDOwWcJ+mt7EHoBHGgECSqPqzEz8YJhSD+7fPE31W1S5tAF1bb9kblPZtzga6l9mPTxjVs8qszaC2fsgzvWuoS+0VwRTJEBY/p5Rx9nMLkA0AuF/hdV4V0QSJkvGclYhQEmvzYSd03gGv3Q=
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com (52.134.97.155) by DB7PR07MB4620.eurprd07.prod.outlook.com (52.135.137.29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.12; Tue, 11 Feb 2020 17:15:24 +0000
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973]) by DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973%5]) with mapi id 15.20.2729.021; Tue, 11 Feb 2020 17:15:24 +0000
From: =?iso-8859-2?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
To: =?iso-8859-2?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>, Kent Watsen <kent+ietf@watsen.net>
CC: NETMOD Working Group <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
Thread-Index: AQHVxVfSEJ6TUivwA0OmLdrVeJgwbqfztdUAgCEFvqA=
Date: Tue, 11 Feb 2020 17:15:23 +0000
Message-ID: <DB7PR07MB4011635119B75D384D11D01DF0180@DB7PR07MB4011.eurprd07.prod.outlook.com>
References: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com> <20200120144528.wt2z4y66xcnp7fxj@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200120144528.wt2z4y66xcnp7fxj@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: aa0f7b65-1ba8-49d0-859b-08d7af15fb3e
x-ms-traffictypediagnostic: DB7PR07MB4620:
x-microsoft-antispam-prvs: <DB7PR07MB4620B68CB2456F8A46B259B9F0180@DB7PR07MB4620.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0310C78181
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(396003)(136003)(346002)(39860400002)(199004)(189003)(9686003)(33656002)(30864003)(5660300002)(86362001)(52536014)(4326008)(478600001)(66556008)(66446008)(66946007)(76116006)(966005)(2906002)(66616009)(66476007)(64756008)(316002)(7696005)(26005)(8936002)(110136005)(53546011)(6506007)(71200400001)(186003)(8676002)(55016002)(81156014)(81166006)(66574012); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB4620; H:DB7PR07MB4011.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: QthJi90Ibwfxj/3yBL5QbHTo7NZN/Izkaqq0YXVYFe1lZHIs01G0pCVvMfhCRnVIqmS/Qd/nQ8VkAupy5/BINaKU3Z/vyXTpJSs1ruvztOI3VEe5QVqzFGAlFst6m1hUd+HAANniTlWkNGUdX3hQOg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_05A8_01D5E107.397C3640"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: aa0f7b65-1ba8-49d0-859b-08d7af15fb3e
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2020 17:15:24.0017 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kF/722ibN2Vw3d22rLguC4c0asK7xw8UdU2t3bBJ+kuGwj59Vb7RA1J2j4eFrqQCDdsXM83TE0n8vp8k5uH8Ib9vFaMZl5t8ALCFY7saVow=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB4620
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wk27UBgtop2rRdsEaPNNSfMCW7w>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 17:15:32 -0000

------=_NextPart_000_05A8_01D5E107.397C3640
Content-Type: text/plain;
	charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable



-----Original Message-----
From: netmod <netmod-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, =
J=FCrgen
Sent: 2020. janu=E1r 20., h=E9tf=F5 15:46
To: Kent Watsen <kent+ietf@watsen.net>
Cc: NETMOD Working Group <netmod@ietf.org>
Subject: Re: [netmod] WG Last Call:
draft-ietf-netmod-yang-instance-file-format-06

On Tue, Jan 07, 2020 at 12:41:23PM +0000, Kent Watsen wrote:
>=20
> This begins a two-week Working Group Last Call (WGLC) on
draft-ietf-netmod-yang-instance-file-format-06.  The WGLC ends on Jan =
21.
Please send your comments to the working group mailing list.
>=20
> Positive comments, e.g., "I've reviewed this document and believe it =
is
ready for publication", are welcome!  This is useful and important, even
from authors.  Objections, concerns, and suggestions are also welcomed =
at
this time.
>

I have reviewed draft-ietf-netmod-yang-instance-file-format-06. I =
believe
this is an important document but not quite ready yet. Most of the =
points I
am raising below should, however, be easy to resolve, many concern
terminology and writing consolidation and do not affect the technical
solution.

/js

* Abstract

  I think we should avoid referring to some <get> operation. Here is a
  proposal of a rewrite:

OLD

   running server available.  This document specifies a standard file
   format for YANG instance data (which follows the syntax and semantic
   from existing YANG models, re-using the same format as the reply to a
   <get> operation/request) and annotates it with metadata.

NEW

   running server available.  This document specifies a standard file
   format for YANG instance data, which follows the syntax and semantic
   of existing YANG models, and annotates it with metadata.
BALAZS: Other have expressly asked for a reference to "get" but if you =
want
I can remove it.

* Terminology

  - Add missing dots (full stops) at the end of sentences
BALAZS: OK

  - I fail to see the difference between 'content-schema' and 'content
    defining YANG module(s)'. The 'content-schema' is already a set of
    YANG modules. I suggest to remove 'Content defining YANG module(s)
    as it is not a necessary term. Rewrite all places where the phrase
    'content defining YANG modules' is used.
BALAZS: a schema is a full set of YANG modules needed to define the=20
structure and properties of the instance data (+features, deviations). =20
A  "content defining YANG module" is an individual YANG module is=20
part of the content-schema. So the difference is a set versus one item.=20
I updated the description to emphasize this difference.

  - Is "YANG Instance Data" a newly defined term? It's introduction
    does not follow the colon style. I also wonder why we need this
    term. Why is YANG in there? I would prefer to have this defined in
    RFC 7950 terms. Is 'instance data' a collection of instantiated
    'data nodes'? Perhaps then we should do the following and move
    this up to the first definition, so we define instance data first,
    then instance data set, and finally instance data file.

    OLD

   YANG Instance Data, or just instance data for short, is data that
   could be stored in a datastore and whose syntax and semantics is
   defined by YANG models.

    NEW

   Instance Data: A collection of instantiated data nodes.
BALAZS: OK, updated.=20

* Introduction

  - It seems UC5 subsumes UC4.
BALAS: OK UC4 and 5 merged

  - One could add UCx: Storing instance data used as test cases but
    then this list of use cases does not need to be exhaustive (means
    I do not care much).
BALAZS: Valid use case, but not added for now. If you say so I can add =
it.

  - Is it necessary to describe P2 in terms of (presumably) NETCONF
    operations? I would prefer to have the document written in a
    protocol agnostic style. Perhaps simply drop "similar to the
    response of a <get> operation/request".
BALAZS: This is a reference both to NETCONF and RESTCONF. It was =
explicitly
asked for by other reviewers.=20

  - P4: What is 'many'? Or did you want to use 'multiple'?
BALAZS: OK, changed to multiple,

* Instance Data File Format

  - Replace "real data" with instance data

  OLD

    "real data" that we want to document/provide.

  NEW

    instance data that we want to document/provide.
BALAZS: OK

  - I do not understand that text about the default attribute. Section
    4.8.9 defines a query parameter, not an attribute. And I do not
    know how that fits into content data.
BALAZS: https://tools.ietf.org/html/rfc8040#section-4.8.9:
" If the "with-defaults" parameter is set to "report-all-tagged", then
   the server MUST adhere to the default-reporting behavior defined in
   Section 3.4 of [RFC6243].  Metadata is reported by the server as
   specified in Section 5.3.  The XML encoding for the "default"
   attribute sent by the server for default nodes is defined in
   Section 6 of [RFC6243].  The JSON encoding for the "default"
   attribute MUST use the same values, as defined in [RFC6243], but
   encoded according to the rules in [RFC7952].  The module name
   "ietf-netconf-with-defaults" MUST be used for the "default"
   attribute. "
Here the usage of the default ATTRIBUTE is defined.

  - Similarly, I do not understand why implementation specific
    metadata may be included in the content-data. This seems to be the
    wrong place, no? Should metadata not go into the header?
BALAZS: As this might be meta-data about the individual instance=20
data nodes (e.g.  metadata following the principles from rfc7952) it =
belongs
here.

  - Why MUST XML attributes be ignored, why is there no text about
    unknown JSON data, 'attributes' (or annotations)? What should
    implementations generally do about unknown elements, attributes,
    objects, arrays, ...)? Why are we specific about only one specific
    case?
BALAZS:  Generally we want to allow users/creators to decorate the data=20
with additional information, that is not standardized. Like YANG =
extensions
 these may be useful, but at least should not cause problems.
XML attributes are often used as meta-data and I was asked to list them
specifically.

It is not stated what an application should do with additional unknown =
data=20
(XML elements, JSON data) that do not fit the above categories.  Should =
we
say something about it?=20
IMHO no. We don't want to be too restrictive, as there are many =
potential=20
users with different needs. We could state
 "Users of the instance data MAY discard any other unknown data".
However that does not mean much.=20

  - References may be helpful in this sentence since <get-data> is not
    part of the original NETCONF specification:

   The content-data part will be very similar to the result returned for
   a NETCONF <get-data> or for a RESTCONF get operation.
BALAZS: OK: will add reference.

    It is unclear what "will be very similar" really means but perhaps
    this is clarified later. If not, this sentence says nothing in
    terms of a technical specification.

  - Does the following sentence imply that any additional data in an
    instance file renders the instance file useless?

   The content-data part MUST conform to the content-schema.
BALAZS: Maybe not useless, but at least partly corrupt.

  - You first write that instance data MUST conform to the schema and
    two paragraphs later you state that instance data MAY be partial,
    i.e., it MAY NOT conform to the content-schema. Perhaps I have an
    idea what you wanted to say but the text that is written here is
    a contradiction.
BALAZS: OK. I will correct it. The content-data part MUST conform to=20
the content-schema, while allowing for the   exceptions listed below.

  - The introduction contains several MAYs and MUSTS that are not
    understandable yet and they do not seem to belong into an
    'Introduction' in the first place.
BALAZS: Section 2 Introduction 1 'may'
" further instance data formats may be specified"
I was specifically asked to include this. Why is this not =
understandable?=20
Where should this be if not in the introduction chapter?
Section 2 does not contain the word must.=20
Maybe I am not understanding your comment.

  - Why is EXTERNAL in all caps but Inline in capitalized form?  In
    the YANG definitions, EXTERNAL seems to be uri. I think we reduce
    ambiguity by being consistent with how we name things.
BALAZS: OK, EXTERNAL should not be all caps.=20
Here external means that the content-schema is defined externally=20
to the instance data set, not even a URI is included.

  - What is a 'real-life YANG module'?
BALAZS: OK,  will rephrase it.=20

  - 3.1.1 How are the details specified in the anydata? Perhaps a
    forward reference might help. What are 'version labels'?
BALAZS: Added reference to example.
Version/Revision labels are defined in
draft-verdt-netmod-yang-module-versioning;=20
added as a reference. I added them here (only as an example) as they are =

highly relevant to specifying module versions even if they are not=20
agreed in Netmod yet. The name was changed from version-label to
revision-label lately.

  - 3.1.2 What is a 'list of content'? Which revision is used? What
    about these 'version labels' here?
BALAZS: You cut the sentence in half: List of content defining YANG =
modules"
The term "Content defining YANG module" is defined in the terminology
section.
In this case there is no possibility for using version/revision labels.
People asked for a simple method.

  - 3.2 I do not understand the example. Has this been validated?  As
    far as I can tell, the ietf-yang-library defines modules-state and
    not module-state. This inconsistency shows up multiple times.
BALAZS: Corrected to modules-state

  - I like to understand why we need several methods to specify the
    schema. Having N solution is always bad for interoperability and
    also for maintainability. Perhaps the WG failed to reach consensus
    on a single solution.  Or there are strong technical reasons - but
    then they should be clearly stated. What are implementations
    expected to support, all methods? Or whatever the implementer
    prefers? How do we achieve interoperability across tools?
BALAZS: Different people in the WG wanted different solutions.
- Some (as I remember you too) asked for a full flexible solution=20
which can use multiple modules potentially not even the=20
ietf-yang-library to define the schema  (Inline solution)
- some asked for a simple solution listing the content schema modules
- some wanted just to use a reference (If any this is the one, I would
remove)
- some stated that they do not want to define the=20
content-schema at all because it is already known=20
So we ended up with 4 methods

* Data Life Cycle

  - I am not sure the first paragraph is needed.
BALAZS: OK removed

  - In the second paragraph, I like to see some discussion of snapshot
    consistency.  How much consistency can be expected? Are there
    indicators for the level of consistency? I would remove the
    sentence about "valid values can be retrieved at run-time" as this
    is obvious but then I am not sure why 'valid' values? Perhaps the
    authors meant 'current' values?
BALAZS: OK< Changed to current. I want to keep the second sentence=20
as it describes the duality between the original documented values and
 the current values that can be read in run-time.
Consistency is out of scope. No indicators are provided. It is very=20
much use-case and implementation specific.

  - How do I implement the "SHOULD be described"? The default is that
    data can change, only in rare cases data is static. But how does a
    tool creating instance data know 'when and how' data changes in the
    future? I suggest to remove the SHOULD. The text saying that =
instance
    data is a snapshot is in my view sufficient.
BALAZS: We do not want to specify the how the changes should be =
described,=20
But we do want to state that this information should be made available.
Just a few ideas how this could be done. Provide
- some plain text in the description of the instance data set
- some additional metadata e.g. etags, timestamp for the individual data
nodes.
- a change indicator in the content defining yang module itself=20

  - This section talks about YANG instance data but it likely should
    talk about YANG instance data sets.
BALAZS: I think both are acceptable terms here. Naturally if the data
changes=20
the data set containing it also changes.

* Delivery of Instance Data

  - Why do we need this SHOULD? I do not think we should use RFC 2119
    keywords to define how organizations may use the instance data
    format. My proposal is to delete this entire section.
BALAZS: I will change it to lower case may.
I was asked to and I want to state that we want to use instance data=20
both for offline delivery of design time information and for run-time
delivery of other data.

(The first 3 users of this format all want to use this for early =
delivery of

server capabilities. It is for now the dominant use case for which the =20
2119 SHOULD is important.).=20

* Backwards Compatibility

  - I do not think 'managed entity' is a YANG term.
BALAZS: What term do you propose for something that is managed like=20
an interface or user etc. ? I was told managed entity is a generic term=20
that is commonly understood . Would "managed item" or "managed thing" be
better?

  - I think this text is use case specific and the items are kind of
    conflicting with each other (2nd says changing the semantics of a
    list should lead to a change of the key while the 1st suggests
    that changing keys may lead to misinterpretation of something
    being new).

  - My proposal is to simply drop this entire section. If use case
    specific text is needed, add it to the use cases in the appendix.
BALAZS: You don't know how many trouble reports we got in=20
multiple use-cases for violating these recommendations. While=20
they may not be important for all use-cases, the are important for many.
Actually we met the problem or had to avoid it in all but one of=20
the listed use-cases.

* YANG Model

  - How is the inline-content-schema feature used? Which component
    does indicate that inline content-schema is supported? Do all
    implementations have to support simplified-inline? If
    inline-schema is used, how do I find out which schema formats are
    supported? The more formats there are, the more interoperability
    issues will arise.
Balazs:
- case inline { is decorated with "if-feature inline-content-schema"
- feature support is generally indicated as part of the =
ietf-yang-library
- simplified-inline is mandatory to support. It is relatively simple, so
IMHO not a problem
- what do you mean with schema-formats? The yang schema is not actually
included anywhere.
If the "inline" case is used, instance data corresponding to the=20
inline-modules is included, not the schema.=20
anydata inline-schema {
             description
               "Instance data corresponding to the YANG modules
                specified in the inline-module nodes defining the set
                of content defining YANG modules for this
                instance-data-set."


* Security Considerations

  - "is designed as a wrapper" - what does this tell me? I suggest to
    rewrite the first paragraph and to remove this phrase or to explain
    what it means.

  - Why is the header part not security sensitive? Almost all data is
    security sensitive in certain situations.
BALAZS: IMHO it is a valid and meaningful statement to differentiate=20
between security sensitive data like passwords and non-sensitive data=20
like a revision date. RFC8341 states:
"One of the most important aspects of the data model documentation,
and one of the biggest concerns during deployment, is the
identification of security-sensitive content."=20
So the differentiation between sensitive and non-sensitive information =
is
important.
In your opinion which part of the header data is sensitive?

  - I would prefer if the text would not use the phrase "result of a
    <get> operation". As stated before, I like to see things written
    in protocol neutral forms.
BALAZS: OK, I will change to the generic "read" operation as used by=20
RFC8341 (although for me <get> is much more clear).

  - Since instance data files may require protection, is there any
    recommendation how to do this, e.g., by wrapping everything into a
    cryptographic message syntax or so? It would be important in
    certain use cases to be able to verify that instance data is
    authentic (i.e., it is signed by the original source). In other
    cases, it may be crucial to protect the instance data itself
    against occasional readers.
BALAZS: File security is an important but really big topic and
 I was instructed by multiple people to avoid a half baked discussion on =
the
topic.

  - It may be useful to explain that data in instance data sets may
    have been filtered by access control rules like NACM and that data
    in instance data sets itself won't be filtered anymore by access
    control rules like NACM. In other words, if I take snapshots and
    stored them as instance data files, these snapshots may leak
    information that is otherwise protected. Hence it is important
    that NACM rules and file access control rules are consistent.
BALAZS: We do not know if the instance data set was originally=20
filtered by NACM or not. We don't know if the users on=20
Netconf/Restconf/cli are the same as the users defined in the=20
file system., so I fear defining what consistent means would be =
impossible.=20
It is stated that " The same kind of handling should be applied, that =
would
   be needed for the result of a <get> operation returning the same
   data." IMHO we can't really say more.

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod

------=_NextPart_000_05A8_01D5E107.397C3640
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_05A8_01D5E107.397C3640--


From nobody Tue Feb 11 10:06:05 2020
Return-Path: <oscar.gonzalezdedios@telefonica.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5160F1209D0; Tue, 11 Feb 2020 10:06:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g8PldaNWkO7k; Tue, 11 Feb 2020 10:05:56 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50112.outbound.protection.outlook.com [40.107.5.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF7BD1209CF; Tue, 11 Feb 2020 10:05:54 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TQALk7dtcgFeI4e8pdZ7+i727OpkNTmvD35FG64ixukUqZXBz1EowoJg5C5RV7xkDjGBXYB5ZDlmgHgvcfeY5V87rpOex2o+zkOLgVBnMIFSK7OZ4zgSQyox/iWRUF4rgQvSZOXeGUQBEZSX7p+KJYFEwldvqdrh5IF4p53L+vnsgnn700xlAfwfBXdTtP/p5uDOVjFRPZQPvabRkHIC1QyJDEpHsRuG4JoE9D+A66Ya2lF3oryMkgsgU4gaWLIJrlHKU5Nvo9AgsiMwRqT4aoa0aCIX+6pEEqVW42Koj2etwqm5ZplAZTJYodagFpFXkhhgIgqKcvz649PXe/Fg6w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hK0U7zuVGVqQ3cjbjBozd1EiiL0snhSVZ7PH8RAkQTI=; b=M5GeILG0pbL0xly23QcI5mlk7375BrI5tdVm3mxASaUtWFlNe+exnye0zPwfUUyP/unvPGwKD7ABzPBcsduQbPCJ56vkqsIqHCt8TaffR05W+jTR/W79de70ed5vg0s4DFCxn9xYXUBXvzCHXPaKE6VGLJNELCgKmH6/LGll925E5aQMqEYqqtK9jzrUY9TEIzig55g5h8thzurAwGcYmFTbyS/dBoxeRbg5skr+/kWJ8nV9WcJjXP35lCqBPuZQu3WknqvZ2Pm1TFUi4sFq/e6OkqSkeib2Xv7WDt6/OzilhFbu3mJk4j1o3fp1hMRsDK/E6yeXyTYoHmGYQRwacQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hK0U7zuVGVqQ3cjbjBozd1EiiL0snhSVZ7PH8RAkQTI=; b=JLx20eFBh2LNuUKIUeRY0kxuPKRDSXNZGuEPw3eKOpxRh7yVjTuFRBzIAPm5t0NYGZf/ZNXMAHi0Nw6CUqv3abxM6dxFZjQhzgR+zWoQo7Lr+nudJBNfU84zYkkyhg+dANLOM3lbS4gryJy/5QxDZZb6aoZkPmT94+7W1L2UD24=
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com (20.178.93.90) by AM6PR06MB5142.eurprd06.prod.outlook.com (20.177.191.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.23; Tue, 11 Feb 2020 18:05:52 +0000
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5]) by AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5%7]) with mapi id 15.20.2707.030; Tue, 11 Feb 2020 18:05:52 +0000
From: =?iso-8859-1?Q?Oscar_Gonz=E1lez_de_Dios?= <oscar.gonzalezdedios@telefonica.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
Thread-Index: AdXgf2dbJ6WUxXgzRxKVGs1XfT3HEwAQpvgAABBLyeA=
Date: Tue, 11 Feb 2020 18:05:51 +0000
Message-ID: <AM6PR06MB5653B347EE8C00708CBE7EC5FD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com> <20200211.105956.997059335051594687.mbj@tail-f.com>
In-Reply-To: <20200211.105956.997059335051594687.mbj@tail-f.com>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oscar.gonzalezdedios@telefonica.com; 
x-originating-ip: [2804:18:6c:d262:a978:9cf5:62a1:af4b]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 37267b52-7b69-4401-cf5e-08d7af1d0820
x-ms-traffictypediagnostic: AM6PR06MB5142:
x-microsoft-antispam-prvs: <AM6PR06MB514268DA507FD9742EAAAAC4FD180@AM6PR06MB5142.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0310C78181
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39860400002)(396003)(366004)(136003)(376002)(346002)(189003)(199004)(66574012)(81156014)(81166006)(4326008)(52536014)(66556008)(66446008)(66946007)(86362001)(66476007)(64756008)(5660300002)(71200400001)(76116006)(2906002)(8936002)(33656002)(8676002)(9686003)(6916009)(7696005)(186003)(54906003)(478600001)(6506007)(316002)(786003)(55016002)(9010500006); DIR:OUT; SFP:1102; SCL:1; SRVR:AM6PR06MB5142; H:AM6PR06MB5653.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: q+WTJLVGfBiWYmBMu5cQmbjo3HHzMYD49hUFgJ3jjfw9OqwJVv7gbGf5hxm766bs51i+HqOsYTg6PJRIfiLf3HHVHhm8F8hnNNw+ZSBtYgvM4VWDrtaJ7BUYYb9c32ZiZG+F563PwS7wQSnes9PTwMRcLxA2EoFiqdrifd2t+kN5Yhri13/WLED4tz7kXSPE1WPpYtmYh5HfhjLX2tphZw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 37267b52-7b69-4401-cf5e-08d7af1d0820
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2020 18:05:51.9156 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QcRs3hTgRBGjAlTuOPrSZ2wGXRdJGIarF9qNAT6B9U2cXOCG+TIL/BQT/ZK6HzfC6ITW8XS4+baTm+zENZS+qq+Y5M5qkTQIvlI7HrySA27JzMnnL2yjqlpji79wNIKw
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR06MB5142
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tJ7a5UDblGyDZLzexednVlyb0ls>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 18:06:01 -0000

-----Mensaje original-----
De: Martin Bjorklund <mbj@tail-f.com>
Enviado el: martes, 11 de febrero de 2020 11:00
Para: Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com>
CC: opsawg@ietf.org; netmod@ietf.org
Asunto: Re: [netmod] Question on how to design a Yang model to reflect auto=
-asignment of a give leaf

Hi,

Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:
> Dear OPSAWG and Netmod colleagues,
>
>                 During last IETF Opsawg meeting we raised a question (and
>                 there was some discussion during the meeting) that we hav=
e
>                 found yet no good answer and we would like to discuss it =
with
>                 operations and Yang experts.
>
>                 The use case is the following: We have a yang module whic=
h
>                 holds certain optional leafs. The behaviors that we would=
 like
>                 to have (and distinguish between them) are:
>
>
> a) The user does not provide the value and such value is auto-assigned
> by the system (a device (if it is a device module) or a controller (if
> it is a network/service module)).

I assume that this value not a static default value?

[Oscar] True. Should the leaf have a default value, it implies that "if the=
 value is not set, the default value is taken".

> b) The user does not provide a value and wants that such value IS NOT
> set by the system (as assigning a value has implications). That is,
> intentionally it is aimed at being left "empty" and should not be
> expanded. So, either the value is set or should remain empty

Do you mean that you want (a) and (b) at the same time for the same leaf?

[Oscar] No. Depending on the leaf, we would like to specify behavior a or b=
ehavior b. Behavior a is ok for most of the cases.  The problem is that in =
some cases, assigning a value has way more implications and the service wil=
l not work properly. Those case are the ones we wanted to specifically tack=
le.

> What is the best way to model this behavior? I see that some yang
> modules have added an "auto-assignment" leaf to express if
> auto-assignment is desired or not. (hence, auto-assignment false, and
> leaf not set, would do not assign).
>
> Which is the "default" rule for a leaf that is not set? It is that the
> system is free to create it (via template or any means of
> auto-assignment) or should leave it as is, that is, empty?
>
> In NMDA, the system is allowed to expand a given configuration. This
> fact, in my personal view, implies that by "default" any system could
> implement the "auto-assignment" behavior being compliant with
> Neconf/Restconf/NMDA rules (but I am not sure if the interpretation is
> correct).

There are (at least) three ways to interpret "auto-assign".  The client wri=
tes to running, and then the server auto-assigns X:

  (a) in running
  (b) in intended
  (c) in the operational state

(c) is uncontroversial and simple to implement in all servers, and simple t=
o understand.
[Oscar] agree

(b) is allowed by NMDA but requires more of the server implementation; spec=
ifically it requires the server to support that intended is different from =
running.
[Oscar] Agree . "Theoretically speaking" this is the behavior I would consi=
der strictly follows NMDA guidelines. Reality is implementations are yet fa=
r from this...

(a) is not recommended in general; running should be fully owned by the cli=
ent(s) and not modified by the server.
[Oscar] Agree.

[Oscar] So... what would be the best way to specify the behavior? Explicitl=
y adding an auto-assign leaf to identify the behavior? Just "obey" NMDA rul=
es?


/martin



>
> Best Regards,
>
>                 =D3scar
>
> ________________________________
>
> Este mensaje y sus adjuntos se dirigen exclusivamente a su
> destinatario, puede contener informaci=F3n privilegiada o confidencial y
> es para uso exclusivo de la persona o entidad de destino. Si no es
> usted. el destinatario indicado, queda notificado de que la lectura,
> utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede estar
> prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este
> mensaje por error, le rogamos que nos lo comunique inmediatamente por
> esta misma v=EDa y proceda a su destrucci=F3n.
>
> The information contained in this transmission is privileged and
> confidential information intended only for the use of the individual
> or entity named above. If the reader of this message is not the
> intended recipient, you are hereby notified that any dissemination,
> distribution or copying of this communication is strictly prohibited.
> If you have received this transmission in error, do not read it.
> Please immediately reply to the sender that you have received this
> communication in error and then delete it.
>
> Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confidencial e=
 =E9
> para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa
> senhoria o destinat=E1rio indicado, fica notificado de que a leitura,
> utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode esta=
r proibida
> em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro,
> rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> proceda a sua destrui=E7=E3o

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la lectura, utilizaci=F3n, divulgaci=F3n y/o=
 copia sin autorizaci=F3n puede estar prohibida en virtud de la legislaci=
=F3n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo =
comunique inmediatamente por esta misma v=EDa y proceda a su destrucci=F3n.

The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination, distribution or copying of this co=
mmunication is strictly prohibited. If you have received this transmission =
in error, do not read it. Please immediately reply to the sender that you h=
ave received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a leitura, utiliza=E7=E3o, div=
ulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode estar proibida em virtude=
 da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro, rogamos-lhe =
que nos o comunique imediatamente por esta mesma via e proceda a sua destru=
i=E7=E3o


From nobody Tue Feb 11 10:34:36 2020
Return-Path: <oscar.gonzalezdedios@telefonica.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AEA4B12002F; Tue, 11 Feb 2020 10:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D6Lgqh3l2SJ5; Tue, 11 Feb 2020 10:34:29 -0800 (PST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40097.outbound.protection.outlook.com [40.107.4.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6590612002E; Tue, 11 Feb 2020 10:34:29 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Efp15lmPSTixpvvOgYEulntobgQrPdLAFCBweaB+6OTAxpVe/OSZ+HHJGTBqYOgPdv3R+sPZS6kK74XudavNHAGnRgXDjpk3x5Qx19kbZlMFqhS/1gCQbh5u0xrcv+RHlWTLrhLf/2UmCGb+5JA70KbgBfsgy37gMMBDvUowsneG46zQphSmi7+DRqTPYO8k9HdCdOg5m7fOrzOyvauEe6jlb3ZpRGPMnUKRgxECJvYJt+E1kZ8Y/pZvCMgFK/hESSMgGC7IqOxyZHCbRHG1YAdu4Es1ilXq55SRQFG4B8S7TM7DdYZiceqG91FhsBdzEtiJxIWvGKkJ3XOMIL5iEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZSDDVQmGBm/+ShUIB84/NJo6/0k/WEh+2iHWTMAfcSY=; b=OgBhmKVa+9t7HOs4DNiGjk38+TRva1Wf4hjkIajdtTO9J/dLxGKuQyGPiZYuw36LdENX3RPXFNiXFtlgyQTXE3BwB4DYqgwj7MJcKS9owdmBtwSWuQ50BEJ8vknSbUJY5OFVmk/WlcmDTymDcB315kcAn3LB4emkO1jLXSgSCV+uTTf2QwsvSJd6eyUom/U0HnPBS/O81UlxsWcXjSQWxolbIBA6zUEQDPb9gDaArNJEKbqCOff1euSEIULPRw+eLh2G2EBeliDEPRiQU7tPi4DWuiRtYTUAMlu1ojqdbDhW5By5e9U9cEerXjBXeqqOJ+snJrFNud6Rp+6Mok/RWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZSDDVQmGBm/+ShUIB84/NJo6/0k/WEh+2iHWTMAfcSY=; b=Pf2bhtAAYNr/YdECgzc3ala4YkttlGZzClgAlyxk6C2Y9y9ZPM0RC2xL57nkGLmZTcHPVzpID7WX7Ser/ADqOXlyF1suGIxBtvPyilcBo6S8/bFBS3wiZi0lICncbwu2RL3H5UriFkCzwVAHpPIU1QrbYa2j51YILPuMKi7tErA=
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com (20.178.93.90) by AM6PR06MB4472.eurprd06.prod.outlook.com (20.177.35.93) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.21; Tue, 11 Feb 2020 18:34:26 +0000
Received: from AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5]) by AM6PR06MB5653.eurprd06.prod.outlook.com ([fe80::4d14:ef4b:8837:87c5%7]) with mapi id 15.20.2707.030; Tue, 11 Feb 2020 18:34:26 +0000
From: =?iso-8859-1?Q?Oscar_Gonz=E1lez_de_Dios?= <oscar.gonzalezdedios@telefonica.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "opsawg@ietf.org" <opsawg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
Thread-Index: AdXgf2dbJ6WUxXgzRxKVGs1XfT3HEwAPk3OAABIL0FA=
Date: Tue, 11 Feb 2020 18:34:26 +0000
Message-ID: <AM6PR06MB56535AFC257EDE913125AD9EFD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com> <05b201d5e0bd$b6072520$22156f60$@olddog.co.uk>
In-Reply-To: <05b201d5e0bd$b6072520$22156f60$@olddog.co.uk>
Accept-Language: es-ES, en-US
Content-Language: es-ES
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oscar.gonzalezdedios@telefonica.com; 
x-originating-ip: [2804:18:6c:d262:a978:9cf5:62a1:af4b]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8ea1b773-a2c8-449d-0e67-08d7af21060d
x-ms-traffictypediagnostic: AM6PR06MB4472:
x-microsoft-antispam-prvs: <AM6PR06MB447267943E4E788DB0C880D5FD180@AM6PR06MB4472.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0310C78181
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(346002)(39860400002)(396003)(366004)(136003)(376002)(189003)(199004)(71200400001)(2906002)(478600001)(110136005)(52536014)(9686003)(186003)(8936002)(5660300002)(86362001)(6506007)(53546011)(8676002)(81156014)(81166006)(76116006)(19627235002)(66574012)(786003)(316002)(33656002)(7696005)(55016002)(66556008)(66446008)(66946007)(64756008)(66476007)(9010500006); DIR:OUT; SFP:1102; SCL:1; SRVR:AM6PR06MB4472; H:AM6PR06MB5653.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: WXQE5oKUVTuzWjJQu06lqgHg59IvpgBu05AvgOI6htkZ8ZmTxMCTlQ+T+K0TGGnXivN5lUfyCRtCTU0SK0SqsHwXC6dyxW1FLTIYUOyFhWbAN5RqHoI8IkQxH1wM5ImG/eamqOkmNA4LsXk1c2KtKHItuXjGivIV8K82rA/w8HvQxicZwqjvnqClbiPK3zxVoncm7O1P1VnNwAnNRILm/pLJodfhz733XGYw1fCFy6bkI8vyM3a7W6tiXGJLG3EF4MY0oovz2zifPftJYTaBPWVqNGnnSsOAxFWAPN6AH02gIqTgxg0CUbyhuu30e1QuYQUyk1CtOs7oIcKyLOnr9jB2HpduIlsTQ9l6d5uK6i/JPZDba67E6a8fNWIS9JjUmUgV+4v8EJmu9KzCCETxsziSlgwBCZrPhnZDUcoiIdgbMTRY1dox3hJiQfQwdzbu5QL5rTGTdn2NzfFroz4HfIoH5az8hgtqvu6IJ+U7ZBhzbGUoFgBeJ4OamGKeDBT4
x-ms-exchange-antispam-messagedata: vxwi3lCh715ZbOHCoQ98K1Wvr+62oOiGw22jjsZzrmApDnFdryAXMxWbDupE02TyKUCgljgfsjmUcB8n7aq5szGdQJh6iO8e18FglULf4rf7cYvPMUSwCuFvow0mefiVwa7JrImABfG/cqskkhnqk7bqvMbf9QDobJWAi796TQWtLa92GgLIHkQVjfu66ZF35ibBP/sKWk/QwFFgEqC90g==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM6PR06MB56535AFC257EDE913125AD9EFD180AM6PR06MB5653eurp_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ea1b773-a2c8-449d-0e67-08d7af21060d
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2020 18:34:26.5625 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ku70+6zGxTH1mRVHzQIvuReGewjZircPtKeAcbgKHO0v6vGc8E+NbEdew4LGfPhv/abOFyLWM6ohqAFpRW5R7CWTCNeNrCbw44IimKpFBd+tf+Fe4AQAORtfv06+H/zi
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR06MB4472
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QRk50OrPmlKm3UPjuyk-XZ5gkig>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Feb 2020 18:34:34 -0000

--_000_AM6PR06MB56535AFC257EDE913125AD9EFD180AM6PR06MB5653eurp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Adrian,

                The problem is that, as the leaf has a type,  It would requ=
ire to say which value of that type means "No value assigned". An alternati=
ve could be a choice of "No value is assigned" (an empty type leaf?) or the=
 leaf with the type itself.  Does this makes sense?

                Oscar

De: Adrian Farrel <adrian@olddog.co.uk>
Enviado el: martes, 11 de febrero de 2020 10:29
Para: Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com>; opsaw=
g@ietf.org; netmod@ietf.org
Asunto: RE: [netmod] Question on how to design a Yang model to reflect auto=
-asignment of a give leaf

Isn't it possible to handle case b) by defining a value to have the meaning=
 "no value has been assigned" and then the user an explicitly set that valu=
e?

Adrian

From: netmod <netmod-bounces@ietf.org<mailto:netmod-bounces@ietf.org>> On B=
ehalf Of Oscar Gonz=E1lez de Dios
Sent: 11 February 2020 02:40
To: opsawg@ietf.org<mailto:opsawg@ietf.org>; netmod@ietf.org<mailto:netmod@=
ietf.org>
Subject: [netmod] Question on how to design a Yang model to reflect auto-as=
ignment of a give leaf

Dear OPSAWG and Netmod colleagues,

                During last IETF Opsawg meeting we raised a question (and t=
here was some discussion during the meeting) that we have found yet no good=
 answer and we would like to discuss it with operations and Yang experts.

                The use case is the following:  We have a yang module which=
 holds certain optional leafs. The behaviors that we would like to have (an=
d distinguish between them) are:

a)       The user does not provide the value and such value is auto-assigne=
d by the system (a  device (if it is a device module) or a controller (if i=
t is a network/service module)).
b)      The user does not provide a value and wants that such value IS NOT =
set by the system (as assigning a value has implications). That is, intenti=
onally it is aimed at being left "empty" and should not be expanded. So, ei=
ther the value is set or should remain empty

What is the best way to model this behavior? I see that some yang modules h=
ave added an "auto-assignment" leaf to express if auto-assignment is desire=
d or not. (hence, auto-assignment false, and leaf not set, would  do not as=
sign).

Which is the "default" rule for a leaf that is not set? It is that the syst=
em is free to create it (via template or any means of auto-assignment) or s=
hould leave it as is, that is, empty?

In NMDA, the system is allowed to expand a given configuration. This fact, =
in my personal view,  implies that by "default" any system could implement =
the "auto-assignment" behavior being compliant with Neconf/Restconf/NMDA ru=
les (but I am not sure if the interpretation is correct).

Best Regards,

                =D3scar

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la lectura, utilizaci=F3n, divulgaci=F3n y/o=
 copia sin autorizaci=F3n puede estar prohibida en virtud de la legislaci=
=F3n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo =
comunique inmediatamente por esta misma v=EDa y proceda a su destrucci=F3n.

The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination, distribution or copying of this co=
mmunication is strictly prohibited. If you have received this transmission =
in error, do not read it. Please immediately reply to the sender that you h=
ave received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a leitura, utiliza=E7=E3o, div=
ulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode estar proibida em virtude=
 da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro, rogamos-lhe =
que nos o comunique imediatamente por esta mesma via e proceda a sua destru=
i=E7=E3o

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la lectura, utilizaci=F3n, divulgaci=F3n y/o=
 copia sin autorizaci=F3n puede estar prohibida en virtud de la legislaci=
=F3n vigente. Si ha recibido este mensaje por error, le rogamos que nos lo =
comunique inmediatamente por esta misma v=EDa y proceda a su destrucci=F3n.

The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination, distribution or copying of this co=
mmunication is strictly prohibited. If you have received this transmission =
in error, do not read it. Please immediately reply to the sender that you h=
ave received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a leitura, utiliza=E7=E3o, div=
ulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode estar proibida em virtude=
 da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro, rogamos-lhe =
que nos o comunique imediatamente por esta mesma via e proceda a sua destru=
i=E7=E3o

--_000_AM6PR06MB56535AFC257EDE913125AD9EFD180AM6PR06MB5653eurp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EstiloCorreo19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EstiloCorreo20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EstiloCorreo21
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:70.85pt 3.0cm 70.85pt 3.0cm;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:991759453;
	mso-list-type:hybrid;
	mso-list-template-ids:-756410648 -82426768 201981977 201981979 201981967 2=
01981977 201981979 201981967 201981977 201981979;}
@list l0:level1
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:53.25pt;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:89.25pt;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:125.25pt;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:161.25pt;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:197.25pt;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:233.25pt;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:269.25pt;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:305.25pt;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:341.25pt;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ES" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Hi Adri=
an,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; The problem is that, as the leaf has a type, &nbsp;It would requir=
e to say which value of that type means &#8220;No value assigned&#8221;. An=
 alternative could be a choice of &#8220;No value is assigned&#8221;
 (an empty type leaf?) or the leaf with the type itself. &nbsp;Does this ma=
kes sense?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; </span>
<span style=3D"color:#1F497D">Oscar <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">&nbsp;<o:p></o:p></spa=
n></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"mso-fareast-language:ES">De:</span=
></b><span style=3D"mso-fareast-language:ES"> Adrian Farrel &lt;adrian@oldd=
og.co.uk&gt;
<br>
<b>Enviado el:</b> martes, 11 de febrero de 2020 10:29<br>
<b>Para:</b> Oscar Gonz=E1lez de Dios &lt;oscar.gonzalezdedios@telefonica.c=
om&gt;; opsawg@ietf.org; netmod@ietf.org<br>
<b>Asunto:</b> RE: [netmod] Question on how to design a Yang model to refle=
ct auto-asignment of a give leaf<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Isn&#8217;t it possible to hand=
le case b) by defining a value to have the meaning &#8220;no value has been=
 assigned&#8221; and then the user an explicitly set that value?<o:p></o:p>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Adrian<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"mso-fareast-languag=
e:EN-GB">From:</span></b><span lang=3D"EN-US" style=3D"mso-fareast-language=
:EN-GB"> netmod &lt;</span><a href=3D"mailto:netmod-bounces@ietf.org"><span=
 lang=3D"EN-US" style=3D"mso-fareast-language:EN-GB">netmod-bounces@ietf.or=
g</span></a><span lang=3D"EN-US" style=3D"mso-fareast-language:EN-GB">&gt;
<b>On Behalf Of </b>Oscar Gonz=E1lez de Dios<br>
<b>Sent:</b> 11 February 2020 02:40<br>
<b>To:</b> </span><a href=3D"mailto:opsawg@ietf.org"><span lang=3D"EN-US" s=
tyle=3D"mso-fareast-language:EN-GB">opsawg@ietf.org</span></a><span lang=3D=
"EN-US" style=3D"mso-fareast-language:EN-GB">;
</span><a href=3D"mailto:netmod@ietf.org"><span lang=3D"EN-US" style=3D"mso=
-fareast-language:EN-GB">netmod@ietf.org</span></a><span lang=3D"EN-US" sty=
le=3D"mso-fareast-language:EN-GB"><br>
<b>Subject:</b> [netmod] Question on how to design a Yang model to reflect =
auto-asignment of a give leaf<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Dear OPSAWG and Netmod colleagu=
es,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; During last IET=
F Opsawg meeting we raised a question (and there was some discussion during=
 the meeting) that we have found yet no good answer and we would like to di=
scuss it with operations and Yang experts.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The use case is=
 the following:&nbsp; We have a yang module which holds certain optional le=
afs. The behaviors that we would like to have (and distinguish between them=
) are:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:53.25pt;text-indent:-18.0pt;mso=
-list:l0 level1 lfo2">
<![if !supportLists]><span lang=3D"EN-US"><span style=3D"mso-list:Ignore">a=
)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US">The user does not provi=
de the value and such value is auto-assigned by the system (a &nbsp;device =
(if it is a device module) or a controller (if it is a network/service modu=
le)).
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:53.25pt;text-indent:-18.0pt;mso=
-list:l0 level1 lfo2">
<![if !supportLists]><span lang=3D"EN-US"><span style=3D"mso-list:Ignore">b=
)<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><span lang=3D"EN-US">The user does not provi=
de a value and wants that such value IS NOT set by the system (as assigning=
 a value has implications). That is, intentionally it is aimed at being lef=
t &#8220;empty&#8221; and should not be expanded.
 So, either the value is set or should remain empty<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">W=
hat is the best way to model this behavior? I see that some yang modules ha=
ve added an &#8220;auto-assignment&#8221; leaf to express if auto-assignmen=
t is desired or not. (hence, auto-assignment false,
 and leaf not set, would&nbsp; do not assign). <o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">&=
nbsp;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">W=
hich is the &#8220;default&#8221; rule for a leaf that is not set? It is th=
at the system is free to create it (via template or any means of auto-assig=
nment) or should leave it as is, that is, empty?
<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">I=
n NMDA, the system is allowed to expand a given configuration. This fact, i=
n my personal view, &nbsp;implies that by &#8220;default&#8221; any system =
could implement the &#8220;auto-assignment&#8221; behavior being compliant
 with Neconf/Restconf/NMDA rules (but I am not sure if the interpretation i=
s correct).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">B=
est Regards,<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US"><=
o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:35.25pt"><span lang=3D"EN-US">&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp; =D3scar
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-GB"><o:p>&nbs=
p;</o:p></span></p>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"mso-fareast-language:EN-GB">
<hr size=3D"2" width=3D"100%" align=3D"center">
</span></div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,sans-serif;color:gray;mso-fareast-language:EN-GB"><br>
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la
 lectura, utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede e=
star prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este m=
ensaje por error, le rogamos que nos lo comunique inmediatamente por esta m=
isma v=EDa y proceda a su destrucci=F3n.<br>
<br>
</span><span lang=3D"EN-US" style=3D"font-size:7.5pt;font-family:&quot;Aria=
l&quot;,sans-serif;color:gray;mso-fareast-language:EN-GB">The information c=
ontained in this transmission is privileged and confidential information in=
tended only for the use of the individual or entity
 named above. If the reader of this message is not the intended recipient, =
you are hereby notified that any dissemination, distribution or copying of =
this communication is strictly prohibited. If you have received this transm=
ission in error, do not read it.
 Please immediately reply to the sender that you have received this communi=
cation in error and then delete it.<br>
<br>
</span><span lang=3D"PT-BR" style=3D"font-size:7.5pt;font-family:&quot;Aria=
l&quot;,sans-serif;color:gray;mso-fareast-language:EN-GB">Esta mensagem e s=
eus anexos se dirigem exclusivamente ao seu destinat=E1rio, pode conter inf=
orma=E7=E3o privilegiada ou confidencial e =E9 para uso
 exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o =
destinat=E1rio indicado, fica notificado de que a leitura, utiliza=E7=E3o, =
divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode estar proibida em virt=
ude da legisla=E7=E3o vigente. Se recebeu esta mensagem
 por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via=
 e proceda a sua destrui=E7=E3o</span><span lang=3D"PT-BR" style=3D"mso-far=
east-language:EN-GB"><o:p></o:p></span></p>
</div>
<br>
<hr>
<font face=3D"Arial" color=3D"Gray" size=3D"1"><br>
Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, pu=
ede contener informaci=F3n privilegiada o confidencial y es para uso exclus=
ivo de la persona o entidad de destino. Si no es usted. el destinatario ind=
icado, queda notificado de que la
 lectura, utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede e=
star prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este m=
ensaje por error, le rogamos que nos lo comunique inmediatamente por esta m=
isma v=EDa y proceda a su destrucci=F3n.<br>
<br>
The information contained in this transmission is privileged and confidenti=
al information intended only for the use of the individual or entity named =
above. If the reader of this message is not the intended recipient, you are=
 hereby notified that any dissemination,
 distribution or copying of this communication is strictly prohibited. If y=
ou have received this transmission in error, do not read it. Please immedia=
tely reply to the sender that you have received this communication in error=
 and then delete it.<br>
<br>
Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinat=E1rio=
, pode conter informa=E7=E3o privilegiada ou confidencial e =E9 para uso ex=
clusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa senhoria o des=
tinat=E1rio indicado, fica notificado de que a
 leitura, utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o p=
ode estar proibida em virtude da legisla=E7=E3o vigente. Se recebeu esta me=
nsagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mes=
ma via e proceda a sua destrui=E7=E3o<br>
</font>
</body>
</html>

--_000_AM6PR06MB56535AFC257EDE913125AD9EFD180AM6PR06MB5653eurp_--


From nobody Tue Feb 11 23:48:36 2020
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52731120041; Tue, 11 Feb 2020 23:48:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vaJQpx64-do0; Tue, 11 Feb 2020 23:48:32 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id D2D3E120893; Tue, 11 Feb 2020 23:48:29 -0800 (PST)
Received: from localhost (unknown [173.38.220.37]) by mail.tail-f.com (Postfix) with ESMTPSA id F12A81AE018C; Wed, 12 Feb 2020 08:48:24 +0100 (CET)
Date: Wed, 12 Feb 2020 08:47:45 +0100 (CET)
Message-Id: <20200212.084745.340561451697677336.mbj@tail-f.com>
To: oscar.gonzalezdedios@telefonica.com
Cc: opsawg@ietf.org, netmod@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <AM6PR06MB5653B347EE8C00708CBE7EC5FD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com> <20200211.105956.997059335051594687.mbj@tail-f.com> <AM6PR06MB5653B347EE8C00708CBE7EC5FD180@AM6PR06MB5653.eurprd06.prod.outlook.com>
X-Mailer: Mew version 6.8 on Emacs 25.2
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/rrp66Uj8PrYOGqL2SevW9OTKGW0>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2020 07:48:34 -0000

Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:
> =

> =

> -----Mensaje original-----
> De: Martin Bjorklund <mbj@tail-f.com>
> Enviado el: martes, 11 de febrero de 2020 11:00
> Para: Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com>
> CC: opsawg@ietf.org; netmod@ietf.org
> Asunto: Re: [netmod] Question on how to design a Yang model to reflec=
t
> auto-asignment of a give leaf
> =

> Hi,
> =

> Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:=

> > Dear OPSAWG and Netmod colleagues,
> >
> >                 During last IETF Opsawg meeting we raised a questio=
n (and
> >                 there was some discussion during the meeting) that =
we have
> >                 found yet no good answer and we would like to discu=
ss it
> >                 with
> >                 operations and Yang experts.
> >
> >                 The use case is the following: We have a yang modul=
e which
> >                 holds certain optional leafs. The behaviors that we=
 would
> >                 like
> >                 to have (and distinguish between them) are:
> >
> >
> > a) The user does not provide the value and such value is auto-assig=
ned
> > by the system (a device (if it is a device module) or a controller =
(if
> > it is a network/service module)).
> =

> I assume that this value not a static default value?
> =

> [Oscar] True. Should the leaf have a default value, it implies that
> "if the value is not set, the default value is taken".
> =

> > b) The user does not provide a value and wants that such value IS N=
OT
> > set by the system (as assigning a value has implications). That is,=

> > intentionally it is aimed at being left "empty" and should not be
> > expanded. So, either the value is set or should remain empty
> =

> Do you mean that you want (a) and (b) at the same time for the same
> leaf?
> =

> [Oscar] No. Depending on the leaf, we would like to specify behavior =
a
> or behavior b. Behavior a is ok for most of the cases.  The problem i=
s
> that in some cases, assigning a value has way more implications and
> the service will not work properly. Those case are the ones we wanted=

> to specifically tackle.

Ok.  See below.

> > What is the best way to model this behavior? I see that some yang
> > modules have added an "auto-assignment" leaf to express if
> > auto-assignment is desired or not. (hence, auto-assignment false, a=
nd
> > leaf not set, would do not assign).
> >
> > Which is the "default" rule for a leaf that is not set? It is that =
the
> > system is free to create it (via template or any means of
> > auto-assignment) or should leave it as is, that is, empty?
> >
> > In NMDA, the system is allowed to expand a given configuration. Thi=
s
> > fact, in my personal view, implies that by "default" any system cou=
ld
> > implement the "auto-assignment" behavior being compliant with
> > Neconf/Restconf/NMDA rules (but I am not sure if the interpretation=
 is
> > correct).
> =

> There are (at least) three ways to interpret "auto-assign".  The
> client writes to running, and then the server auto-assigns X:
> =

>   (a) in running
>   (b) in intended
>   (c) in the operational state
> =

> (c) is uncontroversial and simple to implement in all servers, and
> simple to understand.
> [Oscar] agree
> =

> (b) is allowed by NMDA but requires more of the server implementation=
;
> specifically it requires the server to support that intended is
> different from running.
> [Oscar] Agree . "Theoretically speaking" this is the behavior I would=

> consider strictly follows NMDA guidelines. Reality is implementations=

> are yet far from this...
> =

> (a) is not recommended in general; running should be fully owned by
> the client(s) and not modified by the server.
> [Oscar] Agree.
> =

> [Oscar] So... what would be the best way to specify the behavior?
> Explicitly adding an auto-assign leaf to identify the behavior? Just
> "obey" NMDA rules?

For your "auto-assignment" case, I would describe the behaviour in the
description statement.  Something like: "If this leaf has not been
configured, the server will calculate a value [... specify how ... ]
and use that value operationally.  This calculated value is available
in the operational state."  =


For your other case (the user really doesn't want a value) I also
would document this in the description (unless it's obvious).



/martin





> =

> =

> /martin
> =

> =

> =

> >
> > Best Regards,
> >
> >                 =D3scar
> >
> > ________________________________
> >
> > Este mensaje y sus adjuntos se dirigen exclusivamente a su
> > destinatario, puede contener informaci=F3n privilegiada o confidenc=
ial y
> > es para uso exclusivo de la persona o entidad de destino. Si no es
> > usted. el destinatario indicado, queda notificado de que la lectura=
,
> > utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede est=
ar
> > prohibida en virtud de la legislaci=F3n vigente. Si ha recibido est=
e
> > mensaje por error, le rogamos que nos lo comunique inmediatamente p=
or
> > esta misma v=EDa y proceda a su destrucci=F3n.
> >
> > The information contained in this transmission is privileged and
> > confidential information intended only for the use of the individua=
l
> > or entity named above. If the reader of this message is not the
> > intended recipient, you are hereby notified that any dissemination,=

> > distribution or copying of this communication is strictly prohibite=
d.
> > If you have received this transmission in error, do not read it.
> > Please immediately reply to the sender that you have received this
> > communication in error and then delete it.
> >
> > Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> > destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confiden=
cial e =E9
> > para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 v=
ossa
> > senhoria o destinat=E1rio indicado, fica notificado de que a leitur=
a,
> > utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pod=
e estar proibida
> > em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por =
erro,
> > rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> > proceda a sua destrui=E7=E3o
> =

> ________________________________
> =

> Este mensaje y sus adjuntos se dirigen exclusivamente a su
> destinatario, puede contener informaci=F3n privilegiada o confidencia=
l y
> es para uso exclusivo de la persona o entidad de destino. Si no es
> usted. el destinatario indicado, queda notificado de que la lectura,
> utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede estar=

> prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este
> mensaje por error, le rogamos que nos lo comunique inmediatamente por=

> esta misma v=EDa y proceda a su destrucci=F3n.
> =

> The information contained in this transmission is privileged and
> confidential information intended only for the use of the individual
> or entity named above. If the reader of this message is not the
> intended recipient, you are hereby notified that any dissemination,
> distribution or copying of this communication is strictly
> prohibited. If you have received this transmission in error, do not
> read it. Please immediately reply to the sender that you have receive=
d
> this communication in error and then delete it.
> =

> Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confidenci=
al e =E9
> para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vos=
sa
> senhoria o destinat=E1rio indicado, fica notificado de que a leitura,=

> utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode =
estar proibida
> em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por er=
ro,
> rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> proceda a sua destrui=E7=E3o
> =


From nobody Wed Feb 12 01:07:22 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62B7F1200A1 for <netmod@ietfa.amsl.com>; Wed, 12 Feb 2020 01:07:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E4i2dccqFOvY for <netmod@ietfa.amsl.com>; Wed, 12 Feb 2020 01:07:16 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2056.outbound.protection.outlook.com [40.107.22.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55F33120044 for <netmod@ietf.org>; Wed, 12 Feb 2020 01:07:09 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aAMiZ/MYOyiu4+x4Kx2PTP2xtSX9GLErAnBNRKKVyni7umcmSuhI+BpLPIEfMuWLFQI8v/xJVG0H2ed6NP9WXj+cS6CoDWlYg6poKXbLj/6HYU7Ks4Ku6hb08uvGb34YBPspla9cZhbKXQtNQ0uXmlg6rWkopD37xtijclaESk/mDuyczU+KgiBzNkeRnRS0vSjQ9pXuyCHjibGZvZm9KU4SoIfu2YxibRcla+sQXk42ow9Jqfj5B+NHMUIXod78xId3HZlJk6HZ/3CqM6UCBSEda2W22VYOTcFG0tj5wreBqaO6ylmPLvsREAJvlctSl/6Dk2lIjz1G2N0Tw7+tXw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7itxVdIFIwrA19bUH4tXF5gBUXpk9uCn+QtEP4jGamA=; b=ccxdexxHZ79dQtHFuk2J3UtzwqXtb3RNPIXxIvzAPdURrgbYuOEljWh8j5WD3TnKIEn/9almZxwzxO5uOkerqxXzBc27Tro0ZkfAzlbTTersCI08b3hHpAplGJJr4Mu/vMUMd02yJWoBY/PNZC2svkWXrEUf5ZvkLvDlIy8IA1RDB+Mrri+rzk2UIWOS4BGCNWTSg1m447iNPJzhx6VJTGTJS4ft5oHq7Mi2jRIz+R8sIpRB/BzWKvXDey9FnIU1vGl8BRMLLSVN6vxgZ17KbbkDJHwY0M53djKMnGrKOYlsAGCX+3AUFh6lEQnqtADFrbJH4kZ+YG4Eko/FavSBQA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7itxVdIFIwrA19bUH4tXF5gBUXpk9uCn+QtEP4jGamA=; b=tFQDfbJqikQU5+MTkMjVVx6PtUeCapyQjWbcQaq0l04yzWnyRCgvZyfQmBsSfzXSEC8/nuzWIyadHA6W7DiPiluJQHEWVr6PMrhvnchVZVf/h4vw7m1fiWk9BLs7EKfTGPqauCx2SMkVDpw7ZDkL+L559J8AJ4W1WvNaZev2zzg=
Received: from HE1P190MB0315.EURP190.PROD.OUTLOOK.COM (10.160.48.146) by HE1P190MB0459.EURP190.PROD.OUTLOOK.COM (10.160.68.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.29; Wed, 12 Feb 2020 09:07:06 +0000
Received: from HE1P190MB0315.EURP190.PROD.OUTLOOK.COM ([fe80::b532:80d3:c371:e84d]) by HE1P190MB0315.EURP190.PROD.OUTLOOK.COM ([fe80::b532:80d3:c371:e84d%7]) with mapi id 15.20.2707.030; Wed, 12 Feb 2020 09:07:05 +0000
Received: from localhost (212.201.44.247) by AM0PR06CA0062.eurprd06.prod.outlook.com (2603:10a6:208:aa::39) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.21 via Frontend Transport; Wed, 12 Feb 2020 09:07:04 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: =?iso-8859-1?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
CC: Kent Watsen <kent+ietf@watsen.net>, NETMOD Working Group <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
Thread-Index: AQHVxVfQ4dtefa62LU22UA5i1BqLNafztdMAgCK9LYCAAQnlgA==
Date: Wed, 12 Feb 2020 09:07:05 +0000
Message-ID: <20200212090703.eikj365ctbsighey@anna.jacobs.jacobs-university.de>
References: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com> <20200120144528.wt2z4y66xcnp7fxj@anna.jacobs.jacobs-university.de> <DB7PR07MB4011635119B75D384D11D01DF0180@DB7PR07MB4011.eurprd07.prod.outlook.com>
In-Reply-To: <DB7PR07MB4011635119B75D384D11D01DF0180@DB7PR07MB4011.eurprd07.prod.outlook.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM0PR06CA0062.eurprd06.prod.outlook.com (2603:10a6:208:aa::39) To HE1P190MB0315.EURP190.PROD.OUTLOOK.COM (2603:10a6:7:5f::18)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8a2dbad6-4893-4ca3-a8df-08d7af9aedff
x-ms-traffictypediagnostic: HE1P190MB0459:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1P190MB04591960655F6BF6E83A503CDE1B0@HE1P190MB0459.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0311124FA9
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400004)(396003)(376002)(136003)(346002)(366004)(199004)(189003)(186003)(26005)(5660300002)(2906002)(64756008)(66556008)(66476007)(54906003)(478600001)(71200400001)(316002)(16526019)(86362001)(786003)(1076003)(3450700001)(6916009)(52116002)(6496006)(66446008)(966005)(8676002)(81156014)(66946007)(6486002)(956004)(8936002)(4326008)(30864003)(81166006)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1P190MB0459; H:HE1P190MB0315.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: Yca5CzGeMOhtYnybCcnJ0QKwnyOUaNnYIui+khznbjkXfgAsESx915unfPCjsjTpJuLl+fgyg7rdYbF5yHLX5ZErsiqNcCPIi8cK88c2IUIn1ryG1TUnfcLXpO+bO8UKOQfBirmBzNG+DwtsR5+6lA==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <A2B887022B8931478A7E323CD6E114B6@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 8a2dbad6-4893-4ca3-a8df-08d7af9aedff
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2020 09:07:05.2397 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cFX77SYrxLWhdGhIP6Uybq/0KCl+TifJjjnA7W4Ugj4QkhOtmcz+peY2+/JzL7P3xuTQkfbJqbhlB4tsXtz8CoG1ABlfrlYY7bto6y5LvUE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1P190MB0459
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/oCm9kMW02ll45bcircYUyvd0f_k>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2020 09:07:20 -0000

Trimming things down where things are clear, not fixing the quoting
problems...

> * Abstract
>=20
>   I think we should avoid referring to some <get> operation. Here is a
>   proposal of a rewrite:
>=20
> OLD
>=20
>    running server available.  This document specifies a standard file
>    format for YANG instance data (which follows the syntax and semantic
>    from existing YANG models, re-using the same format as the reply to a
>    <get> operation/request) and annotates it with metadata.
>=20
> NEW
>=20
>    running server available.  This document specifies a standard file
>    format for YANG instance data, which follows the syntax and semantic
>    of existing YANG models, and annotates it with metadata.
> BALAZS: Other have expressly asked for a reference to "get" but if you wa=
nt
> I can remove it.

Thanks. So also further below...
=20
>   - I fail to see the difference between 'content-schema' and 'content
>     defining YANG module(s)'. The 'content-schema' is already a set of
>     YANG modules. I suggest to remove 'Content defining YANG module(s)
>     as it is not a necessary term. Rewrite all places where the phrase
>     'content defining YANG modules' is used.
> BALAZS: a schema is a full set of YANG modules needed to define the=20
> structure and properties of the instance data (+features, deviations). =20
> A  "content defining YANG module" is an individual YANG module is=20
> part of the content-schema. So the difference is a set versus one item.=20
> I updated the description to emphasize this difference.

OK. But then what is a non-content defining YANG module? Or are these
schema-defining YANG modules? I still do not get why we need 'content
defining YANG modules' - we did not need that in other specifications
so far that define schemas. So why do we need new terms here?

>   - Is it necessary to describe P2 in terms of (presumably) NETCONF
>     operations? I would prefer to have the document written in a
>     protocol agnostic style. Perhaps simply drop "similar to the
>     response of a <get> operation/request".
> BALAZS: This is a reference both to NETCONF and RESTCONF. It was explicit=
ly
> asked for by other reviewers.

Well, then the correct wording would be "similar to the response of a
NETCONF <get> operation or the RESTCONF response to a GET method
invocation on the (unified) datastore resource". Sounds complex and I
still prefer the text to be agnostic to specific operations - in
particular since <get> and the unified datastore have their
limitations. The format is simply reusing the already defined data
model encoding formats, i.e., the format has nothing to do with the
operations used to retrieve the data. So I suggest:

   P2  Instance data shall reuse existing encoding rules for
       YANG defined data.

There is no need to refer to specific protocol operations.

>   - I do not understand that text about the default attribute. Section
>     4.8.9 defines a query parameter, not an attribute. And I do not
>     know how that fits into content data.
> BALAZS: https://tools.ietf.org/html/rfc8040#section-4.8.9:
> " If the "with-defaults" parameter is set to "report-all-tagged", then
>    the server MUST adhere to the default-reporting behavior defined in
>    Section 3.4 of [RFC6243].  Metadata is reported by the server as
>    specified in Section 5.3.  The XML encoding for the "default"
>    attribute sent by the server for default nodes is defined in
>    Section 6 of [RFC6243].  The JSON encoding for the "default"
>    attribute MUST use the same values, as defined in [RFC6243], but
>    encoded according to the rules in [RFC7952].  The module name
>    "ietf-netconf-with-defaults" MUST be used for the "default"
>    attribute. "
> Here the usage of the default ATTRIBUTE is defined.

I am still confused about terminology here, an attribute is an XML way
of representing meta data, JSON does this differently. Perhaps some
good examples would clear the confusion.

>   - Similarly, I do not understand why implementation specific
>     metadata may be included in the content-data. This seems to be the
>     wrong place, no? Should metadata not go into the header?
> BALAZS: As this might be meta-data about the individual instance=20
> data nodes (e.g.  metadata following the principles from rfc7952) it belo=
ngs
> here.

OK, perhaps my confusion is that it was not clear to me what kind of
metadata is meant here...
=20
>   - Why MUST XML attributes be ignored, why is there no text about
>     unknown JSON data, 'attributes' (or annotations)? What should
>     implementations generally do about unknown elements, attributes,
>     objects, arrays, ...)? Why are we specific about only one specific
>     case?
> BALAZS:  Generally we want to allow users/creators to decorate the data=20
> with additional information, that is not standardized. Like YANG extensio=
ns
>  these may be useful, but at least should not cause problems.
> XML attributes are often used as meta-data and I was asked to list them
> specifically.
>=20
> It is not stated what an application should do with additional unknown da=
ta=20
> (XML elements, JSON data) that do not fit the above categories.  Should w=
e
> say something about it?=20
> IMHO no. We don't want to be too restrictive, as there are many potential=
=20
> users with different needs. We could state
>  "Users of the instance data MAY discard any other unknown data".
> However that does not mean much.

I do not understand why there are specific rules for XML encodings but
not equivalent JSON rules. It looks like either the XML rules are not
needed or equivalent JSON rules are missing if the XML rules are
needed or there should be an explanation why the different encodings
lead to different results (which is operationally rather surprising).

If we want rules that apply to all encodings, they should be expressed
in an encoding neutral way. The current text and your response leaves
me puzzled what the specification really wants to say here. And do we
have to say something at all?

>     It is unclear what "will be very similar" really means but perhaps
>     this is clarified later. If not, this sentence says nothing in
>     terms of a technical specification.

So what is the meaning of "will be very similar"?

>   - The introduction contains several MAYs and MUSTS that are not
>     understandable yet and they do not seem to belong into an
>     'Introduction' in the first place.
> BALAZS: Section 2 Introduction 1 'may'
> " further instance data formats may be specified"
> I was specifically asked to include this. Why is this not understandable?=
=20
> Where should this be if not in the introduction chapter?
> Section 2 does not contain the word must.=20
> Maybe I am not understanding your comment.

Hm, I do not recall what made me write this, so lets ignore this
comment.
=20
>   - Why is EXTERNAL in all caps but Inline in capitalized form?  In
>     the YANG definitions, EXTERNAL seems to be uri. I think we reduce
>     ambiguity by being consistent with how we name things.
> BALAZS: OK, EXTERNAL should not be all caps.=20
> Here external means that the content-schema is defined externally=20
> to the instance data set, not even a URI is included.

So if I have no case in the content-schema-spec choice, then it is
external or how does this work? Perhaps define external differently?
Another attempt:

External method: Do not include the content-schema, the user needs
to obtain the information through external documents.

I removed "already known" since a tool and human producing an instance
file will in general have no clue what a user of that instance file
already knows.
=20
>   - 3.1.1 How are the details specified in the anydata? Perhaps a
>     forward reference might help. What are 'version labels'?
> BALAZS: Added reference to example.
> Version/Revision labels are defined in
> draft-verdt-netmod-yang-module-versioning;=20
> added as a reference. I added them here (only as an example) as they are=
=20
> highly relevant to specifying module versions even if they are not=20
> agreed in Netmod yet. The name was changed from version-label to
> revision-label lately.

Lets use a single term then, lets say "revision labels" if that is the
most recent once. Right now, both terms seem to be used.

>   - I like to understand why we need several methods to specify the
>     schema. Having N solution is always bad for interoperability and
>     also for maintainability. Perhaps the WG failed to reach consensus
>     on a single solution.  Or there are strong technical reasons - but
>     then they should be clearly stated. What are implementations
>     expected to support, all methods? Or whatever the implementer
>     prefers? How do we achieve interoperability across tools?
> BALAZS: Different people in the WG wanted different solutions.
> - Some (as I remember you too) asked for a full flexible solution=20
> which can use multiple modules potentially not even the=20
> ietf-yang-library to define the schema  (Inline solution)
> - some asked for a simple solution listing the content schema modules
> - some wanted just to use a reference (If any this is the one, I would
> remove)
> - some stated that they do not want to define the=20
> content-schema at all because it is already known=20
> So we ended up with 4 methods

But reaching consensus by doing all four is not necessarily cheap. So
what are compliant tools required to implement. All 4 method?
Whatever the implementer prefers? Or is there a mandatory to support
method (other than external ;-)? The WG needs to understand the costs
of having N ways to do the same thing.
=20
>   - In the second paragraph, I like to see some discussion of snapshot
>     consistency.  How much consistency can be expected? Are there
>     indicators for the level of consistency? I would remove the
>     sentence about "valid values can be retrieved at run-time" as this
>     is obvious but then I am not sure why 'valid' values? Perhaps the
>     authors meant 'current' values?
> BALAZS: OK< Changed to current. I want to keep the second sentence=20
> as it describes the duality between the original documented values and
>  the current values that can be read in run-time.
> Consistency is out of scope. No indicators are provided. It is very=20
> much use-case and implementation specific.

In this case, I think it helps to spell out that users cannot assume
that instance data always represents consistent snapshots.

>   - How do I implement the "SHOULD be described"? The default is that
>     data can change, only in rare cases data is static. But how does a
>     tool creating instance data know 'when and how' data changes in the
>     future? I suggest to remove the SHOULD. The text saying that instance
>     data is a snapshot is in my view sufficient.
> BALAZS: We do not want to specify the how the changes should be described=
,=20
> But we do want to state that this information should be made available.
> Just a few ideas how this could be done. Provide
> - some plain text in the description of the instance data set
> - some additional metadata e.g. etags, timestamp for the individual data
> nodes.
> - a change indicator in the content defining yang module itself=20

I do not know how I implement such a SHOULD. I admit that I do not
understand RFC 2119 language but a lowercase should would make me feel
better.  The concern here is that it is entirely implementation
specific how I make this information available and hence whether I
have followed the SHOULD or not is rather unclear.

>   - This section talks about YANG instance data but it likely should
>     talk about YANG instance data sets.
> BALAZS: I think both are acceptable terms here. Naturally if the data
> changes=20
> the data set containing it also changes.

Well, yes, but the text says "instance data set's description
statement", i.e., the change is documented on the set and not on an
individual instance. But yes, this is a minor nit.

> * Delivery of Instance Data
>=20
>   - Why do we need this SHOULD? I do not think we should use RFC 2119
>     keywords to define how organizations may use the instance data
>     format. My proposal is to delete this entire section.
> BALAZS: I will change it to lower case may.
> I was asked to and I want to state that we want to use instance data=20
> both for offline delivery of design time information and for run-time
> delivery of other data.

But should this not be stated in the use cases and principles list in
section 2? I think section 5 is a mixture of a use-case concern and a
requirement (oops principle):

  PX: Instance data sets may be read from or produced by a live server
      [is YANG server the proper term?] or they can be the result of a
      specification or design effort that does not involve a live
      server.

I think the essence of section 5 should be integrated into section 2.
What it says seems misplaced in the middle of the document. (I
personally prefer to talk about objectives rather than principles but
that may be just me.)
=20
> (The first 3 users of this format all want to use this for early delivery=
 of
>=20
> server capabilities. It is for now the dominant use case for which the =20
> 2119 SHOULD is important.).=20

I do not think this specification should define SHOULDs for specific
use cases. See my proposal for a possible PX to capture what I think
is the core idea.

> * Backwards Compatibility
>=20
>   - I do not think 'managed entity' is a YANG term.
> BALAZS: What term do you propose for something that is managed like=20
> an interface or user etc. ? I was told managed entity is a generic term=20
> that is commonly understood . Would "managed item" or "managed thing" be
> better?
>=20
>   - I think this text is use case specific and the items are kind of
>     conflicting with each other (2nd says changing the semantics of a
>     list should lead to a change of the key while the 1st suggests
>     that changing keys may lead to misinterpretation of something
>     being new).
>=20
>   - My proposal is to simply drop this entire section. If use case
>     specific text is needed, add it to the use cases in the appendix.
> BALAZS: You don't know how many trouble reports we got in=20
> multiple use-cases for violating these recommendations. While=20
> they may not be important for all use-cases, the are important for many.
> Actually we met the problem or had to avoid it in all but one of=20
> the listed use-cases.

This text seems specific to certain use cases or best practices and as
such I suggest to integrate it into the appendix C. I do not think
this advice needs to be part of the technical instance data format
specification. One could even argue that some of this also concerns
config changes to live servers. My issue is that I find this
discussion misplaced - I like to to see the format definition
separated from any guidelines how to use it.
=20
> * YANG Model
>=20
>   - How is the inline-content-schema feature used? Which component
>     does indicate that inline content-schema is supported? Do all
>     implementations have to support simplified-inline? If
>     inline-schema is used, how do I find out which schema formats are
>     supported? The more formats there are, the more interoperability
>     issues will arise.
> Balazs:
> - case inline { is decorated with "if-feature inline-content-schema"

OK

> - feature support is generally indicated as part of the ietf-yang-library

OK

> - simplified-inline is mandatory to support. It is relatively simple, so
> IMHO not a problem

How do I know whether the feature inline-content-schema is supported
in this case?

How much simplification is there really compared to the inline method
if I only list modules in the yang library schema without derivations
etc? See my earlier point about which schema formats are mandatory to
implement and whether the simplification is worth the extra code and
possible interoperability issues.

> - what do you mean with schema-formats? The yang schema is not actually
> included anywhere.
> If the "inline" case is used, instance data corresponding to the=20
> inline-modules is included, not the schema.=20
> anydata inline-schema {
>              description
>                "Instance data corresponding to the YANG modules
>                 specified in the inline-module nodes defining the set
>                 of content defining YANG modules for this
>                 instance-data-set."

My understanding is that the inline-module indicates a variant of the
yang library used and the inline-schema then follows that indicated
yang library variant and provides the schema. Am I entirely wrong
here?
=20
> * Security Considerations
>=20
>   - "is designed as a wrapper" - what does this tell me? I suggest to
>     rewrite the first paragraph and to remove this phrase or to explain
>     what it means.
>=20
>   - Why is the header part not security sensitive? Almost all data is
>     security sensitive in certain situations.
> BALAZS: IMHO it is a valid and meaningful statement to differentiate=20
> between security sensitive data like passwords and non-sensitive data=20
> like a revision date. RFC8341 states:
> "One of the most important aspects of the data model documentation,
> and one of the biggest concerns during deployment, is the
> identification of security-sensitive content."=20
> So the differentiation between sensitive and non-sensitive information is
> important.
> In your opinion which part of the header data is sensitive?

In today's world the idea of 'non-sensitive data' is rather difficult.
The name of an instance-data-set can reveal information, the timestamp
can be sensitive, the description can be sensitive, the combination
can be sensitive. I find the claim that instance data may be sensive
but the header part is not sensitive a very big claim. But since this
section will also be read by SECDIR reviewers, we can see whether they
will raise a point. I certainly would if I were a the assigned SECDIR
reviewer.

>   - Since instance data files may require protection, is there any
>     recommendation how to do this, e.g., by wrapping everything into a
>     cryptographic message syntax or so? It would be important in
>     certain use cases to be able to verify that instance data is
>     authentic (i.e., it is signed by the original source). In other
>     cases, it may be crucial to protect the instance data itself
>     against occasional readers.
> BALAZS: File security is an important but really big topic and
>  I was instructed by multiple people to avoid a half baked discussion on =
the
> topic.

OK
=20
>   - It may be useful to explain that data in instance data sets may
>     have been filtered by access control rules like NACM and that data
>     in instance data sets itself won't be filtered anymore by access
>     control rules like NACM. In other words, if I take snapshots and
>     stored them as instance data files, these snapshots may leak
>     information that is otherwise protected. Hence it is important
>     that NACM rules and file access control rules are consistent.
> BALAZS: We do not know if the instance data set was originally=20
> filtered by NACM or not. We don't know if the users on=20
> Netconf/Restconf/cli are the same as the users defined in the=20
> file system., so I fear defining what consistent means would be impossibl=
e.=20
> It is stated that " The same kind of handling should be applied, that wou=
ld
>    be needed for the result of a <get> operation returning the same
>    data." IMHO we can't really say more.

Yes, I guess what I was trying to say is that a live server may apply
certain access control rules while instance files may not apply the
same rules. In other words, an instance file obtained from a live
server by joe and passed on to lucy may reveal information that lucy
will not be allowed to see on the live server. By passing around
instance files, information may accidentally leak. Yes, we can't solve
this, put we can point this out.

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Feb 12 16:30:32 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B07412001A; Wed, 12 Feb 2020 16:30:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tr2G8F1SLdD1; Wed, 12 Feb 2020 16:30:25 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 4092B120019; Wed, 12 Feb 2020 16:30:25 -0800 (PST)
Received: from [192.168.1.206] (66-227-211-29.dhcp.trcy.mi.charter.com [66.227.211.29]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 8A5F760B9E; Thu, 13 Feb 2020 00:30:24 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com>
Date: Wed, 12 Feb 2020 19:30:23 -0500
Cc: Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>, draft-ietf-netmod-module-tags@ietf.org, Joel Jaeggli <joelja@gmail.com>, netmod-chairs@ietf.org, netmod@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com>
To: Alexey Melnikov <aamelnikov@fastmail.fm>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Wb_rjOeEWnJZmlIxm2sfwDL_qzU>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 00:30:28 -0000

The intent in the document is to place as few restrictions on tags as =
possible to allow for future-proofing and organic growth of use both =
within and outside of SDOs. For standard tags we trust IANA (and the =
human behind the process) to make the call on whether a tag is already =
present. :)

Having worked for a company where a lot of XML string data was non-ascii =
I find limiting to ascii to be rather restrictive.

Thanks,
Chris.

> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker =
<noreply@ietf.org> wrote:
>=20
> Alexey Melnikov has entered the following ballot position for
> draft-ietf-netmod-module-tags-07: Discuss
>=20
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut =
this
> introductory paragraph, however.)
>=20
>=20
> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>=20
>=20
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>=20
>=20
>=20
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>=20
> This is generally a fine document, but after checking RFC 7950 syntax =
for
> strings I question why you think you need non ASCII tags. There are so =
many
> problems that can arise from that. For example, how would IANA be able =
to
> enforce uniqueness of Unicode tags written in different Unicode
> canonicalisation forms?
>=20
>=20
>=20
>=20


From nobody Wed Feb 12 16:58:59 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 87A14120013; Wed, 12 Feb 2020 16:58:57 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158155553744.17978.14732054697973027159@ietfa.amsl.com>
Date: Wed, 12 Feb 2020 16:58:57 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jl63WortqMFxu0SsnDqgSGyBkh4>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-11.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 00:58:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Factory Default Setting
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-11.txt
	Pages           : 12
	Date            : 2020-02-12

Abstract:
   This document defines a method to reset a server to its factory
   default content.  The reset operation may be used, e.g., when the
   existing configuration has major errors so re-starting the
   configuration process from scratch is the best option.

   A new "factory-reset" RPC is defined.  When resetting a device, all
   previous configuration settings will be lost and replaced by the
   factory default content.

   A new optional "factory-default" read-only datastore is defined, that
   contains the factory default configuration for the device.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-11
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Feb 13 05:10:29 2020
Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1C7F120058; Thu, 13 Feb 2020 05:10:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level: 
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmail.fm header.b=p8rr1Lnk; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=aTHfTUsg
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wvEGd6SzwxJI; Thu, 13 Feb 2020 05:10:24 -0800 (PST)
Received: from out4-smtp.messagingengine.com (out4-smtp.messagingengine.com [66.111.4.28]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4AF5120013; Thu, 13 Feb 2020 05:10:24 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 7883F22083; Thu, 13 Feb 2020 08:10:23 -0500 (EST)
Received: from imap21 ([10.202.2.71]) by compute7.internal (MEProxy); Thu, 13 Feb 2020 08:10:23 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.fm; h= mime-version:message-id:in-reply-to:references:date:from:to:cc :subject:content-type; s=fm2; bh=1Afr47SV1cLH7kn/oBHQx29/udiaUw8 Ka9iV52cNAvU=; b=p8rr1LnkjlplWwNMY/6LoY5eweXo7r0eV/aq2DqWQgf7Yez tBq5sEtrklL1PTAKXRiXusPfHk+v9sMX+L3IZmYwH9IZPKNs7Cy8CWGyMfSRmHTS OlCVt6kJrCKPsX760KgI1L0LliiCuFpO6vhEkppuvefM9RRkqY/d6c8zC+/ejY1q n3Rp2p3cpYWd9WQybCBhDesH0kMxiC/MoUf4gsjN7T6FXaLC92Y+0/3PTm7fOLpI 87vV+WgXqtfQcOIU+s+8XPizWHUZPa7IRVYj8fHEKNRMsVJhPGz0KwZ6DkvjSL+M 1Ai8Qdiy8NOKxpTgM1ng10Ej62ckFfxxqe2WOtA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=1Afr47 SV1cLH7kn/oBHQx29/udiaUw8Ka9iV52cNAvU=; b=aTHfTUsgK74DI24oHhD/Q9 MQ34NlxTek6s3IlOEgW+DiLVJlJoBV/iSULwrUKXShkhiLAigYQkGXOhc6qzwzdg VsPEw7rRd/fbcH1x7eblWPGsar72rCSCDPHO06n8Z28UYPP7yFJXALxrVFmApL+x mzTG/19FwDrLJFcfeKy7b4mKdr5z7FoivGCb47E/Fdjt2orR2RdslgheNcMMFgBx sys3MoF1+G6IK9QsOBH9hx9JMD1F2qT0liTugcxEH/jXLp7EAT6rl7aNo8bAwtc0 6TTWI1xIFcUBwy9lqgjQ2eTHHDCfaO45LbMmODLkDFcnbKUwdsA6Hu9yjCasmjXg ==
X-ME-Sender: <xms:v0pFXgeFmWkZhdnDaapwlgIAQM6ad-zELyEs-G-N-kmthdSKYt7VGA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedugedrieekgdegkecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefofgggkfgjfhffhffvufgtsehttdertderreejnecuhfhrohhmpedftehlvgig vgihucfovghlnhhikhhovhdfuceorggrmhgvlhhnihhkohhvsehfrghsthhmrghilhdrfh hmqeenucffohhmrghinhepihgvthhfrdhorhhgnecuvehluhhsthgvrhfuihiivgeptden ucfrrghrrghmpehmrghilhhfrhhomheprggrmhgvlhhnihhkohhvsehfrghsthhmrghilh drfhhm
X-ME-Proxy: <xmx:v0pFXnXitLJU5sbMMJwzyOkSSKK69AUdldxVxARoeioeWPoz5xtreg> <xmx:v0pFXkdhJ1HkIlszJtRRF-Bk6z_X-fc5x3yS827XfCRz9lGKj05lOQ> <xmx:v0pFXr996mGK_BEqimrjwuNrrp748HLyRUd69eju-9sNQaEPizBrug> <xmx:v0pFXi1qo_LTX4j0-9olRoko-T0RPI7n5ruVpUYYK3id8NtsH_GE8A>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id F3A3B660069; Thu, 13 Feb 2020 08:10:22 -0500 (EST)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.7-802-g7a41c81-fmstable-20200203v1
Mime-Version: 1.0
Message-Id: <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
In-Reply-To: <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org>
Date: Thu, 13 Feb 2020 13:10:02 +0000
From: "Alexey Melnikov" <aamelnikov@fastmail.fm>
To: "Christian Hopps" <chopps@chopps.org>
Cc: "The IESG" <iesg@ietf.org>, draft-ietf-netmod-module-tags@ietf.org, "Joel Jaeggli" <joelja@gmail.com>, netmod-chairs@ietf.org, netmod@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Izccplb1bAfd0KNHgO014MXXnI0>
Subject: Re: [netmod]  =?utf-8?q?Alexey_Melnikov=27s_Discuss_on_draft-ietf-net?= =?utf-8?q?mod-module-tags-07=3A_=28with_DISCUSS=29?=
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 13:10:27 -0000

Hi Christian,

On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> The intent in the document is to place as few restrictions on tags as 
> possible to allow for future-proofing and organic growth of use both 
> within and outside of SDOs. For standard tags we trust IANA (and the 
> human behind the process) to make the call on whether a tag is already 
> present. :)

And the problem with that is that because there might be multiple ways to encode in Unicode visually indistinguishable tags IANA would end up asking IESG for help.

So you need to at minimum specify a Unicode normalization form to use. I suggest you normatively reference RFC 5198 here.

> Having worked for a company where a lot of XML string data was 
> non-ascii I find limiting to ascii to be rather restrictive.

Best Regards,
Alexey

> 
> Thanks,
> Chris.
> 
> > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker <noreply@ietf.org> wrote:
> > 
> > Alexey Melnikov has entered the following ballot position for
> > draft-ietf-netmod-module-tags-07: Discuss
> > 
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> > 
> > 
> > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> > 
> > 
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> > 
> > 
> > 
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> > 
> > This is generally a fine document, but after checking RFC 7950 syntax for
> > strings I question why you think you need non ASCII tags. There are so many
> > problems that can arise from that. For example, how would IANA be able to
> > enforce uniqueness of Unicode tags written in different Unicode
> > canonicalisation forms?
> > 
> > 
> > 
> > 
> 
>


From nobody Thu Feb 13 05:40:24 2020
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9BC771200FA for <netmod@ietfa.amsl.com>; Thu, 13 Feb 2020 05:40:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level: 
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aBdItlHmugXx for <netmod@ietfa.amsl.com>; Thu, 13 Feb 2020 05:40:18 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60069.outbound.protection.outlook.com [40.107.6.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50B8E1200F8 for <netmod@ietf.org>; Thu, 13 Feb 2020 05:40:18 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CKunXqaw8UAhCv5H0QJLnsSjujEo2sglL6CE0XM/DaHpguKQpl3zY3CboWzWK3CQpgzzM2XyquLvny1bXFUy0deEJglcqZ3TdhUGWvAlzUCKDoijDPvCGA1CGtxwgXxnaIWTEk8a2eeMdI0wmkop5iQMLeVlEdroogaqT+sENSrbxjasg9cf+ORQeKhAeNzmzciC4l83JP5BuaixV3NCjTEGsTJ3Rms7Eivtu7gLXjRt9HGX2ySbtmrsUDlZnyWtJr1pJnhdPvw/r2+G0kHwt5lKMSk0+87IVNQCw7m+3G8ayRtKYRz6M8+cLwOIO7LLcx8t7Y3JlzXLEZhBqRd2OQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Jp4B43wLQSTAHb8MxGoCro7tjsaqFsUzm149j+L/ThM=; b=PjEnvTbPxsOgEym6CS3f2aRzHA3Cwmn/nN0sIHABhIluP8tT4R6Kd+jdO2srD6iSLJgBpB6yDAuvPMOkIxsXAjJI9b7eJsRoZS8rWmRUuNcd73nshe0D0MmfMsE/IECiReUa4VnxjGvkV26nPIDmWT/DeUGsIIYz7sNUf88+Y1kjFyU7b/+p4CFmYgjRyhmH3S3xAMjmZB9SQRCDQd0ZdvC13mutcWJoaVbFrHE+m6ekFA6x5B3L1NhFWeSGN03gNWypyNwvm23Yd777FiwCK+SsYgJFgg0ES9T0Fb1oNWiDAkgKHk1Eb/NGL/dUADQd8+n3R/TukHwQHXkClddPaQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Jp4B43wLQSTAHb8MxGoCro7tjsaqFsUzm149j+L/ThM=; b=ZZTH2aOiim/bZNI7XvIe4FLDvvIum9HZZ6+Ll7bq4VKSGiMLOjAEIKN8Qi0CBKjYdfcwBpx8clNIaSkdaVeQMFq28ZPSacSp3184i6FKgMXaW0fSQYWexDpd5RUAXiZGtF5MhqGP4EQ96kCh3Bge9V/qe33PE6vk7lhsV7D2EOE=
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com (52.134.97.155) by DB7PR07MB4140.eurprd07.prod.outlook.com (52.134.96.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.9; Thu, 13 Feb 2020 13:40:14 +0000
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973]) by DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973%5]) with mapi id 15.20.2729.021; Thu, 13 Feb 2020 13:40:14 +0000
From: =?iso-8859-1?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
CC: Kent Watsen <kent+ietf@watsen.net>, NETMOD Working Group <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
Thread-Index: AQHVxVfSEJ6TUivwA0OmLdrVeJgwbqfztdUAgCEFvqCAAsFUgIAAY06g
Date: Thu, 13 Feb 2020 13:40:13 +0000
Message-ID: <DB7PR07MB4011A7798CBC8E40F49F8B88F01A0@DB7PR07MB4011.eurprd07.prod.outlook.com>
References: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com> <20200120144528.wt2z4y66xcnp7fxj@anna.jacobs.jacobs-university.de> <DB7PR07MB4011635119B75D384D11D01DF0180@DB7PR07MB4011.eurprd07.prod.outlook.com> <20200212090703.eikj365ctbsighey@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200212090703.eikj365ctbsighey@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5ed39284-407b-4251-dce7-08d7b08a411f
x-ms-traffictypediagnostic: DB7PR07MB4140:
x-microsoft-antispam-prvs: <DB7PR07MB414054ABCAB5084A0D3935F8F01A0@DB7PR07MB4140.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4502;
x-forefront-prvs: 031257FE13
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(376002)(396003)(136003)(39860400002)(199004)(189003)(66476007)(26005)(76116006)(8936002)(66616009)(66946007)(6506007)(64756008)(86362001)(66556008)(7696005)(66446008)(53546011)(186003)(2906002)(71200400001)(478600001)(8676002)(316002)(52536014)(30864003)(54906003)(966005)(6916009)(55016002)(66574012)(4326008)(9686003)(5660300002)(81166006)(33656002)(81156014)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB4140; H:DB7PR07MB4011.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: P7mW4qEc1wfdiGo2wug/8lhZ4tg5IGIFHs4Qd64BtBWQXIVcM500G9+2Taa/8SdVpKJURrb0nUOrvM5QBzeeJy8ltJ7B/B1yvmKklYrdl0tB1YyfYYyydiVQvyVuW8iS/s9DLu8+T8490NIFB58vHw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_06D4_01D5E27B.7F51F4F0"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5ed39284-407b-4251-dce7-08d7b08a411f
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2020 13:40:13.9547 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 172WZxr+p/QvU1lt8IdODK7HVGYzfrPxpnRvA8uWmWZuGwrZj/dHdYsPmkgUE2A53DLa01KwByOwxAOne+srl2UPZvPgvJS72uek0HGIwiQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB4140
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/i6kCsGAPZEx_9tPkbCJ7wqnDuUM>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 13:40:23 -0000

------=_NextPart_000_06D4_01D5E27B.7F51F4F0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

See below as BALAZS2.

-----Original Message-----
From: Sch=F6nw=E4lder, J=FCrgen <J.Schoenwaelder@jacobs-university.de>=20
Sent: 2020. febru=E1r 12., szerda 10:07
To: Bal=E1zs Lengyel <balazs.lengyel@ericsson.com>
Cc: Kent Watsen <kent+ietf@watsen.net>; NETMOD Working Group
<netmod@ietf.org>
Subject: [Not Scanned] - Re: [netmod] WG Last Call:
draft-ietf-netmod-yang-instance-file-format-06

>   - I fail to see the difference between 'content-schema' and 'content
>     defining YANG module(s)'. The 'content-schema' is already a set of
>     YANG modules. I suggest to remove 'Content defining YANG module(s)
>     as it is not a necessary term. Rewrite all places where the phrase
>     'content defining YANG modules' is used.
> BALAZS: a schema is a full set of YANG modules needed to define the=20
> structure and properties of the instance data (+features, deviations).
> A  "content defining YANG module" is an individual YANG module is part =

> of the content-schema. So the difference is a set versus one item.
> I updated the description to emphasize this difference.

OK. But then what is a non-content defining YANG module? Or are these
schema-defining YANG modules? I still do not get why we need 'content
defining YANG modules' - we did not need that in other specifications so =
far
that define schemas. So why do we need new terms here?
BALAZS2: In some paragraphs I reference individual YANG modules that are
part of the content-schema. What would be a better term for the =
individual
modules?

>   - Is it necessary to describe P2 in terms of (presumably) NETCONF
>     operations? I would prefer to have the document written in a
>     protocol agnostic style. Perhaps simply drop "similar to the
>     response of a <get> operation/request".
> BALAZS: This is a reference both to NETCONF and RESTCONF. It was=20
> explicitly asked for by other reviewers.

Well, then the correct wording would be "similar to the response of a
NETCONF <get> operation or the RESTCONF response to a GET method =
invocation
on the (unified) datastore resource". Sounds complex and I still prefer =
the
text to be agnostic to specific operations - in particular since <get> =
and
the unified datastore have their limitations. The format is simply =
reusing
the already defined data model encoding formats, i.e., the format has
nothing to do with the operations used to retrieve the data. So I =
suggest:

   P2  Instance data shall reuse existing encoding rules for
       YANG defined data.=20

There is no need to refer to specific protocol operations.
BALAZS: I will use both of your texts. That is the most common question =
I
get: Will this use the same format as a get-reply? People like to think =
in
terms of a specific easy-to-grasp function instead of a non-descript set =
of
"existing" rules. Existing means you need to understand X number of =
RFCs,
while just looking up a get-reply is easy. It is not precise, but IMHO
that's how people think.=20

>   - I do not understand that text about the default attribute. Section
>     4.8.9 defines a query parameter, not an attribute. And I do not
>     know how that fits into content data.
> BALAZS: https://tools.ietf.org/html/rfc8040#section-4.8.9:
> " If the "with-defaults" parameter is set to "report-all-tagged", then
>    the server MUST adhere to the default-reporting behavior defined in
>    Section 3.4 of [RFC6243].  Metadata is reported by the server as
>    specified in Section 5.3.  The XML encoding for the "default"
>    attribute sent by the server for default nodes is defined in
>    Section 6 of [RFC6243].  The JSON encoding for the "default"
>    attribute MUST use the same values, as defined in [RFC6243], but
>    encoded according to the rules in [RFC7952].  The module name
>    "ietf-netconf-with-defaults" MUST be used for the "default"
>    attribute. "
> Here the usage of the default ATTRIBUTE is defined.

I am still confused about terminology here, an attribute is an XML way =
of
representing meta data, JSON does this differently. Perhaps some good
examples would clear the confusion.
BALAZS2: The Restconf RFC uses the exact term " the default attribute". =
If
it is acceptable there IMHO I should be able to reuse it here. It is not =
my
terminology it's from RFC 8040.=20

>   - Similarly, I do not understand why implementation specific
>     metadata may be included in the content-data. This seems to be the
>     wrong place, no? Should metadata not go into the header?
> BALAZS: As this might be meta-data about the individual instance data=20
> nodes (e.g.  metadata following the principles from rfc7952) it=20
> belongs here.

OK, perhaps my confusion is that it was not clear to me what kind of
metadata is meant here...
BALAZS2:  OK., will try to update, clarify the text.
=20
>   - Why MUST XML attributes be ignored, why is there no text about
>     unknown JSON data, 'attributes' (or annotations)? What should
>     implementations generally do about unknown elements, attributes,
>     objects, arrays, ...)? Why are we specific about only one specific
>     case?
> BALAZS:  Generally we want to allow users/creators to decorate the=20
> data with additional information, that is not standardized. Like YANG=20
> extensions  these may be useful, but at least should not cause =
problems.
> XML attributes are often used as meta-data and I was asked to list=20
> them specifically.
>=20
I do not understand why there are specific rules for XML encodings but =
not
equivalent JSON rules. It looks like either the XML rules are not needed =
or
equivalent JSON rules are missing if the XML rules are needed or there
should be an explanation why the different encodings lead to different
results (which is operationally rather surprising).
BALAZS2:XML has 2 distinct ways to encode information XML attributes and
elements.  JSON only has one uniform way. XML attributes are often used =
to
carry metadata which is a useful facility and they are not used to =
encode
"real" YANG defined data. So we want to allow the use of XML attributes =
and
not go for a least common denominator of the 2 encodings. IMHO it is a
useful facility, IMHO it belongs here, but if you insist I can remove =
it.

If we want rules that apply to all encodings, they should be expressed =
in an
encoding neutral way. The current text and your response leaves me =
puzzled
what the specification really wants to say here. And do we have to say
something at all?

>     It is unclear what "will be very similar" really means but perhaps
>     this is clarified later. If not, this sentence says nothing in
>     terms of a technical specification.

So what is the meaning of "will be very similar"?
BALAZS: Similar means same structure, same data types, but there will =
also
be differences, like the additional metadata and allowing partial data,
ignoring of some constraints that are listed in the chapter. As this is =
not
a precise term I will use it only in the introduction chapter =
(principles).=20

>   - Why is EXTERNAL in all caps but Inline in capitalized form?  In
>     the YANG definitions, EXTERNAL seems to be uri. I think we reduce
>     ambiguity by being consistent with how we name things.
> BALAZS: OK, EXTERNAL should not be all caps.=20
> Here external means that the content-schema is defined externally to=20
> the instance data set, not even a URI is included.

So if I have no case in the content-schema-spec choice, then it is =
external
or how does this work? Perhaps define external differently?
Another attempt:

External method: Do not include the content-schema, the user needs to =
obtain
the information through external documents.

I removed "already known" since a tool and human producing an instance =
file
will in general have no clue what a user of that instance file already
knows.
BALAZS: OK
=20
>   - 3.1.1 How are the details specified in the anydata? Perhaps a
>     forward reference might help. What are 'version labels'?
> BALAZS: Added reference to example.
> Version/Revision labels are defined in=20
> draft-verdt-netmod-yang-module-versioning;
> added as a reference. I added them here (only as an example) as they=20
> are highly relevant to specifying module versions even if they are not =

> agreed in Netmod yet. The name was changed from version-label to=20
> revision-label lately.

Lets use a single term then, lets say "revision labels" if that is the =
most
recent once. Right now, both terms seem to be used.
BALAZS: OK

>   - I like to understand why we need several methods to specify the
>     schema. Having N solution is always bad for interoperability and
>     also for maintainability. Perhaps the WG failed to reach consensus
>     on a single solution.  Or there are strong technical reasons - but
>     then they should be clearly stated. What are implementations
>     expected to support, all methods? Or whatever the implementer
>     prefers? How do we achieve interoperability across tools?
> BALAZS: Different people in the WG wanted different solutions.
> - Some (as I remember you too) asked for a full flexible solution=20
> which can use multiple modules potentially not even the=20
> ietf-yang-library to define the schema  (Inline solution)
> - some asked for a simple solution listing the content schema modules
> - some wanted just to use a reference (If any this is the one, I would
> remove)
> - some stated that they do not want to define the content-schema at=20
> all because it is already known So we ended up with 4 methods

But reaching consensus by doing all four is not necessarily cheap. So =
what
are compliant tools required to implement. All 4 method?
Whatever the implementer prefers? Or is there a mandatory to support =
method
(other than external ;-)? The WG needs to understand the costs of having =
N
ways to do the same thing.
BALAZS: 2 methods are mandatory:  Simplified-Inline & URI.=20
Inline is controlled by a feature, so it is optional. =20
External is inherently optional, as whatever is outside this =
specification
is undefined thus it may or may not be supported.
=20
>   - In the second paragraph, I like to see some discussion of snapshot
>     consistency.  How much consistency can be expected? Are there
>     indicators for the level of consistency? I would remove the
>     sentence about "valid values can be retrieved at run-time" as this
>     is obvious but then I am not sure why 'valid' values? Perhaps the
>     authors meant 'current' values?
> BALAZS: OK< Changed to current. I want to keep the second sentence as=20
> it describes the duality between the original documented values and =20
> the current values that can be read in run-time.
> Consistency is out of scope. No indicators are provided. It is very=20
> much use-case and implementation specific.

In this case, I think it helps to spell out that users cannot assume =
that
instance data always represents consistent snapshots.
BALAZS2: I would like to avoid the topic. We never stated anything about =
the
quality of data in the instance data set.=20
E.g. if this is a snapshot of state data and it takes time to create a
snapshot, data might change even=20
during creating the snapshot. This is not described here or in Netconf =
or in
Restconf.=20
Why should we describe this in more details than the protocols.

>   - How do I implement the "SHOULD be described"? The default is that
>     data can change, only in rare cases data is static. But how does a
>     tool creating instance data know 'when and how' data changes in =
the
>     future? I suggest to remove the SHOULD. The text saying that =
instance
>     data is a snapshot is in my view sufficient.
> BALAZS: We do not want to specify the how the changes should be=20
> described, But we do want to state that this information should be =
made
available.
> Just a few ideas how this could be done. Provide
> - some plain text in the description of the instance data set
> - some additional metadata e.g. etags, timestamp for the individual=20
> data nodes.
> - a change indicator in the content defining yang module itself

I do not know how I implement such a SHOULD. I admit that I do not
understand RFC 2119 language but a lowercase should would make me feel
better.  The concern here is that it is entirely implementation specific =
how
I make this information available and hence whether I have followed the
SHOULD or not is rather unclear.
BALAZS: OK, lowercase should

> * Delivery of Instance Data
>=20
>   - Why do we need this SHOULD? I do not think we should use RFC 2119
>     keywords to define how organizations may use the instance data
>     format. My proposal is to delete this entire section.
> BALAZS: I will change it to lower case may.
> I was asked to and I want to state that we want to use instance data=20
> both for offline delivery of design time information and for run-time=20
> delivery of other data.

But should this not be stated in the use cases and principles list in
section 2? I think section 5 is a mixture of a use-case concern and a
requirement (oops principle):

  PX: Instance data sets may be read from or produced by a live server
      [is YANG server the proper term?] or they can be the result of a
      specification or design effort that does not involve a live
      server.

I think the essence of section 5 should be integrated into section 2.
What it says seems misplaced in the middle of the document. (I =
personally
prefer to talk about objectives rather than principles but that may be =
just
me.)
BALAZS: OK, I will move it into chapter 2 Introduction. This is really =
not
something mandatory on the implementation.
=20
> (The first 3 users of this format all want to use this for early=20
> delivery of
>=20
> server capabilities. It is for now the dominant use case for which the
> 2119 SHOULD is important.).=20

I do not think this specification should define SHOULDs for specific use
cases. See my proposal for a possible PX to capture what I think is the =
core
idea.
BALAZS2: OK, SHOULD change to lower case may.

> * Backwards Compatibility
>=20
>   - I do not think 'managed entity' is a YANG term.
> BALAZS: What term do you propose for something that is managed like an =

> interface or user etc. ? I was told managed entity is a generic term=20
> that is commonly understood . Would "managed item" or "managed thing"=20
> be better?
>=20
>   - I think this text is use case specific and the items are kind of
>     conflicting with each other (2nd says changing the semantics of a
>     list should lead to a change of the key while the 1st suggests
>     that changing keys may lead to misinterpretation of something
>     being new).
>=20
>   - My proposal is to simply drop this entire section. If use case
>     specific text is needed, add it to the use cases in the appendix.
> BALAZS: You don't know how many trouble reports we got in multiple=20
> use-cases for violating these recommendations. While they may not be=20
> important for all use-cases, the are important for many.
> Actually we met the problem or had to avoid it in all but one of the=20
> listed use-cases.

This text seems specific to certain use cases or best practices and as =
such
I suggest to integrate it into the appendix C. I do not think this =
advice
needs to be part of the technical instance data format specification. =
One
could even argue that some of this also concerns config changes to live
servers. My issue is that I find this discussion misplaced - I like to =
to
see the format definition separated from any guidelines how to use it.
BALAZS2: I still see this as important as proved by real life situations =
and
also as a n explicit request from the Yang versioning requirements  =
draft.
The text is specific to some use cases:  In practice relevant to 90% of =
the
use cases. =20
=20
> * YANG Model
>=20
>   - How is the inline-content-schema feature used? Which component
>     does indicate that inline content-schema is supported? Do all
>     implementations have to support simplified-inline? If
>     inline-schema is used, how do I find out which schema formats are
>     supported? The more formats there are, the more interoperability
>     issues will arise.
> Balazs:
> - case inline { is decorated with "if-feature inline-content-schema"

OK

> - feature support is generally indicated as part of the=20
> ietf-yang-library

OK

> - simplified-inline is mandatory to support. It is relatively simple,=20
> so IMHO not a problem

How do I know whether the feature inline-content-schema is supported in =
this
case?
BALAZS2: IMHO your question is out of scope for this draft.=20
Just like for any feature you can read it on-line from =
ietf-yang-library. If
the information is needed offline it can be documented in any design =
time
document. My proposal is to use an instance data file based on
ietf-yang-library using the simplified-inline schema declaration method.

How much simplification is there really compared to the inline method if =
I
only list modules in the yang library schema without derivations etc? =
See my
earlier point about which schema formats are mandatory to implement and
whether the simplification is worth the extra code and possible
interoperability issues.
BALAZS2:
Compare:
INLINE method:
  <content-schema>
    <inline-module>
      ietf-yang-library@2016-06-21
    </inline-module>
    <inline-schema>
      <module-state
        xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-yang-library">
        <module>
          <name>ietf-yang-library</name>
          <revision>2016-06-21</revision>
        </module>
        <module>
          <name>ietf-netconf-monitoring</name>
          <revision>2010-10-04</revision>
        </module>
      </module-state>
    </inline-schema>
  <content-schema>

SIMPLIFIED INLINE method:
  <content-schema>
    <module> ietf-yang-library@2020-01-14</module>
    <module> ietf-netconf-monitoring@2020-01-14</module>
  </content-schema>

> - what do you mean with schema-formats? The yang schema is not=20
> actually included anywhere.
> If the "inline" case is used, instance data corresponding to the=20
> inline-modules is included, not the schema.
> anydata inline-schema {
>              description
>                "Instance data corresponding to the YANG modules
>                 specified in the inline-module nodes defining the set
>                 of content defining YANG modules for this
>                 instance-data-set."

My understanding is that the inline-module indicates a variant of the =
yang
library used and the inline-schema then follows that indicated yang =
library
variant and provides the schema. Am I entirely wrong here?
BALAZS2: You are correct. Some extras:
Inline-module could indicate some other module instead of the =
yang-library.
I was asked to do this earlier by Rob Wilton.=20
There can be multiple inline-modules so we can use yang-lib with =
extensions
like  a module adding revision-labels

=20
>   - It may be useful to explain that data in instance data sets may
>     have been filtered by access control rules like NACM and that data
>     in instance data sets itself won't be filtered anymore by access
>     control rules like NACM. In other words, if I take snapshots and
>     stored them as instance data files, these snapshots may leak
>     information that is otherwise protected. Hence it is important
>     that NACM rules and file access control rules are consistent.
> BALAZS: We do not know if the instance data set was originally=20
> filtered by NACM or not. We don't know if the users on=20
> Netconf/Restconf/cli are the same as the users defined in the file=20
> system., so I fear defining what consistent means would be impossible.
> It is stated that " The same kind of handling should be applied, that
would
>    be needed for the result of a <get> operation returning the same
>    data." IMHO we can't really say more.

Yes, I guess what I was trying to say is that a live server may apply
certain access control rules while instance files may not apply the same
rules. In other words, an instance file obtained from a live server by =
joe
and passed on to lucy may reveal information that lucy will not be =
allowed
to see on the live server. By passing around instance files, information =
may
accidentally leak. Yes, we can't solve this, put we can point this out.

BALAZS2: I agree fully, but file security is a really big topic, so
highlighting some areas will not help people. I  added:
Care should be taken, when copying the original files or providing=20
        file access for additional users, not to reveal information
unintentionally.=20

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>

------=_NextPart_000_06D4_01D5E27B.7F51F4F0
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_06D4_01D5E27B.7F51F4F0--


From nobody Thu Feb 13 06:48:48 2020
Return-Path: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EEDB61200E0 for <netmod@ietfa.amsl.com>; Thu, 13 Feb 2020 06:48:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zUqB863ZMPB6 for <netmod@ietfa.amsl.com>; Thu, 13 Feb 2020 06:48:45 -0800 (PST)
Received: from a48-90.smtp-out.amazonses.com (a48-90.smtp-out.amazonses.com [54.240.48.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70448120013 for <netmod@ietf.org>; Thu, 13 Feb 2020 06:48:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581605324; h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=++ZT58T4XsQ0J3/2Cg23SjXzmrSeQcxewrzJhNxhTx4=; b=LY7m2xqMkA2l1ktyJJWrexdQGa5eJxjBLC5td6VAGUtw1/4uwx7FRkpX8mazxyJG 19GU3eLK9UhP+2CHfjmccHQKbx340fxPTXJc7110Lcm9XZedMWxh6VxPKeigQLwe9Ew gdJZ2ziBvlRDbO5bmghPsufGLVC/+IRfwBVsuzKM=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_5B0C9715-7FEE-4B7D-9A60-E724908E8C65"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Message-ID: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@email.amazonses.com>
Date: Thu, 13 Feb 2020 14:48:42 +0000
To: "netmod@ietf.org" <netmod@ietf.org>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.13-54.240.48.90
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wuABRCCVn9L1U-gpmuopZWpyy38>
Subject: [netmod] Implicit case statementa
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 14:48:47 -0000

--Apple-Mail=_5B0C9715-7FEE-4B7D-9A60-E724908E8C65
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8


RFC 7950 says:

   As a shorthand, the "case" statement can be omitted if the branch
   contains a single "anydata", "anyxml", "choice", "container", "leaf",
   "list", or "leaf-list" statement.  In this case, the case node still
   exists in the schema tree, and its identifier is the same as the
   identifier of the child node.

This seems clear, albeit incomplete, as inconsistencies [1] exist =
amongst `pyang`and `yanglint` (I did not test with `yangson`) in how the =
=E2=80=9Cif-feature=E2=80=9D statement is handled, though I imagine =
other statements (e.g., =E2=80=9Cwhen=E2=80=9D) may also fall into this =
discussion as well.

Ultimately, the question is what Errata and/or YANG-next issue should be =
filed.   I=E2=80=99m okay either way, so long as it=E2=80=99s clear and =
can be implemented consistently across tooling.

In the meanwhile, I recommend module designers avoid using the shorthand =
notation, as there are no known issues with the =E2=80=9Clonghand=E2=80=9D=
 notation.

[1] https://github.com/mbj4668/pyang/issues/559

Kent // contributor



--Apple-Mail=_5B0C9715-7FEE-4B7D-9A60-E724908E8C65
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><pre =
class=3D"newpage" style=3D"margin-top: 0px; margin-bottom: 0px; =
break-before: page; font-variant-ligatures: normal; orphans: 2; widows: =
2;"><font color=3D"#000000" size=3D"3" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0);" class=3D""><br =
class=3D""></span></font><font color=3D"#000000" class=3D""><font =
size=3D"3" class=3D"">RFC 7950 says:<br class=3D""><br class=3D"">   As =
a shorthand, the "case" statement can be omitted if the branch
   contains a single "anydata", "anyxml", "choice", "container", "leaf",
   "list", or "leaf-list" statement.  In this case, the case node still
   exists in the schema tree, and its identifier is the same as the
   identifier of the child node.<br class=3D""><br class=3D"">This seems =
clear, albeit incomplete, as inconsistencies&nbsp;</font></font><span =
style=3D"font-size: medium; color: rgb(0, 0, 0);" class=3D"">[1] =
</span><span style=3D"font-size: medium; color: rgb(0, 0, 0);" =
class=3D"">exist amongst `pyang`and `yanglint` (I did not test =
with</span><span style=3D"font-size: medium; color: rgb(0, 0, 0);" =
class=3D""> </span><span style=3D"font-size: medium; color: rgb(0, 0, =
0);" class=3D"">`yangson`) in how the =E2=80=9Cif-feature=E2=80=9D =
statement is handled, though I imagine other statements (e.g., =
=E2=80=9Cwhen=E2=80=9D) may also fall</span><span style=3D"font-size: =
medium; color: rgb(0, 0, 0);" class=3D""> </span><span style=3D"font-size:=
 medium; color: rgb(0, 0, 0);" class=3D"">into this discussion as =
well.</span></pre><pre class=3D"newpage" style=3D"margin-top: 0px; =
margin-bottom: 0px; break-before: page; font-variant-ligatures: normal; =
orphans: 2; widows: 2;"><font color=3D"#000000" class=3D""><font =
size=3D"3" class=3D""><br class=3D"">Ultimately, the question is what =
Errata and/or YANG-next issue should be filed. &nbsp; I=E2=80=99m okay =
either way, so long as it=E2=80=99s clear and can be implemented =
consistently across tooling.<br class=3D""><br class=3D"">In the =
meanwhile, I recommend module designers avoid using the shorthand =
notation, as there are no known issues with the =E2=80=9Clonghand=E2=80=9D=
 notation.<br class=3D""><br class=3D"">[1]&nbsp;<a =
href=3D"https://github.com/mbj4668/pyang/issues/559" =
class=3D"">https://github.com/mbj4668/pyang/issues/559</a><br =
class=3D""><br class=3D"">Kent // contributor<br class=3D""><br =
class=3D""><br class=3D""></font></font></pre></body></html>=

--Apple-Mail=_5B0C9715-7FEE-4B7D-9A60-E724908E8C65--


From nobody Thu Feb 13 10:39:14 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A229120813; Thu, 13 Feb 2020 10:39:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.436
X-Spam-Level: *
X-Spam-Status: No, score=1.436 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rwc8vKPL7m1o; Thu, 13 Feb 2020 10:39:01 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2083.outbound.protection.outlook.com [40.107.20.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E3B312025D; Thu, 13 Feb 2020 10:39:01 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IFS1pjBv2ufpmYO7/iS9V55UaEIzvRMwjJaDVMjJ9msf++XGaulnCHsfrWo7i36QqgI/j1nWjyJ8IWfVFFeH5pbstH33sNoIK488sJ0yt92KpO310WerWZC7nc6zaQhMG14XGrzYsHa7q5pOeBzmdimbrfj/wsjbx6CuiT+Wv39KnSwcu9iZJLEbP/KPRUk8/rRNq1W7oQtdjjqPGK5t+rfc8XDNvOFCrlFzH8hnvsQbHeAIAV8XWM3rAZlAXd+jgQ/i2DeBoxH2I0JbaQHPeaynj6zqdQKFXYP0lYNa+wG7Sz9jKt8xcSbmxetWxKjxv0iaOscEst0kWrVb7j0UJg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rn4eoAz9qZoP7dAh3o9dx/8H/vTj02W7DqYZm24It6I=; b=fwGGOidCAwoIIioaI0ODQq3kBcZDwUHxmrb7dr1dzJKJyq98BnFGBTufFfTL78H/3pIg9N3YeJWz+jVW/55iPNIqzyh2fdg8ZWDIn0IuG8FZ4Slw7f0gvPjrtemmGIOd6bRgc7pKd1KXf+5LxFwben05wiWKvlM5OF3icfuYp3HoWeOJJNViNACUX+2QrLOwbEcUrPgYU0K4pwpD0HjDttmOsSslIDMDqWEXzTkap/Efn7H8XMtdwzasF2y//5OMdyQ4tLvsoZQ4unWaGUw3Nko8q9t4Jqz2zt23eK7/N13zqTtoEzbnBCM/yW0bI+YeKSgxhZdtcB//C4BrM4iVlA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rn4eoAz9qZoP7dAh3o9dx/8H/vTj02W7DqYZm24It6I=; b=hh+HvHXns7aEHmYixh6s2p4qUm3+KgjhCf7rKjBalEVS4kJ8SrRJZnyAtxDMCrOV05jD3LslLAiX8jEmxOV+D8ZLQ5Pz3FZzaQMZP8ncy1smA7g2NQPf/ShgL/aE+yD+QEtOfC8SkyvmKikRnYJrNOuko2/iEudDBjM1btvmQ/g=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0278.EURP190.PROD.OUTLOOK.COM (10.165.185.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.21; Thu, 13 Feb 2020 18:38:59 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.025; Thu, 13 Feb 2020 18:38:59 +0000
Received: from localhost (212.201.44.247) by ZR0P278CA0042.CHEP278.PROD.OUTLOOK.COM (2603:10a6:910:1d::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.23 via Frontend Transport; Thu, 13 Feb 2020 18:38:58 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Alexey Melnikov <aamelnikov@fastmail.fm>
CC: Christian Hopps <chopps@chopps.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4pzaaJjh2ww68Uallfbdbai0wA==
Date: Thu, 13 Feb 2020 18:38:58 +0000
Message-ID: <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
In-Reply-To: <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: ZR0P278CA0042.CHEP278.PROD.OUTLOOK.COM (2603:10a6:910:1d::11) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9f40dd62-3264-40c2-7edf-08d7b0b3fd1d
x-ms-traffictypediagnostic: DB6P190MB0278:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB027800F552E82F974182D943DE1A0@DB6P190MB0278.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 031257FE13
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(39850400004)(376002)(346002)(136003)(366004)(189003)(199004)(786003)(316002)(66476007)(66946007)(64756008)(66446008)(2906002)(54906003)(66556008)(6916009)(3450700001)(8676002)(1076003)(81156014)(81166006)(186003)(16526019)(5660300002)(26005)(478600001)(966005)(6486002)(6496006)(52116002)(956004)(53546011)(4326008)(71200400001)(8936002)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0278; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 8Hj5TsxzDyvzzZxdjrHDf+4fl9BqEWrBdNFO3xbC7OPBaLef1rXEdxkloB1z8qtoY6gAnrqOSE+qfBhI34PyGlyi28ve9drr6XMdN0vyN/VCkvRNIN9pLdZPyzlbrm1xbDBH3CqMbG39JmPO+c6muQ==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <F6527F351F1DE84EA435FA83864E37BF@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 9f40dd62-3264-40c2-7edf-08d7b0b3fd1d
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Feb 2020 18:38:59.0036 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Nv8gEe/ydUnCMqynJxejajal/HxC4M4uwjBGSTeRpuBjaiZ3KvlJ/yF8VCXlBpY8X2oKZDKArvJX9rq5t3U/48ntwc+RLj5N4lQjZEKwKRI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0278
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jy1_QF1h0A3ymAtDgx2JnMXFjQs>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 18:39:09 -0000

And a longer term solution might be to define a YANG Net-Unicode
string datatype that can be used in all situations where
non-normalized strings may cause problems. The problem (if one
agrees it is one) is likely much bigger than just YANG tags,
there likely are many uses of YANG strings where normalization
would be desirable.

/js

On Thu, Feb 13, 2020 at 01:10:02PM +0000, Alexey Melnikov wrote:
> Hi Christian,
>=20
> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> > The intent in the document is to place as few restrictions on tags as=20
> > possible to allow for future-proofing and organic growth of use both=20
> > within and outside of SDOs. For standard tags we trust IANA (and the=20
> > human behind the process) to make the call on whether a tag is already=
=20
> > present. :)
>=20
> And the problem with that is that because there might be multiple ways to=
 encode in Unicode visually indistinguishable tags IANA would end up asking=
 IESG for help.
>=20
> So you need to at minimum specify a Unicode normalization form to use. I =
suggest you normatively reference RFC 5198 here.
>=20
> > Having worked for a company where a lot of XML string data was=20
> > non-ascii I find limiting to ascii to be rather restrictive.
>=20
> Best Regards,
> Alexey
>=20
> >=20
> > Thanks,
> > Chris.
> >=20
> > > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker <noreply=
@ietf.org> wrote:
> > >=20
> > > Alexey Melnikov has entered the following ballot position for
> > > draft-ietf-netmod-module-tags-07: Discuss
> > >=20
> > > When responding, please keep the subject line intact and reply to all
> > > email addresses included in the To and CC lines. (Feel free to cut th=
is
> > > introductory paragraph, however.)
> > >=20
> > >=20
> > > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.=
html
> > > for more information about IESG DISCUSS and COMMENT positions.
> > >=20
> > >=20
> > > The document, along with other ballot positions, can be found here:
> > > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> > >=20
> > >=20
> > >=20
> > > ---------------------------------------------------------------------=
-
> > > DISCUSS:
> > > ---------------------------------------------------------------------=
-
> > >=20
> > > This is generally a fine document, but after checking RFC 7950 syntax=
 for
> > > strings I question why you think you need non ASCII tags. There are s=
o many
> > > problems that can arise from that. For example, how would IANA be abl=
e to
> > > enforce uniqueness of Unicode tags written in different Unicode
> > > canonicalisation forms?
> > >=20
> > >=20
> > >=20
> > >=20
> >=20
> >
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Thu Feb 13 11:17:33 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E418C1201CE; Thu, 13 Feb 2020 11:17:27 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158162144779.20544.17460935081359894800@ietfa.amsl.com>
Date: Thu, 13 Feb 2020 11:17:27 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/4NnS_4y7JOYJn7poYxMQPKQ2ICs>
Subject: [netmod] I-D Action: draft-ietf-netmod-geo-location-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 19:17:28 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : YANG Geo Location
        Author          : Christian Hopps
	Filename        : draft-ietf-netmod-geo-location-03.txt
	Pages           : 23
	Date            : 2020-02-13

Abstract:
   This document defines a generic geographical location object YANG
   grouping.  The geographical location grouping is intended to be used
   in YANG models for specifying a location on or in reference to the
   Earth or any other astronomical object.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-geo-location/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-geo-location-03
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-geo-location-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-geo-location-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Feb 13 11:51:59 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D1B8120219; Thu, 13 Feb 2020 11:51:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hxt0dWJtnKXe; Thu, 13 Feb 2020 11:51:53 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id E36201201CE; Thu, 13 Feb 2020 11:51:52 -0800 (PST)
Received: from stubbs.int.chopps.org (66-227-211-29.dhcp.trcy.mi.charter.com [66.227.211.29]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 1DEF060B8E; Thu, 13 Feb 2020 19:51:52 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
Date: Thu, 13 Feb 2020 14:51:51 -0500
Cc: Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>, draft-ietf-netmod-module-tags@ietf.org, Joel Jaeggli <joelja@gmail.com>, netmod-chairs@ietf.org, netmod@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <C9A4A3B5-B692-4C7C-AFE2-B95377452999@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
To: Alexey Melnikov <aamelnikov@fastmail.fm>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/o8ZVbuhtWSP8FtrMihWFdnUeuso>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2020 19:51:55 -0000

> On Feb 13, 2020, at 8:10 AM, Alexey Melnikov <aamelnikov@fastmail.fm> =
wrote:
>=20
> Hi Christian,
>=20
> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
>> The intent in the document is to place as few restrictions on tags as=20=

>> possible to allow for future-proofing and organic growth of use both=20=

>> within and outside of SDOs. For standard tags we trust IANA (and the=20=

>> human behind the process) to make the call on whether a tag is =
already=20
>> present. :)
>=20
> And the problem with that is that because there might be multiple ways =
to encode in Unicode visually indistinguishable tags IANA would end up =
asking IESG for help.

I don't have a problem including some text in the IANA guidance if we =
need it; however, the guidance already says:

  "New values should be well considered and not achievable through a
   combination of already existing IETF tags."

How could we arrive at a place where IANA is confused about allowing 2 =
visually indistinguishable strings given the above statement? The =
registry already requires IETF review, and it seems counter to the =
existing IANA guidance to even be talking about distinguishing visually =
indistinguishable tag values. IOW simply by talking about the need to =
compare 2 strings that are visually indistinguishable, we diminish the =
much more important intent of the initial guidance.

Thanks,
Chris.

>=20
> So you need to at minimum specify a Unicode normalization form to use. =
I suggest you normatively reference RFC 5198 here.
>=20
>> Having worked for a company where a lot of XML string data was=20
>> non-ascii I find limiting to ascii to be rather restrictive.
>=20
> Best Regards,
> Alexey
>=20
>>=20
>> Thanks,
>> Chris.
>>=20
>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker =
<noreply@ietf.org> wrote:
>>>=20
>>> Alexey Melnikov has entered the following ballot position for
>>> draft-ietf-netmod-module-tags-07: Discuss
>>>=20
>>> When responding, please keep the subject line intact and reply to =
all
>>> email addresses included in the To and CC lines. (Feel free to cut =
this
>>> introductory paragraph, however.)
>>>=20
>>>=20
>>> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about IESG DISCUSS and COMMENT positions.
>>>=20
>>>=20
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>>>=20
>>>=20
>>>=20
>>> =
----------------------------------------------------------------------
>>> DISCUSS:
>>> =
----------------------------------------------------------------------
>>>=20
>>> This is generally a fine document, but after checking RFC 7950 =
syntax for
>>> strings I question why you think you need non ASCII tags. There are =
so many
>>> problems that can arise from that. For example, how would IANA be =
able to
>>> enforce uniqueness of Unicode tags written in different Unicode
>>> canonicalisation forms?
>>>=20
>>>=20
>>>=20
>>>=20
>>=20
>>=20
>=20


From nobody Fri Feb 14 02:14:39 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C26DA120289 for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 02:14:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level: 
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Q/8etrGZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=iSUdO/Lc
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lvr84jK4q67i for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 02:14:35 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8CDAD1201E5 for <netmod@ietf.org>; Fri, 14 Feb 2020 02:14:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15790; q=dns/txt; s=iport; t=1581675275; x=1582884875; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=t+dP5udQQOXSVEbOFW3ByBECBtxOiGuwQV2ueQH93oI=; b=Q/8etrGZlfHdS6Y+2hzo8ZGzVgjj0g0F1RCSkM5krvrESiVjymdsYaK2 prkRevZKcpvPs/v5/5aUz7Hf49xDP4JcanzOZx7fhSQQqvaJd0rSLDk05 dzrIzBS34bEb4Be4I1PjzaKhft3Iq/USmkwwdl6miFbqvsBGG6EyGolRq U=;
IronPort-PHdr: =?us-ascii?q?9a23=3A81mrLB/Cv6XKWf9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CLGgCJckZe/4cNJK1mHgELHIMgL1A?= =?us-ascii?q?FbFggBAsqCoQKg0YDinhOghGTMIRhglIDVAkBAQEMAQEjCgIEAQGEQAIXgjw?= =?us-ascii?q?kOBMCAw0BAQUBAQECAQUEbYU3DIVmAQEBAQMSEQoTAQE4DwIBCBEEAQErAgI?= =?us-ascii?q?CMB0IAgQBEggagwWBfU0DLgECAQuiSwKBOYhidYEygn8BAQWBLwGDexiCDAM?= =?us-ascii?q?GgTiMJBqBQT+BWIJMPoJkAoFnK4JjMoIsjUQhgniFZooCjzkKgjqHTY8gmxi?= =?us-ascii?q?OaIhukkACBAIEBQIOAQEFgWkigVhwFTuCbFAYDY4dDBeDUIpTdIEpjh8BgQ8?= =?us-ascii?q?BAQ?=
X-IronPort-AV: E=Sophos;i="5.70,440,1574121600";  d="scan'208,217";a="428550764"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2020 10:14:34 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 01EAEY1D012070 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 14 Feb 2020 10:14:34 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:14:33 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:14:32 -0600
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 14 Feb 2020 04:14:32 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QUZI0wDlR9q/DSI665K8T6xHArT4NVBqD7J6cbZvFqTWJWcxZRUR/y9/w7mANlKJzi3Lo8kGDaEa+FwB4fq0AMXeqa4Jum8/hDqlnWiX2Zm81Etvxa5+eiy4Q2NaqGAv6qtun9DgdebiVk7RWCWMda3nCEFjWpt+fAPkGAslESK6M2s1UPlaDUgVvPGA8caXEQWiECcv0eKPqkYtQ6AD2FPbLm8DwUne1IzGscj8oLsJNA6kZKSnfd9NxNuI653fR5NSZ+OV9Mfubo5yt+H0btU98F8VJ0ff9Y+828QH0QO9fPDm6HsyszOImuUxrsylwUJhpSJvJnzKEkwzVfdfwA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t+dP5udQQOXSVEbOFW3ByBECBtxOiGuwQV2ueQH93oI=; b=Kpu2GOjFJ+ocpz7ibSYxZlzaO7iavnzzoGxFCnS3QvvgyiDKqqClWYzFc5kyIZjo8q0iLSw2YD+cUYqFwYAaU47Dl4IrYr/4EQ7sbG4dcbPGDJVQ5+i+MrfX+tj3brfu2dHQ2XNSYPf7sy6hJKrxKUKnJCmQQyLKucMLFPJmcbnbFA7L5IeDRxrA0nctCBNhynOK4CYPi7+zfdYLLxhtbhhZIiCT9SrvH1DczBIPi3ICITdtAXIm5Uhv93a7mFKb8YNnVOH3iu+vwf9YJpocDG1951M3kRL7YiIf8kThYJ7zgd9X/3c968+K6pmnORfRvqSYeYaDmIdjcdzZR6HHKQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t+dP5udQQOXSVEbOFW3ByBECBtxOiGuwQV2ueQH93oI=; b=iSUdO/Lca+EijcQ/CzIO/FsTR2cXNh6EpM1O38BGe3VXyvl2LpDl44uuAQURa/X7ZT1OwGLBGjE8c/bZpYS0con3bAqtSAZGxsIQSIOv55tVxTt+lJYY2adgFP6zUsWL3Jael5Nzm7gG3uEwLAnvjF/DV3VgM8t+HwvMKb243yM=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4333.namprd11.prod.outlook.com (10.255.90.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Fri, 14 Feb 2020 10:14:32 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2707.031; Fri, 14 Feb 2020 10:14:32 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Implicit case statementa
Thread-Index: AQHV4nzDauM+gCA9XkKZZGpbkmqYsagaeIBA
Date: Fri, 14 Feb 2020 10:14:32 +0000
Message-ID: <MN2PR11MB4366EB460639F018FAE197C7B5150@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@email.amazonses.com>
In-Reply-To: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [82.15.79.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 232a5787-fcf7-4ac4-da16-08d7b136af47
x-ms-traffictypediagnostic: MN2PR11MB4333:
x-microsoft-antispam-prvs: <MN2PR11MB4333599A619CA22A2891F755B5150@MN2PR11MB4333.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(136003)(39860400002)(396003)(366004)(376002)(189003)(199004)(2906002)(110136005)(316002)(7696005)(5660300002)(8676002)(52536014)(8936002)(81156014)(81166006)(86362001)(478600001)(71200400001)(64756008)(66556008)(33656002)(66446008)(55016002)(186003)(6506007)(76116006)(53546011)(9686003)(66476007)(66946007)(26005)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4333; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: fY+DONl4HXNDnsycI25x4zjA0/B60SZ0zZT01ZjNNGCDyJaB64c97vHRbfudFmIsFPuhwG1VkTdILHseP+dLjQSzFA/m6V/b0WmK/jO9r1V9Ee8lQk4JP3DJ7Ls1lmmi5DPkZl5QiYtbh9smGD/H9Q==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB4366EB460639F018FAE197C7B5150MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 232a5787-fcf7-4ac4-da16-08d7b136af47
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 10:14:32.2267 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cA0G17WEju/lF1kPWNKkKBENOe7eOruvn/Upl+GRejAYb2UKkNbG1mcNuBjR85XCb6Iw4TXxhPfEKDTf77OiuA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4333
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/hOpIdY1-KtJ5sIdg8_8YZd2wbyA>
Subject: Re: [netmod] Implicit case statementa
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 10:14:38 -0000

--_000_MN2PR11MB4366EB460639F018FAE197C7B5150MN2PR11MB4366namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366EB460639F018FAE197C7B5150MN2PR11MB4366namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366EB460639F018FAE197C7B5150MN2PR11MB4366namp_--


From nobody Fri Feb 14 02:31:03 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C4BB120803; Fri, 14 Feb 2020 02:30:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=UEk7cAPp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=p20F/SgV
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a1TrnZISOi71; Fri, 14 Feb 2020 02:30:56 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E98E1200A3; Fri, 14 Feb 2020 02:30:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4145; q=dns/txt; s=iport; t=1581676256; x=1582885856; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=PJux87UZnw9Jl61qn3VVzBTxiFwEIjufKiSrY1RdbYE=; b=UEk7cAPppkFuK/NyKCO9rlfXHkOmkPVcQLyfCtGFSCF8oTcCaYauNz0I jb+8W9aPK1IBAWhzxr4Qnp7dC9kiiKV0nOHrJ4SJWip05S6UUyZpsXllF 7cRCamAy1U7Le8/YNm3pQGlmTH6nR0kJeeifiVDPFTr032uIzXffWJB56 E=;
IronPort-PHdr: =?us-ascii?q?9a23=3AbeJe/h9tTY+2RP9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CwAACSdUZe/4sNJK1jAxoBAQEBAQE?= =?us-ascii?q?BAQEDAQEBAREBAQECAgEBAQGBe4FUUAVsWCAECyoKh1ADiniCX4liji+BQoE?= =?us-ascii?q?QA1QJAQEBDAEBGAsKAgQBAYN7RQKCUyQ4EwIDDQEBBQEBAQIBBQRthTcMhWY?= =?us-ascii?q?BAQEBAwEBEC4BASwLAQsCAgIBCBABBAEBAS4bBgYLHQgCBAENBQgTB4MFgko?= =?us-ascii?q?DLgECAQuiPwKBOYhigieCfwEBBYFDQYMfDQuCDAMGBYEzjCQagUE/gRFHgkw?= =?us-ascii?q?+ghtJAQEBAgGBLAESASMfERWCe4IsjUsdgjqHKJdwRAqCOodNilQEgWKCZoJ?= =?us-ascii?q?JiBSQO45oiG6CKpAWAgQCBAUCDgEBBYFpImdYEQhwFTuCbFAYDY4dOIM7M4R?= =?us-ascii?q?hhT90AoEnjH2BIgGBDwEB?=
X-IronPort-AV: E=Sophos;i="5.70,440,1574121600"; d="scan'208";a="721527509"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2020 10:30:54 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 01EAUrS5003661 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 14 Feb 2020 10:30:54 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:30:53 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:30:52 -0600
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 14 Feb 2020 04:30:51 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QSgwaqaH6otrZbp2FYhx5WZVeowTFcwaAtcLbH6d9PCkc90n47XOn93Phx8ZGaSuY38kIIAbmATW8AUurN+5xEOhqfcGfSlGQ0NNuwJF9LcX4CLgyTC3PzK1IV7RT+EWAGIyMVW9PgWNHn4OUAWgaR+p//IKHNHNUVHuLf9m5YNsNkkWtLcmmePK7LbQAQDj+jyAF9REb0fAfWJo7d89yQKgeTllxsvTRg0/kmPCRTicpVpK642Mnqe6xaq3Q5MMOeu98Rr7Y7Ga1baenlVTtxcRD5zNRDSPE85T98MqmdOzpfDmaL0keKQ1z5zjonRpKgfX7kcrrqBBo0XtcKDoow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sNv/hOghVXpp0RfFf+1DGD0hviOpOB756AsD1PNkLpI=; b=FXdVTgf+OozBA8GYIm2B8XFceOMczD7h/CiklFDTEsorWGNbWKnwMI6I+Vu5W5z6V3nlYHu8eHZgd86qtcNW7CZ1LDY9UciF8PaiLcrY+AOqAiYRKx/O7N0+SjtRFV6fHoI+RIeVnBKfVm/vwzUlGipZ9vR5LlT5zT3uN/GAiGZiLbQ5cCBCSWUX/uxMGZ6mMq9ZpTe9s67ty59YHQ5RDIAlWZSTpaDpgyoM1KN9rP0xy402E7sy/zwSm4l8rSBRKMHr+a/M1/RyQzC+xaUMDDneZTf5Hn9EGdbRwfI+ZU/NKjvOYDxOmWcnE/m6O/C0fEyhMsSRWir++mZEcG3vXA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sNv/hOghVXpp0RfFf+1DGD0hviOpOB756AsD1PNkLpI=; b=p20F/SgVWyR5sb289OORwV3quQtCUgbW4Ij/qKXaAG6mDHt2CiVYoFh2sbtI+4S28+DRqb69VFw/p//NiurjnIq08V+OraDUHPQFc/AbgjIshCLkQqXKTdedM3E+qTK7MZX5ukU1iQ4qGtp3HjIKDpYd6Sy7Wxh2SBGzY4u45tc=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4302.namprd11.prod.outlook.com (52.135.36.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Fri, 14 Feb 2020 10:30:50 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2707.031; Fri, 14 Feb 2020 10:30:50 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>, Alexey Melnikov <aamelnikov@fastmail.fm>
CC: "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gZdNYAgAEFykA=
Date: Fri, 14 Feb 2020 10:30:50 +0000
Message-ID: <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [82.15.79.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2423ca4a-4756-46bc-3cb4-08d7b138f679
x-ms-traffictypediagnostic: MN2PR11MB4302:
x-microsoft-antispam-prvs: <MN2PR11MB4302C416748C8A6A42B04097B5150@MN2PR11MB4302.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(396003)(39860400002)(346002)(366004)(136003)(199004)(189003)(33656002)(4326008)(86362001)(8676002)(66556008)(81156014)(81166006)(66574012)(66946007)(66476007)(8936002)(2906002)(53546011)(64756008)(6506007)(966005)(110136005)(54906003)(478600001)(7696005)(5660300002)(316002)(9686003)(55016002)(26005)(52536014)(76116006)(186003)(71200400001)(66446008); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4302; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: lCSOfQhtUApkil871J5jQu8qJv9hnadhFPF28CgmlSukVdyVruKJn0hDrL+o3dMs3usbXY8kT3Dy9TAprkBQett2b5I94hi7szXditIdqgLJeaFzrFkJsjl27apjUrYvb/8kNvEoZdIF7ba524e20g==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2423ca4a-4756-46bc-3cb4-08d7b138f679
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 10:30:50.4611 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /A/2F3GwPQsFH91z4vNvyQHyAioKnR0AuUQduSyZ/AD7QBdtr8u5mMo6fXWcqYK7qf6EY2K04lx5iihTJ9SO2Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4302
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ACvlnc-YrU4vrDBFqseIk7gokPU>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 10:31:00 -0000

Hi Juergen,

This sounds potentially useful to me, although should this be for general u=
nicode strings (e.g. ones that might include spaces), or just identifiers (=
without any spaces)?.  Is this something that could/should go into rfc6991-=
bis, or at least be discussed in that context?

I would have thought that normalization would be required wherever a config=
urable unicode string is used as a list key, or leaf-list.

Thanks,
Rob


> -----Original Message-----
> From: iesg <iesg-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, J=FCrgen
> Sent: 13 February 2020 18:39
> To: Alexey Melnikov <aamelnikov@fastmail.fm>
> Cc: netmod-chairs@ietf.org; draft-ietf-netmod-module-tags@ietf.org;
> netmod@ietf.org; Joel Jaeggli <joelja@gmail.com>; Christian Hopps
> <chopps@chopps.org>; The IESG <iesg@ietf.org>
> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> module-tags-07: (with DISCUSS)
>=20
> And a longer term solution might be to define a YANG Net-Unicode string
> datatype that can be used in all situations where non-normalized strings
> may cause problems. The problem (if one agrees it is one) is likely much
> bigger than just YANG tags, there likely are many uses of YANG strings
> where normalization would be desirable.
>=20
> /js
>=20
> On Thu, Feb 13, 2020 at 01:10:02PM +0000, Alexey Melnikov wrote:
> > Hi Christian,
> >
> > On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> > > The intent in the document is to place as few restrictions on tags
> > > as possible to allow for future-proofing and organic growth of use
> > > both within and outside of SDOs. For standard tags we trust IANA
> > > (and the human behind the process) to make the call on whether a tag
> > > is already present. :)
> >
> > And the problem with that is that because there might be multiple ways
> to encode in Unicode visually indistinguishable tags IANA would end up
> asking IESG for help.
> >
> > So you need to at minimum specify a Unicode normalization form to use. =
I
> suggest you normatively reference RFC 5198 here.
> >
> > > Having worked for a company where a lot of XML string data was
> > > non-ascii I find limiting to ascii to be rather restrictive.
> >
> > Best Regards,
> > Alexey
> >
> > >
> > > Thanks,
> > > Chris.
> > >
> > > > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> <noreply@ietf.org> wrote:
> > > >
> > > > Alexey Melnikov has entered the following ballot position for
> > > > draft-ietf-netmod-module-tags-07: Discuss
> > > >
> > > > When responding, please keep the subject line intact and reply to
> > > > all email addresses included in the To and CC lines. (Feel free to
> > > > cut this introductory paragraph, however.)
> > > >
> > > >
> > > > Please refer to
> > > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > > > for more information about IESG DISCUSS and COMMENT positions.
> > > >
> > > >
> > > > The document, along with other ballot positions, can be found here:
> > > > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> > > >
> > > >
> > > >
> > > > ------------------------------------------------------------------
> > > > ----
> > > > DISCUSS:
> > > > ------------------------------------------------------------------
> > > > ----
> > > >
> > > > This is generally a fine document, but after checking RFC 7950
> > > > syntax for strings I question why you think you need non ASCII
> > > > tags. There are so many problems that can arise from that. For
> > > > example, how would IANA be able to enforce uniqueness of Unicode
> > > > tags written in different Unicode canonicalisation forms?
> > > >
> > > >
> > > >
> > > >
> > >
> > >
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
>=20
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri Feb 14 02:43:26 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 679371207FD; Fri, 14 Feb 2020 02:43:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=EyzRzPmp; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Ax6IXgJj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H7VA4qb_5xTo; Fri, 14 Feb 2020 02:43:23 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB7671202A0; Fri, 14 Feb 2020 02:43:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3217; q=dns/txt; s=iport; t=1581677002; x=1582886602; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Xce4KbuT4VkSpNO0i5ULC0Rq23BzTxpJXS0YYCwB1ok=; b=EyzRzPmpZes9APKjBHLDVJP8tawPcl+X5C0FDHCOYapLjt3ThECyIzTP KZoIPwinyiZT9oO2hn1TYt24R1/R5fvu+HjM4ErghDgB71ZUcUNO1J/Z7 TasS02KSK0lb+fC1tVy09+4PCfDAx6IcRToeemqDUb5kgwT+QLANha3ym Q=;
IronPort-PHdr: =?us-ascii?q?9a23=3ACdXA9B8MMysXQv9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CuAAAweUZe/49dJa1mGgEBAQEBAQE?= =?us-ascii?q?BAQMBAQEBEQEBAQICAQEBAYF7gVRQBWxYIAQLKgqHUAOKeIJfiWKOL4FCgRA?= =?us-ascii?q?DVAkBAQEMAQEjCgIEAQGEQAKCUyQ4EwIDDQEBBQEBAQIBBQRthTcMhWYBAQE?= =?us-ascii?q?BAxIoBgEBNwELBAIBCA4DBAEBAR4QIREdCAIEAQ0FCBqDBYJKAy4BAgELolA?= =?us-ascii?q?CgTmIYoIngn8BAQWBQ0GDIg0LggwDBoE4jCQagUE/gRFHgkw+ghtJAgECAYE?= =?us-ascii?q?sARIBCRowgxCCLI1LHYI6nmYyRAqCOodNilQEgWKCZoJJiBSQO45oiG6CKpA?= =?us-ascii?q?WAgQCBAUCDgEBBYFpImdYEQhwFYMnUBgNjh04gzuFFIU/dAKBJ4x9gSIBgQ8?= =?us-ascii?q?BAQ?=
X-IronPort-AV: E=Sophos;i="5.70,440,1574121600"; d="scan'208";a="721538362"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2020 10:43:13 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 01EAhBjV028855 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 14 Feb 2020 10:43:11 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:43:11 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 04:43:10 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 14 Feb 2020 04:43:10 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Gypwv3OJc7OTj8NkMYNOd4ptkvVaqnBSiwUVX15rGJkT9/g61GUf9uzib2nYw/1+vPWtrPkut3eJJzLrLVEaW2OgMAvc8sHuCUYRBrrOpVHu5QvIbbQm3p1RphruWQvarqImJxCGnGjENfb2aBia+/2bdphI102YNjrSAmrYyFtsptKH/e4aXLWTtOFQFUJdaOzUEaX5503RiTDXyPR1iSfDup+BmAnpXWl3XcFtzLUZ+o1MXMiVD5KpOyRJsAoreNXXaQ3DcLqVHxFw4OHyoqesBenlQ/Rv1RgXLIctSb6h+dEh9Wr793ngBmU5OxNBDUCv1UBQd52d8wie5AXNLg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+HLMxwNhIFZA192KMVfirgBjBVf1Cp4C9li6UosthoU=; b=WSdAA6NAk0+U/mgfPabkNztBRD30dM4Fc0/ZaV0h97jEHEaei3cgXAgd8K1/Oi0BV73DcShhCVYVVj0BZb05B5xFZfKHV3WUp0xi+oWl2ovDpofLV8GyDi555RxkJHvvMIbQLClNvov0MXQgAkdRaRik2birh/dQueenLVAvzZB51ST/KSEa6crwkS5wdAK2+S59verytXA6JThEI/VNI49UGSi+BPz9zreLhXoH1qessN1CwpHB66zs+0fezH0YMhDHz1VpChsjP5+h7wYWGA/4lp3UQ7SCpyFkJrmnTC+iW6TiJ55bs/tR7a+M8uEKcCXjyl/6LsgKt4366PSAYQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+HLMxwNhIFZA192KMVfirgBjBVf1Cp4C9li6UosthoU=; b=Ax6IXgJjRwtBbKRYOwYf8qwLSdKuzwAJIge6YTK5v0imO1e2WvQt4nAQVYa8TOjO13Qnikmrf5pFWVRlWb3YizYar5aUTJqw8Hfv5vx+AK4b1QU9mhD/R6Hz8bdwWONhzJ/46ZPTQtReTt/g5lcOqTvdpQGTTfZ+KZlIzedNYuU=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4414.namprd11.prod.outlook.com (52.135.36.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Fri, 14 Feb 2020 10:43:09 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2707.031; Fri, 14 Feb 2020 10:43:09 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Alexey Melnikov <aamelnikov@fastmail.fm>, Christian Hopps <chopps@chopps.org>
CC: "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Thread-Topic: Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gaftpg
Date: Fri, 14 Feb 2020 10:43:09 +0000
Message-ID: <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
In-Reply-To: <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [82.15.79.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c47c9abe-2ca6-41bf-0724-08d7b13aaec7
x-ms-traffictypediagnostic: MN2PR11MB4414:
x-microsoft-antispam-prvs: <MN2PR11MB44140D18A88953C9BFCCDECDB5150@MN2PR11MB4414.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(396003)(376002)(136003)(366004)(39860400002)(189003)(199004)(110136005)(2906002)(966005)(316002)(478600001)(54906003)(53546011)(71200400001)(55016002)(6506007)(9686003)(4326008)(66556008)(64756008)(66446008)(81156014)(7696005)(26005)(8936002)(52536014)(5660300002)(86362001)(186003)(33656002)(66476007)(8676002)(81166006)(76116006)(66946007); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4414; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: esCRdTJ+A41zRmAAHQbpMKqVDoqotfbQP5ba2PsRnAjvnzjKeMZmgh51pjqvXnz0RsfjMvMnOvNqOWUBDtvcgi0yBFjByZWUS1NqoJbt6Yl5oO0CgSA+ISZICCDnAEQp/OtUvHn3ispZChizdC47DoSq479dT68h6236ZCM9sz+F0MvrJ92YahGII3DBsDquja21tIeYZd05L4EODgR0VOqkSsEG5/Fg5vFaCO2R1iEQXlZyl9gYZHYttXHfDIUk2e96APCcOr8/4awKY7ABfhMtVQv7LuXnbG3UdeTgXcS8SDj6wN6YJ9LMq4j4LWA+ZIo7euw9xw13sdEd9qdMJouRK+cHb8/IQmTeRbSqDmzUeEpy8dnQYt4uyKyymKsP8KjjXka0I97y1fYj8uaOS6gsw0r1R67sqOpoCjRJ9VlfczjqR1/HlvO69GT21ip7udLxZfsnddeG2umRESZux59DMfgUEmkLdl8MiIkDWPCk+iszSV8Yr5cn+sy5DtMDlh1oHdw/3ILcyqLnoJFqKA==
x-ms-exchange-antispam-messagedata: yLvPXVoJ6gIn4dNokXk+/lZfABMi1nJUN79Veqz983sKOgzcnku5/iWPeYM9jbOKYovbg9m/GfufMfz34/Xn6+5nn+Mu2mhNXxF8VeL3+u8VkGtT+U2dFunThOoqQHH/7koKWiFm8QxNzd2xiY7xJQ==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: c47c9abe-2ca6-41bf-0724-08d7b13aaec7
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 10:43:09.3563 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: JN1YSlI4KkmvWmYOV/ZfY4Xzp88s8wlPr0UdyAIaw6yrDATruV9TifkF9+i1Nv+TRayrXXS4q56Afub3y1i1cQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4414
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OTWYe6pSEDCRaJ6TtQyzlbFpkc0>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 10:43:26 -0000

Hi Alexey, Christian,=20

Allowing Unicode but requiring normalization as per RFC 5198 for IANA manag=
ed tags makes sense to me.

But does the server also need to normalize any configured tags?  I.e. shoul=
d the description for the tag typedef also specify that tags SHOULD be norm=
alized, and specify a normalization method that SHOULD be used?  Or is the =
onus on the client to use sensible (i.e. already normalized) values, and if=
 so, does that need to be stated?

Thanks,
Rob


> -----Original Message-----
> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
> Sent: 13 February 2020 13:10
> To: Christian Hopps <chopps@chopps.org>
> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The IESG
> <iesg@ietf.org>; netmod@ietf.org; draft-ietf-netmod-module-tags@ietf.org
> Subject: Re: Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-
> 07: (with DISCUSS)
>=20
> Hi Christian,
>=20
> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> > The intent in the document is to place as few restrictions on tags as
> > possible to allow for future-proofing and organic growth of use both
> > within and outside of SDOs. For standard tags we trust IANA (and the
> > human behind the process) to make the call on whether a tag is already
> > present. :)
>=20
> And the problem with that is that because there might be multiple ways to
> encode in Unicode visually indistinguishable tags IANA would end up askin=
g
> IESG for help.
>=20
> So you need to at minimum specify a Unicode normalization form to use. I
> suggest you normatively reference RFC 5198 here.
>=20
> > Having worked for a company where a lot of XML string data was
> > non-ascii I find limiting to ascii to be rather restrictive.
>=20
> Best Regards,
> Alexey
>=20
> >
> > Thanks,
> > Chris.
> >
> > > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> <noreply@ietf.org> wrote:
> > >
> > > Alexey Melnikov has entered the following ballot position for
> > > draft-ietf-netmod-module-tags-07: Discuss
> > >
> > > When responding, please keep the subject line intact and reply to
> > > all email addresses included in the To and CC lines. (Feel free to
> > > cut this introductory paragraph, however.)
> > >
> > >
> > > Please refer to
> > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > > for more information about IESG DISCUSS and COMMENT positions.
> > >
> > >
> > > The document, along with other ballot positions, can be found here:
> > > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> > >
> > >
> > >
> > > --------------------------------------------------------------------
> > > --
> > > DISCUSS:
> > > --------------------------------------------------------------------
> > > --
> > >
> > > This is generally a fine document, but after checking RFC 7950
> > > syntax for strings I question why you think you need non ASCII tags.
> > > There are so many problems that can arise from that. For example,
> > > how would IANA be able to enforce uniqueness of Unicode tags written
> > > in different Unicode canonicalisation forms?
> > >
> > >
> > >
> > >
> >
> >


From nobody Fri Feb 14 03:01:33 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E70851200D8; Fri, 14 Feb 2020 03:01:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kdel3rvqMfxK; Fri, 14 Feb 2020 03:01:26 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id D9F441207FE; Fri, 14 Feb 2020 03:01:25 -0800 (PST)
Received: from stubbs.int.chopps.org (66-227-211-29.dhcp.trcy.mi.charter.com [66.227.211.29]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 1A98D60B7B; Fri, 14 Feb 2020 11:01:25 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
Date: Fri, 14 Feb 2020 06:01:24 -0500
Cc: Christian Hopps <chopps@chopps.org>, Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/NJl9AI1D-dX7_1aQ5NTqU0DEdUk>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 11:01:28 -0000

I was not approaching this discuss with this level of change in mind. =
How many years does it take to get a YANG model even one as simple as =
this completed?

Thanks,
Chris.

> On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) <rwilton@cisco.com> =
wrote:
>=20
> Hi Alexey, Christian,=20
>=20
> Allowing Unicode but requiring normalization as per RFC 5198 for IANA =
managed tags makes sense to me.
>=20
> But does the server also need to normalize any configured tags?  I.e. =
should the description for the tag typedef also specify that tags SHOULD =
be normalized, and specify a normalization method that SHOULD be used?  =
Or is the onus on the client to use sensible (i.e. already normalized) =
values, and if so, does that need to be stated?
>=20
> Thanks,
> Rob
>=20
>=20
>> -----Original Message-----
>> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
>> Sent: 13 February 2020 13:10
>> To: Christian Hopps <chopps@chopps.org>
>> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The IESG
>> <iesg@ietf.org>; netmod@ietf.org; =
draft-ietf-netmod-module-tags@ietf.org
>> Subject: Re: Alexey Melnikov's Discuss on =
draft-ietf-netmod-module-tags-
>> 07: (with DISCUSS)
>>=20
>> Hi Christian,
>>=20
>> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
>>> The intent in the document is to place as few restrictions on tags =
as
>>> possible to allow for future-proofing and organic growth of use both
>>> within and outside of SDOs. For standard tags we trust IANA (and the
>>> human behind the process) to make the call on whether a tag is =
already
>>> present. :)
>>=20
>> And the problem with that is that because there might be multiple =
ways to
>> encode in Unicode visually indistinguishable tags IANA would end up =
asking
>> IESG for help.
>>=20
>> So you need to at minimum specify a Unicode normalization form to =
use. I
>> suggest you normatively reference RFC 5198 here.
>>=20
>>> Having worked for a company where a lot of XML string data was
>>> non-ascii I find limiting to ascii to be rather restrictive.
>>=20
>> Best Regards,
>> Alexey
>>=20
>>>=20
>>> Thanks,
>>> Chris.
>>>=20
>>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
>> <noreply@ietf.org> wrote:
>>>>=20
>>>> Alexey Melnikov has entered the following ballot position for
>>>> draft-ietf-netmod-module-tags-07: Discuss
>>>>=20
>>>> When responding, please keep the subject line intact and reply to
>>>> all email addresses included in the To and CC lines. (Feel free to
>>>> cut this introductory paragraph, however.)
>>>>=20
>>>>=20
>>>> Please refer to
>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>=20
>>>>=20
>>>> The document, along with other ballot positions, can be found here:
>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>>>>=20
>>>>=20
>>>>=20
>>>> =
--------------------------------------------------------------------
>>>> --
>>>> DISCUSS:
>>>> =
--------------------------------------------------------------------
>>>> --
>>>>=20
>>>> This is generally a fine document, but after checking RFC 7950
>>>> syntax for strings I question why you think you need non ASCII =
tags.
>>>> There are so many problems that can arise from that. For example,
>>>> how would IANA be able to enforce uniqueness of Unicode tags =
written
>>>> in different Unicode canonicalisation forms?
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>=20
>>>=20
>=20


From nobody Fri Feb 14 03:06:33 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F55A1207FE; Fri, 14 Feb 2020 03:06:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DfFmUvWJLxe9; Fri, 14 Feb 2020 03:06:23 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 1B6E91200D8; Fri, 14 Feb 2020 03:06:23 -0800 (PST)
Received: from stubbs.int.chopps.org (66-227-211-29.dhcp.trcy.mi.charter.com [66.227.211.29]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 589D160B7B; Fri, 14 Feb 2020 11:06:22 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org>
Date: Fri, 14 Feb 2020 06:06:21 -0500
Cc: Christian Hopps <chopps@chopps.org>, Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/dQUx_yoX7_GKhCrAwSoOk4Ads38>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 11:06:25 -0000

For the record this one is 3 years and counting. For a list of tags.

> On Feb 14, 2020, at 6:01 AM, Christian Hopps <chopps@chopps.org> =
wrote:
>=20
> I was not approaching this discuss with this level of change in mind. =
How many years does it take to get a YANG model even one as simple as =
this completed?
>=20
> Thanks,
> Chris.
>=20
>> On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) <rwilton@cisco.com> =
wrote:
>>=20
>> Hi Alexey, Christian,=20
>>=20
>> Allowing Unicode but requiring normalization as per RFC 5198 for IANA =
managed tags makes sense to me.
>>=20
>> But does the server also need to normalize any configured tags?  I.e. =
should the description for the tag typedef also specify that tags SHOULD =
be normalized, and specify a normalization method that SHOULD be used?  =
Or is the onus on the client to use sensible (i.e. already normalized) =
values, and if so, does that need to be stated?
>>=20
>> Thanks,
>> Rob
>>=20
>>=20
>>> -----Original Message-----
>>> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
>>> Sent: 13 February 2020 13:10
>>> To: Christian Hopps <chopps@chopps.org>
>>> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The =
IESG
>>> <iesg@ietf.org>; netmod@ietf.org; =
draft-ietf-netmod-module-tags@ietf.org
>>> Subject: Re: Alexey Melnikov's Discuss on =
draft-ietf-netmod-module-tags-
>>> 07: (with DISCUSS)
>>>=20
>>> Hi Christian,
>>>=20
>>> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
>>>> The intent in the document is to place as few restrictions on tags =
as
>>>> possible to allow for future-proofing and organic growth of use =
both
>>>> within and outside of SDOs. For standard tags we trust IANA (and =
the
>>>> human behind the process) to make the call on whether a tag is =
already
>>>> present. :)
>>>=20
>>> And the problem with that is that because there might be multiple =
ways to
>>> encode in Unicode visually indistinguishable tags IANA would end up =
asking
>>> IESG for help.
>>>=20
>>> So you need to at minimum specify a Unicode normalization form to =
use. I
>>> suggest you normatively reference RFC 5198 here.
>>>=20
>>>> Having worked for a company where a lot of XML string data was
>>>> non-ascii I find limiting to ascii to be rather restrictive.
>>>=20
>>> Best Regards,
>>> Alexey
>>>=20
>>>>=20
>>>> Thanks,
>>>> Chris.
>>>>=20
>>>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
>>> <noreply@ietf.org> wrote:
>>>>>=20
>>>>> Alexey Melnikov has entered the following ballot position for
>>>>> draft-ietf-netmod-module-tags-07: Discuss
>>>>>=20
>>>>> When responding, please keep the subject line intact and reply to
>>>>> all email addresses included in the To and CC lines. (Feel free to
>>>>> cut this introductory paragraph, however.)
>>>>>=20
>>>>>=20
>>>>> Please refer to
>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>=20
>>>>>=20
>>>>> The document, along with other ballot positions, can be found =
here:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>>>>>=20
>>>>>=20
>>>>>=20
>>>>> =
--------------------------------------------------------------------
>>>>> --
>>>>> DISCUSS:
>>>>> =
--------------------------------------------------------------------
>>>>> --
>>>>>=20
>>>>> This is generally a fine document, but after checking RFC 7950
>>>>> syntax for strings I question why you think you need non ASCII =
tags.
>>>>> There are so many problems that can arise from that. For example,
>>>>> how would IANA be able to enforce uniqueness of Unicode tags =
written
>>>>> in different Unicode canonicalisation forms?
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>=20
>>>>=20
>>>>=20
>>=20
>=20


From nobody Fri Feb 14 03:21:32 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 141D51200D8; Fri, 14 Feb 2020 03:21:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uZ1vmj9eD-sv; Fri, 14 Feb 2020 03:21:25 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 98165120639; Fri, 14 Feb 2020 03:21:25 -0800 (PST)
Received: from stubbs.int.chopps.org (66-227-211-29.dhcp.trcy.mi.charter.com [66.227.211.29]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id C8CA660B7B; Fri, 14 Feb 2020 11:21:24 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org>
Date: Fri, 14 Feb 2020 06:21:24 -0500
Cc: Christian Hopps <chopps@chopps.org>, Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/4lqbq3j4h5ljmTQBsSD9yZCfr6I>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 11:21:28 -0000

How about I add this to the description of "typedef tag" in the module:

       description
         "A tag is a type 'string' value that does not include carriage
          return, newline or tab characters. It SHOULD begin with a
          registered prefix; however, tags without a registered prefix
-         SHOULD NOT be treated as invalid.";
+         SHOULD NOT be treated as invalid. For the purposes of =
comparison
+         non-ascii strings should use 'NFC' (RFC5198) normalization";
     }

Thanks,
Chris.

> On Feb 14, 2020, at 6:06 AM, Christian Hopps <chopps@chopps.org> =
wrote:
>=20
> For the record this one is 3 years and counting. For a list of tags.
>=20
>> On Feb 14, 2020, at 6:01 AM, Christian Hopps <chopps@chopps.org> =
wrote:
>>=20
>> I was not approaching this discuss with this level of change in mind. =
How many years does it take to get a YANG model even one as simple as =
this completed?
>>=20
>> Thanks,
>> Chris.
>>=20
>>> On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) =
<rwilton@cisco.com> wrote:
>>>=20
>>> Hi Alexey, Christian,=20
>>>=20
>>> Allowing Unicode but requiring normalization as per RFC 5198 for =
IANA managed tags makes sense to me.
>>>=20
>>> But does the server also need to normalize any configured tags?  =
I.e. should the description for the tag typedef also specify that tags =
SHOULD be normalized, and specify a normalization method that SHOULD be =
used?  Or is the onus on the client to use sensible (i.e. already =
normalized) values, and if so, does that need to be stated?
>>>=20
>>> Thanks,
>>> Rob
>>>=20
>>>=20
>>>> -----Original Message-----
>>>> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
>>>> Sent: 13 February 2020 13:10
>>>> To: Christian Hopps <chopps@chopps.org>
>>>> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The =
IESG
>>>> <iesg@ietf.org>; netmod@ietf.org; =
draft-ietf-netmod-module-tags@ietf.org
>>>> Subject: Re: Alexey Melnikov's Discuss on =
draft-ietf-netmod-module-tags-
>>>> 07: (with DISCUSS)
>>>>=20
>>>> Hi Christian,
>>>>=20
>>>> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
>>>>> The intent in the document is to place as few restrictions on tags =
as
>>>>> possible to allow for future-proofing and organic growth of use =
both
>>>>> within and outside of SDOs. For standard tags we trust IANA (and =
the
>>>>> human behind the process) to make the call on whether a tag is =
already
>>>>> present. :)
>>>>=20
>>>> And the problem with that is that because there might be multiple =
ways to
>>>> encode in Unicode visually indistinguishable tags IANA would end up =
asking
>>>> IESG for help.
>>>>=20
>>>> So you need to at minimum specify a Unicode normalization form to =
use. I
>>>> suggest you normatively reference RFC 5198 here.
>>>>=20
>>>>> Having worked for a company where a lot of XML string data was
>>>>> non-ascii I find limiting to ascii to be rather restrictive.
>>>>=20
>>>> Best Regards,
>>>> Alexey
>>>>=20
>>>>>=20
>>>>> Thanks,
>>>>> Chris.
>>>>>=20
>>>>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
>>>> <noreply@ietf.org> wrote:
>>>>>>=20
>>>>>> Alexey Melnikov has entered the following ballot position for
>>>>>> draft-ietf-netmod-module-tags-07: Discuss
>>>>>>=20
>>>>>> When responding, please keep the subject line intact and reply to
>>>>>> all email addresses included in the To and CC lines. (Feel free =
to
>>>>>> cut this introductory paragraph, however.)
>>>>>>=20
>>>>>>=20
>>>>>> Please refer to
>>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>>=20
>>>>>>=20
>>>>>> The document, along with other ballot positions, can be found =
here:
>>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> =
--------------------------------------------------------------------
>>>>>> --
>>>>>> DISCUSS:
>>>>>> =
--------------------------------------------------------------------
>>>>>> --
>>>>>>=20
>>>>>> This is generally a fine document, but after checking RFC 7950
>>>>>> syntax for strings I question why you think you need non ASCII =
tags.
>>>>>> There are so many problems that can arise from that. For example,
>>>>>> how would IANA be able to enforce uniqueness of Unicode tags =
written
>>>>>> in different Unicode canonicalisation forms?
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>=20
>>>>>=20
>>>=20
>>=20
>=20


From nobody Fri Feb 14 03:48:35 2020
Return-Path: <ietfc@btconnect.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F231B120828 for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 03:48:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XFs0xi9XAPTi for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 03:48:31 -0800 (PST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10121.outbound.protection.outlook.com [40.107.1.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C4D5120826 for <netmod@ietf.org>; Fri, 14 Feb 2020 03:48:30 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bNewq/51CZ/svR6tf1HHJsx7PE30TWL/In7IzU/nSW7RcZm/C044GtVVEZ5bjfA+vQv/oxfenrxClqsQyPHOEhrfasiPV1NVTmQw6J0MkK6od05P1ZACufqjiFGc75ADS5PtOMNAxXWr8vKw7Tv5x3HO51PyewqCIxUlKn9J35mNfoTasc1O9ipTlFI66tdDIHRsCJVnbj/h01IPhi/Zy9JFJ80FND3Y8jViLgBGrr6zJJbrfwmYTEaWl45FL022dKm4Cx9RMiH/i/Z+duEQDJ6FbJniajTaaBD4CItTaHQFmciA+1OiXJScIzs8VOc1fmBxjILGTQeAmAW0u+w4wg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MrJ5GW5D6Wt+Ky/N0bquAy+YFTlhhwsevQ4nSLQnCHE=; b=kHFgJIi8wiPODwS9UY8XFvaXnUKsrIIdnflPZMZJH8QXZOFYASccONcUWn1vTip7b0amXnz1j8GK+oUkeRvdzmj4oakMd8Kok3iHUTHwGrlHUn+re/XyLswTcIjr1y6VMR8znbPPlSt8P2+ntl0uUwptEWC/w6x97MKQf++6wmEo/mMlYXxpqdzX8lY5QI5c4HVvdMJKHojj9X6yYmJBpH1ugk662WumA0F53aTvpNDhnxy6HBZej6qKx7DfL3qSkArAWVj4BBr8c/fn5sLhDKfZZaE7PZ8/Wz5xYhWHrZBcbi3yuPbMpnc1MrVxrBb2e3eAyKapSJcRX0S9vQt1ow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MrJ5GW5D6Wt+Ky/N0bquAy+YFTlhhwsevQ4nSLQnCHE=; b=hjkw4ogbe3K/PyJljyeqXDIMfNstvkdOID2O4GqhWbAH2wcB+E1ULvR+hdOD91vFTOoGOhgCivLhhpxFQGh1Uvka6d95DD5CbR+4676k0gXUiorLYqBeUZ8iMq56Vvm1+NxeQcuvl2JN8foMf/JZ2n37vQQKwo4zbTqKrXl1AhA=
Received: from DB7PR07MB5657.eurprd07.prod.outlook.com (20.178.85.222) by DB7PR07MB5878.eurprd07.prod.outlook.com (20.177.193.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.6; Fri, 14 Feb 2020 11:48:28 +0000
Received: from DB7PR07MB5657.eurprd07.prod.outlook.com ([fe80::450e:a4e2:e88e:dbcb]) by DB7PR07MB5657.eurprd07.prod.outlook.com ([fe80::450e:a4e2:e88e:dbcb%6]) with mapi id 15.20.2729.025; Fri, 14 Feb 2020 11:48:28 +0000
From: tom petch <ietfc@btconnect.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Implicit case statementa
Thread-Index: AQHV4ny3XCoYjRDKO020fs6RcjJz/qgaeh8AgAAYKvM=
Date: Fri, 14 Feb 2020 11:48:28 +0000
Message-ID: <DB7PR07MB5657DBD01CC9E421E8CB3C56A0150@DB7PR07MB5657.eurprd07.prod.outlook.com>
References: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@email.amazonses.com>, <MN2PR11MB4366EB460639F018FAE197C7B5150@MN2PR11MB4366.namprd11.prod.outlook.com>
In-Reply-To: <MN2PR11MB4366EB460639F018FAE197C7B5150@MN2PR11MB4366.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-originating-ip: [81.131.229.19]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 849a6299-a603-4762-d303-08d7b143ce7a
x-ms-traffictypediagnostic: DB7PR07MB5878:
x-microsoft-antispam-prvs: <DB7PR07MB5878338F4C6C8BA9B04321D1A0150@DB7PR07MB5878.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(396003)(366004)(136003)(39860400002)(376002)(189003)(199004)(71200400001)(33656002)(186003)(81156014)(81166006)(91956017)(5660300002)(52536014)(86362001)(26005)(7696005)(2906002)(966005)(55016002)(9686003)(66476007)(8936002)(66556008)(316002)(76116006)(110136005)(53546011)(6506007)(66946007)(64756008)(66446008)(478600001)(8676002); DIR:OUT; SFP:1102; SCL:1; SRVR:DB7PR07MB5878; H:DB7PR07MB5657.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 4HcAkExPzaDJJd0RbeRAb1Do0DteuDhSUotFwnVgjIO0SNx1fAHVPJtKuuPTm/us85l+5Y7A9DxaDcv/s+joOvIMez8FUUgHQK1WSFmEnewTSFNCbXzVDScnN+axPfaUEFmzW6I8X6s4MpuJ7+kp2A==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 849a6299-a603-4762-d303-08d7b143ce7a
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 11:48:28.0745 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: C8ix9NNDNJyAXZFq7yseHGiLrt5qXIm4EWz94S03rEXS5fqqAdlnKP/E+1ZaBOefPi9fTrXo3KlkTdMOIc/zMw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB5878
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/hSdJdOIr7-SnvXvGeFQf6h2D8Yk>
Subject: Re: [netmod] Implicit case statementa
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 11:48:34 -0000

_____________________________________=0A=
From: netmod <netmod-bounces@ietf.org> on behalf of Rob Wilton (rwilton) <r=
wilton@cisco.com>=0A=
Sent: 14 February 2020 10:14=0A=
To: Kent Watsen; netmod@ietf.org=0A=
My interpretation matches the one that Martin gives in https://github.com/m=
bj4668/pyang/issues/559=0A=
=0A=
<tp>=0A=
=0A=
I was looking at =0A=
draft-boydseda- ipfix-psamp-bulk-data-yang-model=0A=
and see nine choice statements of which six have no case, two have a single=
 case and one has multiple case.  The single case have a note to the effect=
 that they may be augmented, the others have no note.  The no case do have =
multiple container or leaf statements.  It does make me curious.=0A=
=0A=
Tom Petch=0A=
=0A=
=0A=
I.e. the short hand notation =85=0A=
=0A=
    choice test {=0A=
      container foo {=0A=
        if-feature disabled-feature;=0A=
          ...=0A=
      }=0A=
    }=0A=
=0A=
is equivalent to:=0A=
=0A=
    choice test {=0A=
      case foo {=0A=
        container foo {=0A=
          if-feature disabled-feature;=0A=
            ...=0A=
        }=0A=
      }=0A=
    }=0A=
=0A=
Filing an issue in YANG.Next to clarify, or further discuss, this seems hel=
pful to me.=0A=
=0A=
Thanks,=0A=
Rob=0A=
=0A=
=0A=
From: netmod <netmod-bounces@ietf.org> On Behalf Of Kent Watsen=0A=
Sent: 13 February 2020 14:49=0A=
To: netmod@ietf.org=0A=
Subject: [netmod] Implicit case statementa=0A=
=0A=
=0A=
RFC 7950 says:=0A=
=0A=
   As a shorthand, the "case" statement can be omitted if the branch=0A=
=0A=
   contains a single "anydata", "anyxml", "choice", "container", "leaf",=0A=
=0A=
   "list", or "leaf-list" statement.  In this case, the case node still=0A=
=0A=
   exists in the schema tree, and its identifier is the same as the=0A=
=0A=
   identifier of the child node.=0A=
=0A=
This seems clear, albeit incomplete, as inconsistencies [1] exist amongst `=
pyang`and `yanglint` (I did not test with `yangson`) in how the =93if-featu=
re=94 statement is handled, though I imagine other statements (e.g., =93whe=
n=94) may also fall into this discussion as well.=0A=
=0A=
Ultimately, the question is what Errata and/or YANG-next issue should be fi=
led.   I=92m okay either way, so long as it=92s clear and can be implemente=
d consistently across tooling.=0A=
=0A=
In the meanwhile, I recommend module designers avoid using the shorthand no=
tation, as there are no known issues with the =93longhand=94 notation.=0A=
=0A=
[1] https://github.com/mbj4668/pyang/issues/559=0A=
=0A=
Kent // contributor=0A=
=0A=


From nobody Fri Feb 14 04:35:16 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F8191200DE; Fri, 14 Feb 2020 04:35:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=WqGIuStJ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=bGZYKw4j
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JYo56N48gq9E; Fri, 14 Feb 2020 04:35:08 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D46C120043; Fri, 14 Feb 2020 04:35:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5407; q=dns/txt; s=iport; t=1581683708; x=1582893308; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=uns2mieqftMFmOOr4pukjRclVZ24Y1xntY/NzrEr5ZA=; b=WqGIuStJQ79cpJtbE1o8UL3pKx2y7JoF0Mn8FvmE98b6u4fR/xTBjQ/V CG1NtftHk/Fu/r2NyiJlb5iTkoT6dbh5640F4BbbRGvmaZEW+wWoPciP1 ZLx0HcPrk0iurSeRxPo6ePs8h6zv8AEOrTIdOpSsCast86Uktdm9Z2m1V I=;
IronPort-PHdr: =?us-ascii?q?9a23=3AonoJKB8GmZW8Ef9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CuBQBYk0Ze/4YNJK1mHAEBAQEBBwE?= =?us-ascii?q?BEQEEBAEBgXuBVFAFbFggBAsqCodQA4p3gl+JYo4vgUKBEANUCQEBAQwBASM?= =?us-ascii?q?KAgQBAYRAAoIBJDgTAgMNAQEFAQEBAgEFBG2FNwyFZgEBAQEDEigGAQElEgE?= =?us-ascii?q?LBAIBCA4DBAEBAR4QIREdCAIEDgUIGoMFgkoDLgECAQuiPgKBOYhigieCfwE?= =?us-ascii?q?BBYFDQYMeDQuCDAMGgTiMJBqBQT+BEUeBTn4+ghtJAgECAYEsARIBCRowgxC?= =?us-ascii?q?CLI1LHYI6nmYyRAqCOodNilQEgWKCZoJJiBSQO5dWgiqQFgIEAgQFAg4BAQW?= =?us-ascii?q?BaSJnWBEIcBU7gmxQGA2OHTiDO4UUhT90AoEnjH2BIgGBDwEB?=
X-IronPort-AV: E=Sophos;i="5.70,440,1574121600"; d="scan'208";a="439879214"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2020 12:35:06 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 01ECZ5ln019801 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 14 Feb 2020 12:35:06 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 06:35:04 -0600
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 14 Feb 2020 07:35:04 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 14 Feb 2020 07:35:04 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=III03AeS1f2JsnirWqHhAjuVt98BEHKUHhXxiLfnqT3lBUkjEnCOBUImEKjTwL6uFZaXDFqKYVPAwFFh9h7kP98bqErdwZl+LNuPmEs9+GU/hH0oLUc2HuuB3aZ7EbQFxnkdxLtliANVpNatw/puuw2kN9lrkDW31Efd7ljxKjgSZYDQSG1m+hd7U4WvcSqz6fmjbBCXHg+7xeGreXEgg1Zg5dhiLYRJdvUOGz5OQchozxumQ5oHR/8mZI6Hy9JuJ7ymt3l7CVpj15H3ylQujH6EX4SPFBO6g7B0IJo360kGxmwx3+r2crWLTLLRBjBVmKxV9boFcEW/87xEYpREMQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vLzT270NSDwOHfMYHs7lzNnN10adfxZZFZkL7mCRml4=; b=QR3zG2Bi+eV0knBS+uHrsQgwamT72wuTtzA8CLgrkpck9cEHBUOBZZ6AWE+dGkrkGRCVzQhrRHhsax/gtOfoxrG439uGgWwdg1BEdZsbl3KlsP0SFsWyhelhZGaPnM97vSlOUD7R2NVpsxuq+EZEPaSKqNsjenkIRR2kPh5bn04F9Sll/+DdQxtMUzFbjDj3sV9GhcEIxsmBC0l1pIzDX2cTuGxfiViXMak+04sHi4ab+YYSQIhzRCTxDOxM3Dk6Xk01h7GEfi3GOoyygzzwqewFrcvSFYRfsYiwfpbQfbCMkyjJSRmHJ7KlG2F/kxWX9FrbheyHfnyHN7fivEUI/g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vLzT270NSDwOHfMYHs7lzNnN10adfxZZFZkL7mCRml4=; b=bGZYKw4jRgdxaai6L5SLoR2TeP7owp6lCisRw4HY5bA2Vl1gt0sq5Ns+hMeGb9ewdM4cpAH3imvGqPL/PGbqsYqy3WBBOgrYXXc+SdTDEut3z7xw3FYc44eyAO8KW9qSxFt9Th7TP0yM+cJVNyiI7g7w0VuIsAkmG3g1WQbsa0c=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB3598.namprd11.prod.outlook.com (20.178.252.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Fri, 14 Feb 2020 12:35:03 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2707.031; Fri, 14 Feb 2020 12:35:03 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Christian Hopps <chopps@chopps.org>
CC: Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>
Thread-Topic: Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gaftpggAAIeQCAAAFigIAABDQAgAATlSA=
Date: Fri, 14 Feb 2020 12:35:02 +0000
Message-ID: <MN2PR11MB4366EB74886415CD1097BC85B5150@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org>
In-Reply-To: <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [82.15.79.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ad4e3ff5-a74f-42b8-ed75-08d7b14a5076
x-ms-traffictypediagnostic: MN2PR11MB3598:
x-microsoft-antispam-prvs: <MN2PR11MB3598ED190B46AD229F3CC7EEB5150@MN2PR11MB3598.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(366004)(39860400002)(376002)(136003)(346002)(199004)(189003)(5660300002)(52536014)(8676002)(86362001)(81156014)(81166006)(8936002)(2906002)(66556008)(66446008)(64756008)(66476007)(66946007)(55016002)(478600001)(966005)(7696005)(33656002)(26005)(9686003)(6916009)(76116006)(186003)(54906003)(316002)(53546011)(6506007)(4326008)(71200400001); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3598; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 3D/Lzx0PPR4KXt4k2b+wUJZla8EJ7Zs+djHpBRFQIplWXX6ErrMd07OZibx2iOUeOUpXYxFaHe2fePPNGJqgiX3wF6szqJvZgT7lwCTQqnU+MzqWGlgyuyW6JePXqed2G9UvJiK07/6srBGVH2izXg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ad4e3ff5-a74f-42b8-ed75-08d7b14a5076
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 12:35:03.0362 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1zcXI6vU380pQCufYUOKT4f5hL3VuiVzluAjcyPZmgJJUQ73KeMchc9PIlk1NGjjdQUHzqIKwD/8N9lzb03rQg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3598
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Wy6CZwBb_5MJIuYXXgfzXHh9FIw>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 12:35:10 -0000

Hi Chris,

I think that would be okay, although perhaps using SHOULD rather than "shou=
ld" might be better, given that SHOULD NOT is used elsewhere in the descrip=
tion.

Thanks,
Rob


> -----Original Message-----
> From: Christian Hopps <chopps@chopps.org>
> Sent: 14 February 2020 11:21
> To: Rob Wilton (rwilton) <rwilton@cisco.com>
> Cc: Christian Hopps <chopps@chopps.org>; Alexey Melnikov
> <aamelnikov@fastmail.fm>; netmod-chairs@ietf.org; Joel Jaeggli
> <joelja@gmail.com>; The IESG <iesg@ietf.org>; netmod@ietf.org; draft-ietf=
-
> netmod-module-tags@ietf.org
> Subject: Re: Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-
> 07: (with DISCUSS)
>=20
> How about I add this to the description of "typedef tag" in the module:
>=20
>        description
>          "A tag is a type 'string' value that does not include carriage
>           return, newline or tab characters. It SHOULD begin with a
>           registered prefix; however, tags without a registered prefix
> -         SHOULD NOT be treated as invalid.";
> +         SHOULD NOT be treated as invalid. For the purposes of compariso=
n
> +         non-ascii strings should use 'NFC' (RFC5198) normalization";
>      }
>=20
> Thanks,
> Chris.
>=20
> > On Feb 14, 2020, at 6:06 AM, Christian Hopps <chopps@chopps.org> wrote:
> >
> > For the record this one is 3 years and counting. For a list of tags.
> >
> >> On Feb 14, 2020, at 6:01 AM, Christian Hopps <chopps@chopps.org> wrote=
:
> >>
> >> I was not approaching this discuss with this level of change in mind.
> How many years does it take to get a YANG model even one as simple as thi=
s
> completed?
> >>
> >> Thanks,
> >> Chris.
> >>
> >>> On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) <rwilton@cisco.com>
> wrote:
> >>>
> >>> Hi Alexey, Christian,
> >>>
> >>> Allowing Unicode but requiring normalization as per RFC 5198 for IANA
> managed tags makes sense to me.
> >>>
> >>> But does the server also need to normalize any configured tags?  I.e.
> should the description for the tag typedef also specify that tags SHOULD
> be normalized, and specify a normalization method that SHOULD be used?  O=
r
> is the onus on the client to use sensible (i.e. already normalized)
> values, and if so, does that need to be stated?
> >>>
> >>> Thanks,
> >>> Rob
> >>>
> >>>
> >>>> -----Original Message-----
> >>>> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
> >>>> Sent: 13 February 2020 13:10
> >>>> To: Christian Hopps <chopps@chopps.org>
> >>>> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The
> >>>> IESG <iesg@ietf.org>; netmod@ietf.org;
> >>>> draft-ietf-netmod-module-tags@ietf.org
> >>>> Subject: Re: Alexey Melnikov's Discuss on
> >>>> draft-ietf-netmod-module-tags-
> >>>> 07: (with DISCUSS)
> >>>>
> >>>> Hi Christian,
> >>>>
> >>>> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> >>>>> The intent in the document is to place as few restrictions on tags
> >>>>> as possible to allow for future-proofing and organic growth of use
> >>>>> both within and outside of SDOs. For standard tags we trust IANA
> >>>>> (and the human behind the process) to make the call on whether a
> >>>>> tag is already present. :)
> >>>>
> >>>> And the problem with that is that because there might be multiple
> >>>> ways to encode in Unicode visually indistinguishable tags IANA
> >>>> would end up asking IESG for help.
> >>>>
> >>>> So you need to at minimum specify a Unicode normalization form to
> >>>> use. I suggest you normatively reference RFC 5198 here.
> >>>>
> >>>>> Having worked for a company where a lot of XML string data was
> >>>>> non-ascii I find limiting to ascii to be rather restrictive.
> >>>>
> >>>> Best Regards,
> >>>> Alexey
> >>>>
> >>>>>
> >>>>> Thanks,
> >>>>> Chris.
> >>>>>
> >>>>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> >>>> <noreply@ietf.org> wrote:
> >>>>>>
> >>>>>> Alexey Melnikov has entered the following ballot position for
> >>>>>> draft-ietf-netmod-module-tags-07: Discuss
> >>>>>>
> >>>>>> When responding, please keep the subject line intact and reply to
> >>>>>> all email addresses included in the To and CC lines. (Feel free
> >>>>>> to cut this introductory paragraph, however.)
> >>>>>>
> >>>>>>
> >>>>>> Please refer to
> >>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
> >>>>>> for more information about IESG DISCUSS and COMMENT positions.
> >>>>>>
> >>>>>>
> >>>>>> The document, along with other ballot positions, can be found here=
:
> >>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> -----------------------------------------------------------------
> >>>>>> ---
> >>>>>> --
> >>>>>> DISCUSS:
> >>>>>> -----------------------------------------------------------------
> >>>>>> ---
> >>>>>> --
> >>>>>>
> >>>>>> This is generally a fine document, but after checking RFC 7950
> >>>>>> syntax for strings I question why you think you need non ASCII
> tags.
> >>>>>> There are so many problems that can arise from that. For example,
> >>>>>> how would IANA be able to enforce uniqueness of Unicode tags
> >>>>>> written in different Unicode canonicalisation forms?
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>
> >>>>>
> >>>
> >>
> >


From nobody Fri Feb 14 06:30:40 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3F20120041; Fri, 14 Feb 2020 06:30:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.437
X-Spam-Level: *
X-Spam-Status: No, score=1.437 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tb--Gb52ttWk; Fri, 14 Feb 2020 06:30:35 -0800 (PST)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-am5eur02on062a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe07::62a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95314120074; Fri, 14 Feb 2020 06:30:34 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k1cM/W0YuXMbxblMk0zybvPP8e/gqCLynQ9X+o16VHC9+EmibyfHTYpw6Xteg5iqFioWFeK0Hd2/0XVl+NaiMsQcYpq1HinF2GVRPoCTYb/KmGzSGkpn6sUO63eZNXSyJDiJWDjh6XOHWnuKDrMJyTHvLSMju7mENigPwNdT44Scv2yNaai0Zuutd/lh8el+qjHo0HRq77zk/LURgs/7l5kY8CYVCDuzaJY0VARXVJpwcDQECiFLFFl1JfIRf4cPGzvHkjsxUBVMWSnSTYwX2hjt+Z6fkAupK2ap2GA5j3nFUtd0jB6zHGxACZvRtdclby4rXBPMYB7R+WfeRuRX5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C37rDyQP/CKFJJ0UfbaCR9QvGsd4PsSzw0se9iym6A8=; b=JYWyQjl1ZDkAkMfxrDLfeTNWbfFl7nPGQXDZVobv4bJl7SFNpHo1dVuPQBDKejAZF3+2G3/6sndR6X5gzLq1rKw+S4CDyWfRrssXQ2PF5fYwmkX6jTj2cobrE73VBhI4xqkLvnEEaw6lAPaFhg8f1cGhwzBX7g/vpF7QG9dxZjbZOfNJchkcvo7o3NDnMbnriMBu7DXqvp0LhTW7mJTue/hAo6D/7O2qphoQTVuUkJTBxuiDRdvUeND79K5GBBKFwJsti9+Sc+ofUR1vtrwVYyTzrNsNYwk/s7ff6FhSchQVVZ4LAUz1kFw+cJ+B+I9JJ3t5kZhsszianKxbFxDZyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C37rDyQP/CKFJJ0UfbaCR9QvGsd4PsSzw0se9iym6A8=; b=HH71H+jqSnbuHe1nWavH/KwKjtlP5EciOkjY8OTxH4X+9iVFITEfo/zeUNtZ3N9vJ49Ifie7+7w04bmf7sZhY1cDzenaLnGV74KGTFTup3zWNvLOgNfr0NuVQmTaZ656ywUvk+7Ju0/POLFeTCdtzVEpfP0QszOFaDV2XtiFcqw=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0296.EURP190.PROD.OUTLOOK.COM (10.165.162.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.27; Fri, 14 Feb 2020 14:30:31 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.025; Fri, 14 Feb 2020 14:30:31 +0000
Received: from localhost (212.201.44.247) by AM0PR05CA0075.eurprd05.prod.outlook.com (2603:10a6:208:136::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22 via Frontend Transport; Fri, 14 Feb 2020 14:30:31 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
CC: Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4pzaaJjh2ww68Uallfbdbai0wKgafm0AgABC9gA=
Date: Fri, 14 Feb 2020 14:30:31 +0000
Message-ID: <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de> <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
In-Reply-To: <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM0PR05CA0075.eurprd05.prod.outlook.com (2603:10a6:208:136::15) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e1e191ff-72fd-4233-4dba-08d7b15a7218
x-ms-traffictypediagnostic: DB6P190MB0296:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB029660CC99139D682C8B1030DE150@DB6P190MB0296.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(39850400004)(376002)(396003)(366004)(136003)(199004)(189003)(956004)(1076003)(16526019)(66574012)(4326008)(8936002)(186003)(786003)(316002)(26005)(53546011)(52116002)(54906003)(66476007)(66446008)(64756008)(6916009)(66946007)(3450700001)(66556008)(81156014)(2906002)(81166006)(6486002)(86362001)(966005)(71200400001)(478600001)(5660300002)(8676002)(6496006); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0296; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: jvWWVoamZV/EYIBPLYu3bOfLltSTXzUS5MKx5K/C8bQroOQbphOPDgKIjDeASkQX9WhVWHuelvM9ELlv2DLHQqL3sc7Hozsci+KrdIRJXpYmTdLzSQF4k1MGnUpR+lnYrf37HKSXpp7tkYqdV/ZrwQ==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <8E3F82402B0E38418EF1BF316EB18847@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: e1e191ff-72fd-4233-4dba-08d7b15a7218
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 14:30:31.8041 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wb1bVUDXfsg8smY9p/8uvjPgr8hHSmvXaCP/jbqsG1zQqoLLIt7SyIGcG5NKG3lr9f43G6GfoFTNDVQkvL+FnvpCndhXDJklvKjA8AM6qeI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0296
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/bWleSQewZt4g7-a98QZRW64AcqE>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 14:30:38 -0000

Rob,

I think there are two related issues here:

a) If we need normalized strings (to avoid comparison suprises), we
   should have a common type for them; rfc6991-bis would be a proper
   home. I am _not_ saying we should delay the tags document for this,
   but we should think about providing a solution that can be easily
   reused. Right now, we often use strings as part of keys, which can
   lead to comparison issues.

b) It seems that normalized strings only solve part of the problem. If
   an organization creates names for 'things', the organization likely
   wants to further restrict the format of these names to something
   sensible to avoid fun with different kinds of hyphens or emojis or
   ... So while creative unicode characters may technically work,
   there will likely be good reasons to avoid some of them. (There are
   reasons why we have coding styles for most programming languages.)
   These rules may, however, differ between organizations.

We should not confuse a) and b). If IANA needs additional guidelines
for tags (their coding style for tags), then we should provide these
guidelines, i.e., this is a type b) action. The type a) action is
needed to technically ensure that comparisons do not lead to
surprises. But a) won't be an answer for all type b) issues. Of
course, we could give IANA a 'coding style' that avoids any
normalization issues. This would make IANA assigned tags safe but
would not avoid comparison surprises for other sources of tags.

/js

On Fri, Feb 14, 2020 at 10:30:50AM +0000, Rob Wilton (rwilton) wrote:
> Hi Juergen,
>=20
> This sounds potentially useful to me, although should this be for general=
 unicode strings (e.g. ones that might include spaces), or just identifiers=
 (without any spaces)?.  Is this something that could/should go into rfc699=
1-bis, or at least be discussed in that context?
>=20
> I would have thought that normalization would be required wherever a conf=
igurable unicode string is used as a list key, or leaf-list.
>=20
> Thanks,
> Rob
>=20
>=20
> > -----Original Message-----
> > From: iesg <iesg-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, J=FCrg=
en
> > Sent: 13 February 2020 18:39
> > To: Alexey Melnikov <aamelnikov@fastmail.fm>
> > Cc: netmod-chairs@ietf.org; draft-ietf-netmod-module-tags@ietf.org;
> > netmod@ietf.org; Joel Jaeggli <joelja@gmail.com>; Christian Hopps
> > <chopps@chopps.org>; The IESG <iesg@ietf.org>
> > Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> > module-tags-07: (with DISCUSS)
> >=20
> > And a longer term solution might be to define a YANG Net-Unicode string
> > datatype that can be used in all situations where non-normalized string=
s
> > may cause problems. The problem (if one agrees it is one) is likely muc=
h
> > bigger than just YANG tags, there likely are many uses of YANG strings
> > where normalization would be desirable.
> >=20
> > /js
> >=20
> > On Thu, Feb 13, 2020 at 01:10:02PM +0000, Alexey Melnikov wrote:
> > > Hi Christian,
> > >
> > > On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> > > > The intent in the document is to place as few restrictions on tags
> > > > as possible to allow for future-proofing and organic growth of use
> > > > both within and outside of SDOs. For standard tags we trust IANA
> > > > (and the human behind the process) to make the call on whether a ta=
g
> > > > is already present. :)
> > >
> > > And the problem with that is that because there might be multiple way=
s
> > to encode in Unicode visually indistinguishable tags IANA would end up
> > asking IESG for help.
> > >
> > > So you need to at minimum specify a Unicode normalization form to use=
. I
> > suggest you normatively reference RFC 5198 here.
> > >
> > > > Having worked for a company where a lot of XML string data was
> > > > non-ascii I find limiting to ascii to be rather restrictive.
> > >
> > > Best Regards,
> > > Alexey
> > >
> > > >
> > > > Thanks,
> > > > Chris.
> > > >
> > > > > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> > <noreply@ietf.org> wrote:
> > > > >
> > > > > Alexey Melnikov has entered the following ballot position for
> > > > > draft-ietf-netmod-module-tags-07: Discuss
> > > > >
> > > > > When responding, please keep the subject line intact and reply to
> > > > > all email addresses included in the To and CC lines. (Feel free t=
o
> > > > > cut this introductory paragraph, however.)
> > > > >
> > > > >
> > > > > Please refer to
> > > > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > > > > for more information about IESG DISCUSS and COMMENT positions.
> > > > >
> > > > >
> > > > > The document, along with other ballot positions, can be found her=
e:
> > > > > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> > > > >
> > > > >
> > > > >
> > > > > -----------------------------------------------------------------=
-
> > > > > ----
> > > > > DISCUSS:
> > > > > -----------------------------------------------------------------=
-
> > > > > ----
> > > > >
> > > > > This is generally a fine document, but after checking RFC 7950
> > > > > syntax for strings I question why you think you need non ASCII
> > > > > tags. There are so many problems that can arise from that. For
> > > > > example, how would IANA be able to enforce uniqueness of Unicode
> > > > > tags written in different Unicode canonicalisation forms?
> > > > >
> > > > >
> > > > >
> > > > >
> > > >
> > > >
> > >
> > > _______________________________________________
> > > netmod mailing list
> > > netmod@ietf.org
> > > https://www.ietf.org/mailman/listinfo/netmod
> >=20
> > --
> > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> > Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>=20

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Fri Feb 14 08:01:07 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 86193120877; Fri, 14 Feb 2020 08:00:58 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158169605847.16123.13242157500712320238@ietfa.amsl.com>
Date: Fri, 14 Feb 2020 08:00:58 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9E7hkrVlgUBa_f3Z2AuLefqJtMw>
Subject: [netmod] I-D Action: draft-ietf-netmod-yang-instance-file-format-07.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 16:01:03 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : YANG Instance Data File Format
        Authors         : Balazs Lengyel
                          Benoit Claise
	Filename        : draft-ietf-netmod-yang-instance-file-format-07.txt
	Pages           : 26
	Date            : 2020-02-13

Abstract:
   There is a need to document data defined in YANG models when a live
   server is not available.  Data is often needed already at design or
   implementation time or needed by groups that do not have a live
   running server available.  This document specifies a standard file
   format for YANG instance data, which follows the syntax and semantics
   of existing YANG models, and annotates it with metadata.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-yang-instance-file-format/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-yang-instance-file-format-07
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-yang-instance-file-format-07

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-yang-instance-file-format-07


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri Feb 14 08:04:04 2020
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9A331200F9 for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 08:04:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QRBKTCVuXB9P for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 08:04:01 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2062.outbound.protection.outlook.com [40.107.20.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C73D1200E0 for <netmod@ietf.org>; Fri, 14 Feb 2020 08:04:00 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PF4g/pPgTXWBvFffu2PTK8nU47vNoHljd8V2WyDUeZhSeIdtY0smDa0EtzF53qDg7UAz9HaDRtElVy0Y9huoCGt9dYwXs2xX/V+uI90sf/fPxnHn47UFTbdLb4u0wrjEsA4kovASn/KU5jLgLqk8CVmeKN4/RxlqE6k1x732O2yrPJL+9rUmrGhIUSFKLuTSvduWZy/ogwm7JUjSDhvWWg0PHuDaOBJnEDmXxE6O7bG80kHaz37/bNWucbmsBHMpDjvxx2cFpD/OHa71f4/sZfaobb4cNnwfVQbEDjZxJB3z4xqcvLjfbypp+ZLeuk+xg+z2XLlW/19AR3yIZYUerQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZA3698P820ifdsrfHfD+xvxW+lu+zfhXScpg2U6Gc/s=; b=QrVTMJ+WrS75bSlWM24Kbi7zbpUM9dJM+f74oJxi63hc5Ju36+kDv2UbopAulobgOXwvjdd43+cte6YgUdS9XY/g0LJaFlK6DOBetYLQ4zZpELMf4E22f3RQH06wmvsrtoY7kI9JkIxVGnGhjlZ2JnI7+G1heyBG3psAJ66sH5BTc2W7RW8hDv/pZ2KEfyaxhV+xuD2cewHTEOQAATWBDTJe1yzYTy4fcVCnifG7DyBH+eEiYa9eWu1UGcBve4h+3UWSZySxJERiwQ9OUYGgKgWPkLd7cugRa6gCagAkuJQYNXfnTCoYuS1Jsl6qoBywyN1kpAQ9atkboGR7bP1Zkg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZA3698P820ifdsrfHfD+xvxW+lu+zfhXScpg2U6Gc/s=; b=qPXtTy4p/aYfWkX7FD07N3tSlyDJkreGdOpwR44xucHdBotqh4badPZ0cNCPuF2/wwibfIOApjVRN/bpvTBxmQY0SejvnSRubIkvBg/NpIt56CsfXTPjqyLRk9LEC1BmuW6nBaKJQagNALrc1/Q5QIIzrOe3esDnIMacHtVuvg4=
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com (52.134.97.155) by DB7PR07MB4809.eurprd07.prod.outlook.com (20.178.41.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.9; Fri, 14 Feb 2020 16:03:57 +0000
Received: from DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973]) by DB7PR07MB4011.eurprd07.prod.outlook.com ([fe80::b19e:4830:538a:d973%5]) with mapi id 15.20.2750.007; Fri, 14 Feb 2020 16:03:57 +0000
From: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06 to -07
Thread-Index: AdXjRaul/baoBR3OSym1n0wm+wChUg==
Date: Fri, 14 Feb 2020 16:03:57 +0000
Message-ID: <DB7PR07MB4011402E836C2FABCB3E7F42F0150@DB7PR07MB4011.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: df0375f4-778e-4110-035e-08d7b1677f74
x-ms-traffictypediagnostic: DB7PR07MB4809:
x-microsoft-antispam-prvs: <DB7PR07MB4809BE8780E8EED83BEFE408F0150@DB7PR07MB4809.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 03137AC81E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(396003)(39860400002)(366004)(346002)(136003)(199004)(189003)(66574012)(66946007)(64756008)(7696005)(66556008)(66476007)(66616009)(66446008)(76116006)(26005)(186003)(85182001)(110136005)(5660300002)(85202003)(478600001)(54906003)(53546011)(33656002)(86362001)(6506007)(8676002)(52536014)(55016002)(2906002)(966005)(316002)(81156014)(81166006)(9686003)(71200400001)(8936002)(4326008); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB4809; H:DB7PR07MB4011.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: OeJkNj+VpRCsRykMzm4HEjgEGzAezOyZMvHxB1tEuXkQeC9le9OHnbSEPumleYRe9HajTkvwaVSJLgWGSaNLA9pzspf4YjwZODUEJgxAe/QuoTD7FESJhfoOZd1WIHMSu01uHm43yOmAvmw3/bOi4Q==
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0839_01D5E358.BDCF3C00"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: df0375f4-778e-4110-035e-08d7b1677f74
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2020 16:03:57.2872 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: w1swkpoLL9EUWqhPKpA8W8RzFDMhYO4cG2pN3Dgamf9Mmz1UWRuTZucUfxLI0Fm54XeDaxD6IcCVSJonTuJi2HBnVp22GCxCYSh8/iFuta0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB4809
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/AY9GUhbEgqm7ifDnGExjKH-z9bQ>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06 to -07
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 16:04:04 -0000

------=_NextPart_000_0839_01D5E358.BDCF3C00
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Hello Chairs,
I replied to Juergen, and exchanged some additional mails with him. I =
updated the draft to draft-ietf-netmod-yang-instance-file-format-07. =
Please take it forward in the process.

https://protect2.fireeye.com/v1/url?k=3Ded368c2e-b1bcaefa-ed36ccb5-0cc47a=
d93e6a-1bf0817821133165&q=3D1&e=3Db8630aed-b037-42b0-a579-0e6e8067e0eb&u=3D=
https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-netmod-yang-instance-fil=
e-format-07
Regards Balazs

-----Original Message-----
From: netmod <netmod-bounces@ietf.org> On Behalf Of Kent Watsen
Sent: 2020. febru=C3=A1r 9., vas=C3=A1rnap 20:23
To: netmod@ietf.org
Subject: Re: [netmod] WG Last Call: =
draft-ietf-netmod-yang-instance-file-format-06

This message closes the WGLC.

Authors, please respond to Juergen=E2=80=99s message from Jan 20, =
ultimately posting an update to the draft.

Thanks,
Kent // as shepherd



> On Jan 7, 2020, at 7:41 AM, Kent Watsen <kent+ietf@watsen.net> wrote:
>=20
>=20
> This begins a two-week Working Group Last Call (WGLC) on =
draft-ietf-netmod-yang-instance-file-format-06.  The WGLC ends on Jan =
21.  Please send your comments to the working group mailing list.
>=20
> Positive comments, e.g., "I've reviewed this document and believe it =
is ready for publication", are welcome!  This is useful and important, =
even from authors.  Objections, concerns, and suggestions are also =
welcomed at this time.
>=20
> Thank you,
> NETMOD Chairs
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod

------=_NextPart_000_0839_01D5E358.BDCF3C00
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_0839_01D5E358.BDCF3C00--


From nobody Fri Feb 14 09:26:25 2020
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A248712092A for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 09:26:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.887
X-Spam-Level: 
X-Spam-Status: No, score=-1.887 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uxQrUjokj1jp for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 09:26:20 -0800 (PST)
Received: from mail-yb1-xb34.google.com (mail-yb1-xb34.google.com [IPv6:2607:f8b0:4864:20::b34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42BE2120937 for <netmod@ietf.org>; Fri, 14 Feb 2020 09:26:20 -0800 (PST)
Received: by mail-yb1-xb34.google.com with SMTP id u26so1551283ybd.3 for <netmod@ietf.org>; Fri, 14 Feb 2020 09:26:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=guBhE+/be0gUl/Ws2eK0k5KM/3ykAAuyDykXJX/X+AU=; b=BPZLDGqyRf6GvB4JMuiC340A0FRzBvBjTxaKv2Fz+VZJKO+FrTdphtbNlYTcO5O1p2 ufIpOz20rGJwTc0CApSaAKZgsBIU/jZlP0TvjXJB6StNYSOi/pp/Gect7K1qcbDBekNn x9QlszLLeTZx1oZErxTV5itqIvDlBaJD6+4NRNZ41mXnZw5xFPPJiAuksO0YeTSC9UCP 2dbnDMP1RrZMe9O8uoMrBiR2elk9r791jPf8pT9/9M50Pw7qhepvPoqXX/7QL2ikEpfz R2k8uxm39DOlyQPWNHi+Bulvajgow7sgd/MaH+tpwPuTpcTaddohIxMeIN0Vi14fqCL4 0ADA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=guBhE+/be0gUl/Ws2eK0k5KM/3ykAAuyDykXJX/X+AU=; b=ExYoCCNJd7z6n9t/pRnIiQuUz10mmjcm8FY+rPgahK2S+bqIRBZt8c87Z9j3amDwcD J89uePCKoAjroDp9m1Jus3q64nF0MlN0Q9RfU0zYFEj1VlfFJoEza4avQOT8AQmKSvsc Io7XYdb/sU2ZvQ0aCzEgh1x92Smc/tzdYzTFomsE2RtxDEdNeUuzMoikty36eWJ0bf2o crlGMpDq9/QeEXNbMq+O3Bx/h3kXjegLHe5gzLoWEdSZ5/xpwxVaoL5J7q9DuIe7+Q2T hjJETwVkdSbAdxomqZfBxjSfZ+BsF/HO9fSWoNFNbfgVi3f+nOO3qrd6msqcf5fHPl4k 1iGA==
X-Gm-Message-State: APjAAAXoX5D0OQxRAJRX1UhAn16WuPsxE6WAOjKgdtXKKnZqZXeIcCZ1 GG3xJ84QThZ0ia5rXTN5buyBRzf4PyQLeV5eCIUJ5Q==
X-Google-Smtp-Source: APXvYqwhav8CTritaV0a4+Wa0gVGWEWmKh8RCmOjf9Rzf6Wvkk7Vb5PAieuP0k/8qfavkhWsHsDgjleJt2YN3aCUnFA=
X-Received: by 2002:a5b:8c9:: with SMTP id w9mr3741154ybq.44.1581701179391; Fri, 14 Feb 2020 09:26:19 -0800 (PST)
MIME-Version: 1.0
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org>
In-Reply-To: <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 14 Feb 2020 09:26:08 -0800
Message-ID: <CABCOCHQ07V5vFvrE3HwLMuwmvk+WmC_ioiLhJATRv8irk7Q65A@mail.gmail.com>
To: Christian Hopps <chopps@chopps.org>
Cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>,  "draft-ietf-netmod-module-tags@ietf.org" <draft-ietf-netmod-module-tags@ietf.org>,  "netmod@ietf.org" <netmod@ietf.org>, Alexey Melnikov <aamelnikov@fastmail.fm>,  Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f05bda059e8c8020"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/xVwFMEtOirD4DMKb94cLJArc_7A>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 17:26:24 -0000

--000000000000f05bda059e8c8020
Content-Type: text/plain; charset="UTF-8"

On Fri, Feb 14, 2020 at 3:01 AM Christian Hopps <chopps@chopps.org> wrote:

> I was not approaching this discuss with this level of change in mind. How
> many years does it take to get a YANG model even one as simple as this
> completed?
>
>

I strongly agree.
Just because there are refinements to the YANG "string" data type that are
possible
does not mean the Module Tags RFC has to solve that problem, or wait until
it is solved.
Every YANG module using the "string" data type (all of them?) could have
the same problem.



> Thanks,
> Chris.
>

Andy


>
> > On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) <rwilton@cisco.com>
> wrote:
> >
> > Hi Alexey, Christian,
> >
> > Allowing Unicode but requiring normalization as per RFC 5198 for IANA
> managed tags makes sense to me.
> >
> > But does the server also need to normalize any configured tags?  I.e.
> should the description for the tag typedef also specify that tags SHOULD be
> normalized, and specify a normalization method that SHOULD be used?  Or is
> the onus on the client to use sensible (i.e. already normalized) values,
> and if so, does that need to be stated?
> >
> > Thanks,
> > Rob
> >
> >
> >> -----Original Message-----
> >> From: iesg <iesg-bounces@ietf.org> On Behalf Of Alexey Melnikov
> >> Sent: 13 February 2020 13:10
> >> To: Christian Hopps <chopps@chopps.org>
> >> Cc: netmod-chairs@ietf.org; Joel Jaeggli <joelja@gmail.com>; The IESG
> >> <iesg@ietf.org>; netmod@ietf.org;
> draft-ietf-netmod-module-tags@ietf.org
> >> Subject: Re: Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-
> >> 07: (with DISCUSS)
> >>
> >> Hi Christian,
> >>
> >> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> >>> The intent in the document is to place as few restrictions on tags as
> >>> possible to allow for future-proofing and organic growth of use both
> >>> within and outside of SDOs. For standard tags we trust IANA (and the
> >>> human behind the process) to make the call on whether a tag is already
> >>> present. :)
> >>
> >> And the problem with that is that because there might be multiple ways
> to
> >> encode in Unicode visually indistinguishable tags IANA would end up
> asking
> >> IESG for help.
> >>
> >> So you need to at minimum specify a Unicode normalization form to use. I
> >> suggest you normatively reference RFC 5198 here.
> >>
> >>> Having worked for a company where a lot of XML string data was
> >>> non-ascii I find limiting to ascii to be rather restrictive.
> >>
> >> Best Regards,
> >> Alexey
> >>
> >>>
> >>> Thanks,
> >>> Chris.
> >>>
> >>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> >> <noreply@ietf.org> wrote:
> >>>>
> >>>> Alexey Melnikov has entered the following ballot position for
> >>>> draft-ietf-netmod-module-tags-07: Discuss
> >>>>
> >>>> When responding, please keep the subject line intact and reply to
> >>>> all email addresses included in the To and CC lines. (Feel free to
> >>>> cut this introductory paragraph, however.)
> >>>>
> >>>>
> >>>> Please refer to
> >>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
> >>>> for more information about IESG DISCUSS and COMMENT positions.
> >>>>
> >>>>
> >>>> The document, along with other ballot positions, can be found here:
> >>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/
> >>>>
> >>>>
> >>>>
> >>>> --------------------------------------------------------------------
> >>>> --
> >>>> DISCUSS:
> >>>> --------------------------------------------------------------------
> >>>> --
> >>>>
> >>>> This is generally a fine document, but after checking RFC 7950
> >>>> syntax for strings I question why you think you need non ASCII tags.
> >>>> There are so many problems that can arise from that. For example,
> >>>> how would IANA be able to enforce uniqueness of Unicode tags written
> >>>> in different Unicode canonicalisation forms?
> >>>>
> >>>>
> >>>>
> >>>>
> >>>
> >>>
> >
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--000000000000f05bda059e8c8020
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Fri, Feb 14, 2020 at 3:01 AM Chris=
tian Hopps &lt;<a href=3D"mailto:chopps@chopps.org">chopps@chopps.org</a>&g=
t; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0p=
x 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">I was =
not approaching this discuss with this level of change in mind. How many ye=
ars does it take to get a YANG model even one as simple as this completed?<=
br>
<br></blockquote><div><br></div><div><br></div><div>I strongly agree.</div>=
<div>Just because there are refinements to the YANG &quot;string&quot; data=
 type that are possible</div><div>does not mean the Module Tags RFC has to =
solve that problem, or wait until it is solved.</div><div>Every YANG module=
 using the &quot;string&quot; data type (all of them?) could have the same =
problem.</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,20=
4);padding-left:1ex">
Thanks,<br>
Chris.<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:=
1px solid rgb(204,204,204);padding-left:1ex">
<br>
&gt; On Feb 14, 2020, at 5:43 AM, Rob Wilton (rwilton) &lt;<a href=3D"mailt=
o:rwilton@cisco.com" target=3D"_blank">rwilton@cisco.com</a>&gt; wrote:<br>
&gt; <br>
&gt; Hi Alexey, Christian, <br>
&gt; <br>
&gt; Allowing Unicode but requiring normalization as per RFC 5198 for IANA =
managed tags makes sense to me.<br>
&gt; <br>
&gt; But does the server also need to normalize any configured tags?=C2=A0 =
I.e. should the description for the tag typedef also specify that tags SHOU=
LD be normalized, and specify a normalization method that SHOULD be used?=
=C2=A0 Or is the onus on the client to use sensible (i.e. already normalize=
d) values, and if so, does that need to be stated?<br>
&gt; <br>
&gt; Thanks,<br>
&gt; Rob<br>
&gt; <br>
&gt; <br>
&gt;&gt; -----Original Message-----<br>
&gt;&gt; From: iesg &lt;<a href=3D"mailto:iesg-bounces@ietf.org" target=3D"=
_blank">iesg-bounces@ietf.org</a>&gt; On Behalf Of Alexey Melnikov<br>
&gt;&gt; Sent: 13 February 2020 13:10<br>
&gt;&gt; To: Christian Hopps &lt;<a href=3D"mailto:chopps@chopps.org" targe=
t=3D"_blank">chopps@chopps.org</a>&gt;<br>
&gt;&gt; Cc: <a href=3D"mailto:netmod-chairs@ietf.org" target=3D"_blank">ne=
tmod-chairs@ietf.org</a>; Joel Jaeggli &lt;<a href=3D"mailto:joelja@gmail.c=
om" target=3D"_blank">joelja@gmail.com</a>&gt;; The IESG<br>
&gt;&gt; &lt;<a href=3D"mailto:iesg@ietf.org" target=3D"_blank">iesg@ietf.o=
rg</a>&gt;; <a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@iet=
f.org</a>; <a href=3D"mailto:draft-ietf-netmod-module-tags@ietf.org" target=
=3D"_blank">draft-ietf-netmod-module-tags@ietf.org</a><br>
&gt;&gt; Subject: Re: Alexey Melnikov&#39;s Discuss on draft-ietf-netmod-mo=
dule-tags-<br>
&gt;&gt; 07: (with DISCUSS)<br>
&gt;&gt; <br>
&gt;&gt; Hi Christian,<br>
&gt;&gt; <br>
&gt;&gt; On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:<br>
&gt;&gt;&gt; The intent in the document is to place as few restrictions on =
tags as<br>
&gt;&gt;&gt; possible to allow for future-proofing and organic growth of us=
e both<br>
&gt;&gt;&gt; within and outside of SDOs. For standard tags we trust IANA (a=
nd the<br>
&gt;&gt;&gt; human behind the process) to make the call on whether a tag is=
 already<br>
&gt;&gt;&gt; present. :)<br>
&gt;&gt; <br>
&gt;&gt; And the problem with that is that because there might be multiple =
ways to<br>
&gt;&gt; encode in Unicode visually indistinguishable tags IANA would end u=
p asking<br>
&gt;&gt; IESG for help.<br>
&gt;&gt; <br>
&gt;&gt; So you need to at minimum specify a Unicode normalization form to =
use. I<br>
&gt;&gt; suggest you normatively reference RFC 5198 here.<br>
&gt;&gt; <br>
&gt;&gt;&gt; Having worked for a company where a lot of XML string data was=
<br>
&gt;&gt;&gt; non-ascii I find limiting to ascii to be rather restrictive.<b=
r>
&gt;&gt; <br>
&gt;&gt; Best Regards,<br>
&gt;&gt; Alexey<br>
&gt;&gt; <br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; Thanks,<br>
&gt;&gt;&gt; Chris.<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatrack=
er<br>
&gt;&gt; &lt;<a href=3D"mailto:noreply@ietf.org" target=3D"_blank">noreply@=
ietf.org</a>&gt; wrote:<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; Alexey Melnikov has entered the following ballot position =
for<br>
&gt;&gt;&gt;&gt; draft-ietf-netmod-module-tags-07: Discuss<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; When responding, please keep the subject line intact and r=
eply to<br>
&gt;&gt;&gt;&gt; all email addresses included in the To and CC lines. (Feel=
 free to<br>
&gt;&gt;&gt;&gt; cut this introductory paragraph, however.)<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; Please refer to<br>
&gt;&gt;&gt;&gt; <a href=3D"https://www.ietf.org/iesg/statement/discuss-cri=
teria.html" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/iesg/=
statement/discuss-criteria.html</a><br>
&gt;&gt;&gt;&gt; for more information about IESG DISCUSS and COMMENT positi=
ons.<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; The document, along with other ballot positions, can be fo=
und here:<br>
&gt;&gt;&gt;&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-net=
mod-module-tags/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.=
ietf.org/doc/draft-ietf-netmod-module-tags/</a><br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; ----------------------------------------------------------=
----------<br>
&gt;&gt;&gt;&gt; --<br>
&gt;&gt;&gt;&gt; DISCUSS:<br>
&gt;&gt;&gt;&gt; ----------------------------------------------------------=
----------<br>
&gt;&gt;&gt;&gt; --<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; This is generally a fine document, but after checking RFC =
7950<br>
&gt;&gt;&gt;&gt; syntax for strings I question why you think you need non A=
SCII tags.<br>
&gt;&gt;&gt;&gt; There are so many problems that can arise from that. For e=
xample,<br>
&gt;&gt;&gt;&gt; how would IANA be able to enforce uniqueness of Unicode ta=
gs written<br>
&gt;&gt;&gt;&gt; in different Unicode canonicalisation forms?<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; <br>
&gt; <br>
<br>
_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--000000000000f05bda059e8c8020--


From nobody Fri Feb 14 10:04:52 2020
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9D7E120A22 for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 10:04:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.919
X-Spam-Level: 
X-Spam-Status: No, score=-1.919 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NKm2qXumqKVB for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 10:04:48 -0800 (PST)
Received: from mail-pj1-f50.google.com (mail-pj1-f50.google.com [209.85.216.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 44EC3120A1D for <netmod@ietf.org>; Fri, 14 Feb 2020 10:04:48 -0800 (PST)
Received: by mail-pj1-f50.google.com with SMTP id dw13so4175159pjb.4 for <netmod@ietf.org>; Fri, 14 Feb 2020 10:04:48 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=J42tRkxPEmTolQxlLJ7qJWcvyeWOztq1AAWZ2pBHTq8=; b=UZR8qOnb11W5pFBMjrEktf3s/Dzuczjp+3VZBFcG0NFdvqULbNaCPuSWsy7/B+Qf6a zLAd26+B+dOlS2JKQWfjD3xWRkZ4dflWEM77hFUau5aCGrZ61gWjewD+/lKnn55SMzj4 8mYyNV/eRDyxFbexULVBF+Glwd72Oe7LtpMwFWkgjCLDb3a3rqr+LbLVDr3eLGI4yG5L VjFjcSerVRlNGOB2+Td+7zCnejUrWXK68LI5oJyKgMFo4YoIpgSO5jFLe0I4hAutLS16 Dm/JiH36SFhFDoGR3WouqQ8Lzd+FVTg5g2TLBCMqXQRWO6XL119vOIr+2BDB0uinF/2T buOg==
X-Gm-Message-State: APjAAAUr7F3d/EB5RmFJjtisf/BM6VOCoO1lcHWHfZYYu8MS1HBuNRe3 PHQbA0QBFnadG8NgjVNgLFMVRpfI4aNyzw==
X-Google-Smtp-Source: APXvYqzGv3GQOQehjCUEpy8yvHmDSh3ukvczqJrKWc/07DVahYlFRA9kRiFcWYRwtufBnAKPFWqGuQ==
X-Received: by 2002:a17:902:b788:: with SMTP id e8mr4660856pls.1.1581703487531;  Fri, 14 Feb 2020 10:04:47 -0800 (PST)
Received: from [192.168.1.106] (c-73-231-235-186.hsd1.ca.comcast.net. [73.231.235.186]) by smtp.gmail.com with ESMTPSA id d4sm7088129pjz.12.2020.02.14.10.04.47 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 14 Feb 2020 10:04:47 -0800 (PST)
To: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu>
Date: Fri, 14 Feb 2020 10:05:09 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0
MIME-Version: 1.0
In-Reply-To: <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Antivirus: Avast (VPS 200213-2, 02/13/2020), Outbound message
X-Antivirus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/4ReRJe_MCDLS3LF8OkBLozMFKVI>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 18:04:51 -0000

Hi -

On 2/14/2020 3:21 AM, Christian Hopps wrote:
> How about I add this to the description of "typedef tag" in the module:
>
>         description
>           "A tag is a type 'string' value that does not include carriage
>            return, newline or tab characters. It SHOULD begin with a
>            registered prefix; however, tags without a registered prefix
> -         SHOULD NOT be treated as invalid.";
> +         SHOULD NOT be treated as invalid. For the purposes of comparison
> +         non-ascii strings should use 'NFC' (RFC5198) normalization";
>       }
>

There are other considerations beyond normalization form.
For the tip of the iceberg, see the definition of SnmpAdminString
in RFC 3411, or the "SHOULD be avoided" stuff in RFC 5198.

For things like tags where one would like to minimize accidental
visual punning, I'd suggest NFKC should probably be given some
consideration.   Excellent presentation of the issues is
available at https://unicode.org/reports/tr15/

That said, these are issues that were raised in the earliest days of 
Netmod /
Netconf, and no one should be surprised that they haven't gone away by
themselves.  So I find my self in ironic agreement with Andy that it doesn't
make sense to wait for / impose a global solution, because there's plenty
of evidence that having all sorts of ill-defined cases of questionable
interoperability in theory hasn't been sufficient to prevent adoption of
the technology.

Randy


From nobody Fri Feb 14 11:15:34 2020
Return-Path: <0100017045205157-ba7a6e8f-0d4d-4540-b6ca-94d4d81dbe02-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD990120B3F for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 11:15:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iRaf8IHPNHPo for <netmod@ietfa.amsl.com>; Fri, 14 Feb 2020 11:15:30 -0800 (PST)
Received: from a48-93.smtp-out.amazonses.com (a48-93.smtp-out.amazonses.com [54.240.48.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73FFD120B28 for <netmod@ietf.org>; Fri, 14 Feb 2020 11:15:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581707711; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=dpB3lGOn8kSOfDXP1k0KBXDDwAj8rAHGzDpTnV6srWY=; b=nPprwIjCdpUiieOaLY4hILZ1lowgjt8oXsxgvdb5fyo9nZmQ5JIU08pnDbE5v8zO Bus5ivGIrt5C5etUy3oetyXg4GuGaE924yjf2relU0GPRlsFap/HaTUnjZfcOVyxZFs bYqbKuAs+RG205zHnjLi0MV2Adx5YjKFgtwjQKbs=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100017045205157-ba7a6e8f-0d4d-4540-b6ca-94d4d81dbe02-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B38C0F2E-2B6C-4C9B-9E34-3C530E2D7C96"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Fri, 14 Feb 2020 19:15:10 +0000
In-Reply-To: <DB7PR07MB4011402E836C2FABCB3E7F42F0150@DB7PR07MB4011.eurprd07.prod.outlook.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>, Benoit Claise <bclaise@cisco.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: =?utf-8?Q?Bal=C3=A1zs_Lengyel?= <balazs.lengyel@ericsson.com>
References: <DB7PR07MB4011402E836C2FABCB3E7F42F0150@DB7PR07MB4011.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.14-54.240.48.93
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/3SEoBbGaYcK_SYLBPwc8crfz5u0>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06 to -07
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Feb 2020 19:15:33 -0000

--Apple-Mail=_B38C0F2E-2B6C-4C9B-9E34-3C530E2D7C96
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Juergen,

Does the update address all your concerns?  Do you feel there is
a need for another LC

Hi Balazs,

Did you mean to send this to the netmod-chairs alias?  Oh well, as
 long we=E2=80=99re here, following are some questions/comments:

Have the YANG modules been validated and tested for formatting?
(i.e., pyang -f yang --keep-comments --yang-line-length 69 filename)=20

Have the examples in the draft validated against the YANG module?

Please review the Normative/Informative status of the references.
Not looking carefully, but RFCs 2119 and 8174 should be Normative,=20
and I think RFCs 3688 and 6020 should be Informative, right?

All of the =E2=80=9Cimport=E2=80=9D statements in the YANG module are =
missing a
=E2=80=9Creference=E2=80=9D statement.

Please add a paragraph to Section 5.2 preceding the YANG module
indicating all the aforementioned Normative references.

The copyright in the YANG module needs to be 2020 (not 2019)

Please ensure a blank line between paragraphs in the =E2=80=9Cdescription"=

statements.

Please add a statement to the Introduction regarding why the module
Isn=E2=80=99t compliant with NMDA.

The tree diagram does not adhere to the syntax described in=20
draft-ietf-netmod-yang-data-ext.  Please update the first sentence=20
in Section 5.1 to also reference draft-ietf-netmod-yang-data-ext.

Please ensure that the planning-text version of the draft passes
IDNITS (https://www6.ietf.org/tools/idnits) at the =E2=80=9Cverbose =
output=E2=80=9D
level and correct any issues found, or explain why they shouldn=E2=80=99t
be corrected.


Thanks,
Kent  // shepherd


> On Feb 14, 2020, at 11:03 AM, Bal=C3=A1zs Lengyel =
<balazs.lengyel@ericsson.com> wrote:
>=20
> Hello Chairs,
> I replied to Juergen, and exchanged some additional mails with him. I =
updated the draft to draft-ietf-netmod-yang-instance-file-format-07. =
Please take it forward in the process.
>=20
> =
https://protect2.fireeye.com/v1/url?k=3Ded368c2e-b1bcaefa-ed36ccb5-0cc47ad=
93e6a-1bf0817821133165&q=3D1&e=3Db8630aed-b037-42b0-a579-0e6e8067e0eb&u=3D=
https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-netmod-yang-instance-file=
-format-07
> Regards Balazs
>=20
> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Kent Watsen
> Sent: 2020. febru=C3=A1r 9., vas=C3=A1rnap 20:23
> To: netmod@ietf.org
> Subject: Re: [netmod] WG Last Call: =
draft-ietf-netmod-yang-instance-file-format-06
>=20
> This message closes the WGLC.
>=20
> Authors, please respond to Juergen=E2=80=99s message from Jan 20, =
ultimately posting an update to the draft.
>=20
> Thanks,
> Kent // as shepherd
>=20
>=20
>=20
>> On Jan 7, 2020, at 7:41 AM, Kent Watsen <kent+ietf@watsen.net> wrote:
>>=20
>>=20
>> This begins a two-week Working Group Last Call (WGLC) on =
draft-ietf-netmod-yang-instance-file-format-06.  The WGLC ends on Jan =
21.  Please send your comments to the working group mailing list.
>>=20
>> Positive comments, e.g., "I've reviewed this document and believe it =
is ready for publication", are welcome!  This is useful and important, =
even from authors.  Objections, concerns, and suggestions are also =
welcomed at this time.
>>=20
>> Thank you,
>> NETMOD Chairs
>>=20
>> _______________________________________________
>> netmod mailing list
>> netmod@ietf.org
>> https://www.ietf.org/mailman/listinfo/netmod
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_B38C0F2E-2B6C-4C9B-9E34-3C530E2D7C96
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D""><div class=3D"">Juergen,</div><div class=3D""><br =
class=3D""></div><blockquote style=3D"margin: 0px 0px 0px 40px; border: =
none; padding: 0px;" class=3D"">Does the update address all your =
concerns? &nbsp;Do you feel there is</blockquote><blockquote =
style=3D"margin: 0px 0px 0px 40px; border: none; padding: 0px;" =
class=3D"">a need for another LC</blockquote></div><div class=3D""><br =
class=3D""></div>Hi Balazs,<div class=3D""><br =
class=3D""></div><blockquote style=3D"margin: 0 0 0 40px; border: none; =
padding: 0px;" class=3D""><div class=3D"">Did you mean to send this to =
the netmod-chairs alias? &nbsp;Oh well, as</div><div class=3D"">&nbsp;long=
 we=E2=80=99re here, following are some questions/comments:</div><div =
class=3D""><br class=3D""></div><div class=3D"">Have the YANG modules =
been validated and tested for formatting?</div><div class=3D"">(i.e., =
pyang -f yang --keep-comments --yang-line-length 69 =
filename)&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">Have the examples in the draft validated against the YANG =
module?</div><div class=3D""><br class=3D""></div><div class=3D"">Please =
review the Normative/Informative status of the references.</div><div =
class=3D"">Not looking carefully, but RFCs 2119 and 8174 should be =
Normative,&nbsp;</div><div class=3D"">and I think RFCs 3688 and 6020 =
should be Informative, right?</div><div class=3D""><br =
class=3D""></div><div class=3D"">All of the =E2=80=9Cimport=E2=80=9D =
statements in the YANG module are missing a</div><div =
class=3D"">=E2=80=9Creference=E2=80=9D statement.</div><div class=3D""><br=
 class=3D""></div><div class=3D""><div class=3D"">Please add a paragraph =
to Section 5.2 preceding the YANG module</div></div><div =
class=3D"">indicating all the aforementioned Normative =
references.</div><div class=3D""><br class=3D""></div><div class=3D"">The =
copyright in the YANG module needs to be 2020 (not 2019)</div><div =
class=3D""><br class=3D""></div><div class=3D"">Please ensure a blank =
line between paragraphs in the =E2=80=9Cdescription"</div><div =
class=3D"">statements.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Please add a statement to the Introduction regarding why the =
module</div><div class=3D"">Isn=E2=80=99t compliant with NMDA.</div><div =
class=3D""><br class=3D""></div><div class=3D"">The tree diagram does =
not adhere to the syntax described in&nbsp;</div><div =
class=3D"">draft-ietf-netmod-yang-data-ext. &nbsp;Please update the =
first sentence&nbsp;</div><div class=3D"">in Section 5.1 to also =
reference draft-ietf-netmod-yang-data-ext.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Please ensure that the planning-text =
version of the draft passes</div><div class=3D"">IDNITS (<a =
href=3D"https://www6.ietf.org/tools/idnits" =
class=3D"">https://www6.ietf.org/tools/idnits</a>) at the =E2=80=9Cverbose=
 output=E2=80=9D</div><div class=3D"">level and correct any issues =
found, or explain why they shouldn=E2=80=99t</div><div class=3D"">be =
corrected.</div></blockquote><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D"">Thanks,</div><div =
class=3D"">Kent &nbsp;// shepherd</div><div class=3D""><br =
class=3D""></div><div class=3D""><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Feb 14, 2020, at 11:03 AM, =
Bal=C3=A1zs Lengyel &lt;<a href=3D"mailto:balazs.lengyel@ericsson.com" =
class=3D"">balazs.lengyel@ericsson.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hello =
Chairs,<br class=3D"">I replied to Juergen, and exchanged some =
additional mails with him. I updated the draft to =
draft-ietf-netmod-yang-instance-file-format-07. Please take it forward =
in the process.<br class=3D""><br class=3D""><a =
href=3D"https://protect2.fireeye.com/v1/url?k=3Ded368c2e-b1bcaefa-ed36ccb5=
-0cc47ad93e6a-1bf0817821133165&amp;q=3D1&amp;e=3Db8630aed-b037-42b0-a579-0=
e6e8067e0eb&amp;u=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-netmo=
d-yang-instance-file-format-07" =
class=3D"">https://protect2.fireeye.com/v1/url?k=3Ded368c2e-b1bcaefa-ed36c=
cb5-0cc47ad93e6a-1bf0817821133165&amp;q=3D1&amp;e=3Db8630aed-b037-42b0-a57=
9-0e6e8067e0eb&amp;u=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-ne=
tmod-yang-instance-file-format-07</a><br class=3D"">Regards Balazs<br =
class=3D""><br class=3D"">-----Original Message-----<br class=3D"">From: =
netmod &lt;netmod-bounces@ietf.org&gt; On Behalf Of Kent Watsen<br =
class=3D"">Sent: 2020. febru=C3=A1r 9., vas=C3=A1rnap 20:23<br =
class=3D"">To: netmod@ietf.org<br class=3D"">Subject: Re: [netmod] WG =
Last Call: draft-ietf-netmod-yang-instance-file-format-06<br =
class=3D""><br class=3D"">This message closes the WGLC.<br class=3D""><br =
class=3D"">Authors, please respond to Juergen=E2=80=99s message from Jan =
20, ultimately posting an update to the draft.<br class=3D""><br =
class=3D"">Thanks,<br class=3D"">Kent // as shepherd<br class=3D""><br =
class=3D""><br class=3D""><br class=3D""><blockquote type=3D"cite" =
class=3D"">On Jan 7, 2020, at 7:41 AM, Kent Watsen =
&lt;kent+ietf@watsen.net&gt; wrote:<br class=3D""><br class=3D""><br =
class=3D"">This begins a two-week Working Group Last Call (WGLC) on =
draft-ietf-netmod-yang-instance-file-format-06. &nbsp;The WGLC ends on =
Jan 21. &nbsp;Please send your comments to the working group mailing =
list.<br class=3D""><br class=3D"">Positive comments, e.g., "I've =
reviewed this document and believe it is ready for publication", are =
welcome! &nbsp;This is useful and important, even from authors. =
&nbsp;Objections, concerns, and suggestions are also welcomed at this =
time.<br class=3D""><br class=3D"">Thank you,<br class=3D"">NETMOD =
Chairs<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D"">netmod@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></blockquote><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D"">netmod@ietf.org<br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_B38C0F2E-2B6C-4C9B-9E34-3C530E2D7C96--


From nobody Mon Feb 17 18:24:49 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E8FD6120024; Sun, 16 Feb 2020 16:56:04 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158190096488.5841.1217846838340603455@ietfa.amsl.com>
Date: Sun, 16 Feb 2020 16:56:04 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/7tklOcUPJD3UKDQMRbccobI4_6M>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-12.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 00:56:05 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : Factory Default Setting
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-12.txt
	Pages           : 12
	Date            : 2020-02-16

Abstract:
   This document defines a method to reset a server to its factory
   default content.  The reset operation may be used, e.g., when the
   existing configuration has major errors so re-starting the
   configuration process from scratch is the best option.

   A new "factory-reset" RPC is defined.  When resetting a device, all
   previous configuration settings will be lost and replaced by the
   factory default content.

   A new optional "factory-default" read-only datastore is defined, that
   contains the factory default configuration for the device.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-12
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-12

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-12


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Feb 17 18:30:49 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D120812004D for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 03:15:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Wli2RMDtyAw for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 03:15:56 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id D1841120046 for <netmod@ietf.org>; Mon, 17 Feb 2020 03:15:55 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 4AE8760B4D; Mon, 17 Feb 2020 11:15:55 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 06:15:54 -0500
Cc: Christian Hopps <chopps@chopps.org>, netmod@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/zlJFx-19h9mbLgQXsCIKf0cImNU>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 11:15:58 -0000

> On Feb 14, 2020, at 1:05 PM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote:
>=20
> Hi -
>=20
> On 2/14/2020 3:21 AM, Christian Hopps wrote:
>> How about I add this to the description of "typedef tag" in the =
module:
>>=20
>>        description
>>          "A tag is a type 'string' value that does not include =
carriage
>>           return, newline or tab characters. It SHOULD begin with a
>>           registered prefix; however, tags without a registered =
prefix
>> -         SHOULD NOT be treated as invalid.";
>> +         SHOULD NOT be treated as invalid. For the purposes of =
comparison
>> +         non-ascii strings should use 'NFC' (RFC5198) =
normalization";
>>      }
>>=20
>=20
> There are other considerations beyond normalization form.
> For the tip of the iceberg, see the definition of SnmpAdminString
> in RFC 3411, or the "SHOULD be avoided" stuff in RFC 5198.

Do you think that the above is appropriate to include, or should be left =
out as doing more harm than helping?

BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) =
once dealing with LFs and CRs which lucky for us is not part of a tags =
allowable characters.

"
     typedef tag {
       type string {
         length "1..max";
         pattern '[\S ]+';
       }
"

The other is about private use unicode, and I don't know anything about =
that.

I think we either include the diff quoted above, or do nothing, as this =
isn't the document, as we all seem to agree, to fix the larger unicode =
issues with YANG string type.

Thanks,
Chris.

>=20
> For things like tags where one would like to minimize accidental
> visual punning, I'd suggest NFKC should probably be given some
> consideration.   Excellent presentation of the issues is
> available at https://unicode.org/reports/tr15/
>=20
> That said, these are issues that were raised in the earliest days of =
Netmod /
> Netconf, and no one should be surprised that they haven't gone away by
> themselves.  So I find my self in ironic agreement with Andy that it =
doesn't
> make sense to wait for / impose a global solution, because there's =
plenty
> of evidence that having all sorts of ill-defined cases of questionable
> interoperability in theory hasn't been sufficient to prevent adoption =
of
> the technology.
>=20
> Randy
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Mon Feb 17 18:34:29 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A673B120812; Mon, 17 Feb 2020 06:08:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level: 
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=IPr7fOv4; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=CfYJsV+y
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uth9sTNDTB06; Mon, 17 Feb 2020 06:08:13 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 32D271200E5; Mon, 17 Feb 2020 06:08:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=7613; q=dns/txt; s=iport; t=1581948492; x=1583158092; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=n65WcRT7GU83hGfFUXtnjNwPFI6nFdGw16BH8ImxF9I=; b=IPr7fOv4O5gJYNPwqyMxEfCNDWahzIizZzZ7SxpEV+8wOFhpOdMY/nKC R1vvcXrAIHrVfNQYIvaP7k83QAcTDHbsUT/qj3KGiTaZ4k54MTCWR+zSh LMeJtLYKk6xRh6C3nO3glrw5l8Fym3iYG5R/Efi2pdZodi0UcL2oDY6rV Q=;
IronPort-PHdr: =?us-ascii?q?9a23=3ANvCDLhVKFVOEMYjLyHpR6Vz0q87V8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA92J8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtankgA8VGSFhj13q6KkNSXs35Yg6arw=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DeAQDXnUpe/5NdJa1jAxsBAQEBAQE?= =?us-ascii?q?BBQEBAREBAQMDAQEBgXuBVFAFbFggBAsqCodQA4p5gl+JYo4vgUKBEANUCQE?= =?us-ascii?q?BAQwBARgLCgIEAQGDe0UCggEkOBMCAw0BAQUBAQECAQUEbYU3DIVmAQEBAQI?= =?us-ascii?q?BAQEQLgEBLAsBCwICAgEIEAEEAQEBLhsGBgsdCAIEDgUIEweDBYJKAw4gAQI?= =?us-ascii?q?MoFgCgTmIYoIngn8BAQWBQ0GDFQ0LggwDBgWBM4wkGoFBP4ERR4JMPoIbSQE?= =?us-ascii?q?BAQEBAYEsARIBIwUaEQYPgnuCLI1EBx2COocrl3FECoI6h02KVQSBY4Jmgkm?= =?us-ascii?q?IFpA7l1mCKpAXAgQCBAUCDgEBBYFpImdYEQhwFTuCbFAYDY4dOIM7M4RhhT9?= =?us-ascii?q?0AoEni0WBIgGBDwEB?=
X-IronPort-AV: E=Sophos;i="5.70,452,1574121600"; d="scan'208";a="710492482"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Feb 2020 14:07:34 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 01HE7Ym9004208 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 17 Feb 2020 14:07:34 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 17 Feb 2020 08:07:33 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 17 Feb 2020 08:07:32 -0600
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 17 Feb 2020 08:07:32 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IcIHdicuEoYJuE4jPBGdn6t6okvftD7iptXh2Z5K5JZjtzbiBfJbOX8aIkitp1CE5ZQd3U6RKx5p8oTtdivzfuOCmxjO4j6vjhCwBEugVpzTbmrtYfzyF7rS7okvRHaDqkQA29daqc587B2PqkOj7FRqIztewt6tOtCWXKPQBpN3S66etDy4/N8Rwk93XEYvt5l/G+b6evd2W79icTrkhiNGMYjTlQ6lQmgnpV8nKG6Y1b6zsEjfkgw1DTgI+VM+OAA940t73QVKX3H1+GcxcvazsasQrUnACNlwkC5rsX7Kjg2SCLH/P2rkCqo7HD4a2+J9k47C0L6+/pbeJbTtqQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yCNYvA+Uk9ouCk4Xpy3ixAtqX6BQ7hATjjooHO/fGxk=; b=ns6NBN6an6zI+HU4DL3oS4gzji1tsMj/rzaSs0aHG7Ih1Qu0xnwZaGMN4JCNT9th6vHuAp9XMA9s9NAK3HDrqxCexRMisJS+fXdDFxK1dPDOjL0RMr8gTIrMhpdFmBn20PJQGetAE4NkcFS8BpcJbj/gl1rRl9paxD+V0fAbqSLBiQulx5WlvfITDjpMx+fB1CqN/hQB6/4Sy/D+2AcxRVHpkch/xQv5RF2y+NArDH2u278jFJOH4GIXmYprFII6CLyrYZUGhKFOhuJyvE4OrjPGs3xOKo5+Zc/CkCoIoekWa/s25FTK7Xa/9jq1IA7xgMYktdM0Uw/7hNI22FC8DA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yCNYvA+Uk9ouCk4Xpy3ixAtqX6BQ7hATjjooHO/fGxk=; b=CfYJsV+ye079UbsD0brUM9YZWOgi7DCbT9H+BSjbl5nSp7mJOwbVtEZUCIpolgcEaggtp/UIrrtWbq6ywY1cSD6UlwiArISpuU6HelC2RDmjVyGLsRliggOVSXMd3oVwk3CpTK3R9t7MzsUKKG0TjD/HPZPKzNJwPZ42XP8exUg=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4112.namprd11.prod.outlook.com (20.179.150.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Mon, 17 Feb 2020 14:07:31 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2729.031; Mon, 17 Feb 2020 14:07:31 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
CC: Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, Christian Hopps <chopps@chopps.org>, The IESG <iesg@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gZdNYAgAEFykCAAEcggIAEq79w
Date: Mon, 17 Feb 2020 14:07:30 +0000
Message-ID: <MN2PR11MB43665A773E4CF5C3F87B62BBB5160@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de> <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.42]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2637e4f9-7f73-45d2-0315-08d7b3b2baa6
x-ms-traffictypediagnostic: MN2PR11MB4112:
x-microsoft-antispam-prvs: <MN2PR11MB411264720743991049D20DD6B5160@MN2PR11MB4112.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0316567485
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(376002)(136003)(39860400002)(396003)(189003)(199004)(54906003)(4326008)(2906002)(53546011)(52536014)(5660300002)(71200400001)(33656002)(6506007)(966005)(186003)(478600001)(6916009)(55016002)(81166006)(81156014)(8676002)(316002)(8936002)(9686003)(66574012)(7696005)(86362001)(76116006)(26005)(64756008)(66946007)(66446008)(66476007)(66556008); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4112; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: rPjo6zRirtVfdOccMgqvMtaC4O0qxMZhEow9ldi3VXMNjir4gOBgqDkURJiq3137dKizoG/MDBa4IOk7lTAwyaDlV9IoWCt7jKqO5DK09PdYfgIYHqeO8GhQI6BuZP5jBP3dD8Njfm6u3K+qDPqPptb7mgh/bUMxLq+NHBGMPTfmMdro9euojEmSk6BZWJiHpgBRJoSV7WGwMj9scioj3aLnwuZlyn8yHcViGcNEuLEoKV3PLu8SYozO09AOuWUBQjqMHfmJo6eC+as7QmZCWxW1+pBl0ElcviHTEavM/40Mz1IwECEmZKqSvPqoieHqoZ9FCIl5nadHmTNJ/6jYifv4six79Rj159WccxTQxdwRedactFVByMvBwetKNwFYUCfmDGVwhqF9Tp0TtwebDLweYX9PlLckvtkhKYRYW14OYH01v9ihv/N/B3yitV6Sm2DzB7Yo/ez1PYSO5NQZi6NV3NfPvUsIfj98073WawzITmI7mWAY54NPQQmuyr+ms2FftngtzjFNZVxWlzW7sw==
x-ms-exchange-antispam-messagedata: 7KLWRRDNuLaTKjC+ZoIWsEzYGVIrPNzol490xyb+5RZIH5yQoS6v5eB+MFZ/JfWqf8QwVrvSjCweQd3JB6ewVW9mWrH/hI0X5i+lHfmTG784Kr7e9TcSOe/LfQ7DA8v8sy9sQ0zU9Ztx2V2Apl7UOg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 2637e4f9-7f73-45d2-0315-08d7b3b2baa6
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Feb 2020 14:07:30.9948 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1f8NC02Gnxwolf5QFBg04DI0BLJvecP8Qcd4gK+qYoeYHJ2AusWrxTFVEGMGs7i2cae7m8FKcE3LxEvm4zOFsQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4112
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/1GBOIpjVpbHXkoGjlI6AEv7CnUg>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 14:08:19 -0000

Hi Juergen,

Please see inline ...

> -----Original Message-----
> From: Sch=F6nw=E4lder, J=FCrgen <J.Schoenwaelder@jacobs-university.de>
> Sent: 14 February 2020 14:31
> To: Rob Wilton (rwilton) <rwilton@cisco.com>
> Cc: Alexey Melnikov <aamelnikov@fastmail.fm>; netmod@ietf.org; Joel
> Jaeggli <joelja@gmail.com>; Christian Hopps <chopps@chopps.org>; The IESG
> <iesg@ietf.org>
> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> module-tags-07: (with DISCUSS)
>=20
> Rob,
>=20
> I think there are two related issues here:
>=20
> a) If we need normalized strings (to avoid comparison suprises), we
>    should have a common type for them; rfc6991-bis would be a proper
>    home. I am _not_ saying we should delay the tags document for this,
>    but we should think about providing a solution that can be easily
>    reused. Right now, we often use strings as part of keys, which can
>    lead to comparison issues.
[RW]=20

I agree.  Note, I am also not proposing that we delay module-tags for rfc69=
91-bis.

RFC 7950 states that strings are not normalized by default (section 9.4.2).=
  Thinking about this some more, I think that it is reasonable to make it t=
he client's responsibility to normalize strings, if required.

Chris, this would mean that no change to the typedef description is require=
d.

>=20
> b) It seems that normalized strings only solve part of the problem. If
>    an organization creates names for 'things', the organization likely
>    wants to further restrict the format of these names to something
>    sensible to avoid fun with different kinds of hyphens or emojis or
>    ... So while creative unicode characters may technically work,
>    there will likely be good reasons to avoid some of them. (There are
>    reasons why we have coding styles for most programming languages.)
>    These rules may, however, differ between organizations.
>=20
> We should not confuse a) and b). If IANA needs additional guidelines for
> tags (their coding style for tags), then we should provide these
> guidelines, i.e., this is a type b) action. The type a) action is needed
> to technically ensure that comparisons do not lead to surprises. But a)
> won't be an answer for all type b) issues. Of course, we could give IANA =
a
> 'coding style' that avoids any normalization issues. This would make IANA
> assigned tags safe but would not avoid comparison surprises for other
> sources of tags.
[RW]=20

So, solving B seems reasonable for the IANA defined module tags, following =
Alexey's suggestion of referencing RFC 5198 for normalization.

Thanks,
Rob


>=20
> /js
>=20
> On Fri, Feb 14, 2020 at 10:30:50AM +0000, Rob Wilton (rwilton) wrote:
> > Hi Juergen,
> >
> > This sounds potentially useful to me, although should this be for
> general unicode strings (e.g. ones that might include spaces), or just
> identifiers (without any spaces)?.  Is this something that could/should g=
o
> into rfc6991-bis, or at least be discussed in that context?
> >
> > I would have thought that normalization would be required wherever a
> configurable unicode string is used as a list key, or leaf-list.
> >
> > Thanks,
> > Rob
> >
> >
> > > -----Original Message-----
> > > From: iesg <iesg-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, J=FC=
rgen
> > > Sent: 13 February 2020 18:39
> > > To: Alexey Melnikov <aamelnikov@fastmail.fm>
> > > Cc: netmod-chairs@ietf.org; draft-ietf-netmod-module-tags@ietf.org;
> > > netmod@ietf.org; Joel Jaeggli <joelja@gmail.com>; Christian Hopps
> > > <chopps@chopps.org>; The IESG <iesg@ietf.org>
> > > Subject: Re: [netmod] Alexey Melnikov's Discuss on
> > > draft-ietf-netmod-
> > > module-tags-07: (with DISCUSS)
> > >
> > > And a longer term solution might be to define a YANG Net-Unicode
> > > string datatype that can be used in all situations where
> > > non-normalized strings may cause problems. The problem (if one
> > > agrees it is one) is likely much bigger than just YANG tags, there
> > > likely are many uses of YANG strings where normalization would be
> desirable.
> > >
> > > /js
> > >
> > > On Thu, Feb 13, 2020 at 01:10:02PM +0000, Alexey Melnikov wrote:
> > > > Hi Christian,
> > > >
> > > > On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
> > > > > The intent in the document is to place as few restrictions on
> > > > > tags as possible to allow for future-proofing and organic growth
> > > > > of use both within and outside of SDOs. For standard tags we
> > > > > trust IANA (and the human behind the process) to make the call
> > > > > on whether a tag is already present. :)
> > > >
> > > > And the problem with that is that because there might be multiple
> > > > ways
> > > to encode in Unicode visually indistinguishable tags IANA would end
> > > up asking IESG for help.
> > > >
> > > > So you need to at minimum specify a Unicode normalization form to
> > > > use. I
> > > suggest you normatively reference RFC 5198 here.
> > > >
> > > > > Having worked for a company where a lot of XML string data was
> > > > > non-ascii I find limiting to ascii to be rather restrictive.
> > > >
> > > > Best Regards,
> > > > Alexey
> > > >
> > > > >
> > > > > Thanks,
> > > > > Chris.
> > > > >
> > > > > > On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
> > > <noreply@ietf.org> wrote:
> > > > > >
> > > > > > Alexey Melnikov has entered the following ballot position for
> > > > > > draft-ietf-netmod-module-tags-07: Discuss
> > > > > >
> > > > > > When responding, please keep the subject line intact and reply
> > > > > > to all email addresses included in the To and CC lines. (Feel
> > > > > > free to cut this introductory paragraph, however.)
> > > > > >
> > > > > >
> > > > > > Please refer to
> > > > > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > > > > > for more information about IESG DISCUSS and COMMENT positions.
> > > > > >
> > > > > >
> > > > > > The document, along with other ballot positions, can be found
> here:
> > > > > > https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags
> > > > > > /
> > > > > >
> > > > > >
> > > > > >
> > > > > > --------------------------------------------------------------
> > > > > > ----
> > > > > > ----
> > > > > > DISCUSS:
> > > > > > --------------------------------------------------------------
> > > > > > ----
> > > > > > ----
> > > > > >
> > > > > > This is generally a fine document, but after checking RFC 7950
> > > > > > syntax for strings I question why you think you need non ASCII
> > > > > > tags. There are so many problems that can arise from that. For
> > > > > > example, how would IANA be able to enforce uniqueness of
> > > > > > Unicode tags written in different Unicode canonicalisation
> forms?
> > > > > >
> > > > > >
> > > > > >
> > > > > >
> > > > >
> > > > >
> > > >
> > > > _______________________________________________
> > > > netmod mailing list
> > > > netmod@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/netmod
> > >
> > > --
> > > Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> > > Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | German=
y
> > > Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
> >
>=20
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon Feb 17 18:34:52 2020
Return-Path: <noreply@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E6AC6120844; Mon, 17 Feb 2020 06:12:49 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Kent Watsen via Datatracker <noreply@ietf.org>
To: <ibagdona@gmail.com>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.117.0
Auto-Submitted: auto-generated
Precedence: bulk
Cc: netmod-chairs@ietf.org, kent+ietf@watsen.net, iesg-secretary@ietf.org, Kent Watsen <kent+ietf@watsen.net>, netmod@ietf.org
Message-ID: <158194876993.17973.14369850607150275867.idtracker@ietfa.amsl.com>
Date: Mon, 17 Feb 2020 06:12:49 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/A1rI19KAF4irfnGBy281GMEJUFY>
Subject: [netmod] Publication has been requested for draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 14:12:51 -0000

Kent Watsen has requested publication of draft-ietf-netmod-factory-default-12 as Proposed Standard on behalf of the NETMOD working group.

Please verify the document's state at https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/


From nobody Mon Feb 17 18:38:16 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D569120072; Mon, 17 Feb 2020 07:40:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e7zR3Q7vZ2NK; Mon, 17 Feb 2020 07:40:32 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 70F6912001E; Mon, 17 Feb 2020 07:40:32 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 4195260B79; Mon, 17 Feb 2020 15:40:31 +0000 (UTC)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <MN2PR11MB43665A773E4CF5C3F87B62BBB5160@MN2PR11MB4366.namprd11.prod.outlook.com>
Date: Mon, 17 Feb 2020 10:40:30 -0500
Cc: Christian Hopps <chopps@chopps.org>, =?utf-8?B?IlNjaMO2bnfDpGxkZXIsIErDvHJnZW4i?= <J.Schoenwaelder@jacobs-university.de>,  Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <72E551FB-DA3E-4120-BC78-F3555B7496C3@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de> <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de> <MN2PR11MB43665A773E4CF5C3F87B62BBB5160@MN2PR11MB4366.namprd11.prod.outlook.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wjy_G9i60hyRqLUS6vhIq_vQxPw>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 15:40:38 -0000

> On Feb 17, 2020, at 9:07 AM, Rob Wilton (rwilton) <rwilton@cisco.com> =
wrote:
>=20
> Hi Juergen,
>=20
> Please see inline ...
>=20
>> -----Original Message-----
>> From: Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen =
<J.Schoenwaelder@jacobs-university.de>
>> Sent: 14 February 2020 14:31
>> To: Rob Wilton (rwilton) <rwilton@cisco.com>
>> Cc: Alexey Melnikov <aamelnikov@fastmail.fm>; netmod@ietf.org; Joel
>> Jaeggli <joelja@gmail.com>; Christian Hopps <chopps@chopps.org>; The =
IESG
>> <iesg@ietf.org>
>> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
>> module-tags-07: (with DISCUSS)
>>=20
>> Rob,
>>=20
>> I think there are two related issues here:
>>=20
>> a) If we need normalized strings (to avoid comparison suprises), we
>>   should have a common type for them; rfc6991-bis would be a proper
>>   home. I am _not_ saying we should delay the tags document for this,
>>   but we should think about providing a solution that can be easily
>>   reused. Right now, we often use strings as part of keys, which can
>>   lead to comparison issues.
> [RW]=20
>=20
> I agree.  Note, I am also not proposing that we delay module-tags for =
rfc6991-bis.
>=20
> RFC 7950 states that strings are not normalized by default (section =
9.4.2).  Thinking about this some more, I think that it is reasonable to =
make it the client's responsibility to normalize strings, if required.
>=20
> Chris, this would mean that no change to the typedef description is =
required.
>=20
>>=20
>> b) It seems that normalized strings only solve part of the problem. =
If
>>   an organization creates names for 'things', the organization likely
>>   wants to further restrict the format of these names to something
>>   sensible to avoid fun with different kinds of hyphens or emojis or
>>   ... So while creative unicode characters may technically work,
>>   there will likely be good reasons to avoid some of them. (There are
>>   reasons why we have coding styles for most programming languages.)
>>   These rules may, however, differ between organizations.
>>=20
>> We should not confuse a) and b). If IANA needs additional guidelines =
for
>> tags (their coding style for tags), then we should provide these
>> guidelines, i.e., this is a type b) action. The type a) action is =
needed
>> to technically ensure that comparisons do not lead to surprises. But =
a)
>> won't be an answer for all type b) issues. Of course, we could give =
IANA a
>> 'coding style' that avoids any normalization issues. This would make =
IANA
>> assigned tags safe but would not avoid comparison surprises for other
>> sources of tags.
> [RW]=20
>=20
> So, solving B seems reasonable for the IANA defined module tags, =
following Alexey's suggestion of referencing RFC 5198 for normalization.

I will not put the additional text in the typedef and instead put it in =
the guidance for the IANA registry then:

 This registry allocates tags that have the registered prefix
 "ietf:". New values should be well considered and not achievable
-through a combination of already existing IETF tags.
+through a combination of already existing IETF tags. For comparing
+non-ascii strings, 'NFC' [[RFC5198]] normalization SHOULD be used.

Unless there are further objections, I believe this, and a small change =
to the security section suggested by Benjamin K, will clear the =
remaining DISCUSS so I will republish soon.

Thanks,
Chris.

> Thanks,
> Rob
>=20
>=20
>>=20
>> /js
>>=20
>> On Fri, Feb 14, 2020 at 10:30:50AM +0000, Rob Wilton (rwilton) wrote:
>>> Hi Juergen,
>>>=20
>>> This sounds potentially useful to me, although should this be for
>> general unicode strings (e.g. ones that might include spaces), or =
just
>> identifiers (without any spaces)?.  Is this something that =
could/should go
>> into rfc6991-bis, or at least be discussed in that context?
>>>=20
>>> I would have thought that normalization would be required wherever a
>> configurable unicode string is used as a list key, or leaf-list.
>>>=20
>>> Thanks,
>>> Rob
>>>=20
>>>=20
>>>> -----Original Message-----
>>>> From: iesg <iesg-bounces@ietf.org> On Behalf Of Sch=C3=B6nw=C3=A4lder=
, J=C3=BCrgen
>>>> Sent: 13 February 2020 18:39
>>>> To: Alexey Melnikov <aamelnikov@fastmail.fm>
>>>> Cc: netmod-chairs@ietf.org; draft-ietf-netmod-module-tags@ietf.org;
>>>> netmod@ietf.org; Joel Jaeggli <joelja@gmail.com>; Christian Hopps
>>>> <chopps@chopps.org>; The IESG <iesg@ietf.org>
>>>> Subject: Re: [netmod] Alexey Melnikov's Discuss on
>>>> draft-ietf-netmod-
>>>> module-tags-07: (with DISCUSS)
>>>>=20
>>>> And a longer term solution might be to define a YANG Net-Unicode
>>>> string datatype that can be used in all situations where
>>>> non-normalized strings may cause problems. The problem (if one
>>>> agrees it is one) is likely much bigger than just YANG tags, there
>>>> likely are many uses of YANG strings where normalization would be
>> desirable.
>>>>=20
>>>> /js
>>>>=20
>>>> On Thu, Feb 13, 2020 at 01:10:02PM +0000, Alexey Melnikov wrote:
>>>>> Hi Christian,
>>>>>=20
>>>>> On Thu, Feb 13, 2020, at 12:30 AM, Christian Hopps wrote:
>>>>>> The intent in the document is to place as few restrictions on
>>>>>> tags as possible to allow for future-proofing and organic growth
>>>>>> of use both within and outside of SDOs. For standard tags we
>>>>>> trust IANA (and the human behind the process) to make the call
>>>>>> on whether a tag is already present. :)
>>>>>=20
>>>>> And the problem with that is that because there might be multiple
>>>>> ways
>>>> to encode in Unicode visually indistinguishable tags IANA would end
>>>> up asking IESG for help.
>>>>>=20
>>>>> So you need to at minimum specify a Unicode normalization form to
>>>>> use. I
>>>> suggest you normatively reference RFC 5198 here.
>>>>>=20
>>>>>> Having worked for a company where a lot of XML string data was
>>>>>> non-ascii I find limiting to ascii to be rather restrictive.
>>>>>=20
>>>>> Best Regards,
>>>>> Alexey
>>>>>=20
>>>>>>=20
>>>>>> Thanks,
>>>>>> Chris.
>>>>>>=20
>>>>>>> On Apr 11, 2019, at 9:41 AM, Alexey Melnikov via Datatracker
>>>> <noreply@ietf.org> wrote:
>>>>>>>=20
>>>>>>> Alexey Melnikov has entered the following ballot position for
>>>>>>> draft-ietf-netmod-module-tags-07: Discuss
>>>>>>>=20
>>>>>>> When responding, please keep the subject line intact and reply
>>>>>>> to all email addresses included in the To and CC lines. (Feel
>>>>>>> free to cut this introductory paragraph, however.)
>>>>>>>=20
>>>>>>>=20
>>>>>>> Please refer to
>>>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>>>=20
>>>>>>>=20
>>>>>>> The document, along with other ballot positions, can be found
>> here:
>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags
>>>>>>> /
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>> --------------------------------------------------------------
>>>>>>> ----
>>>>>>> ----
>>>>>>> DISCUSS:
>>>>>>> --------------------------------------------------------------
>>>>>>> ----
>>>>>>> ----
>>>>>>>=20
>>>>>>> This is generally a fine document, but after checking RFC 7950
>>>>>>> syntax for strings I question why you think you need non ASCII
>>>>>>> tags. There are so many problems that can arise from that. For
>>>>>>> example, how would IANA be able to enforce uniqueness of
>>>>>>> Unicode tags written in different Unicode canonicalisation
>> forms?
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>=20
>>>>> _______________________________________________
>>>>> netmod mailing list
>>>>> netmod@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/netmod
>>>>=20
>>>> --
>>>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>>>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | =
Germany
>>>> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>>>=20
>>=20
>> --
>> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | =
Germany
>> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon Feb 17 18:41:14 2020
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB02C120890 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 08:50:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level: 
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 70kIUTEZgCQE for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 08:50:50 -0800 (PST)
Received: from mail-pg1-f177.google.com (mail-pg1-f177.google.com [209.85.215.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB39E12089F for <netmod@ietf.org>; Mon, 17 Feb 2020 08:50:49 -0800 (PST)
Received: by mail-pg1-f177.google.com with SMTP id 6so9501073pgk.0 for <netmod@ietf.org>; Mon, 17 Feb 2020 08:50:49 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=U9iuKxvae3Dlcm/5P/JT09SJLoAZp+ak5WigND911RA=; b=TydjGvrbFUMMcvkiLkRpXDuy66JYlh2FGtgSLVsjnUWb9xDqoIcxrUHfHorqkExm4j nEWG4IdzTWTsSmU+dauVCU/EIPK1o7uz5IfnmsQ7eZsKGl2ZHnKxjSA8SNeLeOh+xjof vsrZNzYORKNhGE8SkwTaPYpiOIxJXktfLbG3ZAlAnbUrOx4Ynert6nbu1+3UxuUAznOc kR2z+BDkcl6W1sbKlsq/BXAf1dpMdif0Cyu2l8wB3H4eng2GMEQxEkxwGvBxQIwvaEgX xaNEwM+DZU1KV1pAHBgK0MnapMCZZokGsJBLGf739f8LNePgangRtKqOWg8QzAUWO8Pl M8Gw==
X-Gm-Message-State: APjAAAWNfi7baDy0WUABPNS7Ci/BFSBKHEYBfXtx41hpapZIfZwaIQfj kj+21gSw+ml21X00Y8ttw90zETWbhL8=
X-Google-Smtp-Source: APXvYqyOVZsF1OIW/VZofvgVjzBOZzyD6PtLpNGSncVrEylX/PjsnZ7Y2AlDyQVZC36oPm82UXgcZQ==
X-Received: by 2002:a63:7c4d:: with SMTP id l13mr18709462pgn.275.1581958248301;  Mon, 17 Feb 2020 08:50:48 -0800 (PST)
Received: from [192.168.1.106] (c-73-231-235-186.hsd1.ca.comcast.net. [73.231.235.186]) by smtp.gmail.com with ESMTPSA id z10sm1489980pgf.35.2020.02.17.08.50.47 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Feb 2020 08:50:47 -0800 (PST)
To: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 08:51:11 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0
MIME-Version: 1.0
In-Reply-To: <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Antivirus: Avast (VPS 200217-0, 02/17/2020), Outbound message
X-Antivirus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/GfFJ0zq5ZdYO_z_Xdrv_czQlJD8>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 16:50:55 -0000

Hi -

On 2/17/2020 3:15 AM, Christian Hopps wrote:
...
 > BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) 
once dealing with LFs and CRs which lucky for us is not part of a tags 
allowable characters.

There are lots of other things that complicate life.  The Yang string 
definition
circumscribes some of them, but not all.

> "
>       typedef tag {
>         type string {
>           length "1..max";
>           pattern '[\S ]+';
>         }
> "

This pattern doesn't make sense to me when I try to understand it using
https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes
It excludes "symbols", but permits, for example, paragraph separators and
formatting characters and such delights as zero-width non-joiner. Also, in
complementing the "all symbols" category, it seems to me it already permits
space, so I don't see why it calls out space again.

Randy


From nobody Mon Feb 17 18:42:12 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43E5F120089; Mon, 17 Feb 2020 09:10:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.436
X-Spam-Level: *
X-Spam-Status: No, score=1.436 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LZDSao8powMw; Mon, 17 Feb 2020 09:09:56 -0800 (PST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30065.outbound.protection.outlook.com [40.107.3.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23618120088; Mon, 17 Feb 2020 09:09:56 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DS1ro8KM504zcYp3Zv/C34z5+jqFWcKGscOz9/XkFO5KjXs6lj1aNFQLMppPdhhNXhlneWPEzEPTnVCcm4btLY6geoRZnC/s9OsrChA+yn5MBh9VBc6kGhugDXovA1vpAg5JL/ye3y04ctAeBQHaz1aNo7ijpzXmkUS99bFVjS4qlF3avQCxC+/NjWxg5G3eIqrYRzJUaRxIDq8aVkqLTB71M8aYyBTS7C2Da/Qy6XYC9hT6XBTqRC3u1bbXeXZ5PhKetSTL26ygMOj8aIAbWjQ0HUV6IGIf5ZXgTEoOgZxlNGyni/LYlR4CDVKIPbh7QonMiwt2V3R3XUUhEOi7DQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IW3Bv3CCnokYfZd4QAGCRZCh8yqoetUBDZHDY8Iylec=; b=nJVWO2OD1Ke9ZKXPRvjPJywC9RzE/nG2ZqBhygMK9RP48NLfeG9NiGT/Talz7t0GZLYbxq3Vz5YfdGneCm7v9tDg2FR6tWjG4PDtjg87kNN8GwalF9kkQx4rfquT6tvOxzOzwieWzSApT3gAEMVT84uHDFJQdm7qZDCssRB/eDSbog24Hkcr8sKKiCCFtb1X9sHxjzqdBRTrQSBoPHUEsbn5v9Yyz6SGEcfVVeI/k9ve3fh8IzYjgBd9RfHdbUfK3rbcV7xnzkSz2kupxIMUL1t9d1es4diAy2tqYTLHSQz2Cj5cxZ9Qrr3I2wmxloUzqOfVuaFXXrjE4mVU1HLEiA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IW3Bv3CCnokYfZd4QAGCRZCh8yqoetUBDZHDY8Iylec=; b=UAR+Ea7GSarVMuUETBUvjl/Eq25vnZ7LYBJp2L8bSqk2Ql2OZzRb11zPF64cBUfc4PSOQHicw+JMP7LIwp4JzpWZwynpzjJ7B/tVDI/Y272GpV3OtDjOxHsOKlX2f7B3+ZRL1Hr3aAo+uC+nPlwMrtgWKkv9WVIDih1kriN24Nk=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0117.EURP190.PROD.OUTLOOK.COM (10.172.228.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Mon, 17 Feb 2020 17:09:53 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Mon, 17 Feb 2020 17:09:53 +0000
Received: from localhost (212.201.44.247) by AM4PR0202CA0015.eurprd02.prod.outlook.com (2603:10a6:200:89::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.23 via Frontend Transport; Mon, 17 Feb 2020 17:09:53 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Christian Hopps <chopps@chopps.org>
CC: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4pzaaJjh2ww68Uallfbdbai0wKgafm0AgABC9gCABMxAD4AAF0UA
Date: Mon, 17 Feb 2020 17:09:53 +0000
Message-ID: <20200217170952.rkgyjdtvepfh2lzf@anna.jacobs.jacobs-university.de>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de> <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de> <MN2PR11MB43665A773E4CF5C3F87B62BBB5160@MN2PR11MB4366.namprd11.prod.outlook.com> <72E551FB-DA3E-4120-BC78-F3555B7496C3@chopps.org>
In-Reply-To: <72E551FB-DA3E-4120-BC78-F3555B7496C3@chopps.org>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM4PR0202CA0015.eurprd02.prod.outlook.com (2603:10a6:200:89::25) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9bc8e05f-a923-41fe-ee04-08d7b3cc34c3
x-ms-traffictypediagnostic: DB6P190MB0117:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB011770832EF2D92951329A1ADE160@DB6P190MB0117.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0316567485
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400004)(396003)(376002)(346002)(366004)(136003)(199004)(189003)(5660300002)(8936002)(1076003)(4326008)(786003)(316002)(2906002)(956004)(3450700001)(81156014)(66574012)(8676002)(81166006)(71200400001)(6496006)(52116002)(6486002)(478600001)(6916009)(54906003)(66946007)(66446008)(64756008)(66556008)(53546011)(66476007)(16526019)(186003)(26005)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0117; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: //aXO9dXCETUkIYCeBON3BgOXQCZQrko2+JVNtEw9RhZ30Kyfki+PIuhbGyv6/tHW3O94UnoqFmUucLaiogIhYyGhJ0Mt9LNtEVcbMP6I/C15+UDjAwkHm1Ex9R7FE603phS6t9+mttaaJdOLIyaEg==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <92E62A5522641942AF73BFA56082EF89@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 9bc8e05f-a923-41fe-ee04-08d7b3cc34c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Feb 2020 17:09:53.7339 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6hlfLxXHok2tinmHFele3bjb1Ld2oPt+2rHFMZCYsxuSNdNlFaHdBUMwici2YJmDr4UdYctUzXfedqiCjW6KIJK08Qq6+UhJCSJBhVHyciI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0117
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/A3uLioFLFP5InJqGUCDxUiQvLVM>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 17:10:01 -0000

On Mon, Feb 17, 2020 at 10:40:30AM -0500, Christian Hopps wrote:
>=20
>=20
> > On Feb 17, 2020, at 9:07 AM, Rob Wilton (rwilton) <rwilton@cisco.com> w=
rote:
> >=20
> > Hi Juergen,
> >=20
> > Please see inline ...
> >=20
> >> -----Original Message-----
> >> From: Sch=F6nw=E4lder, J=FCrgen <J.Schoenwaelder@jacobs-university.de>
> >> Sent: 14 February 2020 14:31
> >> To: Rob Wilton (rwilton) <rwilton@cisco.com>
> >> Cc: Alexey Melnikov <aamelnikov@fastmail.fm>; netmod@ietf.org; Joel
> >> Jaeggli <joelja@gmail.com>; Christian Hopps <chopps@chopps.org>; The I=
ESG
> >> <iesg@ietf.org>
> >> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> >> module-tags-07: (with DISCUSS)
> >>=20
> >> Rob,
> >>=20
> >> I think there are two related issues here:
> >>=20
> >> a) If we need normalized strings (to avoid comparison suprises), we
> >>   should have a common type for them; rfc6991-bis would be a proper
> >>   home. I am _not_ saying we should delay the tags document for this,
> >>   but we should think about providing a solution that can be easily
> >>   reused. Right now, we often use strings as part of keys, which can
> >>   lead to comparison issues.
> > [RW]=20
> >=20
> > I agree.  Note, I am also not proposing that we delay module-tags for r=
fc6991-bis.
> >=20
> > RFC 7950 states that strings are not normalized by default (section 9.4=
.2).  Thinking about this some more, I think that it is reasonable to make =
it the client's responsibility to normalize strings, if required.
> >=20
> > Chris, this would mean that no change to the typedef description is req=
uired.
> >=20
> >>=20
> >> b) It seems that normalized strings only solve part of the problem. If
> >>   an organization creates names for 'things', the organization likely
> >>   wants to further restrict the format of these names to something
> >>   sensible to avoid fun with different kinds of hyphens or emojis or
> >>   ... So while creative unicode characters may technically work,
> >>   there will likely be good reasons to avoid some of them. (There are
> >>   reasons why we have coding styles for most programming languages.)
> >>   These rules may, however, differ between organizations.
> >>=20
> >> We should not confuse a) and b). If IANA needs additional guidelines f=
or
> >> tags (their coding style for tags), then we should provide these
> >> guidelines, i.e., this is a type b) action. The type a) action is need=
ed
> >> to technically ensure that comparisons do not lead to surprises. But a=
)
> >> won't be an answer for all type b) issues. Of course, we could give IA=
NA a
> >> 'coding style' that avoids any normalization issues. This would make I=
ANA
> >> assigned tags safe but would not avoid comparison surprises for other
> >> sources of tags.
> > [RW]=20
> >=20
> > So, solving B seems reasonable for the IANA defined module tags, follow=
ing Alexey's suggestion of referencing RFC 5198 for normalization.
>=20
> I will not put the additional text in the typedef and instead put it in t=
he guidance for the IANA registry then:
>=20
>  This registry allocates tags that have the registered prefix
>  "ietf:". New values should be well considered and not achievable
> -through a combination of already existing IETF tags.
> +through a combination of already existing IETF tags. For comparing
> +non-ascii strings, 'NFC' [[RFC5198]] normalization SHOULD be used.
>=20
> Unless there are further objections, I believe this, and a small change t=
o the security section suggested by Benjamin K, will clear the remaining DI=
SCUSS so I will republish soon.

Perhaps this wording is clearer about who is responsible for normalization:

-through a combination of already existing IETF tags.
+through a combination of already existing IETF tags. IANA assigned
+tags must conform to Net-Unicode as defined in RFC 5198 and they shall
+not need normalization.

And then lets hope that others assigning tags follow this advice. ;-)

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon Feb 17 18:45:54 2020
Return-Path: <joelja@bogus.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FAAB12086C; Mon, 17 Feb 2020 11:42:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2CYkOIiGdMOO; Mon, 17 Feb 2020 11:42:02 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36BC4120866; Mon, 17 Feb 2020 11:42:02 -0800 (PST)
Received: from jmbp.local ([IPv6:2601:647:4200:5811:1404:b125:cb24:4770]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id 01HJg1ph002190; Mon, 17 Feb 2020 19:42:01 GMT (envelope-from joelja@bogus.com)
X-Authentication-Warning: nagasaki.bogus.com: Host [IPv6:2601:647:4200:5811:1404:b125:cb24:4770] claimed to be jmbp.local
To: netmod@ietf.org, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
From: Joel Jaeggli <joelja@bogus.com>
X-Pep-Version: 2.0
Message-ID: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com>
Date: Mon, 17 Feb 2020 11:42:01 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------------4DC665A41B2600058FE875E7"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/9gLuB6ISjnxO0ww11R7DTKeHuh8>
Subject: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 19:42:04 -0000

This is a multi-part message in MIME format.
--------------4DC665A41B2600058FE875E7
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Greetings,

This was supposed to get processed shortly after IETF 106, however I lost=
 track of it. We are therefore running a 2 week WGLC on draft-ietf-netmod=
-nmda-diff-03.

https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/

the 02 - 03 diff is available here:

https://www.ietf.org/rfcdiff?url1=3Ddraft-ietf-netmod-nmda-diff-02&url2=3D=
draft-ietf-netmod-nmda-diff-03

Please send email to the list indicating your support or concerns.

This WGLC will conclude Monday March 2nd.


Thank you,
NETMOD WG Chairs


--------------4DC665A41B2600058FE875E7
Content-Type: application/pgp-keys;
 name="pEpkey.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="pEpkey.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQENBF0zjHcBCAC/VccTV8/Owi3MQVGop8umVKn4stHzV/F4/5+ixMnzkhhRsI1L
305ew6Uh+ypYkKn28X7B5+3zNIRxK+JKkV9QKufSBPFcTd41xoknMtCMSr5QZIln
A61tLz2oCIdB6eiTrzI60pHwd0idCOmAEqUP8JLfaQZK9JNQ416Kb/8CHiDhkG0N
17l0EYT+uVVBlUbSAgbaw6gO2csUPeASB6oiFd9AdCBVMQsQ4Q57Giz1oFam/FJw
igtZ4TG+fW8dM1k8ngyonN8RzdTwnkkPLCNrttdOfjrv9llianW9Jz48l52ViT39
S82tYLkDuNbQ0AJKK8lniYz0yvs47k5WHF/VABEBAAG0H0pvZWwgSmFlZ2dsaSA8
am9lbGphQGJvZ3VzLmNvbT6JAVQEEwEIAD4WIQTSCLPd1dloH5f5hauFzc47B3GZ
7AUCXTOMdwIbAwUJAeEzgAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRCFzc47
B3GZ7HcvCAChCaaK8xnP5z7bxz5y5tX15fpEzjjhz0fHe32gJ2uZblWzhX6ch/6z
2k51Pcnf0FJj788Nu+WI0kF/U81jByvbz5WPlEBm7E/D0HLxsIWkbt0AlNjiDIP8
WuTZ0Lom/m7YFzwLTN7g+MI5Jqui/LEKcKAqoo5ioGsDGOIa9Fq7/WWkx7fIYvTR
pqSpPKdZs3kz1z9QvncyM3IrY7fOMD4hShCwcA2HU+rl61g6aIZmpG7LXT0ZlHfY
UMk8zxL/8/S89p7ZPxhxrjDeYMPxlexmWY9KZS6Ek6ugO2udHeEDagpUpUrmqEgg
tK8qSsmclqqWXWps5Bl8JLueamnwV+77uQENBF0zjHcBCADWGXodjIueeHPimoj7
55ExPKJvP8ECZProTxJ86N5xmLP9Fbs70FKSxRwv4at1fWgvEwOU9w0ibq7CT+wo
neboxFsWh6GEHlskSlgr5MpqCJXSpcoHABR7aBaBecFAD2YS3Zaf7GUCHcl51Bb8
7Xuj59tS8S5RCMtQ5spAL1unLt/rIBbEaiJR24/vJQLuZAJtAeUQgy0s2daBFKfL
j/7AIVGTpbFSpM3iiOOjFnvQsWapzxheLNS57OY7DaQWDsd/E8zFHcTJLpotST4r
AkWnXvrCxOkFKX+WJ1TKiy8I0enIa1U8aB+9YswHy4fE3GbGqeMDjSxCziNLKKe+
MlZ1ABEBAAGJATwEGAEIACYWIQTSCLPd1dloH5f5hauFzc47B3GZ7AUCXTOMdwIb
DAUJAeEzgAAKCRCFzc47B3GZ7G9dB/9mvCNEjuJVv9IdcziUFrWX8r0rZPRTw+iH
1EKxpE5RWU+LTf3dNJWz/s8pItLkevjIz4tLOdoAa8awj4xqoLkoVFr/LTU7ugaF
ZksanT5/E5ZsDm/ngsdUAgOwZvalOU6cdj7Utzk1xWbGfPLnx86a8VzEaCMtzNX6
roW3zJPBcxnDekuvuHnEiAvUBDGhf2GcVafVRuyM0MOlT7jQ0B8N6mcmojJFSJvO
4jFLiT2/9vPgl4i41S3P8jbjEBQ24U26BDBuB3yNOvoaPDcRUsC1sKHHZCr1cwan
0E4HFJ5kouvANneQTsH+QtWnGZ9mtDrmR+qZ4p7+4dXve+HsG64S
=3DmE9q
-----END PGP PUBLIC KEY BLOCK-----

--------------4DC665A41B2600058FE875E7--


From nobody Mon Feb 17 18:46:00 2020
Return-Path: <joelja@bogus.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5966F120864; Mon, 17 Feb 2020 11:44:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.791
X-Spam-Level: 
X-Spam-Status: No, score=-0.791 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, LOCALPART_IN_SUBJECT=1.107, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tmKsD6VXBkVO; Mon, 17 Feb 2020 11:44:37 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23985120052; Mon, 17 Feb 2020 11:44:37 -0800 (PST)
Received: from jmbp.local ([IPv6:2601:647:4200:5811:1404:b125:cb24:4770]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id 01HJiasr002254; Mon, 17 Feb 2020 19:44:36 GMT (envelope-from joelja@bogus.com)
X-Authentication-Warning: nagasaki.bogus.com: Host [IPv6:2601:647:4200:5811:1404:b125:cb24:4770] claimed to be jmbp.local
To: "draft-ietf-netmod-nmda-diff@ietf.org" <draft-ietf-netmod-nmda-diff@ietf.org>, netmod@ietf.org
From: Joel Jaeggli <joelja@bogus.com>
X-Pep-Version: 2.0
Message-ID: <14dcbe36-43c3-0a21-4ec8-ad78019eefea@bogus.com>
Date: Mon, 17 Feb 2020 11:44:36 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------------59F1E6EB0A9A3056CDE13FEE"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ZGCKFjRtWkU8b_pbZipkxMdd2Zk>
Subject: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 19:44:39 -0000

This is a multi-part message in MIME format.
--------------59F1E6EB0A9A3056CDE13FEE
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Authors, Contributors, WG,

As part of the preparation for WG Last Call:

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.



--------------59F1E6EB0A9A3056CDE13FEE
Content-Type: application/pgp-keys;
 name="pEpkey.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="pEpkey.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----

mQENBF0zjHcBCAC/VccTV8/Owi3MQVGop8umVKn4stHzV/F4/5+ixMnzkhhRsI1L
305ew6Uh+ypYkKn28X7B5+3zNIRxK+JKkV9QKufSBPFcTd41xoknMtCMSr5QZIln
A61tLz2oCIdB6eiTrzI60pHwd0idCOmAEqUP8JLfaQZK9JNQ416Kb/8CHiDhkG0N
17l0EYT+uVVBlUbSAgbaw6gO2csUPeASB6oiFd9AdCBVMQsQ4Q57Giz1oFam/FJw
igtZ4TG+fW8dM1k8ngyonN8RzdTwnkkPLCNrttdOfjrv9llianW9Jz48l52ViT39
S82tYLkDuNbQ0AJKK8lniYz0yvs47k5WHF/VABEBAAG0H0pvZWwgSmFlZ2dsaSA8
am9lbGphQGJvZ3VzLmNvbT6JAVQEEwEIAD4WIQTSCLPd1dloH5f5hauFzc47B3GZ
7AUCXTOMdwIbAwUJAeEzgAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRCFzc47
B3GZ7HcvCAChCaaK8xnP5z7bxz5y5tX15fpEzjjhz0fHe32gJ2uZblWzhX6ch/6z
2k51Pcnf0FJj788Nu+WI0kF/U81jByvbz5WPlEBm7E/D0HLxsIWkbt0AlNjiDIP8
WuTZ0Lom/m7YFzwLTN7g+MI5Jqui/LEKcKAqoo5ioGsDGOIa9Fq7/WWkx7fIYvTR
pqSpPKdZs3kz1z9QvncyM3IrY7fOMD4hShCwcA2HU+rl61g6aIZmpG7LXT0ZlHfY
UMk8zxL/8/S89p7ZPxhxrjDeYMPxlexmWY9KZS6Ek6ugO2udHeEDagpUpUrmqEgg
tK8qSsmclqqWXWps5Bl8JLueamnwV+77uQENBF0zjHcBCADWGXodjIueeHPimoj7
55ExPKJvP8ECZProTxJ86N5xmLP9Fbs70FKSxRwv4at1fWgvEwOU9w0ibq7CT+wo
neboxFsWh6GEHlskSlgr5MpqCJXSpcoHABR7aBaBecFAD2YS3Zaf7GUCHcl51Bb8
7Xuj59tS8S5RCMtQ5spAL1unLt/rIBbEaiJR24/vJQLuZAJtAeUQgy0s2daBFKfL
j/7AIVGTpbFSpM3iiOOjFnvQsWapzxheLNS57OY7DaQWDsd/E8zFHcTJLpotST4r
AkWnXvrCxOkFKX+WJ1TKiy8I0enIa1U8aB+9YswHy4fE3GbGqeMDjSxCziNLKKe+
MlZ1ABEBAAGJATwEGAEIACYWIQTSCLPd1dloH5f5hauFzc47B3GZ7AUCXTOMdwIb
DAUJAeEzgAAKCRCFzc47B3GZ7G9dB/9mvCNEjuJVv9IdcziUFrWX8r0rZPRTw+iH
1EKxpE5RWU+LTf3dNJWz/s8pItLkevjIz4tLOdoAa8awj4xqoLkoVFr/LTU7ugaF
ZksanT5/E5ZsDm/ngsdUAgOwZvalOU6cdj7Utzk1xWbGfPLnx86a8VzEaCMtzNX6
roW3zJPBcxnDekuvuHnEiAvUBDGhf2GcVafVRuyM0MOlT7jQ0B8N6mcmojJFSJvO
4jFLiT2/9vPgl4i41S3P8jbjEBQ24U26BDBuB3yNOvoaPDcRUsC1sKHHZCr1cwan
0E4HFJ5kouvANneQTsH+QtWnGZ9mtDrmR+qZ4p7+4dXve+HsG64S
=3DmE9q
-----END PGP PUBLIC KEY BLOCK-----

--------------59F1E6EB0A9A3056CDE13FEE--


From nobody Mon Feb 17 18:46:05 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 300CC120864 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 11:47:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z-mNJBiTi204 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 11:47:39 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 984A5120052 for <netmod@ietf.org>; Mon, 17 Feb 2020 11:47:39 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 3221260B79; Mon, 17 Feb 2020 19:47:38 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 14:47:37 -0500
Cc: Christian Hopps <chopps@chopps.org>, netmod@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/8NB4Tb4qoxvU-Z1YOJykmuHZ2K4>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 19:47:42 -0000

> On Feb 17, 2020, at 11:51 AM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote:
>=20
> Hi -
>=20
> On 2/17/2020 3:15 AM, Christian Hopps wrote:
> ...
> > BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) =
once dealing with LFs and CRs which lucky for us is not part of a tags =
allowable characters.
>=20
> There are lots of other things that complicate life.  The Yang string =
definition
> circumscribes some of them, but not all.
>=20
>> "
>>      typedef tag {
>>        type string {
>>          length "1..max";
>>          pattern '[\S ]+';
>>        }
>> "
>=20
> This pattern doesn't make sense to me when I try to understand it =
using
> https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes
> It excludes "symbols", but permits, for example, paragraph separators =
and
> formatting characters and such delights as zero-width non-joiner. =
Also, in
> complementing the "all symbols" category, it seems to me it already =
permits
> space, so I don't see why it calls out space again.

The intent was to have the pattern match the description immediately =
below it:

"A tag value is composed of a standard prefix followed by any type =
'string' value that does not include carriage return, newline or tab =
characters."

Does this pattern fail in doing that?

If this requires anymore work to get right then I think we should drop =
the pattern, as this isn't the document to come up with a better way to =
deal with the apparent ugliness of UTF strings in YANG. The overriding =
intent is to leave it to the users to decide what they want to put in =
there.

Thanks,
Chris.

> Randy
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Mon Feb 17 18:46:10 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 303E012086D; Mon, 17 Feb 2020 11:49:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f4QbRz11qE79; Mon, 17 Feb 2020 11:49:52 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 2A559120052; Mon, 17 Feb 2020 11:49:52 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 74BD660B79; Mon, 17 Feb 2020 19:49:51 +0000 (UTC)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <20200217170952.rkgyjdtvepfh2lzf@anna.jacobs.jacobs-university.de>
Date: Mon, 17 Feb 2020 14:49:50 -0500
Cc: Christian Hopps <chopps@chopps.org>, "Rob Wilton (rwilton)" <rwilton@cisco.com>, Alexey Melnikov <aamelnikov@fastmail.fm>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>, The IESG <iesg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <2D28757C-E1F4-45E5-A8C6-0E45B52F5BD4@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <20200213183857.zhn2eiiztqipwsq3@anna.jacobs.jacobs-university.de> <MN2PR11MB43662F57700DFF1B0C29BE5AB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <20200214143030.qfzhqdlk2gpd4tc3@anna.jacobs.jacobs-university.de> <MN2PR11MB43665A773E4CF5C3F87B62BBB5160@MN2PR11MB4366.namprd11.prod.outlook.com> <72E551FB-DA3E-4120-BC78-F3555B7496C3@chopps.org> <20200217170952.rkgyjdtvepfh2lzf@anna.jacobs.jacobs-university.de>
To: =?utf-8?B?IlNjaMO2bnfDpGxkZXIsIErDvHJnZW4i?= <J.Schoenwaelder@jacobs-university.de>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/IwawddFMaG-YEIoValh5_aS4BDs>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 19:49:55 -0000

> On Feb 17, 2020, at 12:09 PM, Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen =
<J.Schoenwaelder@jacobs-university.de> wrote:
>=20
> IANA assigned
> +tags must conform to Net-Unicode as defined in RFC 5198 and they =
shall
> +not need normalization.


Seems good to me. Changed locally.

Thanks,
Chris.=


From nobody Mon Feb 17 18:46:36 2020
Return-Path: <per@hedeland.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E3F1120864 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 11:57:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dRkbZhMMvX2j for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 11:57:28 -0800 (PST)
Received: from mailout.easydns.com (mailout.easydns.com [64.68.202.10]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7034A120052 for <netmod@ietf.org>; Mon, 17 Feb 2020 11:57:28 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailout.easydns.com (Postfix) with ESMTP id 2827EA041E; Mon, 17 Feb 2020 19:57:27 +0000 (UTC)
Received: from mailout.easydns.com ([127.0.0.1]) by localhost (emo13-pco.easydns.vpn [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5gROdBEsNu0s; Mon, 17 Feb 2020 19:57:27 +0000 (UTC)
Received: from hedeland.org (81-228-157-209-no289.tbcn.telia.com [81.228.157.209]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailout.easydns.com (Postfix) with ESMTPSA id 074D1A03D9; Mon, 17 Feb 2020 19:57:23 +0000 (UTC)
Received: from pluto.hedeland.org (pluto.hedeland.org [10.1.1.5]) by tellus.hedeland.org (8.15.2/8.15.2) with ESMTPS id 01HJvLGZ023491 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Mon, 17 Feb 2020 20:57:22 +0100 (CET) (envelope-from per@hedeland.org)
To: Christian Hopps <chopps@chopps.org>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Cc: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org>
From: Per Hedeland <per@hedeland.org>
Message-ID: <10c84d6f-0af5-1f47-d8af-8e9a6eba191e@hedeland.org>
Date: Mon, 17 Feb 2020 20:57:21 +0100
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.3.1
MIME-Version: 1.0
In-Reply-To: <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/EWuuh3vLC-1ZbuwNE7toKG8_1rc>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 19:57:30 -0000

On 2020-02-17 20:47, Christian Hopps wrote:
 >
 >
 >> On Feb 17, 2020, at 11:51 AM, Randy Presuhn <randy_presuhn@alumni.stanford.edu> wrote:
 >>
 >> Hi -
 >>
 >> On 2/17/2020 3:15 AM, Christian Hopps wrote:
 >> ...
 >>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) once dealing with LFs and CRs which lucky for us is not part of a tags allowable characters.
 >>
 >> There are lots of other things that complicate life.  The Yang string definition
 >> circumscribes some of them, but not all.
 >>
 >>> "
 >>>       typedef tag {
 >>>         type string {
 >>>           length "1..max";
 >>>           pattern '[\S ]+';
 >>>         }
 >>> "
 >>
 >> This pattern doesn't make sense to me when I try to understand it using
 >> https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes
 >> It excludes "symbols", but permits, for example, paragraph separators and
 >> formatting characters and such delights as zero-width non-joiner. Also, in
 >> complementing the "all symbols" category, it seems to me it already permits
 >> space, so I don't see why it calls out space again.

\S is not the *complement* of the "all symbols" category, it *is* the
"all symbols" category - a.k.a. the complement of \s ([#x20\t\n\r]).

 > The intent was to have the pattern match the description immediately below it:
 >
 > "A tag value is composed of a standard prefix followed by any type 'string' value that does not include carriage return, newline or tab characters."
 >
 > Does this pattern fail in doing that?

No, as far as I can see that is exactly what it does.

--Per

 > If this requires anymore work to get right then I think we should drop the pattern, as this isn't the document to come up with a better way to deal with the apparent ugliness of UTF strings in 
YANG. The overriding intent is to leave it to the users to decide what they want to put in there.
 >
 > Thanks,
 > Chris.
 >
 >> Randy
 >>
 >> _______________________________________________
 >> netmod mailing list
 >> netmod@ietf.org
 >> https://www.ietf.org/mailman/listinfo/netmod
 >
 > _______________________________________________
 > netmod mailing list
 > netmod@ietf.org
 > https://www.ietf.org/mailman/listinfo/netmod
 >


From nobody Mon Feb 17 18:49:11 2020
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC9B120874 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 13:42:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level: 
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6KiiFUXnNznH for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 13:42:13 -0800 (PST)
Received: from mail-pj1-f66.google.com (mail-pj1-f66.google.com [209.85.216.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5623120882 for <netmod@ietf.org>; Mon, 17 Feb 2020 13:42:13 -0800 (PST)
Received: by mail-pj1-f66.google.com with SMTP id d5so81777pjz.5 for <netmod@ietf.org>; Mon, 17 Feb 2020 13:42:13 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=HOxMv8Wu1zUNZJvRPXkWpm9+a2Z0oaJF2FpvGdmZojw=; b=MOZaDny840gxlekQqBKCDcTuw8YVIky9wnm0bdsOMiAmbPz5Us1/eRZFbBOUdnBQcR HHNRGlJj6oTl0Vnm8sXbQrjOg+NIdQO+RCnKdIrbj+QyaXoG9wO2+gam4rcMVMx/KFqS fFnw5i054VoW/J/0QqLYBXbjfJ+m11cJQDCQ5hg7++baEzd5zc/zANs6YxoQhwrTcRNS sDOyWCEqlvVxiWIhHU3l65KoBHboLJpwzHWZN9P3Z9xaE6OV+buqhqgCsSNxLyfCErRf mTE0Ns9VOBi0w5joKWTwzvCcBTYhbiafQ2MWHBLKpPfnk0HwmBwubK7/eC8nXbljbtJ3 MgiA==
X-Gm-Message-State: APjAAAU/BpsfWWIRXzOh0JLo7o/Ax0VgYL5FLTXuGJjqAmqdgmdVdpuB XgHx5Jje9JUB/3PaIp/pax9aXuu44c8=
X-Google-Smtp-Source: APXvYqzTPZq7uuZMxendooMvkjl18XhHXcc2ArvUykWUcqRkTbonOu+X/TRmOugrGtiJkJIg92rWxw==
X-Received: by 2002:a17:902:9890:: with SMTP id s16mr16224052plp.77.1581975732981;  Mon, 17 Feb 2020 13:42:12 -0800 (PST)
Received: from [192.168.1.106] (c-73-231-235-186.hsd1.ca.comcast.net. [73.231.235.186]) by smtp.gmail.com with ESMTPSA id i66sm1348987pfg.85.2020.02.17.13.42.12 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Feb 2020 13:42:12 -0800 (PST)
To: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 13:42:35 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0
MIME-Version: 1.0
In-Reply-To: <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-Antivirus: Avast (VPS 200217-0, 02/17/2020), Outbound message
X-Antivirus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/KxoSUi2WpapXhInG5JGTK0mTEUI>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 21:42:16 -0000

Hi -

On 2/17/2020 11:47 AM, Christian Hopps wrote:
>> On Feb 17, 2020, at 11:51 AM, Randy Presuhn 
>> <randy_presuhn@alumni.stanford.edu> wrote: Hi - On 2/17/2020 3:15 AM, 
>> Christian Hopps wrote: ...
>>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) 
>>> once dealing with LFs and CRs which lucky for us is not part of a 
>>> tags allowable characters. 
>> There are lots of other things that complicate life. The Yang string 
>> definition circumscribes some of them, but not all.
>>> " typedef tag { type string { length "1..max"; pattern '[\S ]+'; } " 
>> This pattern doesn't make sense to me when I try to understand it 
>> using 
>> https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes 
>> It excludes "symbols", but permits, for example, paragraph separators 
>> and formatting characters and such delights as zero-width non-joiner. 
>> Also, in complementing the "all symbols" category, it seems to me it 
>> already permits space, so I don't see why it calls out space again. 
> The intent was to have the pattern match the description immediately 
> below it: "A tag value is composed of a standard prefix followed by 
> any type 'string' value that does not include carriage return, newline 
> or tab characters." Does this pattern fail in doing that?

Yes, what it accomplishes does not match the stated intent.
I suspect you may have intended something like '[\Z ]+'
See https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes

Randy


From nobody Mon Feb 17 18:49:48 2020
Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 147C1120048 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:14:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2YhAGhAiqFa0 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:14:31 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 1BF5C120881 for <netmod@ietf.org>; Mon, 17 Feb 2020 14:14:31 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 707C660B5D; Mon, 17 Feb 2020 22:14:30 +0000 (UTC)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 17:14:29 -0500
Cc: Christian Hopps <chopps@chopps.org>, netmod@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BwGsm0pad7F0CuuyLInpVV5DJRk>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 22:14:45 -0000

> On Feb 17, 2020, at 4:42 PM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote:
>=20
> Hi -
>=20
> On 2/17/2020 11:47 AM, Christian Hopps wrote:
>>> On Feb 17, 2020, at 11:51 AM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote: Hi - On 2/17/2020 3:15 AM, =
Christian Hopps wrote: ...
>>>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I =
saw) once dealing with LFs and CRs which lucky for us is not part of a =
tags allowable characters.=20
>>> There are lots of other things that complicate life. The Yang string =
definition circumscribes some of them, but not all.
>>>> " typedef tag { type string { length "1..max"; pattern '[\S ]+'; } =
"=20
>>> This pattern doesn't make sense to me when I try to understand it =
using =
https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes It =
excludes "symbols", but permits, for example, paragraph separators and =
formatting characters and such delights as zero-width non-joiner. Also, =
in complementing the "all symbols" category, it seems to me it already =
permits space, so I don't see why it calls out space again.=20
>> The intent was to have the pattern match the description immediately =
below it: "A tag value is composed of a standard prefix followed by any =
type 'string' value that does not include carriage return, newline or =
tab characters." Does this pattern fail in doing that?
>=20
> Yes, what it accomplishes does not match the stated intent.

I'm finding this hard to believe looking at the definition of "\S" which =
is "everything but space, tab, newline and carriage return" and then =
adding "space". Seems to match the definition unless we quibble over the =
prefix (which I don't think we are).

> I suspect you may have intended something like '[\Z ]+'
> See =
https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes

I don't think that's a valid pattern.

If you are talking about the property categories (where I see 'Z' =
mentioned as "All separators") then there doesn't appear to be a "lower =
means include, upper means exclude" relationship. Also it appears that =
to refer to one of these things the syntax is actually "\P{Z}" or =
"\p{Z}" not just "Z". So translating maybe that's "[\P{Z} ]"? I see =
nothing that defines how "catEsc" (\p{}) vs "compEsc" (\P{}) are =
different, but maybe the upper here means exclude.

I'm more inclined to just ditch any pattern or restriction the more this =
gets discussed. Let the user do what they want. If they want to include =
crazy unicode stuff (almost certainly they dont) then I guess that's =
what they want.

Thanks,
Chris.

>=20
> Randy
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>=20


From nobody Mon Feb 17 18:50:00 2020
Return-Path: <per@hedeland.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5B5412085E for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:31:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ntXix7V3xD-U for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:31:14 -0800 (PST)
Received: from mailout.easydns.com (mailout.easydns.com [64.68.202.10]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28429120048 for <netmod@ietf.org>; Mon, 17 Feb 2020 14:31:13 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailout.easydns.com (Postfix) with ESMTP id 1FCD7C0AED; Mon, 17 Feb 2020 22:31:13 +0000 (UTC)
Received: from mailout.easydns.com ([127.0.0.1]) by localhost (emo12-pco.easydns.vpn [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oihWEmU43LO1; Mon, 17 Feb 2020 22:31:13 +0000 (UTC)
Received: from hedeland.org (81-228-157-209-no289.tbcn.telia.com [81.228.157.209]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mailout.easydns.com (Postfix) with ESMTPSA id 329F1C0E6F; Mon, 17 Feb 2020 22:31:09 +0000 (UTC)
Received: from pluto.hedeland.org (pluto.hedeland.org [10.1.1.5]) by tellus.hedeland.org (8.15.2/8.15.2) with ESMTPS id 01HMV7Zv023809 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Mon, 17 Feb 2020 23:31:07 +0100 (CET) (envelope-from per@hedeland.org)
To: Christian Hopps <chopps@chopps.org>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Cc: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org>
From: Per Hedeland <per@hedeland.org>
Message-ID: <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org>
Date: Mon, 17 Feb 2020 23:31:07 +0100
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.3.1
MIME-Version: 1.0
In-Reply-To: <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/kvi_knF9D8A_G0jEXD1MHkWRv4U>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 22:31:17 -0000

On 2020-02-17 23:14, Christian Hopps wrote:
 >
 >
 >> On Feb 17, 2020, at 4:42 PM, Randy Presuhn <randy_presuhn@alumni.stanford.edu> wrote:
 >>
 >> Hi -
 >>
 >> On 2/17/2020 11:47 AM, Christian Hopps wrote:
 >>>> On Feb 17, 2020, at 11:51 AM, Randy Presuhn <randy_presuhn@alumni.stanford.edu> wrote: Hi - On 2/17/2020 3:15 AM, Christian Hopps wrote: ...
 >>>>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I saw) once dealing with LFs and CRs which lucky for us is not part of a tags allowable characters.
 >>>> There are lots of other things that complicate life. The Yang string definition circumscribes some of them, but not all.
 >>>>> " typedef tag { type string { length "1..max"; pattern '[\S ]+'; } "
 >>>> This pattern doesn't make sense to me when I try to understand it using https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes It excludes "symbols", but permits, for example, 
paragraph separators and formatting characters and such delights as zero-width non-joiner. Also, in complementing the "all symbols" category, it seems to me it already permits space, so I don't see 
why it calls out space again.
 >>> The intent was to have the pattern match the description immediately below it: "A tag value is composed of a standard prefix followed by any type 'string' value that does not include carriage 
return, newline or tab characters." Does this pattern fail in doing that?
 >>
 >> Yes, what it accomplishes does not match the stated intent.
 >
 > I'm finding this hard to believe looking at the definition of "\S" which is "everything but space, tab, newline and carriage return" and then adding "space". Seems to match the definition unless we 
quibble over the prefix (which I don't think we are).

+1

 >> I suspect you may have intended something like '[\Z ]+'
 >> See https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes
 >
 > I don't think that's a valid pattern.

+1

 > If you are talking about the property categories (where I see 'Z' mentioned as "All separators") then there doesn't appear to be a "lower means include, upper means exclude" relationship. Also it 
appears that to refer to one of these things the syntax is actually "\P{Z}" or "\p{Z}" not just "Z". So translating maybe that's "[\P{Z} ]"? I see nothing that defines how "catEsc" (\p{}) vs "compEsc" 
(\P{}) are different, but maybe the upper here means exclude.

The description is right above the definitions:

   The set containing all characters that have property X, can be
   identified with a category escape \p{X}. The complement of this set
   is specified with the category escape \P{X}. ([\P{X}] = [^\p{X}])

So yes, \P{Z} would be the complement of "All Separators", while your
original \S is the complement of \s ([#x20\t\n\r]). I.e. \P{Z} would
exclude "more separators", but is hardly worth the trouble I think -
and it is *not* the "stated intent".

 > I'm more inclined to just ditch any pattern or restriction the more this gets discussed. Let the user do what they want. If they want to include crazy unicode stuff (almost certainly they dont) 
then I guess that's what they want.

FWIW, as I already wrote, I think your original pattern is fine (and I
think Randy needs to have a closer look at the section he references).

--Per

 > Thanks,
 > Chris.
 >
 >>
 >> Randy
 >>
 >> _______________________________________________
 >> netmod mailing list
 >> netmod@ietf.org
 >> https://www.ietf.org/mailman/listinfo/netmod
 >>
 >
 > _______________________________________________
 > netmod mailing list
 > netmod@ietf.org
 > https://www.ietf.org/mailman/listinfo/netmod
 >


From nobody Mon Feb 17 18:50:06 2020
Return-Path: <01000170554bb6b1-62072f16-2ead-4c4c-b39f-99731a334722-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97B291200F5 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:36:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 55dPXHx8V4hu for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:36:31 -0800 (PST)
Received: from a48-90.smtp-out.amazonses.com (a48-90.smtp-out.amazonses.com [54.240.48.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABCA7120058 for <netmod@ietf.org>; Mon, 17 Feb 2020 14:36:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581978990; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=xYjS0BqbXt6lO+/pGMVfqKOISxJDPvviUm5zxbzsdxU=; b=kL7tTyVCOufObPvGYrJx2XK3YizpFrNW7BjNso+fdHO9ddEUGM7Fr9XY3lAVJTEx QR72agHaMbwL78aM1I5cYdzGuRCuA9tDV9vg/1lvs+5F55dOz5jB/6sYxt5I+uUFJEn RgHyLTy+wRhuoXf38blIfe0rlPEuO4hph+LWc3pM=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <01000170554bb6b1-62072f16-2ead-4c4c-b39f-99731a334722-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8DD51628-6EF3-4DAD-AB40-C2EECC226121"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 17 Feb 2020 22:36:30 +0000
In-Reply-To: <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org>
Cc: Christian Hopps <chopps@chopps.org>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>, "netmod@ietf.org" <netmod@ietf.org>
To: Per Hedeland <per@hedeland.org>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org> <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.17-54.240.48.90
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/cG1zzpcsGkaeGSECKXGh8w13dtw>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 22:36:35 -0000

--Apple-Mail=_8DD51628-6EF3-4DAD-AB40-C2EECC226121
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

FWIUW, I created a YANG-Next issue to track the needed long-term update =
to RFC 7950:

https://github.com/netmod-wg/yang-next/issues/102 =
<https://github.com/netmod-wg/yang-next/issues/102>

Kent


> On Feb 17, 2020, at 5:31 PM, Per Hedeland <per@hedeland.org> wrote:
>=20
> On 2020-02-17 23:14, Christian Hopps wrote:
> >
> >
> >> On Feb 17, 2020, at 4:42 PM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote:
> >>
> >> Hi -
> >>
> >> On 2/17/2020 11:47 AM, Christian Hopps wrote:
> >>>> On Feb 17, 2020, at 11:51 AM, Randy Presuhn =
<randy_presuhn@alumni.stanford.edu> wrote: Hi - On 2/17/2020 3:15 AM, =
Christian Hopps wrote: ...
> >>>>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I =
saw) once dealing with LFs and CRs which lucky for us is not part of a =
tags allowable characters.
> >>>> There are lots of other things that complicate life. The Yang =
string definition circumscribes some of them, but not all.
> >>>>> " typedef tag { type string { length "1..max"; pattern '[\S ]+'; =
} "
> >>>> This pattern doesn't make sense to me when I try to understand it =
using =
https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes It =
excludes "symbols", but permits, for example, paragraph separators and =
formatting characters and such delights as zero-width non-joiner. Also, =
in complementing the "all symbols" category, it seems to me it already =
permits space, so I don't see why it calls out space again.
> >>> The intent was to have the pattern match the description =
immediately below it: "A tag value is composed of a standard prefix =
followed by any type 'string' value that does not include carriage =
return, newline or tab characters." Does this pattern fail in doing =
that?
> >>
> >> Yes, what it accomplishes does not match the stated intent.
> >
> > I'm finding this hard to believe looking at the definition of "\S" =
which is "everything but space, tab, newline and carriage return" and =
then adding "space". Seems to match the definition unless we quibble =
over the prefix (which I don't think we are).
>=20
> +1
>=20
> >> I suspect you may have intended something like '[\Z ]+'
> >> See =
https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-classes
> >
> > I don't think that's a valid pattern.
>=20
> +1
>=20
> > If you are talking about the property categories (where I see 'Z' =
mentioned as "All separators") then there doesn't appear to be a "lower =
means include, upper means exclude" relationship. Also it appears that =
to refer to one of these things the syntax is actually "\P{Z}" or =
"\p{Z}" not just "Z". So translating maybe that's "[\P{Z} ]"? I see =
nothing that defines how "catEsc" (\p{}) vs "compEsc" (\P{}) are =
different, but maybe the upper here means exclude.
>=20
> The description is right above the definitions:
>=20
>  The set containing all characters that have property X, can be
>  identified with a category escape \p{X}. The complement of this set
>  is specified with the category escape \P{X}. ([\P{X}] =3D [^\p{X}])
>=20
> So yes, \P{Z} would be the complement of "All Separators", while your
> original \S is the complement of \s ([#x20\t\n\r]). I.e. \P{Z} would
> exclude "more separators", but is hardly worth the trouble I think -
> and it is *not* the "stated intent".
>=20
> > I'm more inclined to just ditch any pattern or restriction the more =
this gets discussed. Let the user do what they want. If they want to =
include crazy unicode stuff (almost certainly they dont) then I guess =
that's what they want.
>=20
> FWIW, as I already wrote, I think your original pattern is fine (and I
> think Randy needs to have a closer look at the section he references).
>=20
> --Per
>=20
> > Thanks,
> > Chris.
> >
> >>
> >> Randy
> >>
> >> _______________________________________________
> >> netmod mailing list
> >> netmod@ietf.org
> >> https://www.ietf.org/mailman/listinfo/netmod
> >>
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
> >
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--Apple-Mail=_8DD51628-6EF3-4DAD-AB40-C2EECC226121
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">FWIUW, I created a YANG-Next issue to track the needed =
long-term update to RFC 7950:<div class=3D""><br class=3D""></div><div =
class=3D""><a href=3D"https://github.com/netmod-wg/yang-next/issues/102" =
class=3D"">https://github.com/netmod-wg/yang-next/issues/102</a><br =
class=3D""><div><br class=3D""></div><div>Kent</div><div><br =
class=3D""></div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Feb 17, 2020, at 5:31 PM, Per Hedeland =
&lt;<a href=3D"mailto:per@hedeland.org" =
class=3D"">per@hedeland.org</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">On =
2020-02-17 23:14, Christian Hopps wrote:<br class=3D"">&gt;<br =
class=3D"">&gt;<br class=3D"">&gt;&gt; On Feb 17, 2020, at 4:42 PM, =
Randy Presuhn &lt;<a href=3D"mailto:randy_presuhn@alumni.stanford.edu" =
class=3D"">randy_presuhn@alumni.stanford.edu</a>&gt; wrote:<br =
class=3D"">&gt;&gt;<br class=3D"">&gt;&gt; Hi -<br class=3D"">&gt;&gt;<br =
class=3D"">&gt;&gt; On 2/17/2020 11:47 AM, Christian Hopps wrote:<br =
class=3D"">&gt;&gt;&gt;&gt; On Feb 17, 2020, at 11:51 AM, Randy Presuhn =
&lt;<a href=3D"mailto:randy_presuhn@alumni.stanford.edu" =
class=3D"">randy_presuhn@alumni.stanford.edu</a>&gt; wrote: Hi - On =
2/17/2020 3:15 AM, Christian Hopps wrote: ...<br =
class=3D"">&gt;&gt;&gt;&gt;&gt; BTW, I did look at the "SHOULD be =
avoided" (occurs twice that I saw) once dealing with LFs and CRs which =
lucky for us is not part of a tags allowable characters.<br =
class=3D"">&gt;&gt;&gt;&gt; There are lots of other things that =
complicate life. The Yang string definition circumscribes some of them, =
but not all.<br class=3D"">&gt;&gt;&gt;&gt;&gt; " typedef tag { type =
string { length "1..max"; pattern '[\S ]+'; } "<br =
class=3D"">&gt;&gt;&gt;&gt; This pattern doesn't make sense to me when I =
try to understand it using <a =
href=3D"https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-clas=
ses" =
class=3D"">https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-c=
lasses</a> It excludes "symbols", but permits, for example, paragraph =
separators and formatting characters and such delights as zero-width =
non-joiner. Also, in complementing the "all symbols" category, it seems =
to me it already permits space, so I don't see why it calls out space =
again.<br class=3D"">&gt;&gt;&gt; The intent was to have the pattern =
match the description immediately below it: "A tag value is composed of =
a standard prefix followed by any type 'string' value that does not =
include carriage return, newline or tab characters." Does this pattern =
fail in doing that?<br class=3D"">&gt;&gt;<br class=3D"">&gt;&gt; Yes, =
what it accomplishes does not match the stated intent.<br =
class=3D"">&gt;<br class=3D"">&gt; I'm finding this hard to believe =
looking at the definition of "\S" which is "everything but space, tab, =
newline and carriage return" and then adding "space". Seems to match the =
definition unless we quibble over the prefix (which I don't think we =
are).<br class=3D""><br class=3D"">+1<br class=3D""><br =
class=3D"">&gt;&gt; I suspect you may have intended something like '[\Z =
]+'<br class=3D"">&gt;&gt; See <a =
href=3D"https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-clas=
ses" =
class=3D"">https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-c=
lasses</a><br class=3D"">&gt;<br class=3D"">&gt; I don't think that's a =
valid pattern.<br class=3D""><br class=3D"">+1<br class=3D""><br =
class=3D"">&gt; If you are talking about the property categories (where =
I see 'Z' mentioned as "All separators") then there doesn't appear to be =
a "lower means include, upper means exclude" relationship. Also it =
appears that to refer to one of these things the syntax is actually =
"\P{Z}" or "\p{Z}" not just "Z". So translating maybe that's "[\P{Z} ]"? =
I see nothing that defines how "catEsc" (\p{}) vs "compEsc" (\P{}) are =
different, but maybe the upper here means exclude.<br class=3D""><br =
class=3D"">The description is right above the definitions:<br =
class=3D""><br class=3D""> &nbsp;The set containing all characters that =
have property X, can be<br class=3D""> &nbsp;identified with a category =
escape \p{X}. The complement of this set<br class=3D""> &nbsp;is =
specified with the category escape \P{X}. ([\P{X}] =3D [^\p{X}])<br =
class=3D""><br class=3D"">So yes, \P{Z} would be the complement of "All =
Separators", while your<br class=3D"">original \S is the complement of =
\s ([#x20\t\n\r]). I.e. \P{Z} would<br class=3D"">exclude "more =
separators", but is hardly worth the trouble I think -<br class=3D"">and =
it is *not* the "stated intent".<br class=3D""><br class=3D"">&gt; I'm =
more inclined to just ditch any pattern or restriction the more this =
gets discussed. Let the user do what they want. If they want to include =
crazy unicode stuff (almost certainly they dont) then I guess that's =
what they want.<br class=3D""><br class=3D"">FWIW, as I already wrote, I =
think your original pattern is fine (and I<br class=3D"">think Randy =
needs to have a closer look at the section he references).<br =
class=3D""><br class=3D"">--Per<br class=3D""><br class=3D"">&gt; =
Thanks,<br class=3D"">&gt; Chris.<br class=3D"">&gt;<br =
class=3D"">&gt;&gt;<br class=3D"">&gt;&gt; Randy<br class=3D"">&gt;&gt;<br=
 class=3D"">&gt;&gt; _______________________________________________<br =
class=3D"">&gt;&gt; netmod mailing list<br class=3D"">&gt;&gt; <a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">&gt;&gt; <a =
href=3D"https://www.ietf.org/mailman/listinfo/netmod" =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod</a><br =
class=3D"">&gt;&gt;<br class=3D"">&gt;<br class=3D"">&gt; =
_______________________________________________<br class=3D"">&gt; =
netmod mailing list<br class=3D"">&gt; <a href=3D"mailto:netmod@ietf.org" =
class=3D"">netmod@ietf.org</a><br class=3D"">&gt; <a =
href=3D"https://www.ietf.org/mailman/listinfo/netmod" =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod</a><br =
class=3D"">&gt;<br class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">netmod mailing list<br class=3D""><a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/netmod<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_8DD51628-6EF3-4DAD-AB40-C2EECC226121--


From nobody Mon Feb 17 18:50:20 2020
Return-Path: <0100017055513529-e38125d5-da1d-4ff6-b982-b1bf318e6c1f-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 368E8120058 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:42:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0Kd6BLqnkjG2 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 14:42:32 -0800 (PST)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE31B120048 for <netmod@ietf.org>; Mon, 17 Feb 2020 14:42:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1581979350; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=464ugy+VrUbu7v3pcl2nyjcywuWUpDuNdEvOn8wKuA8=; b=PFQ4we4Zbbxf2zcYGVYHk07PUyyL3ypCKXVCYht4bHsnX/NwqT1dggt8ogjjoHwh R/C1nnOZ3XqpPnJ/7xeRACR9NuqGr6xTZKM/P4JJjijOoLso6SPVN6Rs3oiXTGqPFMr 2p6CSA+CJHv7BJ8oHhxWg1ZhvmwnjPmEM6J5ySTM=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100017055513529-e38125d5-da1d-4ff6-b982-b1bf318e6c1f-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_516799A5-78BF-40E1-A0AA-76F7D90FCE70"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 17 Feb 2020 22:42:30 +0000
In-Reply-To: <DB7PR07MB5657DBD01CC9E421E8CB3C56A0150@DB7PR07MB5657.eurprd07.prod.outlook.com>
Cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
To: tom petch <ietfc@btconnect.com>
References: <010001703f060085-7c6a3183-7f9f-4706-9be3-f64d9ea40fca-000000@email.amazonses.com> <MN2PR11MB4366EB460639F018FAE197C7B5150@MN2PR11MB4366.namprd11.prod.outlook.com> <DB7PR07MB5657DBD01CC9E421E8CB3C56A0150@DB7PR07MB5657.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.17-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/JiN4CkAvDYd5W2U3bkzOP2TkM44>
Subject: Re: [netmod] Implicit case statementa
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 22:42:34 -0000

--Apple-Mail=_516799A5-78BF-40E1-A0AA-76F7D90FCE70
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

A YANG-Next issue has been created to track a fix for this issue:

https://github.com/netmod-wg/yang-next/issues/103 =
<https://github.com/netmod-wg/yang-next/issues/103>

Kent


> On Feb 14, 2020, at 6:48 AM, tom petch <ietfc@btconnect.com> wrote:
>=20
> _____________________________________
> From: netmod <netmod-bounces@ietf.org> on behalf of Rob Wilton =
(rwilton) <rwilton@cisco.com>
> Sent: 14 February 2020 10:14
> To: Kent Watsen; netmod@ietf.org
> My interpretation matches the one that Martin gives in =
https://github.com/mbj4668/pyang/issues/559
>=20
> <tp>
>=20
> I was looking at=20
> draft-boydseda- ipfix-psamp-bulk-data-yang-model
> and see nine choice statements of which six have no case, two have a =
single case and one has multiple case.  The single case have a note to =
the effect that they may be augmented, the others have no note.  The no =
case do have multiple container or leaf statements.  It does make me =
curious.
>=20
> Tom Petch
>=20
>=20
> I.e. the short hand notation =E2=80=A6
>=20
>    choice test {
>      container foo {
>        if-feature disabled-feature;
>          ...
>      }
>    }
>=20
> is equivalent to:
>=20
>    choice test {
>      case foo {
>        container foo {
>          if-feature disabled-feature;
>            ...
>        }
>      }
>    }
>=20
> Filing an issue in YANG.Next to clarify, or further discuss, this =
seems helpful to me.
>=20
> Thanks,
> Rob
>=20
>=20
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Kent Watsen
> Sent: 13 February 2020 14:49
> To: netmod@ietf.org
> Subject: [netmod] Implicit case statementa
>=20
>=20
> RFC 7950 says:
>=20
>   As a shorthand, the "case" statement can be omitted if the branch
>=20
>   contains a single "anydata", "anyxml", "choice", "container", =
"leaf",
>=20
>   "list", or "leaf-list" statement.  In this case, the case node still
>=20
>   exists in the schema tree, and its identifier is the same as the
>=20
>   identifier of the child node.
>=20
> This seems clear, albeit incomplete, as inconsistencies [1] exist =
amongst `pyang`and `yanglint` (I did not test with `yangson`) in how the =
=E2=80=9Cif-feature=E2=80=9D statement is handled, though I imagine =
other statements (e.g., =E2=80=9Cwhen=E2=80=9D) may also fall into this =
discussion as well.
>=20
> Ultimately, the question is what Errata and/or YANG-next issue should =
be filed.   I=E2=80=99m okay either way, so long as it=E2=80=99s clear =
and can be implemented consistently across tooling.
>=20
> In the meanwhile, I recommend module designers avoid using the =
shorthand notation, as there are no known issues with the =E2=80=9Clonghan=
d=E2=80=9D notation.
>=20
> [1] https://github.com/mbj4668/pyang/issues/559
>=20
> Kent // contributor
>=20


--Apple-Mail=_516799A5-78BF-40E1-A0AA-76F7D90FCE70
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">A =
YANG-Next issue has been created to track a fix for this issue:<div =
class=3D""><br class=3D""></div><div class=3D""><a =
href=3D"https://github.com/netmod-wg/yang-next/issues/103" =
class=3D"">https://github.com/netmod-wg/yang-next/issues/103</a></div><div=
 class=3D""><br class=3D""></div><div class=3D"">Kent</div><div =
class=3D""><br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Feb 14, 2020, at 6:48 AM, tom petch &lt;<a =
href=3D"mailto:ietfc@btconnect.com" class=3D"">ietfc@btconnect.com</a>&gt;=
 wrote:</div><br class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"">_____________________________________<br class=3D"">From: =
netmod &lt;<a href=3D"mailto:netmod-bounces@ietf.org" =
class=3D"">netmod-bounces@ietf.org</a>&gt; on behalf of Rob Wilton =
(rwilton) &lt;<a href=3D"mailto:rwilton@cisco.com" =
class=3D"">rwilton@cisco.com</a>&gt;<br class=3D"">Sent: 14 February =
2020 10:14<br class=3D"">To: Kent Watsen; <a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">My interpretation matches the one that Martin gives in <a =
href=3D"https://github.com/mbj4668/pyang/issues/559" =
class=3D"">https://github.com/mbj4668/pyang/issues/559</a><br =
class=3D""><br class=3D"">&lt;tp&gt;<br class=3D""><br class=3D"">I was =
looking at <br class=3D"">draft-boydseda- =
ipfix-psamp-bulk-data-yang-model<br class=3D"">and see nine choice =
statements of which six have no case, two have a single case and one has =
multiple case. &nbsp;The single case have a note to the effect that they =
may be augmented, the others have no note. &nbsp;The no case do have =
multiple container or leaf statements. &nbsp;It does make me curious.<br =
class=3D""><br class=3D"">Tom Petch<br class=3D""><br class=3D""><br =
class=3D"">I.e. the short hand notation =E2=80=A6<br class=3D""><br =
class=3D""> &nbsp;&nbsp;&nbsp;choice test {<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;container foo {<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;if-feature =
disabled-feature;<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;...<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;}<br class=3D""> &nbsp;&nbsp;&nbsp;}<br =
class=3D""><br class=3D"">is equivalent to:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;&nbsp;choice test {<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;case foo {<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;container foo {<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;if-feature =
disabled-feature;<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;...<br =
class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;}<br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;}<br class=3D""> &nbsp;&nbsp;&nbsp;}<br =
class=3D""><br class=3D"">Filing an issue in YANG.Next to clarify, or =
further discuss, this seems helpful to me.<br class=3D""><br =
class=3D"">Thanks,<br class=3D"">Rob<br class=3D""><br class=3D""><br =
class=3D"">From: netmod &lt;<a href=3D"mailto:netmod-bounces@ietf.org" =
class=3D"">netmod-bounces@ietf.org</a>&gt; On Behalf Of Kent Watsen<br =
class=3D"">Sent: 13 February 2020 14:49<br class=3D"">To: <a =
href=3D"mailto:netmod@ietf.org" class=3D"">netmod@ietf.org</a><br =
class=3D"">Subject: [netmod] Implicit case statementa<br class=3D""><br =
class=3D""><br class=3D"">RFC 7950 says:<br class=3D""><br class=3D""> =
&nbsp;&nbsp;As a shorthand, the "case" statement can be omitted if the =
branch<br class=3D""><br class=3D""> &nbsp;&nbsp;contains a single =
"anydata", "anyxml", "choice", "container", "leaf",<br class=3D""><br =
class=3D""> &nbsp;&nbsp;"list", or "leaf-list" statement. &nbsp;In this =
case, the case node still<br class=3D""><br class=3D""> =
&nbsp;&nbsp;exists in the schema tree, and its identifier is the same as =
the<br class=3D""><br class=3D""> &nbsp;&nbsp;identifier of the child =
node.<br class=3D""><br class=3D"">This seems clear, albeit incomplete, =
as inconsistencies [1] exist amongst `pyang`and `yanglint` (I did not =
test with `yangson`) in how the =E2=80=9Cif-feature=E2=80=9D statement =
is handled, though I imagine other statements (e.g., =E2=80=9Cwhen=E2=80=9D=
) may also fall into this discussion as well.<br class=3D""><br =
class=3D"">Ultimately, the question is what Errata and/or YANG-next =
issue should be filed. &nbsp;&nbsp;I=E2=80=99m okay either way, so long =
as it=E2=80=99s clear and can be implemented consistently across =
tooling.<br class=3D""><br class=3D"">In the meanwhile, I recommend =
module designers avoid using the shorthand notation, as there are no =
known issues with the =E2=80=9Clonghand=E2=80=9D notation.<br =
class=3D""><br class=3D"">[1] <a =
href=3D"https://github.com/mbj4668/pyang/issues/559" =
class=3D"">https://github.com/mbj4668/pyang/issues/559</a><br =
class=3D""><br class=3D"">Kent // contributor<br class=3D""><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_516799A5-78BF-40E1-A0AA-76F7D90FCE70--


From nobody Mon Feb 17 18:54:07 2020
Return-Path: <randy_presuhn@alumni.stanford.edu>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26BDC120866 for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 16:31:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level: 
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T3IS562q05_L for <netmod@ietfa.amsl.com>; Mon, 17 Feb 2020 16:31:11 -0800 (PST)
Received: from mail-pf1-f177.google.com (mail-pf1-f177.google.com [209.85.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9F4712002E for <netmod@ietf.org>; Mon, 17 Feb 2020 16:31:11 -0800 (PST)
Received: by mail-pf1-f177.google.com with SMTP id 185so9738410pfv.3 for <netmod@ietf.org>; Mon, 17 Feb 2020 16:31:11 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=sYc9u1vxW8jHNYWDfooRvHFP3q1prEG1cvefx13p9CQ=; b=emkB1dd+GvPnQFoh3Pi9ws1q01mkPMsUjlYq7FKGqasnPKZqC8CTbsTQ6MKxDJ35gV 0KccEEwtE/Oo9bXsG3nsr1fvf5qGtBa2MN8WSQl7yqDom6g0l7UoLRP6+Ln5IbubX0V/ sq53UaTuY0B+81AeqFOsQj2rbgYQibvt57mxsItMU6Ho6AfMsSQZyTU+MVXip2F0QT4T JFjSflxslvmwDbs8U2GYnxHQ3TWAhToLb8XReZ8d2LoloRoXKrEcfvFcFwiVR4eOXTRt 7SNqNznSgAJD18cGPhYE+S3SroD3OXTtcdPKr977YPIA0FnYJvUssNKACBa1o6xcOavj l5QQ==
X-Gm-Message-State: APjAAAXUnLFkz8NPlWh249KyMfz0llK0D4x7CaJU63YHBOwbvRCCVSPG so9MEqK/V8Z52MzshMvphHiDbhRwziY=
X-Google-Smtp-Source: APXvYqypCRaE0X8JvJBcZ+QU1Nz87z3jeHS3L5D60IPAeK2Fx+MsWu+ELBB9WNdzPWDHgFXA4Wb84A==
X-Received: by 2002:a62:fc11:: with SMTP id e17mr2059019pfh.207.1581985870873;  Mon, 17 Feb 2020 16:31:10 -0800 (PST)
Received: from [192.168.1.106] (c-73-231-235-186.hsd1.ca.comcast.net. [73.231.235.186]) by smtp.gmail.com with ESMTPSA id p23sm2031003pgn.92.2020.02.17.16.31.09 for <netmod@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Feb 2020 16:31:10 -0800 (PST)
To: netmod@ietf.org
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org>
From: Randy Presuhn <randy_presuhn@alumni.stanford.edu>
Message-ID: <58e7afc1-9cc9-7f34-7692-3b58387d5029@alumni.stanford.edu>
Date: Mon, 17 Feb 2020 16:31:33 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0
MIME-Version: 1.0
In-Reply-To: <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Antivirus: Avast (VPS 200217-0, 02/17/2020), Outbound message
X-Antivirus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/KRfUA7F4AzO74q2962n5llZ0Q-w>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 00:31:13 -0000

Hi -

On 2/17/2020 2:14 PM, Christian Hopps wrote:
...
> If you are talking about the property categories (where I see 'Z' 
> mentioned as "All separators") then there doesn't appear to be a 
> "lower means include, upper means exclude" relationship. Also it 
> appears that to refer to one of these things the syntax is actually 
> "\P{Z}" or "\p{Z}" not just "Z". So translating maybe that's "[\P{Z} 
> ]"? I see nothing that defines how "catEsc" (\p{}) vs "compEsc" (\P{}) 
> are different, but maybe the upper here means exclude.

My error.  You're right that "[\P{Z} ]" is what the grammar would require
to eliminate all the space-like things while still allowing #x20 space.
The problem with "\S" is that the only kind of space it eliminates is #x20,
(which you then add back in in the regular expression) while Unicode has
a whole menagerie of other space-like creatures one might well want to
exclude from tags while still permitting #x20, as well as lots of other 
stuff
that is probably a bad idea to permit in tags.  That said...

> I'm more inclined to just ditch any pattern or restriction the more 
> this gets discussed. Let the user do what they want. If they want to 
> include crazy unicode stuff (almost certainly they dont) then I guess 
> that's what they want.

Yeah, doing so is almost a design pattern in Yang:  try to constrain 
things with
regular expressions, find out the expression is either too limiting or 
allows too
many invalid strings, then give up.  :-)  No judgement here - it is what 
it is, and
"done" has to take precedence over "perfect."

Randy


From nobody Tue Feb 18 03:12:56 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10B1C120271 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 03:12:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=I/wWrGFj; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Px1KQOip
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VT4md6fqG5T2 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 03:12:51 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18E1112013B for <netmod@ietf.org>; Tue, 18 Feb 2020 03:12:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4790; q=dns/txt; s=iport; t=1582024371; x=1583233971; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=IENRnIQprEcHAO/jsD9t+jJ5dIfSqSziNIuL5IS8ifs=; b=I/wWrGFjmG2Fy5v5dqVbf1eDiMpNdO5D8Mm9TFwGqpjFzIr8twhO/n8/ F3vEvWMZjAayPDkiZm/oLKKqyrL5dwoL+y4sYvmzDacHDg1j59HoxvnJs jUHEyeRqRXXagmzrwl2taucNIEgjUpyNopY0MjaB+HCm6fkK1N58LXIZw Y=;
IronPort-PHdr: =?us-ascii?q?9a23=3A2AclARECxHC2/SPlOOmOmp1GYnJ96bzpIg4Y7I?= =?us-ascii?q?YmgLtSc6Oluo7vJ1Hb+e4z1A3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNV?= =?us-ascii?q?cejNkO2QkpAcqLE0r+eeT1bigmG8JqX15+9Hb9Ok9QS47z?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DjAQBdxkte/51dJa1mDg0BAQEBAQE?= =?us-ascii?q?BBQEBAREBAQMDAQEBgXuBVCknBWxYIAQLKgqHUAOKeYJfmBGCUgNUCQEBAQw?= =?us-ascii?q?BARgLCgIEAQGDe0UCggMkOBMCAw0BAQUBAQECAQUEbYU3DIVmAQEBAQMBARA?= =?us-ascii?q?oBgEBJQcEBwELBAIBCBEEAQEBHhAnCx0IAgQBDQUIEQmDBYJKAy4BAgyhBgK?= =?us-ascii?q?BOYhigieCfwEBBYEvAQMHg3oYggwDBoE4jCQagUE/gRFHgkw+gmQBAQKBZYN?= =?us-ascii?q?AgiygU45FdgqCO5Z1myaObZs+AgQCBAUCDgEBBYFpIoFYcBU7gmxQGA2OHQw?= =?us-ascii?q?XFW8BAoJJhRSFBDt0gSmOVAGBCgUBAQ?=
X-IronPort-AV: E=Sophos;i="5.70,456,1574121600"; d="scan'208";a="439285276"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Feb 2020 11:12:50 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 01IBCneP024802 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 18 Feb 2020 11:12:50 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 18 Feb 2020 05:12:49 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 18 Feb 2020 05:12:48 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 18 Feb 2020 06:12:48 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Gvf0OaP4anU6VPMO3ikfqUdF6XsQllIJIez6ew0mc1cQ9QWtn8VLExu3wx0OEOWnD8DsyYxG2qvHsQcysAsUqWXjGnXSfeiPek9FrFWtCzwWw2S0S2vevcUAqSMXx6bpeZbXXm1IEMgX6l2f7LKQxE2Hphm/sWTC4bFljPJKWNvkAQwR9QxOSZb+rgayUTNi4w+gTc+lGcSkRjuaA17zEPHhJfa7aaIhaYl2d4MQWhA+OkX7MnTlac1cacbeKmVydqADWjoMJUd4iAXlX1363wGhfDbN7uwKXnp4UOULgeQ8zg7c711nPQ1NhlBWI7ZDx1aJc6Oh6lauYCFyCIpRGQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0h4cKySJYzr9hBg5J2JAKF36KJFQ7dThYir3qrGItK8=; b=OaZvTAUsJFMBr3l0eOdo3pVl5NwGGE2bpG0QhbiRFrwUGyC8DmNfkNvh5KLETyruEp6EbxnIxNFcjtVjkCsOsWUD7wLoShjqbX1MuSJIxcq+plTxXpSVasrjzXAK7WAppiQZAEiVGZm4MFEpAPQ99mL1D/+pED8wJ2ISh5EIPs/LG1huPP3bo9JmDkl8bXJt4Gm3AnRjky1h7lHqF7EidGXPU7oQNCZp9TD/H1gD4bZShKp459qbzXyphD4AVRHhmqhMHRvcNcg5Ec1uCCEKVnlLjf4+lTja0NL+2trd17b1FQzbrk1wOd22PhytwtCxJKUmIQhpuXzmWatygNaMtw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0h4cKySJYzr9hBg5J2JAKF36KJFQ7dThYir3qrGItK8=; b=Px1KQOipg8JOko+qJS3cIwRJQTVObMZSwqP2QWR4/FbF+sgg1YnCVbqs5ObwwNnJsanKWS3ZLNgNUd34wmNF2xIlmbvCTXVSvmgYLPPd7uQpWY726fqdHAxHrDWB8QL/7vaCEQA6tF3yNQZFXvWhDgUIWGc0nKHEz8Xf4ypzWF0=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4399.namprd11.prod.outlook.com (52.135.36.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22; Tue, 18 Feb 2020 11:12:47 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2729.032; Tue, 18 Feb 2020 11:12:47 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Per Hedeland <per@hedeland.org>, Christian Hopps <chopps@chopps.org>, Randy Presuhn <randy_presuhn@alumni.stanford.edu>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gaftpggAAIeQCAAAFigIAABDQAgABwz4CABESmAIAAXa6AgAAxS4CAACAfgIAACOqAgAAEpoCAANIMUA==
Date: Tue, 18 Feb 2020 11:12:47 +0000
Message-ID: <MN2PR11MB4366A6EE0AB49A4B6409D61CB5110@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <155499006434.22705.5858614581630974980.idtracker@ietfa.amsl.com> <7F3B9E7F-6AD8-4801-AE60-9F2D704DC69B@chopps.org> <2ee6b71c-bd2c-4676-9e14-cb240c6845c9@www.fastmail.com> <MN2PR11MB43668E4C0863B8A61857CE0CB5150@MN2PR11MB4366.namprd11.prod.outlook.com> <714842CF-A65A-40FD-A62D-6FA7E1A6801F@chopps.org> <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org> <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org>
In-Reply-To: <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f2715538-274a-4a25-3216-08d7b4637c51
x-ms-traffictypediagnostic: MN2PR11MB4399:
x-microsoft-antispam-prvs: <MN2PR11MB439949A3B026652A0CFB0993B5110@MN2PR11MB4399.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 031763BCAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(376002)(346002)(366004)(39860400002)(396003)(189003)(199004)(26005)(110136005)(55016002)(2906002)(71200400001)(9686003)(7696005)(33656002)(66476007)(186003)(66946007)(478600001)(966005)(76116006)(4326008)(86362001)(53546011)(6506007)(81156014)(81166006)(8936002)(8676002)(66446008)(64756008)(5660300002)(316002)(66556008)(52536014); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4399; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: UiwgNWUOr3FKckmp83dGzxqQXMGMbRikzdjdQ87A4yW2SjxcTChrH1qyF14qPWrTwHXzz06jPiFZyxljOif3wJRt7hOw+cnnf+X+ruwxgZXUlgLNxu31fw+qyQkmmpNxGqpy2cnY0hdnIn2dn9fX9w==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f2715538-274a-4a25-3216-08d7b4637c51
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Feb 2020 11:12:47.4833 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: b09SrS2dFtXCQj/ABcwPTxonxCswHInkYkcK4u+7YQziFcUboL4Ff5AEW9ZIstGLX8gTy+4uuvpZg/ikBdfvFw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4399
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/57g04Ujr1D537fRhD-rT3tgcx8g>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 11:12:54 -0000

I agree with Per.

I think that the original pattern (with the \S) is fine and captures the in=
tent clearly and simply.

I'm also not convinced of how many implementations would properly honour th=
e XML regex property categories, e.g., if the pattern statement has been tr=
anslated to another regex engine.

Thanks,
Rob


> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Per Hedeland
> Sent: 17 February 2020 22:31
> To: Christian Hopps <chopps@chopps.org>; Randy Presuhn
> <randy_presuhn@alumni.stanford.edu>
> Cc: netmod@ietf.org
> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> module-tags-07: (with DISCUSS)
>=20
> On 2020-02-17 23:14, Christian Hopps wrote:
>  >
>  >
>  >> On Feb 17, 2020, at 4:42 PM, Randy Presuhn
> <randy_presuhn@alumni.stanford.edu> wrote:
>  >>
>  >> Hi -
>  >>
>  >> On 2/17/2020 11:47 AM, Christian Hopps wrote:
>  >>>> On Feb 17, 2020, at 11:51 AM, Randy Presuhn
> <randy_presuhn@alumni.stanford.edu> wrote: Hi - On 2/17/2020 3:15 AM,
> Christian Hopps wrote: ...
>  >>>>> BTW, I did look at the "SHOULD be avoided" (occurs twice that I
> saw) once dealing with LFs and CRs which lucky for us is not part of a
> tags allowable characters.
>  >>>> There are lots of other things that complicate life. The Yang strin=
g
> definition circumscribes some of them, but not all.
>  >>>>> " typedef tag { type string { length "1..max"; pattern '[\S ]+'; }
> "
>  >>>> This pattern doesn't make sense to me when I try to understand it
> using https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-
> classes It excludes "symbols", but permits, for example, paragraph
> separators and formatting characters and such delights as zero-width non-
> joiner. Also, in complementing the "all symbols" category, it seems to me
> it already permits space, so I don't see why it calls out space again.
>  >>> The intent was to have the pattern match the description immediately
> below it: "A tag value is composed of a standard prefix followed by any
> type 'string' value that does not include carriage return, newline or tab
> characters." Does this pattern fail in doing that?
>  >>
>  >> Yes, what it accomplishes does not match the stated intent.
>  >
>  > I'm finding this hard to believe looking at the definition of "\S"
> which is "everything but space, tab, newline and carriage return" and the=
n
> adding "space". Seems to match the definition unless we quibble over the
> prefix (which I don't think we are).
>=20
> +1
>=20
>  >> I suspect you may have intended something like '[\Z ]+'
>  >> See https://www.w3.org/TR/2004/REC-xmlschema-2-20041028/#charcter-
> classes
>  >
>  > I don't think that's a valid pattern.
>=20
> +1
>=20
>  > If you are talking about the property categories (where I see 'Z'
> mentioned as "All separators") then there doesn't appear to be a "lower
> means include, upper means exclude" relationship. Also it appears that to
> refer to one of these things the syntax is actually "\P{Z}" or "\p{Z}" no=
t
> just "Z". So translating maybe that's "[\P{Z} ]"? I see nothing that
> defines how "catEsc" (\p{}) vs "compEsc"
> (\P{}) are different, but maybe the upper here means exclude.
>=20
> The description is right above the definitions:
>=20
>    The set containing all characters that have property X, can be
>    identified with a category escape \p{X}. The complement of this set
>    is specified with the category escape \P{X}. ([\P{X}] =3D [^\p{X}])
>=20
> So yes, \P{Z} would be the complement of "All Separators", while your
> original \S is the complement of \s ([#x20\t\n\r]). I.e. \P{Z} would
> exclude "more separators", but is hardly worth the trouble I think - and
> it is *not* the "stated intent".
>=20
>  > I'm more inclined to just ditch any pattern or restriction the more
> this gets discussed. Let the user do what they want. If they want to
> include crazy unicode stuff (almost certainly they dont) then I guess
> that's what they want.
>=20
> FWIW, as I already wrote, I think your original pattern is fine (and I
> think Randy needs to have a closer look at the section he references).
>=20
> --Per
>=20
>  > Thanks,
>  > Chris.
>  >
>  >>
>  >> Randy
>  >>
>  >> _______________________________________________
>  >> netmod mailing list
>  >> netmod@ietf.org
>  >> https://www.ietf.org/mailman/listinfo/netmod
>  >>
>  >
>  > _______________________________________________
>  > netmod mailing list
>  > netmod@ietf.org
>  > https://www.ietf.org/mailman/listinfo/netmod
>  >
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Tue Feb 18 03:20:04 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72605120639 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 03:20:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.437
X-Spam-Level: *
X-Spam-Status: No, score=1.437 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o4b8daaNfKFu for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 03:20:00 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70075.outbound.protection.outlook.com [40.107.7.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6259E120271 for <netmod@ietf.org>; Tue, 18 Feb 2020 03:20:00 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AvDO5XU+0PzpWXkKg5FIZVOAOzho1yq6OEolq2jeFtzxGN0PMBLSTGzgd83Z1rq7ZafVEeSKhS1rpfzYO7esbaY3RifpDa4mITApw+F6r5uFvU5/ThgBF3whquaSmJdFY8bg7QNSdm+omKlocn0P/QLyRlLOdVrtVQ8RJjMrd6KZYCZfcbpTXVllf5pSHXDrK1xJJjVL8MqO3BpkOiCOSHaytR36hmn8aVMyy5J+QabPRyKybxCXgp2XtbEndXp7Ei8MItn06qYRD2E0dnc51GdXYfpW7ZBzbYwsqXTHH0wYysEPhGuALDusKWyoxEfymsy1GY3IumJhORewl3d1AQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wUP9gY0DjCZX5Pv81Uo26Wu0zkTC2LyiGKhKAiiVkRs=; b=bdgUseuwh1SgC/Zhfre6+Z1Z8Jx24TVGdEgJtJwswYOcZoncMVyaQXmT5ez+bDlr0+yyxuFiMEtGOt7mmHyDjNBnBA3Nq6FjlGOLeFvq9UPPqvr9HbUfucWVw5q9w+yRhhR612MoLPiUeMB4x7xe6ZahV0lKB1ycrzhXYTkG3nGvnnrWw1nWBEbkbDhdpCQw4Jv1vdq0gq/ensqa6pUIpOpFEnwcB0xr7tVd3ggOMZoCUjvYkU+SslU1Z5Mtqn4z1mcA0j+KCOaRHf+9Xr0q6it6nStQYXotrqQsiE8PcPmYuBad4G5AKfEo/w8vw61gN2ER1m++Iz5gUlyyvn3AIg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wUP9gY0DjCZX5Pv81Uo26Wu0zkTC2LyiGKhKAiiVkRs=; b=h/JX7QgI30nNQ3eqvEMAYqz9JpbuYrwg/FVehg1AvlqExbAgD+K4K9mFhTZCZJxx0W3k4YpPKTdO34i6VX5VFmdm/h750bF1PU1AWgxGXUo2JGsePp9x8pm5ffinQ83A27Kini0xFwDfYLG+QjZAcsNpfGOaf14JDgzh5ZOChhE=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0486.EURP190.PROD.OUTLOOK.COM (10.165.167.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.29; Tue, 18 Feb 2020 11:19:57 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Tue, 18 Feb 2020 11:19:57 +0000
Received: from localhost (212.201.44.247) by AM0PR06CA0107.eurprd06.prod.outlook.com (2603:10a6:208:fa::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25 via Frontend Transport; Tue, 18 Feb 2020 11:19:57 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV5kxZaJjh2ww68Uallfbdbai0wKggzhkA
Date: Tue, 18 Feb 2020 11:19:57 +0000
Message-ID: <20200218111956.bmqx5i6fyjrx7qn4@anna.jacobs.jacobs-university.de>
References: <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org> <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org> <MN2PR11MB4366A6EE0AB49A4B6409D61CB5110@MN2PR11MB4366.namprd11.prod.outlook.com>
In-Reply-To: <MN2PR11MB4366A6EE0AB49A4B6409D61CB5110@MN2PR11MB4366.namprd11.prod.outlook.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM0PR06CA0107.eurprd06.prod.outlook.com (2603:10a6:208:fa::48) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 13ce7b32-f0b6-4252-b328-08d7b4647c73
x-ms-traffictypediagnostic: DB6P190MB0486:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB0486C11806B4FADF40EFB8D5DE110@DB6P190MB0486.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 031763BCAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39850400004)(366004)(346002)(396003)(376002)(189003)(199004)(66446008)(66556008)(64756008)(8936002)(71200400001)(81166006)(3450700001)(81156014)(66946007)(4326008)(8676002)(66476007)(26005)(2906002)(478600001)(16526019)(6486002)(786003)(86362001)(52116002)(6496006)(186003)(6916009)(4744005)(1076003)(5660300002)(316002)(956004); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0486; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: o/CJNBfzuNmuazMVTBD5p72U6UrQlKDHLJ0FVZoKvkQ3eALoGlQjujaabQF4tN2pv1/yJiGYymh1xoRIEflk7xELF5EZNyuyfT49uM7a4rgTRYuoQN09OuRdkXMfcZPrqH/5qKqwl9Nf4OLnRKElpQ==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <FE4CC228BADDC44B8CA008AA7EB792ED@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 13ce7b32-f0b6-4252-b328-08d7b4647c73
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Feb 2020 11:19:57.5640 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: qf0lz67SHrd7alFDbd8KB15SU1At8Esks3nbMaHBthRqd7gTpY39TktZw4sUUi0vpTAYHE1nRMi63qM/fd+tsNZw5fDkIa2hwFwYrb4sCmI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0486
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BtzXwiDgqKPsMpJJAzMMB1ettao>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 11:20:03 -0000

On Tue, Feb 18, 2020 at 11:12:47AM +0000, Rob Wilton (rwilton) wrote:
>=20
> I'm also not convinced of how many implementations would properly honour =
the XML regex property categories, e.g., if the pattern statement has been =
translated to another regex engine.
>

That's a weird argument. If there is agreement on a restriction and we
can express that restriction in a pattern, we should IMHO do so.

Note the order: It is backwards if there is first a pattern and as a
consequence we agree on that specific restriction.

Ideally, the agreed upon restriction is stated in the description and
if possible also expressed as a pattern. This way it does not matter
how implementations enforce the restriction and it is clear to
everyone what the pattern is trying to achieve.

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Tue Feb 18 08:44:23 2020
Return-Path: <joelja@bogus.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2439120099 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 08:44:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QcmMNZxJXhOl for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 08:44:19 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68831120077 for <netmod@ietf.org>; Tue, 18 Feb 2020 08:44:19 -0800 (PST)
Received: from jmbp.local ([IPv6:2601:647:4200:5811:935:433b:9073:f625]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id 01IGiIU0016925 for <netmod@ietf.org>; Tue, 18 Feb 2020 16:44:18 GMT (envelope-from joelja@bogus.com)
X-Authentication-Warning: nagasaki.bogus.com: Host [IPv6:2601:647:4200:5811:935:433b:9073:f625] claimed to be jmbp.local
To: netmod@ietf.org
From: Joel Jaeggli <joelja@bogus.com>
X-Pep-Version: 2.0
Message-ID: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>
Date: Tue, 18 Feb 2020 08:44:18 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------------0D228415F6576768B1BAD311"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/5zhom-YN8kUldBqwFjcXRF7QyDs>
Subject: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 16:44:22 -0000

This is a multi-part message in MIME format.
--------------0D228415F6576768B1BAD311
Content-Type: multipart/alternative;
 boundary="------------A40EB8B8B8C93072833EE10E"


--------------A40EB8B8B8C93072833EE10E
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

This email begins a 2 week working group adoption poll for:

https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06

Please voice your support or objections before the poll completes on
March 3rd.

Thanks
joel

--------------A40EB8B8B8C93072833EE10E
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>

    <meta http-equiv=3D"content-type" content=3D"text/html; charset=3DUTF=
-8">
  </head>
  <body>
    <div dir=3D"auto">
      <div dir=3D"ltr"><span style=3D"background-color:rgba(255,255,255,0=
)">This
          email begins a 2 week working group adoption poll for:</span>
        <div>
          <div><span style=3D"background-color:rgba(255,255,255,0)"></spa=
n><br>
            <span style=3D"background-color:rgba(255,255,255,0)"><a
                href=3D"https://tools.ietf.org/html/draft-wwx-netmod-even=
t-yang-06">https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06</a>=
</span></div>
          <div><span style=3D"background-color:rgba(255,255,255,0)"><br>
            </span></div>
          <div><span style=3D"background-color:rgba(255,255,255,0)">Pleas=
e
              voice your support or objections before the poll completes
              on March 3rd.</span></div>
          <div><span style=3D"background-color:rgba(255,255,255,0)"><br>
            </span></div>
          Thanks</div>
        <div>joel<br>
        </div>
      </div>
    </div>
  </body>
</html>

--------------A40EB8B8B8C93072833EE10E--

--------------0D228415F6576768B1BAD311
Content-Type: application/pgp-keys;
 name="pEpkey.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="pEpkey.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DmE9q
-----END PGP PUBLIC KEY BLOCK-----

--------------0D228415F6576768B1BAD311--


From nobody Tue Feb 18 08:45:59 2020
Return-Path: <joelja@bogus.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3998120020; Tue, 18 Feb 2020 08:45:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PtzIeTqm_uw1; Tue, 18 Feb 2020 08:45:56 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3973C120077; Tue, 18 Feb 2020 08:45:56 -0800 (PST)
Received: from jmbp.local ([IPv6:2601:647:4200:5811:935:433b:9073:f625]) (authenticated bits=0) by nagasaki.bogus.com (8.15.2/8.15.2) with ESMTPSA id 01IGjtAG016976; Tue, 18 Feb 2020 16:45:55 GMT (envelope-from joelja@bogus.com)
X-Authentication-Warning: nagasaki.bogus.com: Host [IPv6:2601:647:4200:5811:935:433b:9073:f625] claimed to be jmbp.local
To: draft-wwx-netmod-event-yang@ietf.org, netmod@ietf.org
From: Joel Jaeggli <joelja@bogus.com>
X-Pep-Version: 2.0
Message-ID: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
Date: Tue, 18 Feb 2020 08:45:55 -0800
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="------------8C795D099DF4D151CA65E292"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/HduD0y7gRqAg6pm7TAtJXVjfPuU>
Subject: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 16:45:58 -0000

This is a multi-part message in MIME format.
--------------8C795D099DF4D151CA65E292
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Authors, Contributors, WG,

As part of preparation for WG Adoption

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.


--------------8C795D099DF4D151CA65E292
Content-Type: application/pgp-keys;
 name="pEpkey.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="pEpkey.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DmE9q
-----END PGP PUBLIC KEY BLOCK-----

--------------8C795D099DF4D151CA65E292--


From nobody Tue Feb 18 10:00:32 2020
Return-Path: <i_bryskin@yahoo.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 204E7120045 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:00:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p9REfxXZvp-Q for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:00:26 -0800 (PST)
Received: from sonic303-22.consmr.mail.ne1.yahoo.com (sonic303-22.consmr.mail.ne1.yahoo.com [66.163.188.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4F12120018 for <netmod@ietf.org>; Tue, 18 Feb 2020 10:00:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1582048825; bh=CJDcp9CZbJ2P3yeh7qNbjsxRgTJ3XN3n9mmLR0KMH70=; h=Date:From:To:In-Reply-To:References:Subject:From:Subject; b=qpgOxJlsrylNlFO5V4G2045g14o2oBdDfbKp7ZZvoscjnPsAPlHIZBiFdbOdN+wu/WmiHhzbhpMpb3F2mpDsZyGAhZcviw08+YIDSbyXZOXr8vqS1NlmsMYk4hxV/Intuz8hdveZYW/NOXHcfJ9cCiAP9Wp/GUhpYPejLDVTyiLXKJJ7mcz85j3WimW2Lruk/N0FwuDgytcXfvgjNJZlvwsTiLa+dRkjBc4y/O7LSyK6caJqY3Fy922bJ1W39H2YbkzvF1GIgIjA4wkUs7XTq1mGWi4nvgj5XrYOMZntf3GRQY9Zt5wAu12w+BmIdhwb2GrqAk2eMabqgmd8xDDaZw==
X-YMail-OSG: OvkIQnwVM1l2vSBJT6utDNaDIrVcOSd6.LbtNbNLfvZZNE3zC_624LfuR14AO1n Zr0YH5MJR9NDU1z9GKtjCr0R1u8uN.ERi_95JQhnvCdPepUiAnYClN2q9uL8t7ND.FTYOlyz8N2n DLDCU3SoXh_nEgCiPRqf0xzuF0rAVhhfFqcO6tDELAbbIr7RexbMPnT0BK5fw1FqqyDCU3saTwJf j2gF7CxtuuTR4QR2XhptX5ICYyOoEuXIOj7MPL3wi9ly.fbH4FEipx87Pq48LLZyongoTE_vupKa 5YhZD8U8T0pcHRLJ3H41p23I2woqniTfydzfsyeUm5HaLCX8PVh61TZ32TxYIdc2scFJbO2TwxCj xJBjRx7ZFaKnNWoGmrwYzf9rkpiu907t44qfHlHxvyHeFVWGnrKa01iZ5tOhhQIbdBhJIBAzY64j ba_g1xaqyiWdWH2vTphMKbtUyqQNjW9JtQqq4R5cQKWyuu9nGxsqHRGGTMGKBoQo4xCeU1ovjxt. EiBrmwLhoTkN696SbFlmGZHyEUQVfJoj2k3hwTcNLe.U9dIKp1Lt._yVRfZuoS_a9R1O0qgrR9XD bZI.O_sz7fskJHq9xDjKWBK.zj0kmd3qziM7DYZkchlU2R1HFtNdaRF.pAk9E4fNuHmBHseg9lLK HBa4B9yomteCw36jPotggYirwSI6OQI6rlicoPZ.lIOgktVgueYLKxqcoqKu3p0qPjQDP1NuPxp1 nl9bc3BAJXwKu.oWPBXQfnhIdjLayNdybMVgGLGxgRFtJ25E9dBDw_W6GOa2tSW1XRjJDkNURSb0 6Qv4q2jLQNKEHR8yoO.yB0._U65HGUSCC1v972lJ9ehI5EFxnKAhlPYCxmNywVQYeRFXoB4SYmLB j9PJyWmowYTKnyzE3FMKOp1SjREERD5ji1iylhD3LRd9osTxQVfYk4b84jNJis7GYIdBQcnf3h5Z iMevnKTVLdqAesrSoqE76EkVeQ2gsUEqAHdb19eiGzUEWGqd7zwI4P54ksGWgX8n7D5C0JzrqLf. ZR9lfncmHZEkktu4dqay0MtCiQB8TRdDqzpiLwBOZQftIMJ1cOWabWXHF78s0Vhm3QpMGG1ag9pE c5Dnm97JrQFJImIBe97v0e2xQ_V9eC_cEXpmtJ5wpRP.bS0wbv8ibm8JTLc56ii3SDclcq6CabJg EQnW8w0NMHOJPZo1w_3u0G9hXJNicOSAYN_UBrVghjeAJ5QZixWCXj_Yh8bK5w3kN8Q52bwAI_Q_ rbT_R3fER11bTzpTNqb6eBrGD7MnzlAEh3D7Zc4xzEe8CxPVU3DLRMTn.YTCL8yEEAfdfvj8j7qZ W3KQjK1WE_v8w70c4g1k1dyaFZcHGVAm2M1ivmGc-
Received: from sonic.gate.mail.ne1.yahoo.com by sonic303.consmr.mail.ne1.yahoo.com with HTTP; Tue, 18 Feb 2020 18:00:25 +0000
Date: Tue, 18 Feb 2020 17:59:55 +0000 (UTC)
From: Igor Bryskin <i_bryskin@yahoo.com>
To: draft-wwx-netmod-event-yang@ietf.org, netmod@ietf.org,  Joel Jaeggli <joelja@bogus.com>
Message-ID: <1075892840.4678779.1582048795015@mail.yahoo.com>
In-Reply-To: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
References: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_4678778_521138384.1582048795013"
X-Mailer: WebService/1.1.15199 YMailNorrin Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tNdzdlQOWhTbBwo4dLd3G1Yfd1U>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 18:00:30 -0000

------=_Part_4678778_521138384.1582048795013
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

Hi,

I am not aware of any IPR pertinent to this draft.

Regards,
Igor
 

    On Tuesday, February 18, 2020, 11:46:07 AM EST, Joel Jaeggli <joelja@bogus.com> wrote:  
 
 Authors, Contributors, WG,

As part of preparation for WG Adoption

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.
_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod
  
------=_Part_4678778_521138384.1582048795013
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body><div class=3D"ydpfb3527ceyahoo-style-wrap" style=
=3D"font-family: Helvetica\ Neue, Helvetica, Arial, sans-serif; font-size: =
13px;" dir=3D"ltr" data-setdir=3D"false"><div>Hi,<br><div dir=3D"ltr" data-=
setdir=3D"false"><br><div dir=3D"ltr" data-setdir=3D"false">I am not aware =
of any IPR pertinent to this draft.<br><div dir=3D"ltr" data-setdir=3D"fals=
e"><br><div>Regards,<br>Igor<br></div></div></div></div></div><div></div>
        <div><br></div><div><br></div>
       =20
        </div><div id=3D"yahoo_quoted_2055802031" class=3D"yahoo_quoted">
            <div style=3D"font-family:'Helvetica Neue', Helvetica, Arial, s=
ans-serif;font-size:13px;color:#26282a;">
               =20
                <div>
                    On Tuesday, February 18, 2020, 11:46:07 AM EST, Joel Ja=
eggli &lt;joelja@bogus.com&gt; wrote:
                </div>
                <div><br></div>
                <div><br></div>
                <div><div dir=3D"ltr">Authors, Contributors, WG,<br></div><=
div dir=3D"ltr"><br></div><div dir=3D"ltr">As part of preparation for WG Ad=
option<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">Are you aware o=
f any IPR that applies to drafts identified above?<br></div><div dir=3D"ltr=
"><br></div><div dir=3D"ltr">Please state either:<br></div><div dir=3D"ltr"=
><br></div><div dir=3D"ltr">"No, I'm not aware of any IPR that applies to t=
his draft"<br></div><div dir=3D"ltr">or<br></div><div dir=3D"ltr">"Yes, I'm=
 aware of IPR that applies to this draft"<br></div><div dir=3D"ltr"><br></d=
iv><div dir=3D"ltr">If so, has this IPR been disclosed in compliance with I=
ETF IPR rules<br></div><div dir=3D"ltr">(see RFCs 3669, 5378 and 8179 for m=
ore details)?<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">If yes t=
o the above, please state either:<br></div><div dir=3D"ltr"><br></div><div =
dir=3D"ltr">"Yes, the IPR has been disclosed in compliance with IETF IPR ru=
les"<br></div><div dir=3D"ltr">or<br></div><div dir=3D"ltr">"No, the IPR ha=
s not been disclosed"<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">=
If you answer no, please provide any additional details you think<br></div>=
<div dir=3D"ltr">appropriate.<br></div><div dir=3D"ltr"><br></div><div dir=
=3D"ltr">If you are listed as a document author or contributor please answe=
r the<br></div><div dir=3D"ltr">above by responding to this email regardles=
s of whether or not you are<br></div><div dir=3D"ltr">aware of any relevant=
 IPR. This document will not advance to the next<br></div><div dir=3D"ltr">=
stage until a response has been received from each author and listed<br></d=
iv><div dir=3D"ltr">contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN=
 THIS MESSAGE'S<br></div><div dir=3D"ltr">TO LINES.<br></div><div dir=3D"lt=
r"><br></div><div dir=3D"ltr">If you are on the WG email list or attend WG =
meetings but are not listed<br></div><div dir=3D"ltr">as an author or contr=
ibutor, we remind you of your obligations under<br></div><div dir=3D"ltr">t=
he IETF IPR rules which encourages you to notify the IETF if you are<br></d=
iv><div dir=3D"ltr">aware of IPR of others on an IETF contribution, or to r=
efrain from<br></div><div dir=3D"ltr">participating in any contribution or =
discussion related to your<br></div><div dir=3D"ltr">undisclosed IPR. For m=
ore information, please see the RFCs listed above<br></div><div dir=3D"ltr"=
>and<br></div><div dir=3D"ltr">http://trac.tools.ietf.org/group/iesg/trac/w=
iki/IntellectualProperty.<br></div><div dir=3D"ltr"><br></div><div dir=3D"l=
tr">Thank you,<br></div><div dir=3D"ltr">NetMod WG Chairs<br></div><div dir=
=3D"ltr"><br></div><div dir=3D"ltr">PS Please include all listed in the hea=
ders of this message in your<br></div><div dir=3D"ltr">response.<br></div>_=
______________________________________________<br>netmod mailing list<br><a=
 ymailto=3D"mailto:netmod@ietf.org" href=3D"mailto:netmod@ietf.org">netmod@=
ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/netmod" ta=
rget=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br></div>
            </div>
        </div></body></html>
------=_Part_4678778_521138384.1582048795013--


From nobody Tue Feb 18 10:01:16 2020
Return-Path: <i_bryskin@yahoo.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 312F512004C for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:01:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XEdo_MgxpDBf for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:01:13 -0800 (PST)
Received: from sonic304-21.consmr.mail.ne1.yahoo.com (sonic304-21.consmr.mail.ne1.yahoo.com [66.163.191.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CC7B120018 for <netmod@ietf.org>; Tue, 18 Feb 2020 10:01:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1582048872; bh=jKtvMJBFIqw8qVPD/r6Y+3pAdIVACb523GiX4tXhDdY=; h=Date:From:To:In-Reply-To:References:Subject:From:Subject; b=sKl04qacTC3TU6KFVjdQUdpjKZEq2SjSGKw7C42RZGYtXNKlugiLN1/55dJYAD19KY6YoGMr+qInxw6Qm0HJupNydLfkMxPZuc6cH/DrdWu1299da90ufCLTv+OPbzuqAUb6I/DXtd+Rn7j0UeBIe7xonwVXIzdwBDl5D2EtSa9xJMhj5EDavufkUR25iOWpCDxAgPGC5I/bB0Rsmhee8AbSAUJKlRHEoxhXdlYK9ub4FBsocppJoTYUbMDMMM0Srhb6oWIPumTl5KK0ZgIwMgQjp608OL1/os6Ibsr6AvfLB7t+Bo2HaR/EFCFnBlcmMsQsG/hd7wcGIuhm+qZF1Q==
X-YMail-OSG: zgYiDJgVM1lKN0h0wNj31HCzel3vqSlNkENTdEapY1lQJAj0wZUNst_aB6I849U WP.ohtCKeWRX9zxKIZJztQMlddUPFalqIrsvuCKh5.NYO7b1Hg6ZwLNKh4gPQaldWTCxAxCB5hwu uToOm..lbBMuXnggT3BDz9AtV3FZZOiPp1Xgzz65Q2Ml8V6BxAngZN0XgcvgTEWdIFAVSApxfRap nFBdou_RM2vO5jKGwPImgwaJvDcLpWXe3OdxadL.rjLPDtrhDVjMtdqmT5H62NN2D5DpQe5XCgGw gQ98Kuu4_AS7K_vJlQjGbT19O2zRuecF_y3pcWiAZC4Jc70vuHhlvmbUQcDVcYbUSrJakErmqJlf BFSAGNVmzecDz9gb2JywaEQ4UenGt_L6Ky02F9jQ2cPMR9oJdtMmoZYt1c7pqRqik47LcVFSlEqV 3Hde2CVyfFDekKlCDR.NMkPXhl5ntpCu_lt5Bbea7mTob0WDUqUypPnwCiE45s2PdYfmEjBUGc83 bm58hJ1KrRv2Y2r1Uptm27vFvXlkNUzWXxHYHyyIgwKuIuRA4OH03wh7CPKM01o1zi4cjCSNoRcI RmuwJ48cDly4GTocbG70QpWrCnj6RURoGWLifDYT0cwb3HN927Puh2A86_JwsbvDo7I6Zf1CEgFm 3n17KFvXa_QhpArARtfrc0EOXnI8jcrXcwNw2tGC_8mYlkBfQx5kjCTUHW9tbstBRScCjmVmZoEq bzIN_Tbqo8jibvkRRtokil8uNEVhIBzDzWO07JYz9OVc6wmG1rj67KhfmJoGYNWCI1qeXkYMdoE4 FdHe3c69nUkdPxs8jLmXFiI6xk3YkPjWYL5QQOV4SZDZogcV1gvlEDH07AEFCXoQumiD7un.lHGc HSBIuGM_JFQ5H_unTnzMS8tU81kSiIXYbiJCsyCv5lXqve_SWYX.aMrPUhAzDonfSm61VHrZ7LE. bYyWH9Hi4E4hPrKE7wcxdc2liNmrfz8.ZHrgDrLZnfLT5kDTmPi1kIxx6vHqABYuuLMMIZ2ry1kX xpSCPd06PY.I6lWRTZU.ZrKrOk9nqNTuYRrkQxQFFLhVjJ.DHtokUbyaLfee0Bk_8RQqnHyPnkGy oucFvEVQjzs31Ofv1V3jvRmAcxL47VVqcvEHTVDCplzZ_1s30_JKYfyGdBRQZ0cKAGLPGzZHC3H8 flZOFEO92nviS1AWZ1z_SMlEo8Yn8z1.oj3b5YDl4f5eOSCTqFoF8JkgCIoLtQiNEA1O8mkQDT7V jih_Ve.v_RG2qKuY7dnfGZu8BAU0K4UBmKTuOyixJ6YlantBu8a0wUWTzf6K4NuwDeMtBRy80gLE _eZaRwrQwxwhf3vXFp3_27GAoxrLDUAG4FPap
Received: from sonic.gate.mail.ne1.yahoo.com by sonic304.consmr.mail.ne1.yahoo.com with HTTP; Tue, 18 Feb 2020 18:01:12 +0000
Date: Tue, 18 Feb 2020 18:01:09 +0000 (UTC)
From: Igor Bryskin <i_bryskin@yahoo.com>
To: draft-wwx-netmod-event-yang@ietf.org, netmod@ietf.org,  Joel Jaeggli <joelja@bogus.com>
Message-ID: <1004764733.4684727.1582048869877@mail.yahoo.com>
In-Reply-To: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
References: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_4684724_2073024183.1582048869875"
X-Mailer: WebService/1.1.15199 YMailNorrin Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/yHM9mv_ud4M7l0ta0KrbnJL6c7U>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 18:01:15 -0000

------=_Part_4684724_2073024183.1582048869875
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

 Hi,

I am not aware of any IPR pertinent to this draft.

Regards,
Igor
 


    On Tuesday, February 18, 2020, 11:45:59 AM EST, Joel Jaeggli <joelja@bogus.com> wrote:  
 
 Authors, Contributors, WG,

As part of preparation for WG Adoption

Are you aware of any IPR that applies to drafts identified above?

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?

If yes to the above, please state either:

"Yes, the IPR has been disclosed in compliance with IETF IPR rules"
or
"No, the IPR has not been disclosed"

If you answer no, please provide any additional details you think
appropriate.

If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author and listed
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
TO LINES.

If you are on the WG email list or attend WG meetings but are not listed
as an author or contributor, we remind you of your obligations under
the IETF IPR rules which encourages you to notify the IETF if you are
aware of IPR of others on an IETF contribution, or to refrain from
participating in any contribution or discussion related to your
undisclosed IPR. For more information, please see the RFCs listed above
and
http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.

Thank you,
NetMod WG Chairs

PS Please include all listed in the headers of this message in your
response.
  
------=_Part_4684724_2073024183.1582048869875
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body><div class=3D"ydp4356b9eayahoo-style-wrap" style=
=3D"font-family: Helvetica, Arial, sans-serif; font-size: 13px;"><div></div=
>
        <div dir=3D"ltr" data-setdir=3D"false"><div><div>Hi,<br><div dir=3D=
"ltr" data-setdir=3D"false"><br><div dir=3D"ltr" data-setdir=3D"false">I am=
 not aware of any IPR pertinent to this draft.<br><div dir=3D"ltr" data-set=
dir=3D"false"><br><div>Regards,<br>Igor<br></div></div></div></div></div>
        <div><br></div></div><div><br></div></div><div><br></div>
       =20
        </div><div id=3D"yahoo_quoted_2222001179" class=3D"yahoo_quoted">
            <div style=3D"font-family:'Helvetica Neue', Helvetica, Arial, s=
ans-serif;font-size:13px;color:#26282a;">
               =20
                <div>
                    On Tuesday, February 18, 2020, 11:45:59 AM EST, Joel Ja=
eggli &lt;joelja@bogus.com&gt; wrote:
                </div>
                <div><br></div>
                <div><br></div>
                <div><div dir=3D"ltr">Authors, Contributors, WG,<br></div><=
div dir=3D"ltr"><br></div><div dir=3D"ltr">As part of preparation for WG Ad=
option<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">Are you aware o=
f any IPR that applies to drafts identified above?<br></div><div dir=3D"ltr=
"><br></div><div dir=3D"ltr">Please state either:<br></div><div dir=3D"ltr"=
><br></div><div dir=3D"ltr">"No, I'm not aware of any IPR that applies to t=
his draft"<br></div><div dir=3D"ltr">or<br></div><div dir=3D"ltr">"Yes, I'm=
 aware of IPR that applies to this draft"<br></div><div dir=3D"ltr"><br></d=
iv><div dir=3D"ltr">If so, has this IPR been disclosed in compliance with I=
ETF IPR rules<br></div><div dir=3D"ltr">(see RFCs 3669, 5378 and 8179 for m=
ore details)?<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">If yes t=
o the above, please state either:<br></div><div dir=3D"ltr"><br></div><div =
dir=3D"ltr">"Yes, the IPR has been disclosed in compliance with IETF IPR ru=
les"<br></div><div dir=3D"ltr">or<br></div><div dir=3D"ltr">"No, the IPR ha=
s not been disclosed"<br></div><div dir=3D"ltr"><br></div><div dir=3D"ltr">=
If you answer no, please provide any additional details you think<br></div>=
<div dir=3D"ltr">appropriate.<br></div><div dir=3D"ltr"><br></div><div dir=
=3D"ltr">If you are listed as a document author or contributor please answe=
r the<br></div><div dir=3D"ltr">above by responding to this email regardles=
s of whether or not you are<br></div><div dir=3D"ltr">aware of any relevant=
 IPR. This document will not advance to the next<br></div><div dir=3D"ltr">=
stage until a response has been received from each author and listed<br></d=
iv><div dir=3D"ltr">contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN=
 THIS MESSAGE'S<br></div><div dir=3D"ltr">TO LINES.<br></div><div dir=3D"lt=
r"><br></div><div dir=3D"ltr">If you are on the WG email list or attend WG =
meetings but are not listed<br></div><div dir=3D"ltr">as an author or contr=
ibutor, we remind you of your obligations under<br></div><div dir=3D"ltr">t=
he IETF IPR rules which encourages you to notify the IETF if you are<br></d=
iv><div dir=3D"ltr">aware of IPR of others on an IETF contribution, or to r=
efrain from<br></div><div dir=3D"ltr">participating in any contribution or =
discussion related to your<br></div><div dir=3D"ltr">undisclosed IPR. For m=
ore information, please see the RFCs listed above<br></div><div dir=3D"ltr"=
>and<br></div><div dir=3D"ltr">http://trac.tools.ietf.org/group/iesg/trac/w=
iki/IntellectualProperty.<br></div><div dir=3D"ltr"><br></div><div dir=3D"l=
tr">Thank you,<br></div><div dir=3D"ltr">NetMod WG Chairs<br></div><div dir=
=3D"ltr"><br></div><div dir=3D"ltr">PS Please include all listed in the hea=
ders of this message in your<br></div><div dir=3D"ltr">response.<br></div><=
/div>
            </div>
        </div></body></html>
------=_Part_4684724_2073024183.1582048869875--


From nobody Tue Feb 18 10:32:34 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1E9912001E for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:32:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=KmPNkMvn; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=TscOqcui
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wDwKseqNWiea for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 10:32:30 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 443DA120018 for <netmod@ietf.org>; Tue, 18 Feb 2020 10:32:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3424; q=dns/txt; s=iport; t=1582050750; x=1583260350; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=j8fhwf+40dxN8MNBlIOjj/WA6mbYD9L5jGJKU89EQj4=; b=KmPNkMvnT6gNZlTtF4JXMoOr2mxFtxP9IlTpTGx++3T9T7Od/boc1NEd Zhl9a3U+wSjyR4ZVFMfIwBGRKHKcVES2G9KfHtNSFDAVRm4Us7eH0FFFw YyUX78/r08gOfBt/nVVpLmXtAFh8mcPZShQSx903FBbLKeid67xey0oLo k=;
X-IPAS-Result: =?us-ascii?q?A0CwAADmLExe/4QNJK1jAxoBAQEBAQEBAQEDAQEBAREBA?= =?us-ascii?q?QECAgEBAQGBe4FUJCwFbFggBAsqCodQA4p6gl+YEYJSA1QJAQEBDAEBHw4CB?= =?us-ascii?q?AEBhEACggMkOBMCAwEBAQMCAwEBAQEFAQEBAgEFBG2FNwyFZgEBAQECARIuA?= =?us-ascii?q?QE3AQsCAgIBCBABBAEBAS4bFx0IAgQOBQgagmECIoJKAw4gAQKieAKBOYhig?= =?us-ascii?q?ieCfwEBBYVEGIIMAwYFgTOMJBqBQT+BEUeCTD6EMxoFGiaCe4IslnJjiH6PO?= =?us-ascii?q?wqCO40YiV2CSYxni3aqKwIEAgQFAg4BAQWBaSKBWHAVgydQGA2OHTiDOzOKI?= =?us-ascii?q?HSBKY4wAYEPAQE?=
IronPort-PHdr: =?us-ascii?q?9a23=3AkOdnfxbRIYj+URh5VuyKr0T/LSx94ef9IxIV55?= =?us-ascii?q?w7irlHbqWk+dH4MVfC4el20gebRp3VvvRDjeee87vtX2AN+96giDgDa9QNMn?= =?us-ascii?q?1NksAKh0olCc+BB1f8KavwcC0+AMNEfFRk5Hq8d0NSHZW2PgeAuHC54D8MFx?= =?us-ascii?q?m6LhJ7drinPInUgoz3z/q155DYfwRPgny6fK92KxK16w7Ws5teiop5IaF3wR?= =?us-ascii?q?zM6ndPdv8ew2R0bV6ehBfz4M6s8fsBuzxdofcg69JNXe3hcqI0QKYQDDM9L3?= =?us-ascii?q?t06Q=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.70,456,1574121600"; d="scan'208";a="418169097"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Feb 2020 18:32:29 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 01IIWSgT003117 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 18 Feb 2020 18:32:29 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 18 Feb 2020 12:32:28 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 18 Feb 2020 12:32:26 -0600
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 18 Feb 2020 12:32:26 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hcKZNRvkI8J/c6SACeGBAD5qBwEt+xc5oyAdmZE+CKpZudNNBsVlAz5X19VfSdj4i3LuDOprR8PehM4ZU8C8BtESLLUnrVuvWYwEJAuabzdEO+iU3xAXjd7WetUYHRIWhHJK8GGWU0m/jtwdE6Avi8w2gm/tN+cZ8zre/dbydDH9XkxcGRG8qgEaMX8aCM3k3SBN8+8D8/ZM9p0XikDfPsuMpS7qFcaeGrRDbGEkXi5gEOKrfJoYN7LWcDVadcFYUkLUzb+GFfnBUixN1CvPPRNzeaZImQhJi3kG2s7oeRv4hJezjamZKGVBEL1aZBpLzM5ZaNM2eLc2Rw1TUB5y+Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1eGKjod6+AeQTpxEa4K3S48PPVb4viwU7+tmpZMXZxQ=; b=Daoj9NBvI0P6yoO3N5QIAtHtvPgvogliFs4voqgwGeNPU6dOAwGhsPQlMVZF9gr6dAIedXQ+wciXwlD5Z84e/AaswyEGGAhgg31RX/muKHCy8bewPcGYQW/hyDgS7PRuce+vjinEgpqhzg9MI0ZJhsTcqZQ0VxTZjnqKBkkRcU2DBEvJLJrea/mCXvJsso7ZBgw5hSojjPF6ze+sB52P24BzpmwsyUtqjuZG8QHyPfMhSZjNAgdi8nuGCE3zR727WPedEAvWXean9pIYYycs7xxWjaMvAMsHT5DDwwt/yFTOZkPcnCjj/HmDkByEaCrskICDyiIzf/cYGs8x9BvKNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1eGKjod6+AeQTpxEa4K3S48PPVb4viwU7+tmpZMXZxQ=; b=TscOqcuimur6hFxBXO6LLmI4vVr5fJ2y1VoGTNszz3LFBgWZgBc8GVMJnWHDZ3TVonM5gBdMD2/lx6LN4FsgK2mnJRuml1O0E+21DD5U14i8T6Oa6ja23pbNDes5p9Ca0bROsB8bFSiZ0kEoFUbzzko9ckhjSXHu+JNZVjMI6XA=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB4431.namprd11.prod.outlook.com (52.135.37.207) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25; Tue, 18 Feb 2020 18:32:26 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2729.032; Tue, 18 Feb 2020 18:32:26 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
Thread-Index: AQHV4m8DGI058sprvkKdYtaQYpu786gaftpggAAIeQCAAAFigIAABDQAgABwz4CABESmAIAAXa6AgAAxS4CAACAfgIAACOqAgAAEpoCAANIMUIAABMOAgAANy6A=
Date: Tue, 18 Feb 2020 18:32:25 +0000
Message-ID: <MN2PR11MB4366A4C8214E3DEEF50F4BCDB5110@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <C1446662-2320-4158-B34B-3E2D67369F48@chopps.org> <9FECF49A-65E5-436F-973A-7538CFC974E8@chopps.org> <14832a78-ff8c-b923-09ba-207c2cf01362@alumni.stanford.edu> <F22DF063-E77B-4384-AD2E-157CC1DC479C@chopps.org> <3a538bc4-b93e-2027-7870-d59e8609944b@alumni.stanford.edu> <DF98AB41-C1DD-4A43-9C22-222D018A213D@chopps.org> <d79d37eb-14ec-a5ab-6161-971a0c6fd57a@alumni.stanford.edu> <BE06C751-D2E1-4797-8E22-9D7A87C0D616@chopps.org> <27ccbba7-d3d0-a9ab-c19a-9da4fa1d0210@hedeland.org> <MN2PR11MB4366A6EE0AB49A4B6409D61CB5110@MN2PR11MB4366.namprd11.prod.outlook.com> <20200218111956.bmqx5i6fyjrx7qn4@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200218111956.bmqx5i6fyjrx7qn4@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4f30b13b-bbba-47f2-2ee0-08d7b4a0e70c
x-ms-traffictypediagnostic: MN2PR11MB4431:
x-microsoft-antispam-prvs: <MN2PR11MB4431BF1FCAD856D8DFF7A0F3B5110@MN2PR11MB4431.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 031763BCAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(366004)(346002)(376002)(39860400002)(136003)(199004)(189003)(9686003)(33656002)(53546011)(2906002)(6506007)(26005)(478600001)(6916009)(55016002)(66574012)(316002)(5660300002)(4326008)(8936002)(86362001)(7696005)(71200400001)(52536014)(8676002)(66446008)(66556008)(64756008)(81166006)(66946007)(66476007)(81156014)(76116006)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4431; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: BpLnj0HHosy2ZX1nagcGUIgPzVnZCIdZG5UsKdK1YojYGVDtr16uN41fNAYxJFfJoaZsK6gdCZ5a79mFU3BEydHod/oR+usRhSSRuBJmX8fmKTu/Mxi3XC3/dFC2xnDYhH9Tbeh8SVUmVPvnqfQxJlr+o6zmB4v8zc0RZLVN4xHLtzeIedvbxCCyR47zMZ/2tUJa5LV/v73wrKkdQpQ34HPNHIw6mLfkc2zy7d8Vv3GsIZJGoQd6/iU8j9IK+QUw7dD62Qe+xCoA248v79d80Y23JfMCiP7FNnvx6gkWIkS9Pp/FhrmhTvFeICV92ayuqZw0PS8U7IHc8xHeP4mEyLB7mZVcyiBl6r+8vE/9GiCIX/BKE9r2X+Gr8lM4VCU/qATYACx9hnSo8g5rpKFNz9QRI+DkkJlL86sCfJHPBrnJiWTkjMBfVz2QdlrZVvGTpJFfdzAhkIV9xDiPum9E+g3+G7EcnlFEviCMdRMI7n9UeGet011WEn9JknasQWS6m6xuVcg6SgaRf0un0yfG6Q==
x-ms-exchange-antispam-messagedata: MV52YgTCV5adI93B1bCCBRYkJp+8NUs2wedm0wb+TnKociJs9GNX4SC/8t/uj7fuUzwLfu6P4sTPlJfHILAM2uYEcPVE5xJtAMrPmYmf6aWUJmK3p5HK4jBy2cM64doGZyQR95fC7PuXdZsyC/cfzw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 4f30b13b-bbba-47f2-2ee0-08d7b4a0e70c
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Feb 2020 18:32:25.9517 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /m2f1j6btR8D6qWfGZONu+XUWH+KHsPhpaKdb4UYUqXSC2v9o2jjamGRC4pa1V+Itn8mUEbBlhOPPygMMFDSZg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4431
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/3t3xjgZrUWwrHsofWoS56Df4xVo>
Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-module-tags-07: (with DISCUSS)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 18:32:33 -0000

Hi Juergen,

> -----Original Message-----
> From: Sch=F6nw=E4lder, J=FCrgen <J.Schoenwaelder@jacobs-university.de>
> Sent: 18 February 2020 11:20
> To: Rob Wilton (rwilton) <rwilton@cisco.com>
> Cc: netmod@ietf.org
> Subject: Re: [netmod] Alexey Melnikov's Discuss on draft-ietf-netmod-
> module-tags-07: (with DISCUSS)
>=20
> On Tue, Feb 18, 2020 at 11:12:47AM +0000, Rob Wilton (rwilton) wrote:
> >
> > I'm also not convinced of how many implementations would properly honou=
r
> the XML regex property categories, e.g., if the pattern statement has bee=
n
> translated to another regex engine.
> >
>=20
> That's a weird argument. If there is agreement on a restriction and we ca=
n
> express that restriction in a pattern, we should IMHO do so.

Not really.

I believe that ultimately the configuration is the responsibility of the cl=
ient.  If there are reasonable steps that a server can take to help police =
that configuration and reject obvious errors then that is obviously helpful=
, but it most cases a server cannot check that the value provided by the cl=
ient is correct, which I suspect is the far more likely error (e.g. a clien=
t configures the wrong IP address rather than a malformed IP address).

So, in the case of regexes, I still prefer a shorter, easier to read/unders=
tand, and likely more performant pattern statement instead of a longer, com=
plex, and harder to verify pattern statement.

In particular, I note that unicode properties do not seem to be widely used=
 in YANG pattern statements (e.g. perhaps only 10 unique pattern instances =
in all YANG modules on github YANG repo, some of which look plausibly wrong=
 to me (unless they intended to include ASCII control characters), and henc=
e I question whether it is worth using them, but maybe I am being biased to=
wards languages using the Latin alphabet.

Further, I was concerned that there didn't seem to be widespread support fo=
r unicode properties within standard regex engines, but it looks like this =
may have changed, and perhaps support for them is more widespread now, even=
 if the exact specification of what character properties are defined and wh=
at characters are included in those properties seem to able to vary over ti=
me depending on the unicode version, and presumably between implementations=
.

In the case of module tags, I'm not sure what would go wrong if a space was=
 included in the tag name.  I suspect nothing, just that it could be confus=
ing to a user when displayed.

So, I'm still think that pragmatically the existing regex is fine.  But if =
the consensus is to use \P{Z} or better \P{Separator} then I would also be =
okay with that.


>=20
> Note the order: It is backwards if there is first a pattern and as a
> consequence we agree on that specific restriction.
>=20
> Ideally, the agreed upon restriction is stated in the description and if
> possible also expressed as a pattern. This way it does not matter how
> implementations enforce the restriction and it is clear to everyone what
> the pattern is trying to achieve.

Yes. I agree to both these points.

Thanks,
Rob


>=20
> /js
>=20
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Tue Feb 18 12:43:11 2020
Return-Path: <warren@kumari.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCE75120830 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 12:42:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5ePNCHT03j69 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 12:42:58 -0800 (PST)
Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D405612081C for <netmod@ietf.org>; Tue, 18 Feb 2020 12:42:57 -0800 (PST)
Received: by mail-qk1-x730.google.com with SMTP id c20so20934146qkm.1 for <netmod@ietf.org>; Tue, 18 Feb 2020 12:42:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=oLX+flOmQyF8YnhtXTsH2zE2ujvOupYtmmvaaY8iWTA=; b=DEiD7l4cvZna8enc+6N+OWZozzWXZ1MIQKSKrzzsduucZwa/qeG+dYDrDa8oUpWZyH xv//is1XpoPIi/A08wrKsc05Yb5oYofptI6Mo1XcZzMogXsRZ48zc2qGgdo5HvpSgBSI zRuXxeOJV1lw6Yk5a+w8l1h2MazMrEJhbdTIXprdYDvULc5Ro7iuHrhd8mXT63/0XanB YYsiIojB9/Bqae2oc/E/BQ1eylrO14urSD0s2Xt/unZw2MRZ4riscklXm3/pb9HUoNVs F9UeAhxYRuQ4pfZln0dE2zTiVe6XqTaMogr59G0/OZJMhZ38lL1coYMuhMqW9Eh5cjaF 5N1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=oLX+flOmQyF8YnhtXTsH2zE2ujvOupYtmmvaaY8iWTA=; b=khMqhpQyLpKBcRv+Gbe3aDj8fv9k5HueqJlBuapdsjY2M7U4YIG5iBJPhQZGG7kPjA uVBzDHSEN7iF+MtAe2e4hUJsLZl64B+xAb9WDQxWW/y2TCaSEXMdN1gQVcjUuzWPDtsP Cjny4CAVEanYd5+VgdBXGwU3d1K4060dReeYWFlaH9ujMqUBu90SuPK/NfIZyrHNXlu1 1muAHaHB+exUg05eM1OVo0/7c8vSZvFhIjor3SRF260Cb0KbsQltbcV0bhLCkQRP9zVU mijaQQq+/B09+VkSv7uMTitz8I3/TA4TFYSZvlQt5f2Xz1+8J6sU9gXYmfrxCNqiEnot 48Lg==
X-Gm-Message-State: APjAAAWhFRgD3uMPcJ1alLW0dcHZUQtVV5xfNsCAzjK8iTikfiAUU1s0 qhFFSyDNNWYFSFXnSB3T+igpogo4W6V6BPyFZem+0g==
X-Google-Smtp-Source: APXvYqyQ40ARxVKnxbSV9b72Xry6zDyOf1ohsLy1HbwZVTyjBI1TFkbDwWvn6yAK+dRr5VtluQVmdysjR73kEDxNp14=
X-Received: by 2002:a37:6193:: with SMTP id v141mr20036666qkb.37.1582058576771;  Tue, 18 Feb 2020 12:42:56 -0800 (PST)
MIME-Version: 1.0
From: Warren Kumari <warren@kumari.net>
Date: Wed, 19 Feb 2020 07:42:21 +1100
Message-ID: <CAHw9_iJh2MRiFQAb4i9uhr1toZh-rYLuZmGTChQAKjCpse+tFA@mail.gmail.com>
To: draft-ietf-netmod-factory-default@ietf.org, NetMod WG <netmod@ietf.org>,  netmod-chairs@ietf.org, "Rob Wilton (rwilton)" <rwilton@cisco.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/aqkqErj8Uj2Lgube6vkDs5S5ivw>
Subject: [netmod] Changing responsible AD for draft-ietf-netmod-factory-default
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 20:43:00 -0000

Hi there all,

I have just reassigned the responsible AD for
draft-ietf-netmod-factory-default from Ignas to myself.

Rob Wilton (the incoming Management AD, CCed) will be doing the actual
"work" part of this, I'm primarily acting as a proxy / clicking the
buttons in the datatracker.

Please welcome Rob into his new role,
W
-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf


From nobody Tue Feb 18 12:58:48 2020
Return-Path: <010001705a18766c-94142103-ff84-4e9b-ab09-867883dccfed-000000@amazonses.watsen.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58EA7120824; Tue, 18 Feb 2020 12:58:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pjPoXZkMH60X; Tue, 18 Feb 2020 12:58:39 -0800 (PST)
Received: from a8-88.smtp-out.amazonses.com (a8-88.smtp-out.amazonses.com [54.240.8.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 043AC120868; Tue, 18 Feb 2020 12:58:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1582059517; h=Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:Feedback-ID; bh=+Mz4Hy9mNxD98bZ+JRa/DtLqfGJgFmHOpAxDUL94n3M=; b=hYnIjkn+5YGOem2iTjFi3zrgQh1xGLNZiUadd1G7Aq+midWvNm0//AMLJ9YNlpmU pyuuW2KCam+8VMJExYRJi4IX5A93rXJI9/4dFxghNs2lWtFm3YU1OEsZWB19iPC7hoo WaAP456HpJX643oGljoniz3P28vtWW9odD1M74Kc=
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Kent Watsen <kent+ietf@watsen.net>
In-Reply-To: <CAHw9_iJh2MRiFQAb4i9uhr1toZh-rYLuZmGTChQAKjCpse+tFA@mail.gmail.com>
Date: Tue, 18 Feb 2020 20:58:37 +0000
Cc: draft-ietf-netmod-factory-default@ietf.org, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "Rob Wilton (rwilton)" <rwilton@cisco.com>
Content-Transfer-Encoding: 7bit
Message-ID: <010001705a18766c-94142103-ff84-4e9b-ab09-867883dccfed-000000@email.amazonses.com>
References: <CAHw9_iJh2MRiFQAb4i9uhr1toZh-rYLuZmGTChQAKjCpse+tFA@mail.gmail.com>
To: Warren Kumari <warren@kumari.net>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2020.02.18-54.240.8.88
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/NsM_NVw07ks9PktV6xo3iOTqBE0>
Subject: Re: [netmod] Changing responsible AD for draft-ietf-netmod-factory-default
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 20:58:45 -0000

Thanks for jumping in early, Rob!

And thank you, Warren, for helping make this happen   :)

K.


> On Feb 18, 2020, at 3:42 PM, Warren Kumari <warren@kumari.net> wrote:
> 
> Hi there all,
> 
> I have just reassigned the responsible AD for
> draft-ietf-netmod-factory-default from Ignas to myself.
> 
> Rob Wilton (the incoming Management AD, CCed) will be doing the actual
> "work" part of this, I'm primarily acting as a proxy / clicking the
> buttons in the datatracker.
> 
> Please welcome Rob into his new role,
> W
> -- 
> I don't think the execution is relevant when it was obviously a bad
> idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing
> regret at having chosen those particular rabid weasels and that pair
> of pants.
>   ---maf
> 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Tue Feb 18 15:17:09 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3DF7120836 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 15:17:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.437
X-Spam-Level: *
X-Spam-Status: No, score=1.437 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2vszmWYgiPoE for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 15:17:05 -0800 (PST)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60081.outbound.protection.outlook.com [40.107.6.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B8D8120840 for <netmod@ietf.org>; Tue, 18 Feb 2020 15:17:05 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fjDIGGWQiZwqavRhF8MznByy8fMwVW4vaqidTovpZwhOS2rcID+gGJ8ofuS+RIKPvj5iEeUTP0Y7I/qlD6eO0a2nG1qHRpe7pVuHNJYX5q3OxuOKOwTYsJ5tTke4brAIUlzJ4pxRCOM3wBDKRfJKwIUYHmvQu+y4t0qjg9ChITsSPyMbynvvPoFnmlF9ZlHMu2gjn7un5CMv8A1n18+uWD6/dAh2BR6clOAaSDJqoOl+zK1DC8lldrf+z6pI9Imj8+5d2m5FRO4xSm6gH8qNcBZGQXQkujYbRH/lRm6KAE2iVY3drMOm5/5fM4UVuSI34nxd9PVHuG6e6g9YWYMU9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3/4jSrBX6k2DyPO64InnODz/8/oIWRmOcliYiaXASMo=; b=i5LVjnStP6GDHzoMBvpGtfRl2kHIm+FZbpzl4/Iu405HuPvw2tim1sEROtO9sC4sse+J18aO5bU3zXR44ahqSHkXLqVqgL8/941b7xnKDjsYlZZ59pSIcyAeTPnMrOTs0D1l91sGyw0UVYxvSdtY/8I5xET2BKdll4ZJ5UVUNiVVcfg2Hh4Jul/OISRJ6CY1bqgX2Pnw1CDcsQq0asxom4vHU/gn+TrPzRDbAabuC+cGSu70UuyGuD1rJkU6zsnbtkwVGLYfNe2dbO0BhkqZr44B7cBxT9fCwnhbuFi5O+xsAkqg4i4+/qaltFOHwnQtQgCQNZX2qpx9x0dkDzJNDw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3/4jSrBX6k2DyPO64InnODz/8/oIWRmOcliYiaXASMo=; b=qrXjHrnM3arj4tF1xLU6wu4Czal9Hukd0fpPetJiYOIGAn0Kb/uZcPbE3i9vUz5VacuqGZB6t6GQXaVkw267FbEyQUXAcAnb7+jseHE7afmLHIGEsves9cy4mkFvheY++mu6TYVo/UYoKXX0J48xdhVsaXTvbOCy5JLsr7yYZVQ=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0374.EURP190.PROD.OUTLOOK.COM (10.175.242.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22; Tue, 18 Feb 2020 23:17:02 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Tue, 18 Feb 2020 23:17:02 +0000
Received: from localhost (212.201.44.247) by FR2P281CA0031.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:14::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.18 via Frontend Transport; Tue, 18 Feb 2020 23:17:02 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Joel Jaeggli <joelja@bogus.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5rGG/WubBQrYckSiWEEsgzHRGA==
Date: Tue, 18 Feb 2020 23:17:02 +0000
Message-ID: <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>
In-Reply-To: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: FR2P281CA0031.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:14::18) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 780043e3-ddf2-419c-2ce2-08d7b4c8a946
x-ms-traffictypediagnostic: DB6P190MB0374:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB03743D7F97A59A9ABA7665ABDE110@DB6P190MB0374.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 031763BCAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(396003)(366004)(39850400004)(136003)(346002)(189003)(199004)(3450700001)(956004)(86362001)(6916009)(8676002)(8936002)(81156014)(71200400001)(81166006)(4326008)(52116002)(6496006)(6486002)(316002)(64756008)(66446008)(26005)(786003)(66476007)(66556008)(186003)(16526019)(66946007)(5660300002)(966005)(478600001)(2906002)(1076003); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0374; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: keQL8w0ZuV6xWnfhnGP7cvaLaROzBHktV87aOOmMRHlp7cbTKASKBSJuC82pq+oy8m00fJs9gLx8Bs8PZVOl9S6DvkavOo0wdp9wEsedlqasKY386lxn5VKkZ5qvWHSWj7tlWFzAcbdgZC8JKHPdJ7tzsaLZvA0pfdka1NxSvqYX6eQP0PuQNTlhynpOsHByy+au8KTMxS10BwVA1Rkp4mfA6O/xebBKaY/x5814bMSRqgsGlEAmv/AG0lf2vyrwARivDTTBypkx5G2DmKyrgZtFU1aNY6uvy+aesMHOFLuYvuhtNTkybM7f4SwdB1Le6R2kpJHF2TKSpKbLl/RljpyuACiCoHb9XiUCvfJkK+qPPdGJFRapJTGCfmfPB5YnzIb/q1tn9pKMfSKkMIIXsNcp/LqZEnRx0lQp1gWHzbc6de0DN+016xTmvrLRXDrk2kTsLPFtxLyLiw1/YLubDSzBKjIlDkUxDPuLX/lLokUxyK/OGPsNwMzzXJ9cWIzsFJOFDgacPO+VB+pP26lKbQ==
x-ms-exchange-antispam-messagedata: mstIzZ+0fYOdaiU2/JuUV/VFdRyPPvbFCYtwVHEsSF/njFVrXK/qn/OByLgZduK4/snKpQNA8rhXmHFjdnZhAEXSR/f7szsfwQ0a4uHqfAQBzy/Wt1y59IXEjmGkRBdMSsaDyVrzFlMhw0ZdfiTllg==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <4363E3F8BACD9D4E954AEA582F1CEB1E@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 780043e3-ddf2-419c-2ce2-08d7b4c8a946
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Feb 2020 23:17:02.4111 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: s7REl6+mc1U1UwJXt/hkPMSmDuaU1IhJGcrmjp2T2r8RYUfFI8ZNzk51jw9/h7QCtVTgmPnqSB6y9dXs2jix3UzRwLiJUPogXkhnU7PJU6Y=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0374
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Rnqh5ztR3R9OKEyQuvi5yuCONQY>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 23:17:08 -0000

On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
> This email begins a 2 week working group adoption poll for:
>=20
> https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
>=20
> Please voice your support or objections before the poll completes on
> March 3rd.

I am against adoption of this draft. I wonder whether Benoit will
explain his contributions to this document; Benoit was added as a
co-author in -06 and he used to be rather sceptical about the SUPA
work (and this is essentially part of the SUPA work resubmitted to the
NETMOD WG). Despite this, the YANG definitions are clearly not up to
the level one would expect for WG adoption. Many descriptions are
just repetition of leaf names and there are obvious errors such as

          leaf-list day-of-month {
            type uint8 {
              range "0..59";
            }
            description
              "A set of days of the month at which this
               scheduling timing will trigger.";
          }

Despite the strange range, it is unclear how a number will in the
range will identify a set. Note, this is an example, there are lots of
them in the document. The examples provides are not convincing and
technically wrong (how can <interval>10m</interval> match

          leaf interval {
            type uint32 {
              range "1..max";
            }
            units "seconds";
            mandatory true;
            description
              "The number of seconds between two triggers
               generated by this periodic timing object.";
          }

and I have serious doubts that the design is anywhere close to be
practically usable. There need to be mechanisms to bind 'variables'
while matching conditions that and be reused in action definitions, it
is not scalable to have constants such as interface names in the
examples hard-coded in policy rules - this would lead to a huge number
of rules if you want to apply policy rules to all interfaces.

There is also a lack of extensibility, which is important for a core
policy language, and definitions like:

  identity function-type {
    description
      "Possible values are:
       plus, minus, mult, divide, remain.";
  }

without ever defining these operators feels strange. I also not
convinced that the resulting expressions are expressive enough for
real-world use.

This document is in a state that requires way too much effort to fix
in a WG process. I also doubt that expressing policies in such a
low-level format is usable in practice. Policy languages for network
management have a long history and this proposal seems to ignore the
lessons learned in the past.

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Tue Feb 18 16:36:32 2020
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EBBD120843 for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 16:36:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level: 
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UzIbccDeHVCQ for <netmod@ietfa.amsl.com>; Tue, 18 Feb 2020 16:36:28 -0800 (PST)
Received: from mail-yb1-xb32.google.com (mail-yb1-xb32.google.com [IPv6:2607:f8b0:4864:20::b32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC7E612083A for <netmod@ietf.org>; Tue, 18 Feb 2020 16:36:28 -0800 (PST)
Received: by mail-yb1-xb32.google.com with SMTP id p123so11512145ybp.2 for <netmod@ietf.org>; Tue, 18 Feb 2020 16:36:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=WbwdJfVC1Pn+rVW3WQEtfDjRH8ErhpbGpctiNrTEckM=; b=RTNja4X1ZN0TfSyQbIniSQtG42EVynwVkaiq3PJKvb6wYOXJW6K8TLIeU05TOXAlZ0 UkbSCVxrz0NHNR9AuqrqknNa8rnbSV7V6gyLEfnPMzoOHwN+IuyQqPNeCYb5DOZI3nwb xgrZoReKtaaRJoFoMqOtgruKsppCtwcVxRKMsFrz16iMr7AUqQnGwCm260IqxRsRJHmi 7u/wNBEAMGN6cNnl2NULrWCFFBw1WGuQOitHGzZ+2ZdwabYEy400cI05eo/c/BXUth+P ki7yB8mK8mWZzrfxSxBLAiD5t+Y3GPu6YxM3CtJmVxTu1ryoEca7AEGrZ0dCaRGnAdi6 vaIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=WbwdJfVC1Pn+rVW3WQEtfDjRH8ErhpbGpctiNrTEckM=; b=oJ9r+plxj92fngXcvaCLufnttQ+ZzYbEgz6ndS7XkWRWOl7D+IDnfgk3dx020GSFdk zlhdAN5PJgQwcgeL0fXlsYGXP6Ca4Tt1Dc4o0towrAi4nB2GT35Uapjgkz+XYDr52k4I fncvZjMqkMRYMUcYPCNoB3FOmaDJetK+hSRSC4ngpXXejGDLFkUOvdBwGpDe3wieuJh7 8c16xyr4P1IollbZP9RlS05+RuXBrk6TunqX06YsgyqVggcXGA97kc8PGneZFrvQ/tFL ZgUnYOV6GqTFRQErtsjbYzA2B6I4zSIEtvUIzSWovj+UCF2FLQF7nlLPyCo5u6t+3y/t I2Nw==
X-Gm-Message-State: APjAAAXrgdPVeXxG/2WVp8PfblugNXEoFlq4Uv4IDqU2qChgEBZDAAXV 7k8KlsrhD7b22a5hEHl1JiI1tWtzB1MCKSw2d65Aag==
X-Google-Smtp-Source: APXvYqyHJDhI1PTtDixRwAPkUUnJqSw/SBpc/E2Ms59Ls9HxBkGfLxjWoQxP994nHWAYTztOQf5ASzMMrGkplLYaImM=
X-Received: by 2002:a25:c545:: with SMTP id v66mr22193523ybe.59.1582072587696;  Tue, 18 Feb 2020 16:36:27 -0800 (PST)
MIME-Version: 1.0
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Tue, 18 Feb 2020 16:36:16 -0800
Message-ID: <CABCOCHT0aa33jZzASVOLZe8i7Q0WC4M2YWfrV8B81Wq5hkwi4Q@mail.gmail.com>
To: =?UTF-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>
Cc: Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000009950d1059ee2fa9a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/eG4UaWTjEGId0yZSsJQS-gsw4Y4>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 00:36:31 -0000

--0000000000009950d1059ee2fa9a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi,

I think the procedures we used to follow under Marshall Rose as AD work
better than current adoption calls. First we agreed on what problem(s) to
solve.
Then we agree on solutions.  Without the first, it is hard to achieve the
second.
I would support working on a short requirements draft first, and then
revisit the
solution if that goes well.

I agree with Juergen about the complexity level for real deployments.
Decomposing logic expressions into a bunch of YANG list entries will never
work.
Just use XPath for expressions. It has variables, functions, and
expressions in compact string form.

There seems to be overlap with RFC 8632.
I would expect to see alarms reused instead of reinvented,
and ECA visibility into the notifications in each server event stream (from
RFC 8639).

The Policy Variables and RPC calls are improvements over past solutions
but still not enough to implement an ECA platform.  A real programming
language
is required, but that may not need to be standardized. Maybe just
mechanisms are needed
to bind ECA components (like PVs) to specific languages (like Python).
Then bind scripts to conditions and actions instead of using YANG objects.
All past attempts to write scripts in SMIv2 or YANG have failed.
YANG is not a programming language.


Andy


On Tue, Feb 18, 2020 at 3:17 PM Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen <
J.Schoenwaelder@jacobs-university.de> wrote:

> On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
> > This email begins a 2 week working group adoption poll for:
> >
> > https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
> >
> > Please voice your support or objections before the poll completes on
> > March 3rd.
>
> I am against adoption of this draft. I wonder whether Benoit will
> explain his contributions to this document; Benoit was added as a
> co-author in -06 and he used to be rather sceptical about the SUPA
> work (and this is essentially part of the SUPA work resubmitted to the
> NETMOD WG). Despite this, the YANG definitions are clearly not up to
> the level one would expect for WG adoption. Many descriptions are
> just repetition of leaf names and there are obvious errors such as
>
>           leaf-list day-of-month {
>             type uint8 {
>               range "0..59";
>             }
>             description
>               "A set of days of the month at which this
>                scheduling timing will trigger.";
>           }
>
> Despite the strange range, it is unclear how a number will in the
> range will identify a set. Note, this is an example, there are lots of
> them in the document. The examples provides are not convincing and
> technically wrong (how can <interval>10m</interval> match
>
>           leaf interval {
>             type uint32 {
>               range "1..max";
>             }
>             units "seconds";
>             mandatory true;
>             description
>               "The number of seconds between two triggers
>                generated by this periodic timing object.";
>           }
>
> and I have serious doubts that the design is anywhere close to be
> practically usable. There need to be mechanisms to bind 'variables'
> while matching conditions that and be reused in action definitions, it
> is not scalable to have constants such as interface names in the
> examples hard-coded in policy rules - this would lead to a huge number
> of rules if you want to apply policy rules to all interfaces.
>
> There is also a lack of extensibility, which is important for a core
> policy language, and definitions like:
>
>   identity function-type {
>     description
>       "Possible values are:
>        plus, minus, mult, divide, remain.";
>   }
>
> without ever defining these operators feels strange. I also not
> convinced that the resulting expressions are expressive enough for
> real-world use.
>
> This document is in a state that requires way too much effort to fix
> in a WG process. I also doubt that expressing policies in such a
> low-level format is usable in practice. Policy languages for network
> management have a long history and this proposal seems to ignore the
> lessons learned in the past.
>
> /js
>
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--0000000000009950d1059ee2fa9a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi,</div><div><br></div><div>I think the procedures w=
e used to follow under Marshall Rose as AD work</div><div>better than curre=
nt adoption calls. First we agreed on what problem(s) to solve.</div><div>T=
hen we agree on solutions.=C2=A0 Without the first, it is hard to achieve t=
he second.</div><div>I would support working on a short requirements draft =
first, and then revisit the</div><div>solution if that goes well.</div><div=
><br></div><div>I agree with Juergen about the complexity level for real de=
ployments.</div><div>Decomposing logic expressions into a bunch of YANG lis=
t entries will never work.</div><div>Just use XPath for expressions. It has=
 variables, functions, and expressions in compact string form.</div><div><b=
r></div><div><div>There seems to be overlap with RFC 8632.</div><div>I woul=
d expect to see alarms reused instead of reinvented,</div><div>and ECA visi=
bility into the notifications in each server event stream (from RFC 8639).<=
/div><div></div></div><div><br></div><div>The Policy Variables and RPC call=
s are improvements over past solutions</div><div>but still not enough to im=
plement an ECA platform.=C2=A0 A real programming language</div><div>is req=
uired, but that may not need to be standardized. Maybe just mechanisms are =
needed</div><div>to bind ECA components (like PVs) to specific languages (l=
ike Python).</div><div>Then bind scripts to conditions and actions instead =
of using YANG objects.</div><div>All past attempts to write scripts in SMIv=
2 or YANG have failed.</div><div>YANG is not a programming language.</div><=
div><br></div><div><br></div><div>Andy</div><div><br></div><br><div class=
=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Feb 18, 2020=
 at 3:17 PM Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen &lt;<a href=3D"mailto:J.Scho=
enwaelder@jacobs-university.de">J.Schoenwaelder@jacobs-university.de</a>&gt=
; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On Tue,=
 Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:<br>
&gt; This email begins a 2 week working group adoption poll for:<br>
&gt; <br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-wwx=
-netmod-event-yang-06</a><br>
&gt; <br>
&gt; Please voice your support or objections before the poll completes on<b=
r>
&gt; March 3rd.<br>
<br>
I am against adoption of this draft. I wonder whether Benoit will<br>
explain his contributions to this document; Benoit was added as a<br>
co-author in -06 and he used to be rather sceptical about the SUPA<br>
work (and this is essentially part of the SUPA work resubmitted to the<br>
NETMOD WG). Despite this, the YANG definitions are clearly not up to<br>
the level one would expect for WG adoption. Many descriptions are<br>
just repetition of leaf names and there are obvious errors such as<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 leaf-list day-of-month {<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 type uint8 {<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 range &quot;0..59&quot;;<b=
r>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 description<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;A set of days of the=
 month at which this<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0scheduling timing wi=
ll trigger.&quot;;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
<br>
Despite the strange range, it is unclear how a number will in the<br>
range will identify a set. Note, this is an example, there are lots of<br>
them in the document. The examples provides are not convincing and<br>
technically wrong (how can &lt;interval&gt;10m&lt;/interval&gt; match<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 leaf interval {<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 type uint32 {<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 range &quot;1..max&quot;;<=
br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 units &quot;seconds&quot;;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 mandatory true;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 description<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;The number of second=
s between two triggers<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0generated by this pe=
riodic timing object.&quot;;<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
<br>
and I have serious doubts that the design is anywhere close to be<br>
practically usable. There need to be mechanisms to bind &#39;variables&#39;=
<br>
while matching conditions that and be reused in action definitions, it<br>
is not scalable to have constants such as interface names in the<br>
examples hard-coded in policy rules - this would lead to a huge number<br>
of rules if you want to apply policy rules to all interfaces.<br>
<br>
There is also a lack of extensibility, which is important for a core<br>
policy language, and definitions like:<br>
<br>
=C2=A0 identity function-type {<br>
=C2=A0 =C2=A0 description<br>
=C2=A0 =C2=A0 =C2=A0 &quot;Possible values are:<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0plus, minus, mult, divide, remain.&quot;;<br>
=C2=A0 }<br>
<br>
without ever defining these operators feels strange. I also not<br>
convinced that the resulting expressions are expressive enough for<br>
real-world use.<br>
<br>
This document is in a state that requires way too much effort to fix<br>
in a WG process. I also doubt that expressing policies in such a<br>
low-level format is usable in practice. Policy languages for network<br>
management have a long history and this proposal seems to ignore the<br>
lessons learned in the past.<br>
<br>
/js<br>
<br>
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
<br>
_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--0000000000009950d1059ee2fa9a--


From nobody Tue Feb 18 17:11:57 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9689120867; Tue, 18 Feb 2020 17:11:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KVWWb1rYtoOg; Tue, 18 Feb 2020 17:11:53 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6749120865; Tue, 18 Feb 2020 17:11:52 -0800 (PST)
Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id BB1063FEA15E0D5AB022; Wed, 19 Feb 2020 01:11:48 +0000 (GMT)
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 19 Feb 2020 01:11:48 +0000
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Wed, 19 Feb 2020 01:11:48 +0000
Received: from DGGEML403-HUB.china.huawei.com (10.3.17.33) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Wed, 19 Feb 2020 01:11:47 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.170]) by DGGEML403-HUB.china.huawei.com ([fe80::74d9:c659:fbec:21fa%31]) with mapi id 14.03.0439.000; Wed, 19 Feb 2020 09:11:44 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "draft-wwx-netmod-event-yang@ietf.org" <draft-wwx-netmod-event-yang@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, Joel Jaeggli <joelja@bogus.com>
Thread-Topic: [netmod] IPR poll on draft-wwx-netmod-event-yang
Thread-Index: AdXmwWze7e87efLBTwqzuvsgMt6YLQ==
Date: Wed, 19 Feb 2020 01:11:43 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD497EF6@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAAD497EF6dggeml511mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QNkqyp-lJStK2P01lRvoRoesddI>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 01:11:56 -0000

--_000_B8F9A780D330094D99AF023C5877DABAAD497EF6dggeml511mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAAD497EF6dggeml511mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
SGVsdmV0aWNhOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZhY2UN
Cgl7Zm9udC1mYW1pbHk65a6L5L2TOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0K
QGZvbnQtZmFjZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQg
NSAzIDUgNCA2IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglw
YW5vc2UtMToyIDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5
OiJcQOWui+S9kyI7DQoJcGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQovKiBTdHlsZSBE
ZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0K
CXttYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0
Ow0KCWZvbnQtZmFtaWx5OuWui+S9kzt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21z
by1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRl
cmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHls
ZS1wcmlvcml0eTo5OTsNCgljb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGlu
ZTt9DQpzcGFuLkVtYWlsU3R5bGUxNw0KCXttc28tc3R5bGUtdHlwZTpwZXJzb25hbC1yZXBseTsN
Cglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjojMUY0OTdEO30NCi5N
c29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZTox
MC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3NpemU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1h
cmdpbjo3Mi4wcHQgOTAuMHB0IDcyLjBwdCA5MC4wcHQ7fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtw
YWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0K
PG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwh
W2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9
ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlv
dXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJaSC1DTiIgbGluaz0i
Ymx1ZSIgdmxpbms9InB1cnBsZSI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0
O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4
MkEiPk5vLCBJJ20gbm90IGF3YXJlIG9mIGFueSBJUFIgdGhhdCBhcHBsaWVzIHRvIHRoaXMgZHJh
ZnQuPC9zcGFuPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86
cD48L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86cD4mbmJzcDs8
L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPi1RaW48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjwvZGl2Pg0KPGRpdiBpZD0ieWFob29fcXVvdGVkXzIwNTU4MDIwMzEiPg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2Vy
aWY7Y29sb3I6IzI2MjgyQSI+T24gVHVlc2RheSwgRmVicnVhcnkgMTgsIDIwMjAsIDExOjQ2OjA3
IEFNIEVTVCwgSm9lbCBKYWVnZ2xpICZsdDs8YSBocmVmPSJtYWlsdG86am9lbGphQGJvZ3VzLmNv
bSI+am9lbGphQGJvZ3VzLmNvbTwvYT4mZ3Q7IHdyb3RlOg0KPG86cD48L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDss
c2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4t
VVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZx
dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPkF1dGhvcnMsIENvbnRyaWJ1dG9ycywgV0cs
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTom
cXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5BcyBwYXJ0IG9m
IHByZXBhcmF0aW9uIGZvciBXRyBBZG9wdGlvbjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0i
Zm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1z
ZXJpZjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2Vy
aWY7Y29sb3I6IzI2MjgyQSI+QXJlIHlvdSBhd2FyZSBvZiBhbnkgSVBSIHRoYXQgYXBwbGllcyB0
byBkcmFmdHMgaWRlbnRpZmllZCBhYm92ZT88bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2Vy
aWY7Y29sb3I6IzI2MjgyQSI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8
ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250
LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlm
O2NvbG9yOiMyNjI4MkEiPlBsZWFzZSBzdGF0ZSBlaXRoZXI6PG86cD48L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDss
c2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj4mcXVvdDtObywgSSdtIG5vdCBhd2FyZSBvZiBhbnkg
SVBSIHRoYXQgYXBwbGllcyB0byB0aGlzIGRyYWZ0JnF1b3Q7PG86cD48L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPm9yPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxl
PSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5z
LXNlcmlmO2NvbG9yOiMyNjI4MkEiPiZxdW90O1llcywgSSdtIGF3YXJlIG9mIElQUiB0aGF0IGFw
cGxpZXMgdG8gdGhpcyBkcmFmdCZxdW90OzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9u
dC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJp
Zjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7
Y29sb3I6IzI2MjgyQSI+SWYgc28sIGhhcyB0aGlzIElQUiBiZWVuIGRpc2Nsb3NlZCBpbiBjb21w
bGlhbmNlIHdpdGggSUVURiBJUFIgcnVsZXM8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZv
bnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2Vy
aWY7Y29sb3I6IzI2MjgyQSI+KHNlZSBSRkNzIDM2NjksIDUzNzggYW5kIDgxNzkgZm9yIG1vcmUg
ZGV0YWlscyk/PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEi
PjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250
LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5J
ZiB5ZXMgdG8gdGhlIGFib3ZlLCBwbGVhc2Ugc3RhdGUgZWl0aGVyOjxvOnA+PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2Em
cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48
L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1V
UyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1
b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+JnF1b3Q7WWVzLCB0aGUgSVBSIGhhcyBiZWVu
IGRpc2Nsb3NlZCBpbiBjb21wbGlhbmNlIHdpdGggSUVURiBJUFIgcnVsZXMmcXVvdDs8bzpwPjwv
bzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7
SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+b3I8bzpwPjwvbzpwPjwv
c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n
PSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0
aWNhJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+JnF1b3Q7Tm8sIHRoZSBJUFIgaGFz
IG5vdCBiZWVuIGRpc2Nsb3NlZCZxdW90OzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9u
dC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJp
Zjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7
Y29sb3I6IzI2MjgyQSI+SWYgeW91IGFuc3dlciBubywgcGxlYXNlIHByb3ZpZGUgYW55IGFkZGl0
aW9uYWwgZGV0YWlscyB5b3UgdGhpbms8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7
Y29sb3I6IzI2MjgyQSI+YXBwcm9wcmlhdGUuPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJm
b250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNl
cmlmO2NvbG9yOiMyNjI4MkEiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9u
dC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJp
Zjtjb2xvcjojMjYyODJBIj5JZiB5b3UgYXJlIGxpc3RlZCBhcyBhIGRvY3VtZW50IGF1dGhvciBv
ciBjb250cmlidXRvciBwbGVhc2UgYW5zd2VyIHRoZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwv
ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHls
ZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fu
cy1zZXJpZjtjb2xvcjojMjYyODJBIj5hYm92ZSBieSByZXNwb25kaW5nIHRvIHRoaXMgZW1haWwg
cmVnYXJkbGVzcyBvZiB3aGV0aGVyIG9yIG5vdCB5b3UgYXJlPG86cD48L286cD48L3NwYW4+PC9w
Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPmF3YXJlIG9mIGFueSByZWxldmFudCBJUFIuIFRo
aXMgZG9jdW1lbnQgd2lsbCBub3QgYWR2YW5jZSB0byB0aGUgbmV4dDxvOnA+PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2Em
cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5zdGFnZSB1bnRpbCBhIHJlc3BvbnNlIGhh
cyBiZWVuIHJlY2VpdmVkIGZyb20gZWFjaCBhdXRob3IgYW5kIGxpc3RlZDxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9
IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRp
Y2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5jb250cmlidXRvci4gTk9URTogVEhJ
UyBBUFBMSUVTIFRPIEFMTCBPRiBZT1UgTElTVEVEIElOIFRISVMgTUVTU0FHRSdTPG86cD48L286
cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
bGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hl
bHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPlRPIExJTkVTLjxvOnA+PC9v
OnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtI
ZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpw
Pjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBs
YW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVs
dmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+SWYgeW91IGFyZSBvbiB0aGUg
V0cgZW1haWwgbGlzdCBvciBhdHRlbmQgV0cgbWVldGluZ3MgYnV0IGFyZSBub3QgbGlzdGVkPG86
cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZx
dW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPmFzIGFuIGF1dGhv
ciBvciBjb250cmlidXRvciwgd2UgcmVtaW5kIHlvdSBvZiB5b3VyIG9ibGlnYXRpb25zIHVuZGVy
PG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5
OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPnRoZSBJRVRG
IElQUiBydWxlcyB3aGljaCBlbmNvdXJhZ2VzIHlvdSB0byBub3RpZnkgdGhlIElFVEYgaWYgeW91
IGFyZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh
bWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5hd2Fy
ZSBvZiBJUFIgb2Ygb3RoZXJzIG9uIGFuIElFVEYgY29udHJpYnV0aW9uLCBvciB0byByZWZyYWlu
IGZyb208bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1m
YW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+cGFy
dGljaXBhdGluZyBpbiBhbnkgY29udHJpYnV0aW9uIG9yIGRpc2N1c3Npb24gcmVsYXRlZCB0byB5
b3VyPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFt
aWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPnVuZGlz
Y2xvc2VkIElQUi4gRm9yIG1vcmUgaW5mb3JtYXRpb24sIHBsZWFzZSBzZWUgdGhlIFJGQ3MgbGlz
dGVkIGFib3ZlPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2Zv
bnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEi
PmFuZDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZh
bWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj48YSBo
cmVmPSJodHRwOi8vdHJhYy50b29scy5pZXRmLm9yZy9ncm91cC9pZXNnL3RyYWMvd2lraS9JbnRl
bGxlY3R1YWxQcm9wZXJ0eSI+aHR0cDovL3RyYWMudG9vbHMuaWV0Zi5vcmcvZ3JvdXAvaWVzZy90
cmFjL3dpa2kvSW50ZWxsZWN0dWFsUHJvcGVydHk8L2E+LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDss
c2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8
L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5
bGU9ImZvbnQtc2l6ZToxMC4wcHQ7Zm9udC1mYW1pbHk6JnF1b3Q7SGVsdmV0aWNhJnF1b3Q7LHNh
bnMtc2VyaWY7Y29sb3I6IzI2MjgyQSI+VGhhbmsgeW91LDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBz
dHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDss
c2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5OZXRNb2QgV0cgQ2hhaXJzPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGlj
YSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFu
PjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2Em
cXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMjYyODJBIj5QUyBQbGVhc2UgaW5jbHVkZSBhbGwgbGlz
dGVkIGluIHRoZSBoZWFkZXJzIG9mIHRoaXMgbWVzc2FnZSBpbiB5b3VyPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGlj
YSZxdW90OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPnJlc3BvbnNlLjxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMi
IHN0eWxlPSJmb250LXNpemU6MTAuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMyNjI4MkEiPl9fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fPGJyPg0KbmV0bW9kIG1haWxpbmcgbGlzdDxicj4NCjxhIGhyZWY9
Im1haWx0bzpuZXRtb2RAaWV0Zi5vcmciPm5ldG1vZEBpZXRmLm9yZzwvYT48YnI+DQo8YSBocmVm
PSJodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL25ldG1vZCIgdGFyZ2V0PSJf
YmxhbmsiPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kPC9hPjxv
OnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9i
b2R5Pg0KPC9odG1sPg0K

--_000_B8F9A780D330094D99AF023C5877DABAAD497EF6dggeml511mbxchi_--


From nobody Tue Feb 18 17:15:47 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4590120866; Tue, 18 Feb 2020 17:15:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AVh_UTXwo8Mz; Tue, 18 Feb 2020 17:15:44 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0660A120865; Tue, 18 Feb 2020 17:15:44 -0800 (PST)
Received: from LHREML711-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id B5499FCB9E7A7648C4BF; Wed, 19 Feb 2020 01:15:42 +0000 (GMT)
Received: from lhreml727-chm.china.huawei.com (10.201.108.78) by LHREML711-CAH.china.huawei.com (10.201.108.34) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 19 Feb 2020 01:15:42 +0000
Received: from lhreml727-chm.china.huawei.com (10.201.108.78) by lhreml727-chm.china.huawei.com (10.201.108.78) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 19 Feb 2020 01:15:42 +0000
Received: from DGGEML406-HUB.china.huawei.com (10.3.17.50) by lhreml727-chm.china.huawei.com (10.201.108.78) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Wed, 19 Feb 2020 01:15:41 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.170]) by dggeml406-hub.china.huawei.com ([10.3.17.50]) with mapi id 14.03.0439.000; Wed, 19 Feb 2020 09:15:36 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, Warren Kumari <warren@kumari.net>
CC: "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "Rob Wilton (rwilton)" <rwilton@cisco.com>
Thread-Topic: [netmod] Changing responsible AD for draft-ietf-netmod-factory-default
Thread-Index: AdXmwd153m0FgDftT0yIN7PpWiZqVw==
Date: Wed, 19 Feb 2020 01:15:36 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD497F1D@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/j4IZD2rfd6lLX2oz1p-Av7quK8Y>
Subject: Re: [netmod] Changing responsible AD for draft-ietf-netmod-factory-default
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 01:15:46 -0000
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From nobody Tue Feb 18 17:32:56 2020
Return-Path: <wangzitao@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74252120872; Tue, 18 Feb 2020 17:32:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rFJ1SAQ-KSHG; Tue, 18 Feb 2020 17:32:51 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3DF412002E; Tue, 18 Feb 2020 17:32:51 -0800 (PST)
Received: from lhreml707-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id DCE2B4C3F08F25DACAFE; Wed, 19 Feb 2020 01:32:49 +0000 (GMT)
Received: from DGGEMM423-HUB.china.huawei.com (10.1.198.40) by lhreml707-cah.china.huawei.com (10.201.108.48) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 19 Feb 2020 01:32:49 +0000
Received: from DGGEMM527-MBX.china.huawei.com ([169.254.6.191]) by dggemm423-hub.china.huawei.com ([10.1.198.40]) with mapi id 14.03.0439.000; Wed, 19 Feb 2020 09:32:42 +0800
From: wangzitao <wangzitao@huawei.com>
To: Joel Jaeggli <joelja@bogus.com>, "draft-wwx-netmod-event-yang@ietf.org" <draft-wwx-netmod-event-yang@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: IPR poll on draft-wwx-netmod-event-yang
Thread-Index: AdXmxBiQKB6sGvhWSCSAHYphrV2FJQ==
Date: Wed, 19 Feb 2020 01:32:42 +0000
Message-ID: <E6BC9BBCBCACC246846FC685F9FF41EA2DD4D7D2@DGGEMM527-MBX.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.67]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/IpfOE7x3oVXkTMBgJnEWjyPMc30>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 01:32:54 -0000
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From nobody Wed Feb 19 01:52:58 2020
Return-Path: <bclaise@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94DD81200F1; Wed, 19 Feb 2020 01:52:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level: 
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AS6VNzMtslqm; Wed, 19 Feb 2020 01:52:54 -0800 (PST)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4F8421200B5; Wed, 19 Feb 2020 01:52:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1796; q=dns/txt; s=iport; t=1582105973; x=1583315573; h=subject:to:references:from:message-id:date:mime-version: in-reply-to:content-transfer-encoding; bh=dtXMcLbsd59oqAnwBqIS5DqMzQ/DWRl/AOIjrtxqIP0=; b=A7mBYGxJr9AmAGCls1V9sqfVTnuhkkyJDZilxdCNKD+WC3TvDEwtMREC d/3UqmimMYgNZBdXwxliAIrBHWsGTd8HnKElMs93BWFJBKwjyfEdE7Rbi vC6u7Q19PxlhBnlETdrXMQrjpeyM7lixQp1SQhk+VJq6YY4KxJvKPK0CV 4=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0COBQBzBE1e/xbLJq1mHAEBAQEBBwE?= =?us-ascii?q?BEQEEBAEBgXuBfYEYdRIqBIQQiQOHcJl4gWcJAQEBDAEBIwwEAQGEQAKCJzg?= =?us-ascii?q?TAgMNAQEFAQEBAgEFBG2FNwyFZwYjFTwVCxoCJgICVwYBDAgBAYJXSwGCew+?= =?us-ascii?q?sUHWBMoVKg1qBPoEOKow+gUE/gREnDIJgPoJZCwKBMAESAYMxgl4EjViJfZg?= =?us-ascii?q?4gkWHT48HBhyCSX2HHoQljCGDW4sTiHeIXIlvAgQLAhWBaSJncTMaCBsVO4J?= =?us-ascii?q?tCEcYDZckhUBAAzKMYoIyAQE?=
X-IronPort-AV: E=Sophos;i="5.70,459,1574121600"; d="scan'208";a="23436763"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Feb 2020 09:52:51 +0000
Received: from [10.55.221.38] (ams-bclaise-nitro5.cisco.com [10.55.221.38]) (authenticated bits=0) by aer-core-2.cisco.com (8.15.2/8.15.2) with ESMTPSA id 01J9qnnF023892 (version=TLSv1.2 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 19 Feb 2020 09:52:50 GMT
To: Joel Jaeggli <joelja@bogus.com>, draft-wwx-netmod-event-yang@ietf.org, netmod@ietf.org
References: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
From: Benoit Claise <bclaise@cisco.com>
Message-ID: <3616cff2-8c5c-4176-ab4d-4b9e3cc3ebaf@cisco.com>
Date: Wed, 19 Feb 2020 10:52:49 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
In-Reply-To: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
X-Authenticated-User: bclaise
X-Outbound-SMTP-Client: 10.55.221.38, ams-bclaise-nitro5.cisco.com
X-Outbound-Node: aer-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/o-7lXdowujVYkdbq2IQZncKdNYM>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 09:52:56 -0000

Hi Joel,

No, I'm not aware of any IPR that applies to this draft

Regards, Benoit
> Authors, Contributors, WG,
>
> As part of preparation for WG Adoption
>
> Are you aware of any IPR that applies to drafts identified above?
>
> Please state either:
>
> "No, I'm not aware of any IPR that applies to this draft"
> or
> "Yes, I'm aware of IPR that applies to this draft"
>
> If so, has this IPR been disclosed in compliance with IETF IPR rules
> (see RFCs 3669, 5378 and 8179 for more details)?
>
> If yes to the above, please state either:
>
> "Yes, the IPR has been disclosed in compliance with IETF IPR rules"
> or
> "No, the IPR has not been disclosed"
>
> If you answer no, please provide any additional details you think
> appropriate.
>
> If you are listed as a document author or contributor please answer the
> above by responding to this email regardless of whether or not you are
> aware of any relevant IPR. This document will not advance to the next
> stage until a response has been received from each author and listed
> contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
> TO LINES.
>
> If you are on the WG email list or attend WG meetings but are not listed
> as an author or contributor, we remind you of your obligations under
> the IETF IPR rules which encourages you to notify the IETF if you are
> aware of IPR of others on an IETF contribution, or to refrain from
> participating in any contribution or discussion related to your
> undisclosed IPR. For more information, please see the RFCs listed above
> and
> http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.
>
> Thank you,
> NetMod WG Chairs
>
> PS Please include all listed in the headers of this message in your
> response.
>


From nobody Wed Feb 19 02:17:04 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E7E7120104 for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 02:17:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.435
X-Spam-Level: *
X-Spam-Status: No, score=1.435 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGau6kyEWlCw for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 02:16:59 -0800 (PST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30052.outbound.protection.outlook.com [40.107.3.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C02F1200FD for <netmod@ietf.org>; Wed, 19 Feb 2020 02:16:58 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HDfRkJCngudZjdPzCqzRrDOiP2Vo1pD4/pNXjFWvV29HRfXL6adq9ieGosmXMCzSb7oTj7kzHhckP4Xru1TfEh5EAhWh5z4VfGlM1VA4APMqyjRLpPzIPsJKW2h6PQw5/7OSwac/+FOI2Y2TYuUqLWXlmuGRTWoIhB2IYmJHA/aiUMBnF/nRRyqLbzovHhuwgRp+jVjBKtInsjpGEc4UX623W0BI4cvBN1yI0bPzQbw7KIYDQLAZsQO+eookQB8jtoUhvrjxf2wd6eiABU+KQIq/NG7zyEh0l4G8bbxhTs6wu4rLv/P19rFvgoWQCrao6dww08/qzRRl1g6XsS7upw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+8fYZ+Ix8MDv6dhSB/9w/zKPE2bvhn1JVsc2z6W1R+4=; b=FG9j+KGQERTgAx/Jk+PZbwRSjX9LEUfnDCVavsDHWLCfvL4weOZcDcLp71Yq/VGqRwMi8ezEZkcTpz6EN/r5HOfcDFd6hA4iUXYChBpJcAGDJCl6rJ7+x166gIyqzXDOgwfmFBMjpN/Z1/s4XufuJeP7QPQNqsJR3BCE1Lcu8hYYU/jUeP3OKhBIDrxr80sDvW/oyCdO+27zh3SGbPr8c/SU6Q+XPlYiCYLsPlki1ucML4L/IjrOgYnmiLo4b5GSInKuGM1/3vI79MB9RIhh/HP0qD2bE1t9+4DiKUsAj8gnI5w4Y7bEWRbQqbOUqJttQV3CZf5KW+ixwujb1Ssk7w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+8fYZ+Ix8MDv6dhSB/9w/zKPE2bvhn1JVsc2z6W1R+4=; b=aWsMEcIv8SRpV99m7WICX0JXgaWiac3P9Rg9kjCB+PA44yIV+aSKzXre4Fv6guwuS/nnx2ZJuVn3H+Puy1jtOuMIu2N1p3YImAvJWjxeA/ZxKp0eXtmM8/mLDpcIAv+NfhePXsPH4DXsSFFvkXVVjPtmmEZYi+LGycMDpUaY+08=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0310.EURP190.PROD.OUTLOOK.COM (10.165.186.141) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22; Wed, 19 Feb 2020 10:16:55 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 10:16:55 +0000
Received: from localhost (212.201.44.247) by AM0PR05CA0013.eurprd05.prod.outlook.com (2603:10a6:208:55::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.17 via Frontend Transport; Wed, 19 Feb 2020 10:16:55 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: =?iso-8859-1?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
CC: Kent Watsen <kent+ietf@watsen.net>, NETMOD Working Group <netmod@ietf.org>
Thread-Topic: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
Thread-Index: AQHVxVfQ4dtefa62LU22UA5i1BqLNafztdMAgCK9LYCAAQnlgIAB3qeAgAk1LYA=
Date: Wed, 19 Feb 2020 10:16:55 +0000
Message-ID: <20200219101653.7e46vtzxuyaixr73@anna.jacobs.jacobs-university.de>
References: <0100016f8006222d-b861a109-93ee-4a77-8b65-54c22d591e25-000000@email.amazonses.com> <20200120144528.wt2z4y66xcnp7fxj@anna.jacobs.jacobs-university.de> <DB7PR07MB4011635119B75D384D11D01DF0180@DB7PR07MB4011.eurprd07.prod.outlook.com> <20200212090703.eikj365ctbsighey@anna.jacobs.jacobs-university.de> <DB7PR07MB4011A7798CBC8E40F49F8B88F01A0@DB7PR07MB4011.eurprd07.prod.outlook.com>
In-Reply-To: <DB7PR07MB4011A7798CBC8E40F49F8B88F01A0@DB7PR07MB4011.eurprd07.prod.outlook.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM0PR05CA0013.eurprd05.prod.outlook.com (2603:10a6:208:55::26) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 365894e4-b5ce-4b3f-86f2-08d7b524d8b1
x-ms-traffictypediagnostic: DB6P190MB0310:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB0310C86BC516CA4ACA259634DE100@DB6P190MB0310.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:4502;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400004)(346002)(396003)(136003)(366004)(376002)(189003)(199004)(6916009)(16526019)(5660300002)(186003)(71200400001)(4326008)(30864003)(86362001)(478600001)(6486002)(6496006)(786003)(316002)(53546011)(966005)(2906002)(52116002)(54906003)(81156014)(1076003)(66574012)(26005)(8676002)(956004)(64756008)(66446008)(66476007)(66556008)(8936002)(81166006)(66946007)(3450700001)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0310; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: HHf4YrthgvBLZ7zGxxmUEsNeR3dSj6zvaT+ub986VLwAc6TKThIzMGEsUqk0Leo3+l6oH5yOw783xvbZL5EWaOh1lqu8LkDYmiI2w8XpghfU46Hp9N533jI4PKMp6kUIWSfgfljFzXt6aoZnwfjToA==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <0CBB60D0F6409D45B0D5E2D29209DEEF@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 365894e4-b5ce-4b3f-86f2-08d7b524d8b1
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 10:16:55.7576 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GENAF8RAAaShHqyv7T+Hq4zEQnuxMqqk4OVgRyduuSZsZlo7RLAwrPjayF9W47iVdC24FrjRdHz6ON+xuNqobE8gSOM0vcT4jtjNM4CY98s=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0310
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/U2i05QfSrTVXpPrn2EaXzpfExKc>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-yang-instance-file-format-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 10:17:02 -0000

On Thu, Feb 13, 2020 at 01:40:13PM +0000, Bal=E1zs Lengyel wrote:
> See below as BALAZS2.
>=20
> -----Original Message-----
> From: Sch=F6nw=E4lder, J=FCrgen <J.Schoenwaelder@jacobs-university.de>=20
> Sent: 2020. febru=E1r 12., szerda 10:07
> To: Bal=E1zs Lengyel <balazs.lengyel@ericsson.com>
> Cc: Kent Watsen <kent+ietf@watsen.net>; NETMOD Working Group
> <netmod@ietf.org>
> Subject: [Not Scanned] - Re: [netmod] WG Last Call:
> draft-ietf-netmod-yang-instance-file-format-06
>=20
> >   - I fail to see the difference between 'content-schema' and 'content
> >     defining YANG module(s)'. The 'content-schema' is already a set of
> >     YANG modules. I suggest to remove 'Content defining YANG module(s)
> >     as it is not a necessary term. Rewrite all places where the phrase
> >     'content defining YANG modules' is used.
> > BALAZS: a schema is a full set of YANG modules needed to define the=20
> > structure and properties of the instance data (+features, deviations).
> > A  "content defining YANG module" is an individual YANG module is part=
=20
> > of the content-schema. So the difference is a set versus one item.
> > I updated the description to emphasize this difference.
>=20
> OK. But then what is a non-content defining YANG module? Or are these
> schema-defining YANG modules? I still do not get why we need 'content
> defining YANG modules' - we did not need that in other specifications so =
far
> that define schemas. So why do we need new terms here?
> BALAZS2: In some paragraphs I reference individual YANG modules that are
> part of the content-schema. What would be a better term for the individua=
l
> modules?
>=20
> >   - Is it necessary to describe P2 in terms of (presumably) NETCONF
> >     operations? I would prefer to have the document written in a
> >     protocol agnostic style. Perhaps simply drop "similar to the
> >     response of a <get> operation/request".
> > BALAZS: This is a reference both to NETCONF and RESTCONF. It was=20
> > explicitly asked for by other reviewers.
>=20
> Well, then the correct wording would be "similar to the response of a
> NETCONF <get> operation or the RESTCONF response to a GET method invocati=
on
> on the (unified) datastore resource". Sounds complex and I still prefer t=
he
> text to be agnostic to specific operations - in particular since <get> an=
d
> the unified datastore have their limitations. The format is simply reusin=
g
> the already defined data model encoding formats, i.e., the format has
> nothing to do with the operations used to retrieve the data. So I suggest=
:
>=20
>    P2  Instance data shall reuse existing encoding rules for
>        YANG defined data.=20
>=20
> There is no need to refer to specific protocol operations.
> BALAZS: I will use both of your texts. That is the most common question I
> get: Will this use the same format as a get-reply? People like to think i=
n
> terms of a specific easy-to-grasp function instead of a non-descript set =
of
> "existing" rules. Existing means you need to understand X number of RFCs,
> while just looking up a get-reply is easy. It is not precise, but IMHO
> that's how people think.

If you write "reuse existing encoding rules", then actually fewer
documents need to be understood. And operations have additional issues
in how they interact with 'datastores', so they may even be misleading
and I rather have the standards precise (and minimal normative
dependencies).
=20
> >   - I do not understand that text about the default attribute. Section
> >     4.8.9 defines a query parameter, not an attribute. And I do not
> >     know how that fits into content data.
> > BALAZS: https://tools.ietf.org/html/rfc8040#section-4.8.9:
> > " If the "with-defaults" parameter is set to "report-all-tagged", then
> >    the server MUST adhere to the default-reporting behavior defined in
> >    Section 3.4 of [RFC6243].  Metadata is reported by the server as
> >    specified in Section 5.3.  The XML encoding for the "default"
> >    attribute sent by the server for default nodes is defined in
> >    Section 6 of [RFC6243].  The JSON encoding for the "default"
> >    attribute MUST use the same values, as defined in [RFC6243], but
> >    encoded according to the rules in [RFC7952].  The module name
> >    "ietf-netconf-with-defaults" MUST be used for the "default"
> >    attribute. "
> > Here the usage of the default ATTRIBUTE is defined.
>=20
> I am still confused about terminology here, an attribute is an XML way of
> representing meta data, JSON does this differently. Perhaps some good
> examples would clear the confusion.
> BALAZS2: The Restconf RFC uses the exact term " the default attribute". I=
f
> it is acceptable there IMHO I should be able to reuse it here. It is not =
my
> terminology it's from RFC 8040.=20
>=20
> >   - Similarly, I do not understand why implementation specific
> >     metadata may be included in the content-data. This seems to be the
> >     wrong place, no? Should metadata not go into the header?
> > BALAZS: As this might be meta-data about the individual instance data=20
> > nodes (e.g.  metadata following the principles from rfc7952) it=20
> > belongs here.
>=20
> OK, perhaps my confusion is that it was not clear to me what kind of
> metadata is meant here...
> BALAZS2:  OK., will try to update, clarify the text.
> =20
> >   - Why MUST XML attributes be ignored, why is there no text about
> >     unknown JSON data, 'attributes' (or annotations)? What should
> >     implementations generally do about unknown elements, attributes,
> >     objects, arrays, ...)? Why are we specific about only one specific
> >     case?
> > BALAZS:  Generally we want to allow users/creators to decorate the=20
> > data with additional information, that is not standardized. Like YANG=20
> > extensions  these may be useful, but at least should not cause problems=
.
> > XML attributes are often used as meta-data and I was asked to list=20
> > them specifically.
> >=20
> I do not understand why there are specific rules for XML encodings but no=
t
> equivalent JSON rules. It looks like either the XML rules are not needed =
or
> equivalent JSON rules are missing if the XML rules are needed or there
> should be an explanation why the different encodings lead to different
> results (which is operationally rather surprising).
> BALAZS2:XML has 2 distinct ways to encode information XML attributes and
> elements.  JSON only has one uniform way. XML attributes are often used t=
o
> carry metadata which is a useful facility and they are not used to encode
> "real" YANG defined data. So we want to allow the use of XML attributes a=
nd
> not go for a least common denominator of the 2 encodings. IMHO it is a
> useful facility, IMHO it belongs here, but if you insist I can remove it.

I believe this text is odd for what I wrote below.
=20
> If we want rules that apply to all encodings, they should be expressed in=
 an
> encoding neutral way. The current text and your response leaves me puzzle=
d
> what the specification really wants to say here. And do we have to say
> something at all?
>=20
> >     It is unclear what "will be very similar" really means but perhaps
> >     this is clarified later. If not, this sentence says nothing in
> >     terms of a technical specification.
>=20
> So what is the meaning of "will be very similar"?
> BALAZS: Similar means same structure, same data types, but there will als=
o
> be differences, like the additional metadata and allowing partial data,
> ignoring of some constraints that are listed in the chapter. As this is n=
ot
> a precise term I will use it only in the introduction chapter (principles=
).=20
>=20
> >   - Why is EXTERNAL in all caps but Inline in capitalized form?  In
> >     the YANG definitions, EXTERNAL seems to be uri. I think we reduce
> >     ambiguity by being consistent with how we name things.
> > BALAZS: OK, EXTERNAL should not be all caps.=20
> > Here external means that the content-schema is defined externally to=20
> > the instance data set, not even a URI is included.
>=20
> So if I have no case in the content-schema-spec choice, then it is extern=
al
> or how does this work? Perhaps define external differently?
> Another attempt:
>=20
> External method: Do not include the content-schema, the user needs to obt=
ain
> the information through external documents.
>=20
> I removed "already known" since a tool and human producing an instance fi=
le
> will in general have no clue what a user of that instance file already
> knows.
> BALAZS: OK
> =20
> >   - 3.1.1 How are the details specified in the anydata? Perhaps a
> >     forward reference might help. What are 'version labels'?
> > BALAZS: Added reference to example.
> > Version/Revision labels are defined in=20
> > draft-verdt-netmod-yang-module-versioning;
> > added as a reference. I added them here (only as an example) as they=20
> > are highly relevant to specifying module versions even if they are not=
=20
> > agreed in Netmod yet. The name was changed from version-label to=20
> > revision-label lately.
>=20
> Lets use a single term then, lets say "revision labels" if that is the mo=
st
> recent once. Right now, both terms seem to be used.
> BALAZS: OK
>=20
> >   - I like to understand why we need several methods to specify the
> >     schema. Having N solution is always bad for interoperability and
> >     also for maintainability. Perhaps the WG failed to reach consensus
> >     on a single solution.  Or there are strong technical reasons - but
> >     then they should be clearly stated. What are implementations
> >     expected to support, all methods? Or whatever the implementer
> >     prefers? How do we achieve interoperability across tools?
> > BALAZS: Different people in the WG wanted different solutions.
> > - Some (as I remember you too) asked for a full flexible solution=20
> > which can use multiple modules potentially not even the=20
> > ietf-yang-library to define the schema  (Inline solution)
> > - some asked for a simple solution listing the content schema modules
> > - some wanted just to use a reference (If any this is the one, I would
> > remove)
> > - some stated that they do not want to define the content-schema at=20
> > all because it is already known So we ended up with 4 methods
>=20
> But reaching consensus by doing all four is not necessarily cheap. So wha=
t
> are compliant tools required to implement. All 4 method?
> Whatever the implementer prefers? Or is there a mandatory to support meth=
od
> (other than external ;-)? The WG needs to understand the costs of having =
N
> ways to do the same thing.
> BALAZS: 2 methods are mandatory:  Simplified-Inline & URI.=20
> Inline is controlled by a feature, so it is optional. =20
> External is inherently optional, as whatever is outside this specificatio=
n
> is undefined thus it may or may not be supported.

This means that as soon as I have deviations or I am not supporting
all features (this can be quite likely), there is no guaranteed to be
supported way to communicate schema information. Well, if that is what
the WG believes is what we want...
 =20
> >   - In the second paragraph, I like to see some discussion of snapshot
> >     consistency.  How much consistency can be expected? Are there
> >     indicators for the level of consistency? I would remove the
> >     sentence about "valid values can be retrieved at run-time" as this
> >     is obvious but then I am not sure why 'valid' values? Perhaps the
> >     authors meant 'current' values?
> > BALAZS: OK< Changed to current. I want to keep the second sentence as=20
> > it describes the duality between the original documented values and =20
> > the current values that can be read in run-time.
> > Consistency is out of scope. No indicators are provided. It is very=20
> > much use-case and implementation specific.
>=20
> In this case, I think it helps to spell out that users cannot assume that
> instance data always represents consistent snapshots.
> BALAZS2: I would like to avoid the topic. We never stated anything about =
the
> quality of data in the instance data set.=20
> E.g. if this is a snapshot of state data and it takes time to create a
> snapshot, data might change even=20
> during creating the snapshot. This is not described here or in Netconf or=
 in
> Restconf.=20
> Why should we describe this in more details than the protocols.

I think the phrase 'snapshot of information at a specific point of
time' makes the difference for me. I do not think that RFC 6241 or RFC
8040 promise to create a snapshot or a snapshot of information at a
specific point of time.
=20
> >   - How do I implement the "SHOULD be described"? The default is that
> >     data can change, only in rare cases data is static. But how does a
> >     tool creating instance data know 'when and how' data changes in the
> >     future? I suggest to remove the SHOULD. The text saying that instan=
ce
> >     data is a snapshot is in my view sufficient.
> > BALAZS: We do not want to specify the how the changes should be=20
> > described, But we do want to state that this information should be made
> available.
> > Just a few ideas how this could be done. Provide
> > - some plain text in the description of the instance data set
> > - some additional metadata e.g. etags, timestamp for the individual=20
> > data nodes.
> > - a change indicator in the content defining yang module itself
>=20
> I do not know how I implement such a SHOULD. I admit that I do not
> understand RFC 2119 language but a lowercase should would make me feel
> better.  The concern here is that it is entirely implementation specific =
how
> I make this information available and hence whether I have followed the
> SHOULD or not is rather unclear.
> BALAZS: OK, lowercase should
>=20
> > * Delivery of Instance Data
> >=20
> >   - Why do we need this SHOULD? I do not think we should use RFC 2119
> >     keywords to define how organizations may use the instance data
> >     format. My proposal is to delete this entire section.
> > BALAZS: I will change it to lower case may.
> > I was asked to and I want to state that we want to use instance data=20
> > both for offline delivery of design time information and for run-time=20
> > delivery of other data.
>=20
> But should this not be stated in the use cases and principles list in
> section 2? I think section 5 is a mixture of a use-case concern and a
> requirement (oops principle):
>=20
>   PX: Instance data sets may be read from or produced by a live server
>       [is YANG server the proper term?] or they can be the result of a
>       specification or design effort that does not involve a live
>       server.
>=20
> I think the essence of section 5 should be integrated into section 2.
> What it says seems misplaced in the middle of the document. (I personally
> prefer to talk about objectives rather than principles but that may be ju=
st
> me.)
> BALAZS: OK, I will move it into chapter 2 Introduction. This is really no=
t
> something mandatory on the implementation.

I still do not see why one use case gets a subsection while others are
elaborated on in the appendix. I am still not sure section 2.2 is
needed. I would rather add the proposed PX to the principles and dump
section 2.2.
 =20
> > (The first 3 users of this format all want to use this for early=20
> > delivery of
> >=20
> > server capabilities. It is for now the dominant use case for which the
> > 2119 SHOULD is important.).=20
>=20
> I do not think this specification should define SHOULDs for specific use
> cases. See my proposal for a possible PX to capture what I think is the c=
ore
> idea.
> BALAZS2: OK, SHOULD change to lower case may.
=20
> > * Backwards Compatibility
> >=20
> >   - I do not think 'managed entity' is a YANG term.
> > BALAZS: What term do you propose for something that is managed like an=
=20
> > interface or user etc. ? I was told managed entity is a generic term=20
> > that is commonly understood . Would "managed item" or "managed thing"=20
> > be better?
> >=20
> >   - I think this text is use case specific and the items are kind of
> >     conflicting with each other (2nd says changing the semantics of a
> >     list should lead to a change of the key while the 1st suggests
> >     that changing keys may lead to misinterpretation of something
> >     being new).
> >=20
> >   - My proposal is to simply drop this entire section. If use case
> >     specific text is needed, add it to the use cases in the appendix.
> > BALAZS: You don't know how many trouble reports we got in multiple=20
> > use-cases for violating these recommendations. While they may not be=20
> > important for all use-cases, the are important for many.
> > Actually we met the problem or had to avoid it in all but one of the=20
> > listed use-cases.
>=20
> This text seems specific to certain use cases or best practices and as su=
ch
> I suggest to integrate it into the appendix C. I do not think this advice
> needs to be part of the technical instance data format specification. One
> could even argue that some of this also concerns config changes to live
> servers. My issue is that I find this discussion misplaced - I like to to
> see the format definition separated from any guidelines how to use it.
> BALAZS2: I still see this as important as proved by real life situations =
and
> also as a n explicit request from the Yang versioning requirements  draft=
.
> The text is specific to some use cases:  In practice relevant to 90% of t=
he
> use cases.

I understand that you care about this specific use case a lot and it
might be 90% in your estimation but this does not change my point that
the text seems guidelines text that I prefer to see separated from the
technical instance format specification and hence moved into the
matching appendix.
 =20
> > * YANG Model
> >=20
> >   - How is the inline-content-schema feature used? Which component
> >     does indicate that inline content-schema is supported? Do all
> >     implementations have to support simplified-inline? If
> >     inline-schema is used, how do I find out which schema formats are
> >     supported? The more formats there are, the more interoperability
> >     issues will arise.
> > Balazs:
> > - case inline { is decorated with "if-feature inline-content-schema"
>=20
> OK
>=20
> > - feature support is generally indicated as part of the=20
> > ietf-yang-library
>=20
> OK
>=20
> > - simplified-inline is mandatory to support. It is relatively simple,=20
> > so IMHO not a problem
>=20
> How do I know whether the feature inline-content-schema is supported in t=
his
> case?
> BALAZS2: IMHO your question is out of scope for this draft.=20
> Just like for any feature you can read it on-line from ietf-yang-library.=
 If
> the information is needed offline it can be documented in any design time
> document. My proposal is to use an instance data file based on
> ietf-yang-library using the simplified-inline schema declaration method.
>=20
> How much simplification is there really compared to the inline method if =
I
> only list modules in the yang library schema without derivations etc? See=
 my
> earlier point about which schema formats are mandatory to implement and
> whether the simplification is worth the extra code and possible
> interoperability issues.
> BALAZS2:
> Compare:
> INLINE method:
>   <content-schema>
>     <inline-module>
>       ietf-yang-library@2016-06-21
>     </inline-module>
>     <inline-schema>
>       <module-state
>         xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-yang-library">
>         <module>
>           <name>ietf-yang-library</name>
>           <revision>2016-06-21</revision>
>         </module>
>         <module>
>           <name>ietf-netconf-monitoring</name>
>           <revision>2010-10-04</revision>
>         </module>
>       </module-state>
>     </inline-schema>
>   <content-schema>
>=20
> SIMPLIFIED INLINE method:
>   <content-schema>
>     <module> ietf-yang-library@2020-01-14</module>
>     <module> ietf-netconf-monitoring@2020-01-14</module>
>   </content-schema>

The begining is static overhead (does not increase with # of modules)
and the rest marginal when it comes to tools reading this, at least
not a big enough argument for me to invent another format. And once
you have a deviation or a feature not implemented, you will need the
longer format anyway (or simply announce a schema that is not quite
correct - I guess this is what people will do).
=20
> > - what do you mean with schema-formats? The yang schema is not=20
> > actually included anywhere.
> > If the "inline" case is used, instance data corresponding to the=20
> > inline-modules is included, not the schema.
> > anydata inline-schema {
> >              description
> >                "Instance data corresponding to the YANG modules
> >                 specified in the inline-module nodes defining the set
> >                 of content defining YANG modules for this
> >                 instance-data-set."
>=20
> My understanding is that the inline-module indicates a variant of the yan=
g
> library used and the inline-schema then follows that indicated yang libra=
ry
> variant and provides the schema. Am I entirely wrong here?
> BALAZS2: You are correct. Some extras:
> Inline-module could indicate some other module instead of the yang-librar=
y.
> I was asked to do this earlier by Rob Wilton.=20
> There can be multiple inline-modules so we can use yang-lib with extensio=
ns
> like  a module adding revision-labels

Yes, I agree, this makes things even more open ended. My expectations
for finding accurate interoperable schema information in instance
formats likely needs to be low.
 =20
> >   - It may be useful to explain that data in instance data sets may
> >     have been filtered by access control rules like NACM and that data
> >     in instance data sets itself won't be filtered anymore by access
> >     control rules like NACM. In other words, if I take snapshots and
> >     stored them as instance data files, these snapshots may leak
> >     information that is otherwise protected. Hence it is important
> >     that NACM rules and file access control rules are consistent.
> > BALAZS: We do not know if the instance data set was originally=20
> > filtered by NACM or not. We don't know if the users on=20
> > Netconf/Restconf/cli are the same as the users defined in the file=20
> > system., so I fear defining what consistent means would be impossible.
> > It is stated that " The same kind of handling should be applied, that
> would
> >    be needed for the result of a <get> operation returning the same
> >    data." IMHO we can't really say more.
>=20
> Yes, I guess what I was trying to say is that a live server may apply
> certain access control rules while instance files may not apply the same
> rules. In other words, an instance file obtained from a live server by jo=
e
> and passed on to lucy may reveal information that lucy will not be allowe=
d
> to see on the live server. By passing around instance files, information =
may
> accidentally leak. Yes, we can't solve this, put we can point this out.
>=20
> BALAZS2: I agree fully, but file security is a really big topic, so
> highlighting some areas will not help people. I  added:
> Care should be taken, when copying the original files or providing=20
>         file access for additional users, not to reveal information
> unintentionally.=20
>=20

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Feb 19 02:45:49 2020
Return-Path: <bclaise@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFCA31200EB for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 02:45:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bWudx_s9mf1S for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 02:45:44 -0800 (PST)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 318D412003E for <netmod@ietf.org>; Wed, 19 Feb 2020 02:45:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12854; q=dns/txt; s=iport; t=1582109144; x=1583318744; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to; bh=/IP8Q0CWnBsYpjq3CJ1St4bR4tQ5VugNyRFIgxfGKfY=; b=bCInRJx4raGju2L4Wctnz5xE3XbI5uyH9gwtqPpRBWj+ZS9KhNbulBW6 ATqA2cVqX5xwIWSRw5NkXlzIeJEZmHpa7/yOX35yo2t+xQbn0hVr7zhWM tHqv/HajCkiHssOgGcbA9ZmFlTiyVDTY5H3APBEJ3VeEErl1jSFm5vNJ4 g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BdAABxEE1e/xbLJq1cAQkaAQEBAQE?= =?us-ascii?q?BAQEBAwEBAQERAQEBAgIBAQEBgXuBfYEYdRKEPokDiBaTMIYjgWcJAQEBDAE?= =?us-ascii?q?BIwwEAQGEQAKCJzgTAgMNAQEFAQEBAgEFBG2FNwyFZwEFI1YQCxgqAgJXBgE?= =?us-ascii?q?MCAEBgldLAYJ7D6xBdYEyhDkCgQ+DVIE4BoE4jD6BQT+BESeBbn4+gmQBAQO?= =?us-ascii?q?BLQEHAQoBCYMogl4EsA2CRYdPjwcGHIJJiBuEJYwhg1uLE4h3iFyJbwIECwI?= =?us-ascii?q?VgWkiZ3EzGggbFTuCbU8YDZckhUBAA40UgjIBAQ?=
X-IronPort-AV: E=Sophos; i="5.70,459,1574121600"; d="scan'208,217"; a="23499078"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Feb 2020 10:45:41 +0000
Received: from [10.55.221.38] (ams-bclaise-nitro5.cisco.com [10.55.221.38]) (authenticated bits=0) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTPSA id 01JAjdhM017204 (version=TLSv1.2 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 19 Feb 2020 10:45:41 GMT
To: =?UTF-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>, Joel Jaeggli <joelja@bogus.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>
From: Benoit Claise <bclaise@cisco.com>
Message-ID: <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>
Date: Wed, 19 Feb 2020 11:45:39 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
In-Reply-To: <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>
Content-Type: multipart/alternative; boundary="------------D1BEAFB8410B1986C0923764"
Content-Language: en-US
X-Authenticated-User: bclaise
X-Outbound-SMTP-Client: 10.55.221.38, ams-bclaise-nitro5.cisco.com
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jlCbbRzuqWQTdX3RUzPMjQx77x4>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 10:45:48 -0000

This is a multi-part message in MIME format.
--------------D1BEAFB8410B1986C0923764
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit

Jürgen,

To tell that I was skeptical about the SUPA work is just wrong.

I had great hopes for SUPA, as having consistent policy constructs in 
YANG module was key. The big hope was that those SUPA constructs could 
be re-used in other YANG modules
     example: routing, ACL, security ...
     Regardless of the location: in a network element or in a 
controller/orchestrator
     Regardless of the function: network element and service YANG modules
If successful, in the end, SUPA would have helped to reuse code.

Was I disappointed by the progress? Yes. The results were not there 
while the rest of the world uses their YANG policy constructs. Timing 
was key so, as AD, I had to pull the plug.
The world has moved on. So be it.
You can't infer skepticism from pragmatism.

Now, back to the draft.
 From a network element point, I stressed the need to take have _simple 
_ECA rules directly routers.
Think about RMON event/alarm but for YANG. Think about removing the RMON 
event/alarm restrictions that it works only for integer/counter.
If your point is that the draft is not perfect, fair point.
Should we solve attempt to solve that issue? Yes.

A confusion comes from the abstract that implies that this work is based 
on SUPA.

Abstract

    RFC8328 defines a policy-based management framework that allows
    definition of a data model to be used to represent high-level,
    possibly network-wide policies.  Policy discussed in RFC8328 are
    classified into imperative policy and declarative policy, Event
    Condition Action (ECA) policy is an typical example of imperative
    policy.  This document defines a YANG data model for the ECA policy
    management.  The ECA policy YANG provides the ability for the network
    management function (within a network element) to control the
    configuration and monitor state change and take simple and instant
    action on the server when a trigger condition on the system state is
    met.

Actually, in my mind, the abstract should be simplified to something 
such as (and yes, it could be improved)

Abstract

    This document defines a YANG data model for the ECA policy
    management.  The ECA policy YANG provides the ability for the network
    management function (within a network element) to control the
    configuration and monitor state change and take simple and instant
    action on the server when a trigger condition on the system state is
    met.

And then, somewhere in the introduction, the following text should be 
reused:

    RFC8328 defines a policy-based management framework that allows
    definition of a data model to be used to represent high-level,
    possibly network-wide policies.  Policy discussed in RFC8328 are
    classified into imperative policy and declarative policy, Event
    Condition Action (ECA) policy is an typical example of imperative
    policy.


Regards, Benoit.
> On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
>> This email begins a 2 week working group adoption poll for:
>>
>> https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
>>
>> Please voice your support or objections before the poll completes on
>> March 3rd.
> I am against adoption of this draft. I wonder whether Benoit will
> explain his contributions to this document; Benoit was added as a
> co-author in -06 and he used to be rather sceptical about the SUPA
> work (and this is essentially part of the SUPA work resubmitted to the
> NETMOD WG). Despite this, the YANG definitions are clearly not up to
> the level one would expect for WG adoption. Many descriptions are
> just repetition of leaf names and there are obvious errors such as
>
>            leaf-list day-of-month {
>              type uint8 {
>                range "0..59";
>              }
>              description
>                "A set of days of the month at which this
>                 scheduling timing will trigger.";
>            }
>
> Despite the strange range, it is unclear how a number will in the
> range will identify a set. Note, this is an example, there are lots of
> them in the document. The examples provides are not convincing and
> technically wrong (how can <interval>10m</interval> match
>
>            leaf interval {
>              type uint32 {
>                range "1..max";
>              }
>              units "seconds";
>              mandatory true;
>              description
>                "The number of seconds between two triggers
>                 generated by this periodic timing object.";
>            }
>
> and I have serious doubts that the design is anywhere close to be
> practically usable. There need to be mechanisms to bind 'variables'
> while matching conditions that and be reused in action definitions, it
> is not scalable to have constants such as interface names in the
> examples hard-coded in policy rules - this would lead to a huge number
> of rules if you want to apply policy rules to all interfaces.
>
> There is also a lack of extensibility, which is important for a core
> policy language, and definitions like:
>
>    identity function-type {
>      description
>        "Possible values are:
>         plus, minus, mult, divide, remain.";
>    }
>
> without ever defining these operators feels strange. I also not
> convinced that the resulting expressions are expressive enough for
> real-world use.
>
> This document is in a state that requires way too much effort to fix
> in a WG process. I also doubt that expressing policies in such a
> low-level format is usable in practice. Policy languages for network
> management have a long history and this proposal seems to ignore the
> lessons learned in the past.
>
> /js
>


--------------D1BEAFB8410B1986C0923764
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    <div class="moz-cite-prefix">Jürgen,<br>
      <br>
      To tell that I was skeptical about the SUPA work is just wrong.<br>
      <br>
      I had great hopes for SUPA, as having consistent policy constructs
      in YANG module was key. The big hope was that those SUPA
      constructs could be re-used in other YANG modules<br>
          example: routing, ACL, security ... <br>
          Regardless of the location: in a network element or in a
      controller/orchestrator<br>
          Regardless of the function: network element and service YANG
      modules<br>
      If successful, in the end, SUPA would have helped to reuse code.<br>
       <br>
      Was I disappointed by the progress? Yes. The results were not
      there while the rest of the world uses their YANG policy
      constructs. Timing was key so, as AD, I had to pull the plug.<br>
      The world has moved on. So be it.<br>
      You can't infer skepticism from pragmatism.<br>
      <br>
      Now, back to the draft.<br>
      From a network element point, I stressed the need to take have <u>simple
      </u>ECA rules directly routers.<br>
      Think about RMON event/alarm but for YANG. Think about removing
      the RMON event/alarm restrictions that it works only for
      integer/counter. <br>
      If your point is that the draft is not perfect, fair point.<br>
      Should we solve attempt to solve that issue? Yes.<br>
      <br>
      A confusion comes from the abstract that implies that this work is
      based on SUPA.<br>
      <pre><span class="m_h">Abstract</span>

   RFC8328 defines a policy-based management framework that allows
   definition of a data model to be used to represent high-level,
   possibly network-wide policies.  Policy discussed in RFC8328 are
   classified into imperative policy and declarative policy, Event
   Condition Action (ECA) policy is an typical example of imperative
   policy.  This document defines a YANG data model for the ECA policy
   management.  The ECA policy YANG provides the ability for the network
   management function (within a network element) to control the
   configuration and monitor state change and take simple and instant
   action on the server when a trigger condition on the system state is
   met.</pre>
      Actually, in my mind, the abstract should be simplified to
      something such as (and yes, it could be improved)<br>
      <pre><span class="m_h">Abstract</span>

   This document defines a YANG data model for the ECA policy
   management.  The ECA policy YANG provides the ability for the network
   management function (within a network element) to control the
   configuration and monitor state change and take simple and instant
   action on the server when a trigger condition on the system state is
   met.</pre>
      And then, somewhere in the introduction, the following text should
      be reused: <br>
      <pre>   RFC8328 defines a policy-based management framework that allows
   definition of a data model to be used to represent high-level,
   possibly network-wide policies.  Policy discussed in RFC8328 are
   classified into imperative policy and declarative policy, Event
   Condition Action (ECA) policy is an typical example of imperative
   policy. </pre>
      <br>
      Regards, Benoit.<br>
    </div>
    <blockquote type="cite"
cite="mid:20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de">
      <pre class="moz-quote-pre" wrap="">On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
</pre>
      <blockquote type="cite">
        <pre class="moz-quote-pre" wrap="">This email begins a 2 week working group adoption poll for:

<a class="moz-txt-link-freetext" href="https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06">https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06</a>

Please voice your support or objections before the poll completes on
March 3rd.
</pre>
      </blockquote>
      <pre class="moz-quote-pre" wrap="">
I am against adoption of this draft. I wonder whether Benoit will
explain his contributions to this document; Benoit was added as a
co-author in -06 and he used to be rather sceptical about the SUPA
work (and this is essentially part of the SUPA work resubmitted to the
NETMOD WG). Despite this, the YANG definitions are clearly not up to
the level one would expect for WG adoption. Many descriptions are
just repetition of leaf names and there are obvious errors such as

          leaf-list day-of-month {
            type uint8 {
              range "0..59";
            }
            description
              "A set of days of the month at which this
               scheduling timing will trigger.";
          }

Despite the strange range, it is unclear how a number will in the
range will identify a set. Note, this is an example, there are lots of
them in the document. The examples provides are not convincing and
technically wrong (how can &lt;interval&gt;10m&lt;/interval&gt; match

          leaf interval {
            type uint32 {
              range "1..max";
            }
            units "seconds";
            mandatory true;
            description
              "The number of seconds between two triggers
               generated by this periodic timing object.";
          }

and I have serious doubts that the design is anywhere close to be
practically usable. There need to be mechanisms to bind 'variables'
while matching conditions that and be reused in action definitions, it
is not scalable to have constants such as interface names in the
examples hard-coded in policy rules - this would lead to a huge number
of rules if you want to apply policy rules to all interfaces.

There is also a lack of extensibility, which is important for a core
policy language, and definitions like:

  identity function-type {
    description
      "Possible values are:
       plus, minus, mult, divide, remain.";
  }

without ever defining these operators feels strange. I also not
convinced that the resulting expressions are expressive enough for
real-world use.

This document is in a state that requires way too much effort to fix
in a WG process. I also doubt that expressing policies in such a
low-level format is usable in practice. Policy languages for network
management have a long history and this proposal seems to ignore the
lessons learned in the past.

/js

</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------D1BEAFB8410B1986C0923764--


From nobody Wed Feb 19 03:44:24 2020
Return-Path: <d.king@lancaster.ac.uk>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B9D51200D5 for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 03:44:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=livelancsac.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hTvEpberJc5P for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 03:44:17 -0800 (PST)
Received: from GBR01-CWL-obe.outbound.protection.outlook.com (mail-eopbgr110111.outbound.protection.outlook.com [40.107.11.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE1A512003E for <netmod@ietf.org>; Wed, 19 Feb 2020 03:44:16 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=egYUBTrbwrWx642xTGQ/o2IRWseDTXAZh1yKuFO6emUXM4uzbvpDAfoL3PUYnjx70xcjWQPWUmYWWimHdIWhXbV7uhzT3q5DjB6GnYPy3MCspubp22NPOQTlsFP8GrD56JmG0NgrZBcRmyN2VVln1Ic10mKSr2gP4jL7NFZrA9zreo6lvtYt5ZQGmzrKwviEQhUAcCy1HOH5A7ZWZJAxbvfWNWZyPDw+nLpeyHCxznenf3pv6NVLrDIZtfDq+VUrbNcguJj1zndYz+BwhZOjK+2Oc6jhSK2yBVJn5gh2ffdSMcjfHe/vu92/Y3GXLYMZQgqzB7JT+9kEW1B9IOCJ+g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RgnE0zqsbJKkHwhWmw3xqoPbtqBYFU8vEoybWzqcwJM=; b=EPIWvQRZr9X6LABOWO9klJTjkGKBmrZ2Zzea/9ShbzdL8iOSIy3qhbpODTAOQ5uzNzBGXEl3+dkqh5S5mFNVNCoxUbqi0XEDliBZsjaflv/0VQbFQyu7Jfh+Wlbc/hEemK3lE2i7/xSqB2+vxUYl7HCO7plYqieanDuLUB4Tw3o/r6BmRQLFbjm5zXBa9cQsUPPATL/ZdAzm5V4A6c8sjrAteZv/sxDCXPSRhpcdFHy40cR73sqNuYo+2g9w0yqglUXTKrbw/vjQhaW4CFu6HxIzz79NG9ufB+UUtcNAEqdoK2eYctJReLstTkkMQHL/TIm0gee5QQRmfcueloOIJQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=lancaster.ac.uk; dmarc=pass action=none header.from=lancaster.ac.uk; dkim=pass header.d=lancaster.ac.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=livelancsac.onmicrosoft.com; s=selector2-livelancsac-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RgnE0zqsbJKkHwhWmw3xqoPbtqBYFU8vEoybWzqcwJM=; b=L7cm8cttVKVn5cgLeG9zuf9p/O48m2oXbZrmp31ukpurBMGNaQaSFaqizp108P9Hw07nCl0I/dz29/ytvITr5OddG7e7LjOURiNoV7pt1uSKtEsWTUAVqBc9C/OKBjg4ajsYKUZwxzV7zFOgIM1gEEhsXTv7qpqCkzN842RtXKQ=
Received: from CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM (10.164.184.15) by CWXP265MB1463.GBRP265.PROD.OUTLOOK.COM (20.176.45.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.31; Wed, 19 Feb 2020 11:44:14 +0000
Received: from CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM ([fe80::94ae:8312:244:ddf8]) by CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM ([fe80::94ae:8312:244:ddf8%2]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 11:44:14 +0000
From: "King, Daniel" <d.king@lancaster.ac.uk>
To: Benoit Claise <bclaise@cisco.com>, =?utf-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>, Joel Jaeggli <joelja@bogus.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQKea3EF3NDZCPTLolJwsK5LwvKY0wHrgbsaAraxxVambEKiIA==
Date: Wed, 19 Feb 2020 11:44:14 +0000
Message-ID: <CWXP265MB0775983A3A9DB3FABC23D932D6100@CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de> <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>
In-Reply-To: <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=d.king@lancaster.ac.uk; 
x-originating-ip: [217.206.228.219]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a15532ac-2183-4fd7-f371-08d7b5310b85
x-ms-traffictypediagnostic: CWXP265MB1463:
x-microsoft-antispam-prvs: <CWXP265MB146334F3E02E1EC1658D0212D6100@CWXP265MB1463.GBRP265.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(39860400002)(376002)(396003)(346002)(136003)(189003)(199004)(55016002)(64756008)(76116006)(966005)(81166006)(66946007)(81156014)(9686003)(66556008)(66446008)(8676002)(33656002)(8936002)(66476007)(66574012)(86362001)(9326002)(110136005)(52536014)(186003)(478600001)(786003)(2906002)(6506007)(53546011)(26005)(4326008)(5660300002)(7696005)(316002)(71200400001); DIR:OUT; SFP:1102; SCL:1; SRVR:CWXP265MB1463; H:CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: lancaster.ac.uk does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: KTJiP9+VfTto/DeCjYh+fMU/GtfEVUHxuQ/bSxV7P/dnVMIaULMmi62pi5VUJk8HIxbo6oUmkKF+dyNW5lmW1NCLTUmxKJympyiUT9Gm+zzammyLQIVYf21MtIQURQeHds0QBGH3CzpTsAXq0j2RCA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CWXP265MB0775983A3A9DB3FABC23D932D6100CWXP265MB0775GBRP_"
MIME-Version: 1.0
X-OriginatorOrg: lancaster.ac.uk
X-MS-Exchange-CrossTenant-Network-Message-Id: a15532ac-2183-4fd7-f371-08d7b5310b85
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 11:44:14.6478 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9c9bcd11-977a-4e9c-a9a0-bc734090164a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NwwGNICONd8WvYB4k2EkNm6STyNwFYiG9I/yVQ5EQZkSeqkCt48cwz70pgbLSsQtRYX3Vg3I2fCy5+O4n4U1Rw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CWXP265MB1463
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DU8Ie2wOapXLDeLoo6fAe3j2Pk8>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 11:44:21 -0000

--_000_CWXP265MB0775983A3A9DB3FABC23D932D6100CWXP265MB0775GBRP_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CWXP265MB0775983A3A9DB3FABC23D932D6100CWXP265MB0775GBRP_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_CWXP265MB0775983A3A9DB3FABC23D932D6100CWXP265MB0775GBRP_--


From nobody Wed Feb 19 04:18:05 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B918A120046 for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 04:18:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.436
X-Spam-Level: *
X-Spam-Status: No, score=1.436 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzKHOFp9CaEd for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 04:18:02 -0800 (PST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40089.outbound.protection.outlook.com [40.107.4.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C24312003F for <netmod@ietf.org>; Wed, 19 Feb 2020 04:18:02 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VEvVz/fyuI1OIXLqed7CZY3z8FLBNsFnPnAUT6UNhBWHv076xynPI8SCF0TDOXfgjOBUYX4x4JzNNfCkCYCItlo84VjOVzRftolpriS7PJ2U80P3tPtrLfrimAa1Xaqc5k7ZbL13yYJtM3S1rSRQvgurlQXDsDBdGnGfThAArKQRtvLIOKnLtdZqQ8+qyMikUZ9t6AaMZX5i0msbjLBqUa65paBP7p67sSffNPFl8P7PHSL/lA/k1kyct2Aq7b/jWxnl/zbwhkjyf5AMtkTWlEnPSfJa4kkTrLwxpCaIpfB/upshQjWmRizQsIqMqe4jwf/G+w/2LyfbMuaoyqzyHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iKhA73owH2LEHy6VPbkpO8Q2a+kKtZ80qZnP3OVYxU0=; b=d+rYUTc2to7MfFfx6+iUOjE2XEGr6wFEK9BaVsBANaKbDfeBy05kFE+80lgiJIX5oGSJMU7TaGlHoTUy6IQ1dZRWD4+j+stDqBADaYyFdGJPXo5NEKF6PK98lQB8h5WFACrL4OLSpcBDTtk265ZxneyCzZoDiI11ETS2OU1wvEerAx1zlZ76pJHaOJ+6PfxCRscRwwLgqphf7r2E9PeTnbH5N8WUZYvfxSh2SfIpBpspdmc8xxMgoAyxC+Q1N3HGzrt1l+BTiQiIqzffcjRdpMhhUJMaKjPtWirG7f9lae2o/EYORcg+Z6NhmjhXhffrPSoiRkL3tk6MsZiNgkosGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iKhA73owH2LEHy6VPbkpO8Q2a+kKtZ80qZnP3OVYxU0=; b=fsWAV0IYrhJ0Vuo1psTTiVMKWgLYKNme9S7QmEQwt5x6wddHjz9O314iYa3ztvCxVX5q3e/BXQzVGg+amIayu1IcX9UF7uOFvdaEmBjAgL25NvdgXKe1P/smrNN5QZ7r6jaPQq6qa0yA7wx8ru/GRQl/ReSuiew2GXjNCRPxo8w=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0519.EURP190.PROD.OUTLOOK.COM (10.165.185.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.27; Wed, 19 Feb 2020 12:18:00 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 12:18:00 +0000
Received: from localhost (212.201.44.247) by AM0PR01CA0024.eurprd01.prod.exchangelabs.com (2603:10a6:208:69::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25 via Frontend Transport; Wed, 19 Feb 2020 12:17:59 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Benoit Claise <bclaise@cisco.com>
CC: Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5rGG/WubBQrYckSiWEEsgzHRGKgiVg+AgAAZywA=
Date: Wed, 19 Feb 2020 12:18:00 +0000
Message-ID: <20200219121758.2ri4jtrhl6ytlkrw@anna.jacobs.jacobs-university.de>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de> <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>
In-Reply-To: <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM0PR01CA0024.eurprd01.prod.exchangelabs.com (2603:10a6:208:69::37) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 929f2505-2aa2-4549-403a-08d7b535c293
x-ms-traffictypediagnostic: DB6P190MB0519:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB0519860400906224EF60D424DE100@DB6P190MB0519.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(39850400004)(376002)(136003)(346002)(199004)(189003)(478600001)(26005)(86362001)(6916009)(4326008)(1076003)(956004)(52116002)(6666004)(71200400001)(66574012)(786003)(6496006)(6486002)(66556008)(66946007)(81156014)(66476007)(5660300002)(81166006)(8676002)(2906002)(66446008)(64756008)(8936002)(3450700001)(16526019)(966005)(316002)(54906003)(186003); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0519; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: hZ5xhs2IS5VGHNgbaYk6LKDuMuIUv2ei5DOvuHB/3/1UMZPJhaRZFv78SWNoQSbWVxIvqPWi+7qF5QR7CmPDm6mQ9jwOj7ObmA4cwhVTJB1kp53OnAUz8do0ktBqAAGRl4gxg//eFmOMWiA0/E7mcw==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <41A4616F2C8C544983B57A1FEE8D5D03@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 929f2505-2aa2-4549-403a-08d7b535c293
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 12:18:00.0137 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SNOfTf7MnkjVNxuvH0NRprgLrhKw/DVz7d/7In7qr81R60CKqzoR5NtwZfUhHh+E5PGuI+8+HranABxtgwhq/c6KJX65PDXx7jSbD8TJVcQ=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0519
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/XNWRNO_ZMJoj0Io14s8v6iu8qXg>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 12:18:05 -0000

Benoit,

thanks for the clarification.

I still believe that the approach taken is wrong. I doubt that network
operators are interested in an assembly level approach for expressing
threshold triggers. I am not sure xpath is the answer either. What was
perhaps reasonable to try in the 90s (RMON, DISMAN work) may not be
reasonably today anymore.

The example starting on page 43 seems to be doing this

  every 10 minutes
  if    exists(/ietf-interfaces:interfaces=3D'eth0')
  and   if:interface[if:name=3D'eth0']/if:statistic/if:in-errors >=3D 100
  then  /if:interfaces/if:interface[if:name=3D'eth0']/if:enable =3D false

but it requires 1.5 pages of XML to express this (and then the rule is
not even meaningful since comparing an absolute value of a counter is
not useful).

If we are serious about policies, I believe we need to think about a
language-based approach that can be read and understood and which does
the things that are meaningful. Let me makeup some pseudo code based
on the example that can work for all eth* interfaces and that gets the
delta calculation of the counter right.

  if =3D /ietf-interfaces:interfaces/interface # json style namespace bindi=
ng
  dt =3D 600 # 10 minutes in seconds
  every dt
  foreach name in $if/name:
    this =3D $if/[name=3D$name]
    if   $name matches 'eth.*'
    and  delta($this/statistic/in-errors, dt) >=3D 100
    then $this/enable =3D false

If people are serious about doing this kind of work, start by
collecting real-world policies that need to be expressable, then
identify the "language" mechanisms that are needed (loops over lists,
bindings, variables and substitutions, pattern matching, ...) and then
find a suitable representation. Yes, this is also something that
people wanted SUPA to do and it did fail because it was already hard
to collect real-world policies that help to understand what kind of
mechanisms are needed and why.

/js

On Wed, Feb 19, 2020 at 11:45:39AM +0100, Benoit Claise wrote:
> J=FCrgen,
>=20
> To tell that I was skeptical about the SUPA work is just wrong.
>=20
> I had great hopes for SUPA, as having consistent policy constructs in YAN=
G
> module was key. The big hope was that those SUPA constructs could be re-u=
sed
> in other YANG modules
> =A0=A0=A0 example: routing, ACL, security ...
> =A0=A0=A0 Regardless of the location: in a network element or in a
> controller/orchestrator
> =A0=A0=A0 Regardless of the function: network element and service YANG mo=
dules
> If successful, in the end, SUPA would have helped to reuse code.
>=20
> Was I disappointed by the progress? Yes. The results were not there while
> the rest of the world uses their YANG policy constructs. Timing was key s=
o,
> as AD, I had to pull the plug.
> The world has moved on. So be it.
> You can't infer skepticism from pragmatism.
>=20
> Now, back to the draft.
> From a network element point, I stressed the need to take have _simple _E=
CA
> rules directly routers.
> Think about RMON event/alarm but for YANG. Think about removing the RMON
> event/alarm restrictions that it works only for integer/counter.
> If your point is that the draft is not perfect, fair point.
> Should we solve attempt to solve that issue? Yes.
>=20
> A confusion comes from the abstract that implies that this work is based =
on
> SUPA.
>=20
> Abstract
>=20
>    RFC8328 defines a policy-based management framework that allows
>    definition of a data model to be used to represent high-level,
>    possibly network-wide policies.  Policy discussed in RFC8328 are
>    classified into imperative policy and declarative policy, Event
>    Condition Action (ECA) policy is an typical example of imperative
>    policy.  This document defines a YANG data model for the ECA policy
>    management.  The ECA policy YANG provides the ability for the network
>    management function (within a network element) to control the
>    configuration and monitor state change and take simple and instant
>    action on the server when a trigger condition on the system state is
>    met.
>=20
> Actually, in my mind, the abstract should be simplified to something such=
 as
> (and yes, it could be improved)
>=20
> Abstract
>=20
>    This document defines a YANG data model for the ECA policy
>    management.  The ECA policy YANG provides the ability for the network
>    management function (within a network element) to control the
>    configuration and monitor state change and take simple and instant
>    action on the server when a trigger condition on the system state is
>    met.
>=20
> And then, somewhere in the introduction, the following text should be
> reused:
>=20
>    RFC8328 defines a policy-based management framework that allows
>    definition of a data model to be used to represent high-level,
>    possibly network-wide policies.  Policy discussed in RFC8328 are
>    classified into imperative policy and declarative policy, Event
>    Condition Action (ECA) policy is an typical example of imperative
>    policy.
>=20
>=20
> Regards, Benoit.
> > On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
> > > This email begins a 2 week working group adoption poll for:
> > >=20
> > > https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
> > >=20
> > > Please voice your support or objections before the poll completes on
> > > March 3rd.
> > I am against adoption of this draft. I wonder whether Benoit will
> > explain his contributions to this document; Benoit was added as a
> > co-author in -06 and he used to be rather sceptical about the SUPA
> > work (and this is essentially part of the SUPA work resubmitted to the
> > NETMOD WG). Despite this, the YANG definitions are clearly not up to
> > the level one would expect for WG adoption. Many descriptions are
> > just repetition of leaf names and there are obvious errors such as
> >=20
> >            leaf-list day-of-month {
> >              type uint8 {
> >                range "0..59";
> >              }
> >              description
> >                "A set of days of the month at which this
> >                 scheduling timing will trigger.";
> >            }
> >=20
> > Despite the strange range, it is unclear how a number will in the
> > range will identify a set. Note, this is an example, there are lots of
> > them in the document. The examples provides are not convincing and
> > technically wrong (how can <interval>10m</interval> match
> >=20
> >            leaf interval {
> >              type uint32 {
> >                range "1..max";
> >              }
> >              units "seconds";
> >              mandatory true;
> >              description
> >                "The number of seconds between two triggers
> >                 generated by this periodic timing object.";
> >            }
> >=20
> > and I have serious doubts that the design is anywhere close to be
> > practically usable. There need to be mechanisms to bind 'variables'
> > while matching conditions that and be reused in action definitions, it
> > is not scalable to have constants such as interface names in the
> > examples hard-coded in policy rules - this would lead to a huge number
> > of rules if you want to apply policy rules to all interfaces.
> >=20
> > There is also a lack of extensibility, which is important for a core
> > policy language, and definitions like:
> >=20
> >    identity function-type {
> >      description
> >        "Possible values are:
> >         plus, minus, mult, divide, remain.";
> >    }
> >=20
> > without ever defining these operators feels strange. I also not
> > convinced that the resulting expressions are expressive enough for
> > real-world use.
> >=20
> > This document is in a state that requires way too much effort to fix
> > in a WG process. I also doubt that expressing policies in such a
> > low-level format is usable in practice. Policy languages for network
> > management have a long history and this proposal seems to ignore the
> > lessons learned in the past.
> >=20
> > /js
> >=20
>=20

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Feb 19 06:16:35 2020
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42076120127 for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 06:16:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level: 
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bxTeFHy1k4YY for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 06:16:29 -0800 (PST)
Received: from mail-yw1-xc42.google.com (mail-yw1-xc42.google.com [IPv6:2607:f8b0:4864:20::c42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CBFF1120125 for <netmod@ietf.org>; Wed, 19 Feb 2020 06:16:28 -0800 (PST)
Received: by mail-yw1-xc42.google.com with SMTP id b186so162523ywc.1 for <netmod@ietf.org>; Wed, 19 Feb 2020 06:16:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=5Cnp70YKp7cVxoFTl2v4YreGDQ3BH+v+4LS8wsEm/Bw=; b=LSymyZmiJzfpJE7YE69XxcWZe1Nrx9mGlWuXXc5yE7oR0VGLm7iVj7XSZ/DlcE9VB+ YlfaLeTw8WFzHwLOjud33B6aJZ1yxpnvLifgclv68kWcfDRL1d69G+WXGT0zu/dpRV6K 4jdJMxHa3aCFw5P6ZwU6C6Wy0ePnE88Pm1EbqPb3c/7kushI6MGMXNDHjoSUFL253RHu qOc7gc3VdbIgucC67aXjpbM9XfuFCF6O+6lC5ofWKbNPTOExW8vY9W5orMqZXh/NJFCI yDedsSNwoWobItYnkEwcECLJBUgDbZETROd1vnuiQD69yCMQd0qRrTEiy5COwFAMpHjr 4tsw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5Cnp70YKp7cVxoFTl2v4YreGDQ3BH+v+4LS8wsEm/Bw=; b=HMhiISebFPatqoxp5LzUtq0/vuHJAFeVNThnK7KcezfsX2SZQIowUFLsq37gcQ+Yok H4dVBhf1xlO5tdxc/QNKILUFW959QFoiopGCMSqeDeQpiihcCb3yedyHHWnjkvL4tghH 2WN5aeKppqMym60r9kbVbPoIuXoDw87YYDXM3jge54H1k0Om7jKTFNAaEr3EYU9ph84F Ee+8fAJ2Rr1/s4xQVsXPidBz/aO6zTleszMtk2jeqTIoxNidj2BtsD33lvkkh1QkQdGL OCJdi0at3a2RmrwBtznuMXLCZiM50A9VbekRkm+x01a5nB9YaOl53r6IsuFbp1OkhJXo Kh7w==
X-Gm-Message-State: APjAAAUj//X96FBFuJYR189GViA8L1UGfOJTWTeCPciBc484BesxaalA i7LH/9Q+TQ2zR8Z4wpUMW4uUf5UT22W0OrGAQP7HSg==
X-Google-Smtp-Source: APXvYqxI7/wbEeFK/ef/Fm10AQQPsgkjQSRJBsc30vEvButHgo7HjyTqpMoOxQNH/SFVtX5cyNAxCy+XN93/Bw42gfo=
X-Received: by 2002:a0d:f685:: with SMTP id g127mr22123112ywf.412.1582121787734;  Wed, 19 Feb 2020 06:16:27 -0800 (PST)
MIME-Version: 1.0
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de> <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com> <20200219121758.2ri4jtrhl6ytlkrw@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200219121758.2ri4jtrhl6ytlkrw@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Wed, 19 Feb 2020 06:16:16 -0800
Message-ID: <CABCOCHTbb1L2Nan81=v=JY5-UiLUz-1x1wVUkuidm2WMx-or+w@mail.gmail.com>
To: =?UTF-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>
Cc: Benoit Claise <bclaise@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002653fe059eee6f47"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wlAtXcl-kh0SN3nWliH8-xvQ6WU>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 14:16:33 -0000

--0000000000002653fe059eee6f47
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Wed, Feb 19, 2020 at 4:18 AM Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen <
J.Schoenwaelder@jacobs-university.de> wrote:

> Benoit,
>
> thanks for the clarification.
>
> I still believe that the approach taken is wrong. I doubt that network
> operators are interested in an assembly level approach for expressing
> threshold triggers. I am not sure xpath is the answer either. What was
> perhaps reasonable to try in the 90s (RMON, DISMAN work) may not be
> reasonably today anymore.
>
>
I agree that "plain" XPath is not that useful.
Your example of a counter delta really show why.


> The example starting on page 43 seems to be doing this
>
>   every 10 minutes
>   if    exists(/ietf-interfaces:interfaces=3D'eth0')
>   and   if:interface[if:name=3D'eth0']/if:statistic/if:in-errors >=3D 100
>   then  /if:interfaces/if:interface[if:name=3D'eth0']/if:enable =3D false
>
> but it requires 1.5 pages of XML to express this (and then the rule is
> not even meaningful since comparing an absolute value of a counter is
> not useful).
>
>
Perhaps people think that by programming in YANG this somehow makes it
universal and avoids picking a programming language.

If we are serious about policies, I believe we need to think about a
> language-based approach that can be read and understood and which does
> the things that are meaningful. Let me makeup some pseudo code based
> on the example that can work for all eth* interfaces and that gets the
> delta calculation of the counter right.
>
>   if =3D /ietf-interfaces:interfaces/interface # json style namespace bin=
ding
>   dt =3D 600 # 10 minutes in seconds
>   every dt
>   foreach name in $if/name:
>     this =3D $if/[name=3D$name]
>     if   $name matches 'eth.*'
>     and  delta($this/statistic/in-errors, dt) >=3D 100
>     then $this/enable =3D false
>
>

I am hopeful that complex state like an array of counter rates could be
maintained
using policy variables. Then XPath could reference the PV in an expression
that is easy to write.



> If people are serious about doing this kind of work, start by
> collecting real-world policies that need to be expressable, then
> identify the "language" mechanisms that are needed (loops over lists,
> bindings, variables and substitutions, pattern matching, ...) and then
> find a suitable representation. Yes, this is also something that
> people wanted SUPA to do and it did fail because it was already hard
> to collect real-world policies that help to understand what kind of
> mechanisms are needed and why.
>
>
A real language is needed with local variables, functions, conditional
branching and iteration, etc.
Using YANG data nodes to "configure" policy logic seems like the most
difficult way possible
to provide this functionality.


/js
>

Andy


>
> On Wed, Feb 19, 2020 at 11:45:39AM +0100, Benoit Claise wrote:
> > J=C3=BCrgen,
> >
> > To tell that I was skeptical about the SUPA work is just wrong.
> >
> > I had great hopes for SUPA, as having consistent policy constructs in
> YANG
> > module was key. The big hope was that those SUPA constructs could be
> re-used
> > in other YANG modules
> >     example: routing, ACL, security ...
> >     Regardless of the location: in a network element or in a
> > controller/orchestrator
> >     Regardless of the function: network element and service YANG module=
s
> > If successful, in the end, SUPA would have helped to reuse code.
> >
> > Was I disappointed by the progress? Yes. The results were not there whi=
le
> > the rest of the world uses their YANG policy constructs. Timing was key
> so,
> > as AD, I had to pull the plug.
> > The world has moved on. So be it.
> > You can't infer skepticism from pragmatism.
> >
> > Now, back to the draft.
> > From a network element point, I stressed the need to take have _simple
> _ECA
> > rules directly routers.
> > Think about RMON event/alarm but for YANG. Think about removing the RMO=
N
> > event/alarm restrictions that it works only for integer/counter.
> > If your point is that the draft is not perfect, fair point.
> > Should we solve attempt to solve that issue? Yes.
> >
> > A confusion comes from the abstract that implies that this work is base=
d
> on
> > SUPA.
> >
> > Abstract
> >
> >    RFC8328 defines a policy-based management framework that allows
> >    definition of a data model to be used to represent high-level,
> >    possibly network-wide policies.  Policy discussed in RFC8328 are
> >    classified into imperative policy and declarative policy, Event
> >    Condition Action (ECA) policy is an typical example of imperative
> >    policy.  This document defines a YANG data model for the ECA policy
> >    management.  The ECA policy YANG provides the ability for the networ=
k
> >    management function (within a network element) to control the
> >    configuration and monitor state change and take simple and instant
> >    action on the server when a trigger condition on the system state is
> >    met.
> >
> > Actually, in my mind, the abstract should be simplified to something
> such as
> > (and yes, it could be improved)
> >
> > Abstract
> >
> >    This document defines a YANG data model for the ECA policy
> >    management.  The ECA policy YANG provides the ability for the networ=
k
> >    management function (within a network element) to control the
> >    configuration and monitor state change and take simple and instant
> >    action on the server when a trigger condition on the system state is
> >    met.
> >
> > And then, somewhere in the introduction, the following text should be
> > reused:
> >
> >    RFC8328 defines a policy-based management framework that allows
> >    definition of a data model to be used to represent high-level,
> >    possibly network-wide policies.  Policy discussed in RFC8328 are
> >    classified into imperative policy and declarative policy, Event
> >    Condition Action (ECA) policy is an typical example of imperative
> >    policy.
> >
> >
> > Regards, Benoit.
> > > On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
> > > > This email begins a 2 week working group adoption poll for:
> > > >
> > > > https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
> > > >
> > > > Please voice your support or objections before the poll completes o=
n
> > > > March 3rd.
> > > I am against adoption of this draft. I wonder whether Benoit will
> > > explain his contributions to this document; Benoit was added as a
> > > co-author in -06 and he used to be rather sceptical about the SUPA
> > > work (and this is essentially part of the SUPA work resubmitted to th=
e
> > > NETMOD WG). Despite this, the YANG definitions are clearly not up to
> > > the level one would expect for WG adoption. Many descriptions are
> > > just repetition of leaf names and there are obvious errors such as
> > >
> > >            leaf-list day-of-month {
> > >              type uint8 {
> > >                range "0..59";
> > >              }
> > >              description
> > >                "A set of days of the month at which this
> > >                 scheduling timing will trigger.";
> > >            }
> > >
> > > Despite the strange range, it is unclear how a number will in the
> > > range will identify a set. Note, this is an example, there are lots o=
f
> > > them in the document. The examples provides are not convincing and
> > > technically wrong (how can <interval>10m</interval> match
> > >
> > >            leaf interval {
> > >              type uint32 {
> > >                range "1..max";
> > >              }
> > >              units "seconds";
> > >              mandatory true;
> > >              description
> > >                "The number of seconds between two triggers
> > >                 generated by this periodic timing object.";
> > >            }
> > >
> > > and I have serious doubts that the design is anywhere close to be
> > > practically usable. There need to be mechanisms to bind 'variables'
> > > while matching conditions that and be reused in action definitions, i=
t
> > > is not scalable to have constants such as interface names in the
> > > examples hard-coded in policy rules - this would lead to a huge numbe=
r
> > > of rules if you want to apply policy rules to all interfaces.
> > >
> > > There is also a lack of extensibility, which is important for a core
> > > policy language, and definitions like:
> > >
> > >    identity function-type {
> > >      description
> > >        "Possible values are:
> > >         plus, minus, mult, divide, remain.";
> > >    }
> > >
> > > without ever defining these operators feels strange. I also not
> > > convinced that the resulting expressions are expressive enough for
> > > real-world use.
> > >
> > > This document is in a state that requires way too much effort to fix
> > > in a WG process. I also doubt that expressing policies in such a
> > > low-level format is usable in practice. Policy languages for network
> > > management have a long history and this proposal seems to ignore the
> > > lessons learned in the past.
> > >
> > > /js
> > >
> >
>
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--0000000000002653fe059eee6f47
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Wed, Feb 19, 2020 at 4:18 AM Sch=
=C3=B6nw=C3=A4lder, J=C3=BCrgen &lt;<a href=3D"mailto:J.Schoenwaelder@jacob=
s-university.de">J.Schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex">Benoit,<br>
<br>
thanks for the clarification.<br>
<br>
I still believe that the approach taken is wrong. I doubt that network<br>
operators are interested in an assembly level approach for expressing<br>
threshold triggers. I am not sure xpath is the answer either. What was<br>
perhaps reasonable to try in the 90s (RMON, DISMAN work) may not be<br>
reasonably today anymore.<br>
<br></blockquote><div><br></div><div>I agree that &quot;plain&quot; XPath i=
s not that useful.</div><div>Your example of a counter delta really show wh=
y.</div><div>=C2=A0=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left=
:1ex">
The example starting on page 43 seems to be doing this<br>
<br>
=C2=A0 every 10 minutes<br>
=C2=A0 if=C2=A0 =C2=A0 exists(/ietf-interfaces:interfaces=3D&#39;eth0&#39;)=
<br>
=C2=A0 and=C2=A0 =C2=A0if:interface[if:name=3D&#39;eth0&#39;]/if:statistic/=
if:in-errors &gt;=3D 100<br>
=C2=A0 then=C2=A0 /if:interfaces/if:interface[if:name=3D&#39;eth0&#39;]/if:=
enable =3D false<br>
<br>
but it requires 1.5 pages of XML to express this (and then the rule is<br>
not even meaningful since comparing an absolute value of a counter is<br>
not useful).<br>
<br></blockquote><div><br></div><div>Perhaps people think that by programmi=
ng in YANG this somehow makes it</div><div>universal and avoids picking a p=
rogramming language.</div><div><br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa=
dding-left:1ex">
If we are serious about policies, I believe we need to think about a<br>
language-based approach that can be read and understood and which does<br>
the things that are meaningful. Let me makeup some pseudo code based<br>
on the example that can work for all eth* interfaces and that gets the<br>
delta calculation of the counter right.<br>
<br>
=C2=A0 if =3D /ietf-interfaces:interfaces/interface # json style namespace =
binding<br>
=C2=A0 dt =3D 600 # 10 minutes in seconds<br>
=C2=A0 every dt<br>
=C2=A0 foreach name in $if/name:<br>
=C2=A0 =C2=A0 this =3D $if/[name=3D$name]<br>
=C2=A0 =C2=A0 if=C2=A0 =C2=A0$name matches &#39;eth.*&#39;<br>
=C2=A0 =C2=A0 and=C2=A0 delta($this/statistic/in-errors, dt) &gt;=3D 100<br=
>
=C2=A0 =C2=A0 then $this/enable =3D false<br>
<br></blockquote><div><br></div><div><br></div><div>I am hopeful that compl=
ex state like an array of counter rates could be maintained</div><div>using=
 policy variables. Then XPath could reference the PV in an expression that =
is easy to write.</div><div><br></div><div>=C2=A0</div><blockquote class=3D=
"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(2=
04,204,204);padding-left:1ex">
If people are serious about doing this kind of work, start by<br>
collecting real-world policies that need to be expressable, then<br>
identify the &quot;language&quot; mechanisms that are needed (loops over li=
sts,<br>
bindings, variables and substitutions, pattern matching, ...) and then<br>
find a suitable representation. Yes, this is also something that<br>
people wanted SUPA to do and it did fail because it was already hard<br>
to collect real-world policies that help to understand what kind of<br>
mechanisms are needed and why.<br>
<br></blockquote><div><br></div><div>A real language is needed with local v=
ariables, functions, conditional branching and iteration, etc.</div><div>Us=
ing YANG data nodes to &quot;configure&quot; policy logic seems like the mo=
st difficult way possible</div><div>to provide this functionality.</div><di=
v><br></div><div><br></div><blockquote class=3D"gmail_quote" style=3D"margi=
n:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex=
">
/js<br></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px=
 solid rgb(204,204,204);padding-left:1ex">
<br>
On Wed, Feb 19, 2020 at 11:45:39AM +0100, Benoit Claise wrote:<br>
&gt; J=C3=BCrgen,<br>
&gt; <br>
&gt; To tell that I was skeptical about the SUPA work is just wrong.<br>
&gt; <br>
&gt; I had great hopes for SUPA, as having consistent policy constructs in =
YANG<br>
&gt; module was key. The big hope was that those SUPA constructs could be r=
e-used<br>
&gt; in other YANG modules<br>
&gt; =C2=A0=C2=A0=C2=A0 example: routing, ACL, security ...<br>
&gt; =C2=A0=C2=A0=C2=A0 Regardless of the location: in a network element or=
 in a<br>
&gt; controller/orchestrator<br>
&gt; =C2=A0=C2=A0=C2=A0 Regardless of the function: network element and ser=
vice YANG modules<br>
&gt; If successful, in the end, SUPA would have helped to reuse code.<br>
&gt; <br>
&gt; Was I disappointed by the progress? Yes. The results were not there wh=
ile<br>
&gt; the rest of the world uses their YANG policy constructs. Timing was ke=
y so,<br>
&gt; as AD, I had to pull the plug.<br>
&gt; The world has moved on. So be it.<br>
&gt; You can&#39;t infer skepticism from pragmatism.<br>
&gt; <br>
&gt; Now, back to the draft.<br>
&gt; From a network element point, I stressed the need to take have _simple=
 _ECA<br>
&gt; rules directly routers.<br>
&gt; Think about RMON event/alarm but for YANG. Think about removing the RM=
ON<br>
&gt; event/alarm restrictions that it works only for integer/counter.<br>
&gt; If your point is that the draft is not perfect, fair point.<br>
&gt; Should we solve attempt to solve that issue? Yes.<br>
&gt; <br>
&gt; A confusion comes from the abstract that implies that this work is bas=
ed on<br>
&gt; SUPA.<br>
&gt; <br>
&gt; Abstract<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 RFC8328 defines a policy-based management framework that =
allows<br>
&gt;=C2=A0 =C2=A0 definition of a data model to be used to represent high-l=
evel,<br>
&gt;=C2=A0 =C2=A0 possibly network-wide policies.=C2=A0 Policy discussed in=
 RFC8328 are<br>
&gt;=C2=A0 =C2=A0 classified into imperative policy and declarative policy,=
 Event<br>
&gt;=C2=A0 =C2=A0 Condition Action (ECA) policy is an typical example of im=
perative<br>
&gt;=C2=A0 =C2=A0 policy.=C2=A0 This document defines a YANG data model for=
 the ECA policy<br>
&gt;=C2=A0 =C2=A0 management.=C2=A0 The ECA policy YANG provides the abilit=
y for the network<br>
&gt;=C2=A0 =C2=A0 management function (within a network element) to control=
 the<br>
&gt;=C2=A0 =C2=A0 configuration and monitor state change and take simple an=
d instant<br>
&gt;=C2=A0 =C2=A0 action on the server when a trigger condition on the syst=
em state is<br>
&gt;=C2=A0 =C2=A0 met.<br>
&gt; <br>
&gt; Actually, in my mind, the abstract should be simplified to something s=
uch as<br>
&gt; (and yes, it could be improved)<br>
&gt; <br>
&gt; Abstract<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 This document defines a YANG data model for the ECA polic=
y<br>
&gt;=C2=A0 =C2=A0 management.=C2=A0 The ECA policy YANG provides the abilit=
y for the network<br>
&gt;=C2=A0 =C2=A0 management function (within a network element) to control=
 the<br>
&gt;=C2=A0 =C2=A0 configuration and monitor state change and take simple an=
d instant<br>
&gt;=C2=A0 =C2=A0 action on the server when a trigger condition on the syst=
em state is<br>
&gt;=C2=A0 =C2=A0 met.<br>
&gt; <br>
&gt; And then, somewhere in the introduction, the following text should be<=
br>
&gt; reused:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 RFC8328 defines a policy-based management framework that =
allows<br>
&gt;=C2=A0 =C2=A0 definition of a data model to be used to represent high-l=
evel,<br>
&gt;=C2=A0 =C2=A0 possibly network-wide policies.=C2=A0 Policy discussed in=
 RFC8328 are<br>
&gt;=C2=A0 =C2=A0 classified into imperative policy and declarative policy,=
 Event<br>
&gt;=C2=A0 =C2=A0 Condition Action (ECA) policy is an typical example of im=
perative<br>
&gt;=C2=A0 =C2=A0 policy.<br>
&gt; <br>
&gt; <br>
&gt; Regards, Benoit.<br>
&gt; &gt; On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:<br>
&gt; &gt; &gt; This email begins a 2 week working group adoption poll for:<=
br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; <a href=3D"https://tools.ietf.org/html/draft-wwx-netmod-even=
t-yang-06" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html=
/draft-wwx-netmod-event-yang-06</a><br>
&gt; &gt; &gt; <br>
&gt; &gt; &gt; Please voice your support or objections before the poll comp=
letes on<br>
&gt; &gt; &gt; March 3rd.<br>
&gt; &gt; I am against adoption of this draft. I wonder whether Benoit will=
<br>
&gt; &gt; explain his contributions to this document; Benoit was added as a=
<br>
&gt; &gt; co-author in -06 and he used to be rather sceptical about the SUP=
A<br>
&gt; &gt; work (and this is essentially part of the SUPA work resubmitted t=
o the<br>
&gt; &gt; NETMOD WG). Despite this, the YANG definitions are clearly not up=
 to<br>
&gt; &gt; the level one would expect for WG adoption. Many descriptions are=
<br>
&gt; &gt; just repetition of leaf names and there are obvious errors such a=
s<br>
&gt; &gt; <br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 leaf-list day-of-month {=
<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 type uint8 {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 range &quo=
t;0..59&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 description<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;A se=
t of days of the month at which this<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0sche=
duling timing will trigger.&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; &gt; <br>
&gt; &gt; Despite the strange range, it is unclear how a number will in the=
<br>
&gt; &gt; range will identify a set. Note, this is an example, there are lo=
ts of<br>
&gt; &gt; them in the document. The examples provides are not convincing an=
d<br>
&gt; &gt; technically wrong (how can &lt;interval&gt;10m&lt;/interval&gt; m=
atch<br>
&gt; &gt; <br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 leaf interval {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 type uint32 {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 range &quo=
t;1..max&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 units &quot;secon=
ds&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 mandatory true;<b=
r>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 description<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;The =
number of seconds between two triggers<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0gene=
rated by this periodic timing object.&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 }<br>
&gt; &gt; <br>
&gt; &gt; and I have serious doubts that the design is anywhere close to be=
<br>
&gt; &gt; practically usable. There need to be mechanisms to bind &#39;vari=
ables&#39;<br>
&gt; &gt; while matching conditions that and be reused in action definition=
s, it<br>
&gt; &gt; is not scalable to have constants such as interface names in the<=
br>
&gt; &gt; examples hard-coded in policy rules - this would lead to a huge n=
umber<br>
&gt; &gt; of rules if you want to apply policy rules to all interfaces.<br>
&gt; &gt; <br>
&gt; &gt; There is also a lack of extensibility, which is important for a c=
ore<br>
&gt; &gt; policy language, and definitions like:<br>
&gt; &gt; <br>
&gt; &gt;=C2=A0 =C2=A0 identity function-type {<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 description<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 &quot;Possible values are:<br>
&gt; &gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0plus, minus, mult, divide, remai=
n.&quot;;<br>
&gt; &gt;=C2=A0 =C2=A0 }<br>
&gt; &gt; <br>
&gt; &gt; without ever defining these operators feels strange. I also not<b=
r>
&gt; &gt; convinced that the resulting expressions are expressive enough fo=
r<br>
&gt; &gt; real-world use.<br>
&gt; &gt; <br>
&gt; &gt; This document is in a state that requires way too much effort to =
fix<br>
&gt; &gt; in a WG process. I also doubt that expressing policies in such a<=
br>
&gt; &gt; low-level format is usable in practice. Policy languages for netw=
ork<br>
&gt; &gt; management have a long history and this proposal seems to ignore =
the<br>
&gt; &gt; lessons learned in the past.<br>
&gt; &gt; <br>
&gt; &gt; /js<br>
&gt; &gt; <br>
&gt; <br>
<br>
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
<br>
_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--0000000000002653fe059eee6f47--


From nobody Wed Feb 19 08:32:06 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A9AF1208EC for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 08:32:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=i0Ut4bkZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=MFoas0fe
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nUWf7A_0Ea-k for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 08:32:02 -0800 (PST)
Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 118B11208F1 for <netmod@ietf.org>; Wed, 19 Feb 2020 08:32:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4082; q=dns/txt; s=iport; t=1582129922; x=1583339522; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=tcZ5ET8kddiPqG8fYY41XdTpQPOJmyQ4pKytHUMx7p8=; b=i0Ut4bkZb9XZFimzuMwz2HLtvdweYi+HhuKDFyovRRLhOU/hsTsTzLv1 eaqMTRFB57pNqbACoIoVNSXyRvk/4SqZYYxkl7nd+Amm4gVKNRqHjfzvW 8pIQxnntiAoM1+hUqaW8UmXwSAIwBHmQdcxkt4o2rZdYxgqn8jN+O7SRk 4=;
X-IPAS-Result: =?us-ascii?q?A0CpDACJYk1e/5hdJa1mHQEBAQkBEQUFAYF7gVRQBWxYI?= =?us-ascii?q?AQLKgqECoNGA4pxToIRmBGCUgNUCQEBAQwBASUIAgQBAYRAAheBbSQ4EwIDA?= =?us-ascii?q?QEBAwIDAQEBAQUBAQECAQUEbYU3AQuFZgEBAQEDEhERDAEBMAUDCwQCAQgRB?= =?us-ascii?q?AEBAwImAgICMBUGAQEFAwIEEwgagwWCSgMuAQIMonMCgTmIYnWBMoJ/AQEFg?= =?us-ascii?q?TMCDkGDQRiCDAmBDiqMJBqBQT+BWIJMPoJkAQECAQEYgTEagw4ygiyQY4YUm?= =?us-ascii?q?R4KgjuHT48tgkl9hx6QR45viHmSTAIEAgQFAg4BAQWBaSKBWHAVGoMNCUcYD?= =?us-ascii?q?Y4dg3OFFIU/dAKBJ4xaAYEPAQE?=
IronPort-PHdr: =?us-ascii?q?9a23=3A5s/5cBy/pKGa50zXCy+N+z0EezQntrPoPwUc9p?= =?us-ascii?q?sgjfdUf7+++4j5YhSN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A1RJKa5lQT1?= =?us-ascii?q?kAgMQSkRYnBZufFkz/MPnsRyc7B89FElRi+iLzaBIHAsv1alzMr3H39iYcSk?= =?us-ascii?q?mtEw1zK6y1ApTVk8m8y+G1/dvUfhlMgz2+J7h1KUf+pgTKvc5QioxnYqo2xw?= =?us-ascii?q?CBpHxUM+hb3mJnI1uPknOert+95pti7zhdt7o6+shMXL+yf6MjUacZAQ=3D?= =?us-ascii?q?=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.70,461,1574121600"; d="scan'208";a="418925025"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Feb 2020 16:32:00 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 01JGVxSf030283 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <netmod@ietf.org>; Wed, 19 Feb 2020 16:32:00 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 19 Feb 2020 10:31:59 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 19 Feb 2020 11:31:59 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 19 Feb 2020 10:31:59 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HuY9eoRW/ElVjUeCmaHztUcul1zxuvE0wtY+d/6AjEl2+d4A3Ci5suk8LSynb3KZpBy8xlST7lihAeaVAFctahAL3eLIlcTvlK7zTA8z+o93G1GymQODC5PsWoVvwgCI++rW+uveO4wuQlGbancVgt0nEqyJsDP6UwVRy5FbpKDK1CJI2N4eoQ527tz6U1or+Bmb1NxZDuTnxDd3EqGMt5DLxcRJyp08FrHL71coB6+um51YUFBeaHq4v1y1J7b1zG/4AyPvW5ld3fi5XmfOV/JEWpkP8kW8D5Bw/2JHHJgcZDiHnNboFWQJlHEGzNPlcx999FOaXHjKTPam+y34eg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tcZ5ET8kddiPqG8fYY41XdTpQPOJmyQ4pKytHUMx7p8=; b=KTNrxsLJr9tatxSheYTcB4cYtWFvRuVgQSN32y+yyxjnxspoa0gvtHyuiDrQEwIKSynLZXdnQmCcyp8Ar3RuQzLg74SEOJ4aLf5UurZ54lRE5ZpOXl2kMahY2Mb2FZ2n43HjAUViIus51ajFDPxdYsqr5Tzbpl6oRPGhIlqQ0g5DKGj4rhc6ixYw8jqd6gTQm1thQk0IOopqky25HLBzR2tsWeBLsa90y6vMGhs6qQv8yoFRSMxd/edY76XX9781iIzQZwowL/YlWR1vcf8p/KwkD5e4ZOaILmKeRFlz+e/0agrPeTiXDe150dbpEzAEJCR4AGegSqhCo6XW2+5mrQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tcZ5ET8kddiPqG8fYY41XdTpQPOJmyQ4pKytHUMx7p8=; b=MFoas0feetgPs6n9NaDSMxx3uG4JB2ZT96o/DIVjaj+m/Mk9VEkbtLGrTXJKEsJXhP8EYhGEDnC0Zsqq4eRRmWHyRU+Ny7/b5CO9OGbCFGSmO9pwEqr/JDuVfdKJd8dGwwbrJm5hCQs8YA7WMqyhXnMyYUFCAhj036egZXrK8CU=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB3663.namprd11.prod.outlook.com (20.178.253.96) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.24; Wed, 19 Feb 2020 16:31:58 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 16:31:58 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
Thread-Index: AQHV5z/M5Q6vxMk/FkmF3a9e95wzUqgisdGQ
Date: Wed, 19 Feb 2020 16:31:58 +0000
Message-ID: <MN2PR11MB43662694CCFD2393E28BCD84B5100@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <158212891051.17762.855079352975284790.idtracker@ietfa.amsl.com>
In-Reply-To: <158212891051.17762.855079352975284790.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.36]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dbf10040-cd1e-4d01-fb09-08d7b5593d7f
x-ms-traffictypediagnostic: MN2PR11MB3663:
x-microsoft-antispam-prvs: <MN2PR11MB366375C982FF0EC53E7F5BCFB5100@MN2PR11MB3663.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(366004)(396003)(136003)(346002)(376002)(189003)(199004)(8936002)(66556008)(66446008)(66476007)(64756008)(15650500001)(81166006)(66946007)(8676002)(81156014)(186003)(76116006)(55016002)(71200400001)(9686003)(33656002)(316002)(5660300002)(52536014)(6916009)(2906002)(86362001)(7696005)(26005)(66574012)(6506007)(53546011)(478600001)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3663; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: S/l014n53u0DDlalLZGHEqTRopEM1Kogu0Yx7N3lxReBQqdeTijblnmyU7fZuOngHdjTOVJ0N9QtquC8ta7aLM48AI19bF7eMdZGThZnnY3j3xW+G5AQYLiuVa6Fef4HTAaH6QOH2yOvZ8E3TcHE2Q==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: dbf10040-cd1e-4d01-fb09-08d7b5593d7f
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 16:31:58.0821 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oQo8jrJSlmPqoDJjZvvz7chgkemGbJzgDYCUni/uRe3eNN33k2+USTWd6RRZtNeiePqZ2e7xzU/NvfkAUQS9rw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3663
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/uQbmCUyX-RRoCBs8GncTF-flGLY>
Subject: [netmod] FW: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 16:32:05 -0000
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From nobody Wed Feb 19 08:36:59 2020
Return-Path: <lberger@labn.net>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B45E12022C for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 08:36:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yy-KQGBfs7OX for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 08:36:55 -0800 (PST)
Received: from gproxy10-pub.mail.unifiedlayer.com (gproxy10-pub.mail.unifiedlayer.com [69.89.20.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BB771201A3 for <netmod@ietf.org>; Wed, 19 Feb 2020 08:36:55 -0800 (PST)
Received: from cmgw15.unifiedlayer.com (unknown [10.9.0.15]) by gproxy10.mail.unifiedlayer.com (Postfix) with ESMTP id 2202A1406DA for <netmod@ietf.org>; Wed, 19 Feb 2020 09:36:55 -0700 (MST)
Received: from box313.bluehost.com ([69.89.31.113]) by cmsmtp with ESMTP id 4SLHjNRKMPmYN4SLHjHyZn; Wed, 19 Feb 2020 09:36:55 -0700
X-Authority-Reason: nr=8
X-Authority-Analysis: v=2.3 cv=N7UH6V1B c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=dLZJa+xiwSxG16/P+YVxDGlgEgI=:19 a=jpOVt7BSZ2e4Z31A5e1TngXxSK0=:19 a=xqWC_Br6kY4A:10:nop_ipv6 a=IkcTkHD0fZMA:10:nop_charset_1 a=l697ptgUJYAA:10:nop_rcvd_month_year a=Vy_oeq2dmq0A:10:endurance_base64_authed_username_1 a=HLvPDLHGFjgA:10:nop_election2020_name_subject a=48vgC7mUAAAA:8 a=9qxNCY_qAAAA:8 a=AUd_NHdVAAAA:8 a=i0EeH86SAAAA:8 a=3BgEKmxHDNRDgvV6Ca4A:9 a=7Zwj6sZBwVKJAoWSPKxL6X1jA+E=:19 a=QEXdDO2ut3YA:10:nop_charset_2 a=-RoEEKskQ1sA:10:nop_election2020_name_body a=w1C3t2QeGrPiZgrLijVG:22 a=A2X48xt2e1hG9NJDz63Y:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:To:Subject:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=OLJNNHqlkBBlkzCOm0QoaNytfMk6uNGaLHFAUxQioaM=; b=Bl3MTddqUqwE0JpZeIm/Xv+Dot VdlkTcGo2zZR2IlPymcNZkvMmqzLSkfL9B3Du8G2wKzeg4FgaZdnRjpanJbpqKvHABXEo1MJ8Q7p+ YOPs2Xn82KuO1STl7RAWj+VAr;
Received: from [127.0.0.1] (port=11877 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92) (envelope-from <lberger@labn.net>) id 1j4SLG-002p4m-Rn; Wed, 19 Feb 2020 09:36:54 -0700
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
References: <158212891051.17762.855079352975284790.idtracker@ietfa.amsl.com> <MN2PR11MB43662694CCFD2393E28BCD84B5100@MN2PR11MB4366.namprd11.prod.outlook.com>
From: Lou Berger <lberger@labn.net>
Message-ID: <0b7918ef-4dc4-da25-1f42-83ae8a7af55b@labn.net>
Date: Wed, 19 Feb 2020 11:36:50 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <MN2PR11MB43662694CCFD2393E28BCD84B5100@MN2PR11MB4366.namprd11.prod.outlook.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 127.0.0.1
X-Source-L: Yes
X-Exim-ID: 1j4SLG-002p4m-Rn
X-Source: 
X-Source-Args: 
X-Source-Dir: 
X-Source-Sender: ([IPv6:::1]) [127.0.0.1]:11877
X-Source-Auth: lberger@labn.net
X-Email-Count: 3
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
X-Local-Domain: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/LW4X5o4BMs7xhcZgZVmPOKqfa18>
Subject: Re: [netmod] FW: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 16:36:58 -0000

Thanks Rob/Team!

All,

     We're planning to run the adoption poll on the versioning document 
set  once the next update of the selection draft is published -- so 
please feel free to get started reading/commenting on this document now.

Lou

On 2/19/2020 11:31 AM, Rob Wilton (rwilton) wrote:
> FYI, I've posted an updated version of the YANG packages draft.  This is the version that we plan to request a WG adoption call on, once we have an updated version of the version selection draft posted (hopefully ready soon).
>
> To highlight the main changes:
>   - Added a section to describe how YANG packages relate to datastore schema, along with guidance on how to structure package definitions.
>   - Unified the package definition on the server vs in YANG instance data documents.  In particular, the on-server definition no longer reuses the module-sets from YANG library.  This also simplifies the explanation of how these definitions relate since the same common grouping is reused.
>   - Move packages into its own top level container, rather than being under YANG library.
>   - Changed the binding between datastore schema in YANG library and packages.  Before there was a 1:1 binding from datastore schema to package definition.  It has been changed to a 1:N binding, i.e. a datastore scheme is represented by a union of compatible packages.  This aligns with how the relationship is defined in the version selection draft.
>
> Thanks,
> Rob
>
>
> -----Original Message-----
> From: internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: 19 February 2020 16:15
> To: Jason Sterne <jason.sterne@nokia.com>; Reshad Rahman (rrahman) <rrahman@cisco.com>; Rob Wilton (rwilton) <rwilton@cisco.com>; Joe Clarke (jclarke) <jclarke@cisco.com>; Wu Bo <lana.wubo@huawei.com>; Bo Wu <lana.wubo@huawei.com>
> Subject: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
>
>
> A new version of I-D, draft-rwilton-netmod-yang-packages-03.txt
> has been successfully submitted by Robert Wilton and posted to the IETF repository.
>
> Name:		draft-rwilton-netmod-yang-packages
> Revision:	03
> Title:		YANG Packages
> Document date:	2020-02-19
> Group:		Individual Submission
> Pages:		56
> URL:            https://www.ietf.org/internet-drafts/draft-rwilton-netmod-yang-packages-03.txt
> Status:         https://datatracker.ietf.org/doc/draft-rwilton-netmod-yang-packages/
> Htmlized:       https://tools.ietf.org/html/draft-rwilton-netmod-yang-packages-03
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-rwilton-netmod-yang-packages
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-rwilton-netmod-yang-packages-03
>
> Abstract:
>     This document defines YANG packages, a versioned organizational
>     structure holding a set of related YANG modules, that collectively
>     define a YANG schema.  It describes how packages: are represented on
>     a server, can be defined in offline YANG instance data documents, and
>     can be used to define the schema associated with YANG instance data
>     documents.
>
>                                                                                    
>
>
> Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>


From nobody Wed Feb 19 08:57:41 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B228712022D; Wed, 19 Feb 2020 08:57:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.435
X-Spam-Level: *
X-Spam-Status: No, score=1.435 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_SBL_CSS=3.335, SPF_NONE=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yg0IfPV2aDJm; Wed, 19 Feb 2020 08:57:31 -0800 (PST)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2054.outbound.protection.outlook.com [40.107.22.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 020F8120241; Wed, 19 Feb 2020 08:57:30 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KxioloKiH9WxMygWsYDF489WFKfcRaHSAItHTvXiu0SakySxsW7vQZMp5qX5xQbzYi8PQZhXL3+pdYWXJNIYrDltz0+3y1QIWD0DwEEsBMBG9LJn3s6CsyacDjVhhN9r+TCpIxErEx41z8OKDOh0Enh6V2zasEjI3yGZAC/giuGzsfXjo894xkOKWZk9HFfV7z7QtxQKVM+ryo0N6OF76YSworFh+QhmdqyisqXKb+ZRQmYNQKeOb4LDbQ64y/puWBcHtsqIIwmxLpWwwiYTpWlNIeWqyLbOdS8M1n1R8xXylFr5WAIdS7GGVHceuqojRaeVZ2BSr6/sSG7AiVu6Tg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HL5vUl8fMYsySDVLv0fRJtQByCica6smjCPSIxw9RHY=; b=Q/bME7n2CCphr0q7Fnv6ZSu05VUEHatJdkyjthw+4FEVsiimd/ToD3C6zE2+vgJGUXwCBMNn1RB9S0nvGd4TDlnQaKZuPifF4TGRU0QpEk+E3bBf9u+o+WmHl1gOxAWO0SAPKHzKVNZrdqBs7g9wnDtk7OSj60pa9cv5W3HhDk6gSArZwkxhfvT0atrgQ8QG0+6iT7uumq+FdgfIA6eYDvsURzw8SHdM7a4nPClcMknvjBfsCgnM/3Bus+tE9NAvy1XsYreNsgmWboAfDdkP1jBvmhKGDdnkiDQ18Kxk+f2bYzj1BpO1cWiX8wfq2XWrMKxSizbH7qeJBDLpDDlefQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HL5vUl8fMYsySDVLv0fRJtQByCica6smjCPSIxw9RHY=; b=SjEeqLx8nrGXPjksB1IIWWeacQSuJzwMvPwxB1P5SdpK3Fi4JS5ums0WeXDIhk8Y4xJKsnB3/NHjcJRbMG1O0yHdqe4Mh7RpO3js2o1V4ZxRqxPbFuCFPHZy7hHLoblWZ7LZGXfUazUowj4FcgfIl06kFbBKdG62DJWT6l7SbKY=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0327.EURP190.PROD.OUTLOOK.COM (10.175.242.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.29; Wed, 19 Feb 2020 16:57:28 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 16:57:28 +0000
Received: from localhost (212.201.44.247) by AM3PR05CA0122.eurprd05.prod.outlook.com (2603:10a6:207:2::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.25 via Frontend Transport; Wed, 19 Feb 2020 16:57:28 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Joel Jaeggli <joelja@bogus.com>
CC: "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
Thread-Topic: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
Thread-Index: AQHV5cpjTZuQg6TmkkSwH9n+2ZnT06giv7+A
Date: Wed, 19 Feb 2020 16:57:28 +0000
Message-ID: <20200219165727.ha6hhu5onoueznvw@anna.jacobs.jacobs-university.de>
References: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com>
In-Reply-To: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: AM3PR05CA0122.eurprd05.prod.outlook.com (2603:10a6:207:2::24) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 72b9ad87-a512-4edb-a8c1-08d7b55ccd38
x-ms-traffictypediagnostic: DB6P190MB0327:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB03277931170EC2827DDC4514DE100@DB6P190MB0327.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(366004)(376002)(396003)(39850400004)(136003)(199004)(189003)(71200400001)(8936002)(6916009)(66556008)(6486002)(5660300002)(4326008)(3450700001)(66446008)(66946007)(66476007)(64756008)(2906002)(956004)(54906003)(478600001)(6496006)(186003)(81156014)(786003)(81166006)(316002)(26005)(8676002)(966005)(86362001)(1076003)(52116002)(16526019); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0327; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: h4annwbHzkjEyeSUS0CIiTngQc3M0TQojPwB1jozYDLx8XHAmmRm+mfdVnHYZngbIjw5xq1u7/ZWvfTk0E+XTTTybMcdydCycSIdeHw5Ngn+xUtDT2ym11wr8dnii+F8e4g8ZgauW3xVpF8PyFjm2oPOsZ0XWD0BUrgg5/irZqwer/AbobAzs6P+pnjYdJuKSXijwtmfOgtG70C6ZtHAdPLqK89efFLyiaCQkuVWEwMa9IfciHXpPDd4BRgWBCfGKgr283nYvVV8/MPYFwsgiscXQ7G3VeEgybeWbNrzwjv7rvi4DbQ1GvR1UUZJFCWRMS4kap6oHsf5936J5uQ2RTj9ARO76Tvaz8vpvxljePV/FT3ShWpEXlt7OfzF6i+YGpe+qtwN5G5u6Xc/hEDVmPtP6LOLE8AsxBAzUFXqlfa+QJCjBjqLAw55QOPO0n1PZmuKVPvqcFhBDKLBOmZ4oCB8SHJssswLishqCI/W693hpO59VAvy6nDJGbcmad313b1cC481Rmu6mp94sF+Jqg==
x-ms-exchange-antispam-messagedata: zR5Nk3zk/2IHL+6y0RObmTFSfJwTLnq3PQRkZSgGuf2GzPkEa1vY7f9WqVGJRCOJzFBijhe35ZcN5XvYMv9fh1c0pzrzSI7qNv2bnxJLnXbJZwPxQQl5DwhJpxOKJEtoczfY9P0VnNTLvAJUUUg5FA==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <E65B757F6E4AA849A26153211BDEF747@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 72b9ad87-a512-4edb-a8c1-08d7b55ccd38
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 16:57:28.3124 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ghR3Nhcp9bF64s2KMUwOkSo3i/Zk3mJYvTsVobw9fk/ZFtbovJyu51qtDbnJKvQ9gdRVLGPsKGNX707U5U4U+9hjeWVmoHhaE4SCvVw1B6k=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0327
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tFamR1ofCMaonVA4S_1TZBHe_Dc>
Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 16:57:34 -0000

Hi,

this is a good document that deserves to go forward. Some comments...

- In the introduction, you may want to mention that applied config
  often differs from config because applied config includes stuff that
  was learned or generated by the system (e.g., IP addresses obtained
  via DHCP or generated by the kernel itself). This applies to systems
  that otherwise implement NC or RC in a synchronous update manner,
  i.e., a difference between <intended> and <applied> is for many
  operational systems likely the normal situation and not an
  exceptional one.

- I do not understand this:

      [...]  (The filter dow not contain expressions that
      would match values data nodes, as this is not required by most use
      cases and would complicate the scheme, from implementation to
      dealing with race conditions.)

  Despite the wording nits, I fail to understand the race condition
  argument. It seems the filters are the same as we have them in other
  places and this is good and a strong argument by itself. Reusing
  concepts is a good thing. Just state that and remove potentially
  hand-waving arguments about race conditions created by filtering on
  values. (And subtree filters can filter out certain interfaces by
  matching the <name/> element.)

- I think you should import the term 'schema node' (and if necessary
  also other terms) from RFC 7950. Perhaps merge section 2+3 into a
  section Terminology that has the RFC2119 blurb and states that this
  specification uses the terminology defined in RFC 7950 and RFC 8342.

- Given that the applied configuration includes learned and system
  provided data, it may make a lot of sense to filter on origin so
  that learned or system generated config is not part of the
  comparison. I think this is really missing. Of course, one can
  filter the result to get rid of all 'learned' items but the whole
  point of the compare RPC is to avoid long responses that are not
  needed. The get-data operation defined in RFC 8526 has an origin
  filter that may be reused. (Perhaps it makes sense to align the
  parameters with RFC 8526 get-data even further.)

- Why do we need the 'no-matches' leaf? Why not simply return an empty
  'differences' container?

- Nit

  OLD

   RPC request to compare <operational< (source of the comparison) with
   <intended>(target of the comparison):

  NEW

   RPC request to compare <operational> (source of the comparison) with
   <intended> (target of the comparison):

- I have not validated the examples.

- Section 7 talks about rejecting frequent requests. It may be useful
  to specify which error response is returned in this case so that
  coders implement the same behavior.

- Perhaps the document should spell out how compare interacts with
  NACM. I kind of assume that NACM rules are applied before the
  content is compared, i.e., data that is not accessible won't get
  compared. Well, whatever the correct behavior is, I think this
  deserves to be spelled out.

- I would probably have picked in ietf-interfaces example to avoid a
  reference to a work in progress but this does not really matter
  much.

/js

On Mon, Feb 17, 2020 at 11:42:01AM -0800, Joel Jaeggli wrote:
> Greetings,
>=20
> This was supposed to get processed shortly after IETF 106, however I lost=
 track of it. We are therefore running a 2 week WGLC on draft-ietf-netmod-n=
mda-diff-03.
>=20
> https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/
>=20
> the 02 - 03 diff is available here:
>=20
> https://www.ietf.org/rfcdiff?url1=3Ddraft-ietf-netmod-nmda-diff-02&url2=
=3Ddraft-ietf-netmod-nmda-diff-03
>=20
> Please send email to the list indicating your support or concerns.
>=20
> This WGLC will conclude Monday March 2nd.
>=20
>=20
> Thank you,
> NETMOD WG Chairs
>=20


> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Feb 19 09:03:01 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21126120071 for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 09:02:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Qf3TSbtu; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=w7uML72p
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hYRtqqV8nOlf for <netmod@ietfa.amsl.com>; Wed, 19 Feb 2020 09:02:56 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4ADFF120143 for <netmod@ietf.org>; Wed, 19 Feb 2020 09:02:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6886; q=dns/txt; s=iport; t=1582131775; x=1583341375; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=EF9m9r8XxN1VCrRNT3J2ZA5iEpVESNgbI0Yy7Dt7rzk=; b=Qf3TSbtub2K8v0s/tCsm4n06klUz3+SmWHconUTA1/wQ0T0qnVRsi9xg 5PRAumCBhsRgCtOJYgc3YTEccH45rX045AMiPhFf9n06P7IBya1eySjOe lGwO5g1zbNeoUQHLjnI2Dd6Y1CP1dVV3MRyzphywM5rXNNh1NaJM5G61k A=;
IronPort-PHdr: =?us-ascii?q?9a23=3Am6+eCxQz3zHn0oMFwmxq+XseaNpsv++ubAcI9p?= =?us-ascii?q?oqja5Pea2//pPkeVbS/uhpkESXBdfA8/wRje3QvuigQmEG7Zub+FE6OJ1XH1?= =?us-ascii?q?5g640NmhA4RsuMCEn1NvnvOjYlHcBeU1lN9HCgOk8TE8H7NBXf?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DeBQD1aE1e/4gNJK1mHAEBAQEBBwE?= =?us-ascii?q?BEQEEBAEBgXuBVFAFbFggBAsqCoQKg0YDinGCX5gRglIDVAkBAQEMAQEYCwo?= =?us-ascii?q?CBAEBg3tFAheBbSQ4EwIDDQEBBQEBAQIBBQRthTcBC4VmAQEBAQMBARAREQw?= =?us-ascii?q?BASwEBQIBCwQCAQgRBAEBAQICJgICAiULFQgIAgQOBQgTB4MFgkoDLgECDKM?= =?us-ascii?q?MAoE5iGJ1gTKCfwEBBYFDQYMvGIIMCYEOKowkGoFBP4FYgkw+gmQBAQIBARi?= =?us-ascii?q?BMRoVgnkygiyOG4JIhhSZHgqCO4dPjy2CSX2HHpBHjm+BTYcskkwCBAIEBQI?= =?us-ascii?q?OAQEFgWkigVhwFRohgmwJRxgNjh04gzuFFIU/dIEpjFoBgQ8BAQ?=
X-IronPort-AV: E=Sophos;i="5.70,461,1574121600"; d="scan'208";a="725357633"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Feb 2020 17:02:53 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 01JH2rQ0009132 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 19 Feb 2020 17:02:53 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 19 Feb 2020 11:02:53 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 19 Feb 2020 12:02:51 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 19 Feb 2020 12:02:50 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=k5jFbiw4w0FCFrj9OwZnF4V+AHN3eY5gZSMRKIatgV97bxk0NEPO+qs78BYGjcMlrdfRNjdi5Hl3zu7Bd66Lrnbsq6CUNnQCodjdosEHU7fuVs9rAJCpFmnTcvHIAei9TKiYAj7KeT90W6O6o8FAR48Jeu9Mp7iNNGz9YKZg5Sp1f4WzA45Q77As2g2dP86BRebQgbCl7XRSTyNz6rCiEOvM9wkBN+KuR7AGu6VCs950z7I6spj+SxNzCeIX0Rh0yQ2gvES63sm80XBAyTCwCnsp+UxaRNzIh1cWf2IeM1ljbY/KvVY2ToRHFg0u1m4VH3tC/KfOx0oS4a3A3gHQIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EF9m9r8XxN1VCrRNT3J2ZA5iEpVESNgbI0Yy7Dt7rzk=; b=ZMxg1Re+uun/iG1vKLvviF4HkQ5/kBB4V0UGCcrU+z1WpaJYePW0ltf1pu2tBI+80nBF3IpegsPibdP6xVxIpSEFjgzcuUFkFj0C0AQfcaPvQ+GcHuv2xe7WqRGeJ4HgN5BWk4YvdV66bDaUQIeOYXSESpg+oBv4XoouV5Cd+nco+QifZIjyxo8AcBFYYPFhV/xAoEnEFGW4ku02VZwAtW++Mcf/QZB4hMrjvdGy+V8CRhCWoJVIjmlbiNW1jiDgUC0+VvlQtk9KLIl7XxIegHtdFvOXAqp4gIBRjGXYCplhtoEqCmpzdQ4l6u4/at8HvsOY13RkjCb16qvN77zbXg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EF9m9r8XxN1VCrRNT3J2ZA5iEpVESNgbI0Yy7Dt7rzk=; b=w7uML72pW1rQ3uGfUeNzksvN/5cfA1KXH/LUL4SdN1oM/bP/Ui3s3wLo6oWHnPAAwe6Ku47T/0X2ju0V/zDHOsn3TfFQHOD7ofg2MN5UwTDCEcMsT/pmHL1TY8itrXt38xMBACdyvSFrAKAt0lemZot7kQoUQUqFzLTl+kcmOws=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (52.135.38.209) by MN2PR11MB3856.namprd11.prod.outlook.com (20.178.251.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.17; Wed, 19 Feb 2020 17:02:48 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2729.032; Wed, 19 Feb 2020 17:02:48 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] FW: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
Thread-Index: AQHV5z/M5Q6vxMk/FkmF3a9e95wzUqgisdGQgAAFQQCAAANWsA==
Date: Wed, 19 Feb 2020 17:02:48 +0000
Message-ID: <MN2PR11MB4366A33EC11F89085C1E5BC9B5100@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <158212891051.17762.855079352975284790.idtracker@ietfa.amsl.com> <MN2PR11MB43662694CCFD2393E28BCD84B5100@MN2PR11MB4366.namprd11.prod.outlook.com> <0b7918ef-4dc4-da25-1f42-83ae8a7af55b@labn.net>
In-Reply-To: <0b7918ef-4dc4-da25-1f42-83ae8a7af55b@labn.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.36]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 75adc429-5a04-46a9-6fb5-08d7b55d8c36
x-ms-traffictypediagnostic: MN2PR11MB3856:
x-microsoft-antispam-prvs: <MN2PR11MB38568E6D70C06A2B67485D69B5100@MN2PR11MB3856.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0318501FAE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(136003)(376002)(346002)(39860400002)(189003)(199004)(66556008)(76116006)(4326008)(66946007)(64756008)(66446008)(6916009)(66476007)(15650500001)(86362001)(7696005)(71200400001)(33656002)(9686003)(6506007)(81156014)(8676002)(2906002)(478600001)(66574012)(53546011)(8936002)(316002)(52536014)(26005)(55016002)(966005)(186003)(81166006)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3856; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 0eKf+sSpwW4myuXDObPFFtW1JnXMXSO/YaWrnPbHl4GwF0dOCDUATZH3J0f1vUlQmuJlecJ2fHfjZh/gGlsbkmshMH+YN6meOF3vWciKYUH3uq7/wgL13iuuS2N5omeClBCJ+L2ZIDEXyY0pmPfd+A==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 75adc429-5a04-46a9-6fb5-08d7b55d8c36
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Feb 2020 17:02:48.2220 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: afhljNPnEyffhscZl9IVpBpqdRLf6wzZT/HG47Scp+bbv+EjPR9zsiU55w3SjL8/hwboIRfe9v8HqtI2LMa++w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3856
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/2RyHsOtuF7Y6myyopaOykeeOu-g>
Subject: Re: [netmod] FW: New Version Notification for draft-rwilton-netmod-yang-packages-03.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Feb 2020 17:02:59 -0000
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From nobody Thu Feb 20 08:59:36 2020
Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EADB31209B4; Thu, 20 Feb 2020 08:59:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YTT_1K_bKdjp; Thu, 20 Feb 2020 08:59:17 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 879A51209AA; Thu, 20 Feb 2020 08:59:17 -0800 (PST)
Received: from localhost (unknown [173.38.220.37]) by mail.tail-f.com (Postfix) with ESMTPSA id 2367F1B03C80; Thu, 20 Feb 2020 17:59:14 +0100 (CET)
Date: Thu, 20 Feb 2020 17:58:34 +0100 (CET)
Message-Id: <20200220.175834.640820639957432794.mbj@tail-f.com>
To: joelja@bogus.com
Cc: netmod@ietf.org, netmod-chairs@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com>
References: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com>
X-Mailer: Mew version 6.8 on Emacs 25.2
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/IukmUa5yMrEsrR_EFGXmT1ItDOs>
Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Feb 2020 16:59:20 -0000

Hi,

Joel Jaeggli <joelja@bogus.com> wrote:
> Greetings,
> 
> This was supposed to get processed shortly after IETF 106, however I lost track of it. We are therefore running a 2 week WGLC on draft-ietf-netmod-nmda-diff-03.
> 
> https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/
> 
> the 02 - 03 diff is available here:
> 
> https://www.ietf.org/rfcdiff?url1=draft-ietf-netmod-nmda-diff-02&url2=draft-ietf-netmod-nmda-diff-03
> 
> Please send email to the list indicating your support or concerns.


I have reviewed draft-ietf-netmod-nmda-diff-03 and have some comments.

o  Section 4

      (The filter dow not contain expressions that
      would match values data nodes, as this is not required by most use
      cases and would complicate the scheme, from implementation to
      dealing with race conditions.)

  I don't think it is a good idea to reject filters that match
  values.  For example, suppose I want to compare the config for a
  specific interface.  I could do /interfaces/interfac[name='eth0'],
  or a subtree filter.  Why should this not be possible?

  Besides, the mechanism of rejecting such filters is not defined.
  The only text we have is this sentence within parentheses.


o  leaf all in the YANG module

   s/Specifically, if one/For example, if one/


o  leaf xpath-filter

  The description needs to specify the XPath context, see RFC 6991.


o  container differences

  It is not clear what the YANG patch records reflect.  Is it the
  patches that are required to go from "source" to "target"?  Or the
  other way around?


o  anydata source-value

  This description needs work.  The current text isn't correct
  ('value' is not present when the operation is 'move').

  The description should explain what this is supposed to contain.


o  Section 6

  The example is confusing.  It seems the diff is the patches required
  to go from target to source.  And the source-value contains the
  origin present in the target, is that correct?  And the value
  contains an origin that isn't present in neither the source nor the
  target.



/martin


From nobody Mon Feb 24 02:54:57 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8199E3A0747 for <netmod@ietfa.amsl.com>; Mon, 24 Feb 2020 02:54:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v5HluV33gn5e for <netmod@ietfa.amsl.com>; Mon, 24 Feb 2020 02:54:51 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9340B3A0743 for <netmod@ietf.org>; Mon, 24 Feb 2020 02:54:19 -0800 (PST)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id E72812EA2C2A339C7E15; Mon, 24 Feb 2020 10:54:17 +0000 (GMT)
Received: from lhreml716-chm.china.huawei.com (10.201.108.67) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 24 Feb 2020 10:54:17 +0000
Received: from lhreml716-chm.china.huawei.com (10.201.108.67) by lhreml716-chm.china.huawei.com (10.201.108.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 24 Feb 2020 10:54:17 +0000
Received: from DGGEML405-HUB.china.huawei.com (10.3.17.49) by lhreml716-chm.china.huawei.com (10.201.108.67) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Mon, 24 Feb 2020 10:54:17 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by dggeml405-hub.china.huawei.com ([10.3.17.49]) with mapi id 14.03.0439.000; Mon, 24 Feb 2020 18:54:13 +0800
From: Qin Wu <bill.wu@huawei.com>
To: =?utf-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>, Benoit Claise <bclaise@cisco.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AdXq/X9Nzpg1AfSxQbu77+4fPq+GnA==
Date: Mon, 24 Feb 2020 10:54:13 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4D4F22@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/GLT_3x2VaPC5iscsqZHYUyW3eYk>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 10:54:55 -0000
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From nobody Mon Feb 24 07:34:18 2020
Return-Path: <xufeng.liu.ietf@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A93AE3A0D4D; Mon, 24 Feb 2020 07:34:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sTG5px-ovGj6; Mon, 24 Feb 2020 07:34:15 -0800 (PST)
Received: from mail-io1-xd32.google.com (mail-io1-xd32.google.com [IPv6:2607:f8b0:4864:20::d32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BE423A0D67; Mon, 24 Feb 2020 07:26:17 -0800 (PST)
Received: by mail-io1-xd32.google.com with SMTP id d15so10659946iog.3; Mon, 24 Feb 2020 07:26:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=O4t5iFELfM4LETp1WfWojHPgd0Fn/teBAa/Jgp7t54E=; b=i3btsmZajkxfyOu9iUEXPKWOSQI6FoLhmS1PTa9T7TO/UuRcc+AgDgmD8ASZo4QNaD K9vQlf+Ne0bVRgAEEnpejnHddG21ggS/jHSpzuu+lT3m0wwA6kK1kA1UCkPQLoojyPi/ f1BEaIkgO4neUi6CUdT56rqs9z++vXx0qyQuvdrpFya5m+Kraq93bipNOKEZk5wuifw4 KjHLsMG4vVjff+9/5Lyjr/IlvMVRqzFo5ixvazuCTYFbdg6KPd86CGiftvcw5gIqZMWS ex+IWRCamILndtPNGjR23bEjLJlPmEBXcl+Vj0IbBxAxc1XKahijHKFr//ZO7uwc5Mjz flHw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=O4t5iFELfM4LETp1WfWojHPgd0Fn/teBAa/Jgp7t54E=; b=P9U50kPHXjesC+TMr1hZZ7fF0N2qqnFGHE9uQBWuCq2JtztVimayev3+eITrfUAjO8 7OD9o8Pt8k6ZRKvCoBbKT/0I97bYteqgwngeXLiuD+Ff2giOGi+bCy3wuWvRBdGvpAIQ iKhwUeNrYN7fMYtJLI7tBg06jHE43xPexJ7rKSgKbDs6YNYkVKZxRHA+8wDWsjIEbYGe L7wKFq3ahEIY83X6kxAx33AueLl/Dp0WxfSdC9gcg5Qq9FHjBTR+sbrosth+Npbo/Jmf 1AWG7gZL8hW7eXscHyMrfkrVA1W8XjEcgGmSHnCM1vgsTEBKk8ZqX+rJi4QIaGEduIa9 F/yA==
X-Gm-Message-State: APjAAAWct3bRvxqMc8FJ0n1nVf4Dj0+ASTNhqmszk+5gxyXxUOfyIbfA LEOOkY/NGj2dfyiloiUc/xrOKHkaex5IQdP7T4DsDosUI+w=
X-Google-Smtp-Source: APXvYqz5jadx6eDRUtFnoSkSlDKm4vqdmOoqE9aF0NanAKX4Pbm1bszUOCIB5flPHyUhdMFo3HlfcxBabN0uNhi/IZM=
X-Received: by 2002:a02:390a:: with SMTP id l10mr51225989jaa.42.1582557976420;  Mon, 24 Feb 2020 07:26:16 -0800 (PST)
MIME-Version: 1.0
References: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
In-Reply-To: <5a393145-f01b-e1b8-5f3b-5dca1210893e@bogus.com>
From: Xufeng Liu <xufeng.liu.ietf@gmail.com>
Date: Mon, 24 Feb 2020 10:26:05 -0500
Message-ID: <CAEz6PPSCr3+FM0OX3ffsRFM-MnPEYUD4EWE+bYGjGK7msSmfhQ@mail.gmail.com>
To: Joel Jaeggli <joelja@bogus.com>
Cc: draft-wwx-netmod-event-yang@ietf.org, NETMOD WG <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000056650059f53feee"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Sx9IeUHRVPiRBr4MVyIXPaNFw34>
Subject: Re: [netmod] IPR poll on draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 15:34:17 -0000

--000000000000056650059f53feee
Content-Type: text/plain; charset="UTF-8"

No, I'm not aware of any IPR that applies to this draft.

Thanks,
- Xufeng

On Tue, Feb 18, 2020 at 11:45 AM Joel Jaeggli <joelja@bogus.com> wrote:

> Authors, Contributors, WG,
>
> As part of preparation for WG Adoption
>
> Are you aware of any IPR that applies to drafts identified above?
>
> Please state either:
>
> "No, I'm not aware of any IPR that applies to this draft"
> or
> "Yes, I'm aware of IPR that applies to this draft"
>
> If so, has this IPR been disclosed in compliance with IETF IPR rules
> (see RFCs 3669, 5378 and 8179 for more details)?
>
> If yes to the above, please state either:
>
> "Yes, the IPR has been disclosed in compliance with IETF IPR rules"
> or
> "No, the IPR has not been disclosed"
>
> If you answer no, please provide any additional details you think
> appropriate.
>
> If you are listed as a document author or contributor please answer the
> above by responding to this email regardless of whether or not you are
> aware of any relevant IPR. This document will not advance to the next
> stage until a response has been received from each author and listed
> contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE'S
> TO LINES.
>
> If you are on the WG email list or attend WG meetings but are not listed
> as an author or contributor, we remind you of your obligations under
> the IETF IPR rules which encourages you to notify the IETF if you are
> aware of IPR of others on an IETF contribution, or to refrain from
> participating in any contribution or discussion related to your
> undisclosed IPR. For more information, please see the RFCs listed above
> and
> http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProperty.
>
> Thank you,
> NetMod WG Chairs
>
> PS Please include all listed in the headers of this message in your
> response.
>
>

--000000000000056650059f53feee
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>No, I&#39;m not aware of any IPR that applies to this=
 draft.</div><div><br></div><div>Thanks,</div><div>- Xufeng<br></div></div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue=
, Feb 18, 2020 at 11:45 AM Joel Jaeggli &lt;<a href=3D"mailto:joelja@bogus.=
com">joelja@bogus.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,20=
4);padding-left:1ex">Authors, Contributors, WG,<br>
<br>
As part of preparation for WG Adoption<br>
<br>
Are you aware of any IPR that applies to drafts identified above?<br>
<br>
Please state either:<br>
<br>
&quot;No, I&#39;m not aware of any IPR that applies to this draft&quot;<br>
or<br>
&quot;Yes, I&#39;m aware of IPR that applies to this draft&quot;<br>
<br>
If so, has this IPR been disclosed in compliance with IETF IPR rules<br>
(see RFCs 3669, 5378 and 8179 for more details)?<br>
<br>
If yes to the above, please state either:<br>
<br>
&quot;Yes, the IPR has been disclosed in compliance with IETF IPR rules&quo=
t;<br>
or<br>
&quot;No, the IPR has not been disclosed&quot;<br>
<br>
If you answer no, please provide any additional details you think<br>
appropriate.<br>
<br>
If you are listed as a document author or contributor please answer the<br>
above by responding to this email regardless of whether or not you are<br>
aware of any relevant IPR. This document will not advance to the next<br>
stage until a response has been received from each author and listed<br>
contributor. NOTE: THIS APPLIES TO ALL OF YOU LISTED IN THIS MESSAGE&#39;S<=
br>
TO LINES.<br>
<br>
If you are on the WG email list or attend WG meetings but are not listed<br=
>
as an author or contributor, we remind you of your obligations under<br>
the IETF IPR rules which encourages you to notify the IETF if you are<br>
aware of IPR of others on an IETF contribution, or to refrain from<br>
participating in any contribution or discussion related to your<br>
undisclosed IPR. For more information, please see the RFCs listed above<br>
and<br>
<a href=3D"http://trac.tools.ietf.org/group/iesg/trac/wiki/IntellectualProp=
erty" rel=3D"noreferrer" target=3D"_blank">http://trac.tools.ietf.org/group=
/iesg/trac/wiki/IntellectualProperty</a>.<br>
<br>
Thank you,<br>
NetMod WG Chairs<br>
<br>
PS Please include all listed in the headers of this message in your<br>
response.<br>
<br>
</blockquote></div>

--000000000000056650059f53feee--


From nobody Mon Feb 24 08:04:58 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5E693A0DAE; Mon, 24 Feb 2020 08:04:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.337
X-Spam-Level: 
X-Spam-Status: No, score=-9.337 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QewAY2pQ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=JAqBEHU4
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7jtdePPWP_DA; Mon, 24 Feb 2020 08:04:53 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17EED3A0E56; Mon, 24 Feb 2020 08:04:51 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=17610; q=dns/txt; s=iport; t=1582560291; x=1583769891; h=from:to:cc:subject:date:message-id:mime-version; bh=D4urqxCCtk5BuOpZ7/A9lJqYQIp273e7891Z50VlH/I=; b=QewAY2pQ/ggbY79kWW6dy0jwA9iZhmYEUHtvsuSUDRyuWf78qwreDVPe TFPmP+EORH3HRhkc2wi7nx09frRJtF+6hNy9WNzFjpGlOxaGKn98VH+DI gOXpVx1iPNiPb5TQ/Yor/9sdHg34OYieGj8nHHy+MkqTdiUNvbeLwWGWX w=;
IronPort-PHdr: =?us-ascii?q?9a23=3A1i5NoB83yf1vPv9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DrPADr8lNe/4sNJK1mHQEBAQkBEQU?= =?us-ascii?q?FAYF7gSUvUAVsWCAECyoKh1ADinEzmkCBQoEQA1QJAQEBDAEBHw4CBAEBhEA?= =?us-ascii?q?CTAEEgTwkOBMCAw0BAQUBAQECAQUEbYU3DIIpgz0WGxMBATcBEQEaZhcPAQQ?= =?us-ascii?q?BDQ0agwWBfU0DLgEOoikCgTmIYoIngn8BAQWFABiCDAMGgTiLfiYagUE/gRF?= =?us-ascii?q?HgU6EIAEBA4FJAQIYK4MWgiyWVZlFCoI8h1GPMIJJjGmLfI5wgU2HL5JLAgQ?= =?us-ascii?q?CBAUCDgEBBYFpIiqBBQsecBUaIYJsUBgNjh2Dc4UUhUF0gSmLRgEnBIEHAYE?= =?us-ascii?q?PAQE?=
X-IronPort-AV: E=Sophos;i="5.70,480,1574121600";  d="scan'208,217";a="722497647"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 24 Feb 2020 16:04:50 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 01OG4mpM024887 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 24 Feb 2020 16:04:49 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 24 Feb 2020 10:04:48 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 24 Feb 2020 11:04:45 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 24 Feb 2020 10:04:45 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BqCPU3l56pQc5bIB9lPzmqKFRKu1dlV0lZpBMLcpbOT++TmZyuBmiz2iTkGr4zFL6uoIDgourbnrFC7bROMM28YQWo+hIg3khtkLG8gohxUma8KReY9TkbmpwiB0FYohNNMMMciiq+rUnqQ9SLqesDyqVF1LUkVy/YeshK0Lru5hI2ftG+OqxFkTgENprAMDsinuh5lrhZpRXKbdGgWpN8KG1p1UXiwPkisPdkv0Ra9om6rnPYQmDR7fe6/qDJ680l2kdT/aScwhrgzB5gbOMeeYuakcRgcMWuN8FBpnErM5Yhd3xKDz5Rl774hJywJWeZ+pKqwrxBlF5p3yssV/jg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XeHt0zdeI6H6/wDSlwDFqZJ9VKMwupNuywGrt4ZCbH4=; b=bulOkFju3uz2ZHncdtO2rZ0c01u1htMwe/Darb+R0qtAR4ouGNJ8M6lbYrCZR4gbafsxNUkX0swgR97QV8oJopVHiXDtDaQ21HVTjoFicVmsCQq/K6Q8hxwD+VQZwKgo/e0xMypSho1vlrzG4NWh1cFBdT9EjbHpEKOHeQy6bxzkHap8X+5PJnlJTmyIa7/8rHHCUF1tdYVcPFpcF6Hb3czTO4+n/gy8rx/cCAFvCjI3RAY1mbf/+1ynCN1WHnnKPbipg2X69yhfezDdSYgmXKUzKEm28KSIM4+PSbH/vPRdGRuELuJuKUgwAUiKcu2kMbHyFylS6keSkviGwKDJ5w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XeHt0zdeI6H6/wDSlwDFqZJ9VKMwupNuywGrt4ZCbH4=; b=JAqBEHU4Wk1qclUeCMxyACq2AbZebHVtsoxFkRpISTSbA/+L5WRTkbmqtwokQCSZqRYR0naOrDFK85+JH30ITOiWckiuT/GJq80K9FI3slTnfVGzwDAoGgfz4JinQ5k7MWkFNHWgPcL4/4s3qa096gx4zDb9Q74HmgdsMqtv7oo=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4207.namprd11.prod.outlook.com (2603:10b6:208:18a::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.22; Mon, 24 Feb 2020 16:04:44 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Mon, 24 Feb 2020 16:04:43 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXrK91DLlBAy7r2SwW5K4lCI86Kqg==
Date: Mon, 24 Feb 2020 16:04:43 +0000
Message-ID: <MN2PR11MB43660B9F19E8794C5A8B7144B5EC0@MN2PR11MB4366.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.62]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b92182bf-f577-4013-9af8-08d7b9434355
x-ms-traffictypediagnostic: MN2PR11MB4207:
x-microsoft-antispam-prvs: <MN2PR11MB4207CF53091008EB81060769B5EC0@MN2PR11MB4207.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 032334F434
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(39860400002)(366004)(136003)(346002)(376002)(189003)(199004)(110136005)(316002)(6506007)(5660300002)(76116006)(66946007)(478600001)(52536014)(55016002)(9686003)(86362001)(2906002)(4326008)(81166006)(81156014)(8676002)(8936002)(71200400001)(33656002)(64756008)(66446008)(66476007)(66556008)(186003)(7696005)(26005)(9326002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4207; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: s+0vpHSnkr/JYqCpF80+tDu+mY9iQVYurcIeWx8bvTvXFpYRgBl9ioWh0IuQ+VwrxqD64AGOjkAugpuDiVJG1SqaEYFUagQ3L4BbnUBbK57fzO/d87j/AwMnC1xDhxvMiM8QBUJ2XRRYZwCAsC8ifA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB43660B9F19E8794C5A8B7144B5EC0MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b92182bf-f577-4013-9af8-08d7b9434355
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2020 16:04:43.8016 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: LD+B0yvw29K0KYbPxTIbO+Sm6n0hXwieID7CW6bonL9pxFM9jZMvYitqAlhhGRc7rMAfvjX1DHvUf3UpYwlylw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4207
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/m84_5Q7sHdoVy1bvvPH5Zwlgip0>
Subject: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 16:04:57 -0000

--_000_MN2PR11MB43660B9F19E8794C5A8B7144B5EC0MN2PR11MB4366namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi,

Thanks for writing this document.  I found this document to be well written=
, clear and understandable.  However, there are a few issues which I think =
could be addressed before kicking off IETF LC.

I have the following comments:


  1.  Title: The title of the document may be clearer as: "A YANG Data Mode=
l for Factory Default Settings".


  1.  Abstract: I would suggest condensing the abstract, which is currently=
 very similar to the introduction, perhaps to the following text:



 "This document defines a YANG data model to allow clients to

  reset a server back to its factory default condition.  It

  also defines a "factory-default" datastore to allow clients

  to read the factory default configuration for the device.



  The YANG data model in this document conforms to the Network

  Management Datastore Architecture (NMDA) defined in RFC 8342<https://tool=
s.ietf.org/html/rfc8342>.
   "


  1.  Introduction: It might be useful to include instructions for the RFC =
editor at the beginning of the introduction to summarize what actions are r=
equired before publication.



  1.  Terminology (section 1.1).   For the definition of the factory-defaul=
t datastore, I would add the sentence "This datastore is referred to as "<f=
actory-default>."



  1.  Terminology (section 1.1).  I propose that you also important the ter=
m "datastore schema" from RFC 8342, for use with a proposed update to secti=
on 3.



  1.  Section 2, third bullet.  It might be better to replace "ephemeral da=
tastores" with "dynamic configuration datastores", since that is the refere=
nce is RFC 8342.



  1.  Section 3, first paragraph.  I suggest removing the word minimal, i.e=
. "preconfigured minimal initial configuration" =3D> "preconfigured initial=
 configuration", since it isn't required that the factory default configura=
tion is minimal, although it would normally be so.


  1.  Section 3. I think that the document must define what the schema is f=
or the "factory-default".  Hence, rather than "YANG modules: all", perhaps =
"YANG modules: The factory default datastore schema MUST either be the same=
 as the conventional configuration datastores, or a subset of the datastore=
 schema for the conventional configuration datastores."


  1.  Section 3. Probably add the following sentence to the end of section =
3: "If supported, the factory-default datastore MUST be included in the lis=
t of datastores in YANG library [RFC 8525]."  This would probably also add =
RFC 8525 as a normative reference.


  1.  YANG module, rpc factory-reset description.  I suggest changing the d=
escription to



"The server resets all datastores to their factory default content and any =
non-volatile storage back to factory condition, deleting all dynamically ge=
nerated files, including those containing keys, certificates, logs, and oth=
er temporary files.



Depending on the factory default configuration, after being reset, the devi=
ce may become unreachable on the network."


  1.  I think that the security section needs to explicitly mention that no=
n volatile storage is expected to be wiped clean and reset back to the fact=
ory default state, but that there is no guarantee that the data is wiped to=
 any particular data cleansing particular standard, and the owner of the de=
vice MUST NOT rely on any temporary data (e.g., including private keys) bei=
ng unrecoverable after the factory-reset RPC has been invoked.


Nits:

Section 2:
"are all reset to" =3D> "are reset to"
"datastores(e.g. " =3D> "datastores (e.g., "

Section 3:
"with <operational> =3D> "with the <operational>".

Section 7: ", Susan Hares to review this draft and provide important input =
to this document" =3D> ", and Susan Hares for reviewing this document and p=
roviding important input".

Regards,
Rob


--_000_MN2PR11MB43660B9F19E8794C5A8B7144B5EC0MN2PR11MB4366namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";
	mso-fareast-language:EN-GB;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:495076583;
	mso-list-type:hybrid;
	mso-list-template-ids:237383226 134807567 134807577 134807579 134807567 13=
4807577 134807579 134807567 134807577 134807579;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks for writing this document.&nbsp; I found this=
 document to be well written, clear and understandable.&nbsp; However, ther=
e are a few issues which I think could be addressed before kicking off IETF=
 LC.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I have the following comments: <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"1" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Title: The title of the document may be clearer as: &#8220;<span styl=
e=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black;mso-f=
areast-language:EN-GB">A YANG Data Model for Factory Default
 Settings</span>&#8221;.<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"2" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Abstract: I would suggest condensing the abstract, which is currently=
 very similar to the introduction, perhaps to the following text:<o:p></o:p=
></li></ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<pre> &#8220;<span style=3D"color:black">This document defines a YANG data =
model to allow clients to<o:p></o:p></span></pre>
<pre><span style=3D"color:black">&nbsp; reset a server back to its factory =
default condition.&nbsp; It<o:p></o:p></span></pre>
<pre><span style=3D"color:black">&nbsp; also defines a &#8220;factory-defau=
lt&#8221; datastore to allow clients<o:p></o:p></span></pre>
<pre><span style=3D"color:black">&nbsp; to read the factory default configu=
ration for the device.<o:p></o:p></span></pre>
<pre><span style=3D"color:black"><o:p>&nbsp;</o:p></span></pre>
<pre><span style=3D"color:black">&nbsp; The YANG data model in this documen=
t conforms to the Network<o:p></o:p></span></pre>
<pre><span style=3D"color:black">&nbsp; Management Datastore Architecture (=
NMDA) defined in <a href=3D"https://tools.ietf.org/html/rfc8342">RFC 8342</=
a>.<o:p></o:p></span></pre>
<p class=3D"MsoNormal">&nbsp; &nbsp;&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"3" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Introduction: It might be useful to include instructions for the RFC =
editor at the beginning of the introduction to summarize what actions are r=
equired before publication.<o:p></o:p></li></ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"4" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Terminology (section 1.1). &nbsp;&nbsp;For the definition of the fact=
ory-default datastore, I would add the sentence &#8220;<span style=3D"font-=
size:10.0pt;font-family:&quot;Courier New&quot;;color:black;mso-fareast-lan=
guage:EN-GB">This
 datastore is referred to as &quot;&lt;factory-default&gt;.</span>&#8221;<o=
:p></o:p></li></ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"5" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Terminology (section 1.1).&nbsp; I propose that you also important th=
e term &#8220;datastore schema&#8221; from RFC 8342, for use with a propose=
d update to section 3.<o:p></o:p></li></ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"6" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Section 2, third bullet.&nbsp; It might be better to replace &#8220;<=
span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:bl=
ack;mso-fareast-language:EN-GB">ephemeral datastores</span>&#8221;
 with &#8220;<span style=3D"font-size:10.0pt;font-family:&quot;Courier New&=
quot;;color:black;mso-fareast-language:EN-GB">dynamic configuration datasto=
res</span>&#8221;, since that is the reference is RFC 8342.<o:p></o:p></li>=
</ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"7" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Section 3, first paragraph.&nbsp; I suggest removing the word minimal=
, i.e. &#8220;<span style=3D"font-size:10.0pt;font-family:&quot;Courier New=
&quot;;color:black;mso-fareast-language:EN-GB">preconfigured
 minimal initial configuration</span>&#8221; =3D&gt; &#8220;<span style=3D"=
font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black;mso-fareas=
t-language:EN-GB">preconfigured initial configuration</span>&#8221;, since =
it isn&#8217;t required that the factory default configuration is minimal,
 although it would normally be so.<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"8" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Section 3. I think that the document must define what the schema is f=
or the &#8220;factory-default&#8221;.&nbsp; Hence, rather than &#8220;<span=
 style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:black;=
mso-fareast-language:EN-GB">YANG
 modules: all</span>&#8221;, perhaps &#8220;<span style=3D"font-size:10.0pt=
;font-family:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB=
">YANG modules: The factory default datastore schema MUST either be the sam=
e as the conventional configuration datastores, or a subset
 of the datastore schema for the conventional configuration datastores.</sp=
an>&#8221;&nbsp; <o:p>
</o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"9" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">Section 3. Probably add the following sentence to the end of section =
3: &#8220;<span style=3D"font-size:10.0pt;font-family:&quot;Courier New&quo=
t;;color:black;mso-fareast-language:EN-GB">If supported,
 the factory-default datastore MUST be included in the list of datastores i=
n YANG library [RFC 8525].</span>&#8221;&nbsp; This would probably also add=
 RFC 8525 as a normative reference.<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"10" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">YANG module, rpc factory-reset description.&nbsp; I suggest changing =
the description to
<o:p></o:p></li></ol>
<p class=3D"MsoListParagraph"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph">&#8220;<span style=3D"font-size:10.0pt;font-f=
amily:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">The s=
erver resets all datastores to their factory default content and any non-vo=
latile storage back to factory condition, deleting all
 dynamically generated files, including those containing keys, certificates=
, logs, and other temporary files.<o:p></o:p></span></p>
<p class=3D"MsoListParagraph"><span style=3D"font-size:10.0pt;font-family:&=
quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB"><o:p>&nbsp;<=
/o:p></span></p>
<p class=3D"MsoListParagraph"><span style=3D"font-size:10.0pt;font-family:&=
quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">Depending on=
 the factory default configuration, after being reset, the device may becom=
e unreachable on the network</span>.&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0cm" start=3D"11" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0cm;mso-list:l0 level1 =
lfo1">I think that the security section needs to explicitly mention that no=
n volatile storage is expected to be wiped clean and reset back to the fact=
ory default state, but that there is
 no guarantee that the data is wiped to any particular data cleansing parti=
cular standard, and the owner of the device MUST NOT rely on any temporary =
data (e.g., including private keys) being unrecoverable after the factory-r=
eset RPC has been invoked.<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Nits:<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Section 2: <o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;are all reset to&#8221; =3D&gt; &#8220;are re=
set to&#8221;<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;datastores(e.g. &#8220; =3D&gt; &#8220;datast=
ores (e.g., &#8220;<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Section 3:<o:p></o:p></p>
<p class=3D"MsoNormal">&#8220;with &lt;operational&gt; =3D&gt; &#8220;with =
the &lt;operational&gt;&#8221;.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Section 7: &#8220;, Susan Hares to review this draft=
 and provide important input to this document&#8221; =3D&gt; &#8220;, and S=
usan Hares for reviewing this document and providing important input&#8221;=
.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">Rob<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_MN2PR11MB43660B9F19E8794C5A8B7144B5EC0MN2PR11MB4366namp_--


From nobody Mon Feb 24 10:27:07 2020
Return-Path: <xufeng.liu.ietf@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A2F83A10B0 for <netmod@ietfa.amsl.com>; Mon, 24 Feb 2020 10:27:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level: 
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id afGOzMXET2Ka for <netmod@ietfa.amsl.com>; Mon, 24 Feb 2020 10:27:02 -0800 (PST)
Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94BEC3A10A8 for <netmod@ietf.org>; Mon, 24 Feb 2020 10:27:02 -0800 (PST)
Received: by mail-io1-xd43.google.com with SMTP id m25so11265772ioo.8 for <netmod@ietf.org>; Mon, 24 Feb 2020 10:27:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=vdFGsAAIPwM+Xc+o2DzkOqL59Jcf1b4ODJJUnS4vNyg=; b=o3HW3tUbrUVk4MWNkqkcxUnZV/MUO59dnJtjH7FjjkmE0ZfJRygBcSAID0264ovp2I C+Oa0k5OMW4cES/ofASjmv0Vfs8SlgxlvTr0O8fnLt2fQtcEfXLNp7IgUmGJyeqJ9FcZ 7vIQv+epYQtQY7O34Layc1Rinp4h3EJFv1WWCWPQ9q116oN9VGDn13j0e9+onEcBoMvv tBqcUaV6Z3YHIQZoMDhDNAMetnPy6VnQGDV+22AyNtekC7625q0I4hTWrlC/QyOUYrLA 7tGvvAgOQYhYiI3Pcgv+cdVqytIeMSpNJgjTtDHPFIsvLC4xCzYP8EAGb2Ss4nFgL9gT fqIA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vdFGsAAIPwM+Xc+o2DzkOqL59Jcf1b4ODJJUnS4vNyg=; b=XxjusCKbY3IYUVwuIwoZ9eeC0bl961WFVTQz0i4cdBSdLUhP5zAGRskD4JXLuZ9YX0 a5RZk/38SiSAqwH832fqrVMv1ZeCgxwXKep612/1kNmoF/+8VII2l1PNq3VHirqjKeYM db0d/PrU2ZlCnWjyaZYq/Kh9eeEpJ1pQnDY0u+ua7VLNjDl1uSE683pLpZ+JIdbGfqLc 2h5JS7IxV8qU2dogNGJecTpU8NUzLRhz0hyjX2lHPv4o0nTUaC+kaFyEAlZrG/E2nz1A Fmiq5zVpQWDPw89jslueMnEoEu9NGNMRYfK+vMFs+TrTZMkdW1D2Oi01+QDh5BnxRrr+ dU8Q==
X-Gm-Message-State: APjAAAX/CDDtrUgclqhLO+Z2qPZ2MNguuwKXvbWfMBrwKlbRDu0fCOvF 9lBe0WfVWIjNEBaeXEY5zIODOtWq6nSYSZw9znE=
X-Google-Smtp-Source: APXvYqx7onHZD3pLBy1XvIeNjgXVM38Vs7KVSp0dIUjvfy0QBXHCy4Y20+NMtKWUopJlQ95T78Me01Pfj4rflSsXnb4=
X-Received: by 2002:a5d:8a10:: with SMTP id w16mr50704586iod.216.1582568821652;  Mon, 24 Feb 2020 10:27:01 -0800 (PST)
MIME-Version: 1.0
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de> <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com> <CWXP265MB0775983A3A9DB3FABC23D932D6100@CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM>
In-Reply-To: <CWXP265MB0775983A3A9DB3FABC23D932D6100@CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM>
From: Xufeng Liu <xufeng.liu.ietf@gmail.com>
Date: Mon, 24 Feb 2020 13:26:50 -0500
Message-ID: <CAEz6PPSgRX=NEfhDj_HyVddCMPHtQ9Zoo84mvyvLsdmmF4givQ@mail.gmail.com>
To: "King, Daniel" <d.king@lancaster.ac.uk>
Cc: Benoit Claise <bclaise@cisco.com>,  =?UTF-8?B?U2Now7Zud8OkbGRlciwgSsO8cmdlbg==?= <J.Schoenwaelder@jacobs-university.de>,  Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007281a4059f5684b6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/UNf-AoGmJ_Mb1snfctboPgkAXDM>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 18:27:06 -0000

--0000000000007281a4059f5684b6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Agree with Dan. The use case is valid, though the errors in the data model
can be fixed.
Support.
Thanks,
- Xufeng

On Wed, Feb 19, 2020 at 6:44 AM King, Daniel <d.king@lancaster.ac.uk> wrote=
:

> Hi All,
>
>
>
> Expressing, and delegating base imperative policy to network nodes
> (regardless if it=E2=80=99s a switch, router, network function, or indeed
> =E2=80=9Ccontroller=E2=80=9D) is a critical step for facilitating network=
 automation. I
> support the I-D and would like to see the WG adopt the work. Yes, the I-D
> needs to be developed further and this would be better managed if the
> effort was owned by the WG.
>
>
>
> I do agree somewhat with J=C3=BCrgen that past experiences have shown a l=
ack
> of willingness between vendors for expressing policy (imperative or
> otherwise). Major vendors have tended to implement their own policy
> language, or specific purpose (security, role management, et al.) languag=
e
> that has been based on standards (formal) or open-source project (de
> facto). The fact that the I-D author and contributor list already has a
> good mix of implementors demonstrates a willingness to develop an
> interoperable network-wide solution.
>
>
>
> BR, Dan.
>
>
>
> *From:* netmod <netmod-bounces@ietf.org> *On Behalf Of *Benoit Claise
> *Sent:* 19 February 2020 10:46
> *To:* Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen <J.Schoenwaelder@jacobs-universi=
ty.de>; Joel
> Jaeggli <joelja@bogus.com>
> *Cc:* netmod@ietf.org
> *Subject:* Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> J=C3=BCrgen,
>
> To tell that I was skeptical about the SUPA work is just wrong.
>
> I had great hopes for SUPA, as having consistent policy constructs in YAN=
G
> module was key. The big hope was that those SUPA constructs could be
> re-used in other YANG modules
>     example: routing, ACL, security ...
>     Regardless of the location: in a network element or in a
> controller/orchestrator
>     Regardless of the function: network element and service YANG modules
> If successful, in the end, SUPA would have helped to reuse code.
>
> Was I disappointed by the progress? Yes. The results were not there while
> the rest of the world uses their YANG policy constructs. Timing was key s=
o,
> as AD, I had to pull the plug.
> The world has moved on. So be it.
> You can't infer skepticism from pragmatism.
>
> Now, back to the draft.
> From a network element point, I stressed the need to take have *simple *E=
CA
> rules directly routers.
> Think about RMON event/alarm but for YANG. Think about removing the RMON
> event/alarm restrictions that it works only for integer/counter.
> If your point is that the draft is not perfect, fair point.
> Should we solve attempt to solve that issue? Yes.
>
> A confusion comes from the abstract that implies that this work is based
> on SUPA.
>
> Abstract
>
>
>
>    RFC8328 defines a policy-based management framework that allows
>
>    definition of a data model to be used to represent high-level,
>
>    possibly network-wide policies.  Policy discussed in RFC8328 are
>
>    classified into imperative policy and declarative policy, Event
>
>    Condition Action (ECA) policy is an typical example of imperative
>
>    policy.  This document defines a YANG data model for the ECA policy
>
>    management.  The ECA policy YANG provides the ability for the network
>
>    management function (within a network element) to control the
>
>    configuration and monitor state change and take simple and instant
>
>    action on the server when a trigger condition on the system state is
>
>    met.
>
> Actually, in my mind, the abstract should be simplified to something such
> as (and yes, it could be improved)
>
> Abstract
>
>
>
>    This document defines a YANG data model for the ECA policy
>
>    management.  The ECA policy YANG provides the ability for the network
>
>    management function (within a network element) to control the
>
>    configuration and monitor state change and take simple and instant
>
>    action on the server when a trigger condition on the system state is
>
>    met.
>
> And then, somewhere in the introduction, the following text should be
> reused:
>
>    RFC8328 defines a policy-based management framework that allows
>
>    definition of a data model to be used to represent high-level,
>
>    possibly network-wide policies.  Policy discussed in RFC8328 are
>
>    classified into imperative policy and declarative policy, Event
>
>    Condition Action (ECA) policy is an typical example of imperative
>
>    policy.
>
>
> Regards, Benoit.
>
> On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:
>
> This email begins a 2 week working group adoption poll for:
>
>
>
> https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
>
>
>
> Please voice your support or objections before the poll completes on
>
> March 3rd.
>
>
>
> I am against adoption of this draft. I wonder whether Benoit will
>
> explain his contributions to this document; Benoit was added as a
>
> co-author in -06 and he used to be rather sceptical about the SUPA
>
> work (and this is essentially part of the SUPA work resubmitted to the
>
> NETMOD WG). Despite this, the YANG definitions are clearly not up to
>
> the level one would expect for WG adoption. Many descriptions are
>
> just repetition of leaf names and there are obvious errors such as
>
>
>
>           leaf-list day-of-month {
>
>             type uint8 {
>
>               range "0..59";
>
>             }
>
>             description
>
>               "A set of days of the month at which this
>
>                scheduling timing will trigger.";
>
>           }
>
>
>
> Despite the strange range, it is unclear how a number will in the
>
> range will identify a set. Note, this is an example, there are lots of
>
> them in the document. The examples provides are not convincing and
>
> technically wrong (how can <interval>10m</interval> match
>
>
>
>           leaf interval {
>
>             type uint32 {
>
>               range "1..max";
>
>             }
>
>             units "seconds";
>
>             mandatory true;
>
>             description
>
>               "The number of seconds between two triggers
>
>                generated by this periodic timing object.";
>
>           }
>
>
>
> and I have serious doubts that the design is anywhere close to be
>
> practically usable. There need to be mechanisms to bind 'variables'
>
> while matching conditions that and be reused in action definitions, it
>
> is not scalable to have constants such as interface names in the
>
> examples hard-coded in policy rules - this would lead to a huge number
>
> of rules if you want to apply policy rules to all interfaces.
>
>
>
> There is also a lack of extensibility, which is important for a core
>
> policy language, and definitions like:
>
>
>
>   identity function-type {
>
>     description
>
>       "Possible values are:
>
>        plus, minus, mult, divide, remain.";
>
>   }
>
>
>
> without ever defining these operators feels strange. I also not
>
> convinced that the resulting expressions are expressive enough for
>
> real-world use.
>
>
>
> This document is in a state that requires way too much effort to fix
>
> in a WG process. I also doubt that expressing policies in such a
>
> low-level format is usable in practice. Policy languages for network
>
> management have a long history and this proposal seems to ignore the
>
> lessons learned in the past.
>
>
>
> /js
>
>
>
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--0000000000007281a4059f5684b6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Agree with Dan. The use case is valid, though the err=
ors in the data model can be fixed.</div><div>Support.</div><div>Thanks,</d=
iv><div>- Xufeng<br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" c=
lass=3D"gmail_attr">On Wed, Feb 19, 2020 at 6:44 AM King, Daniel &lt;<a hre=
f=3D"mailto:d.king@lancaster.ac.uk">d.king@lancaster.ac.uk</a>&gt; wrote:<b=
r></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex=
;border-left:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"EN-GB">
<div class=3D"gmail-m_2820592277180736278WordSection1">
<p class=3D"MsoNormal"><span>Hi All, <u></u><u></u></span></p>
<p class=3D"MsoNormal"><span><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span>Expressing, and delegating base imperative pol=
icy to network nodes (regardless if it=E2=80=99s a switch, router, network =
function, or indeed =E2=80=9Ccontroller=E2=80=9D) is a critical step for fa=
cilitating network automation.
 I support the I-D and would like to see the WG adopt the work. Yes, the I-=
D needs to be developed further and this would be better managed if the eff=
ort was owned by the WG.
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span>I do agree somewhat with
</span><span lang=3D"EN-US">J=C3=BCrgen that past experiences have shown a =
lack of willingness between vendors for expressing policy (imperative or ot=
herwise). Major vendors have tended to implement their own policy language,=
 or specific purpose (security, role management,
 et al.) language that has been based on standards (formal) or open-source =
project (de facto). The fact that the I-D author and contributor list alrea=
dy has a good mix of implementors demonstrates a willingness to develop an =
interoperable network-wide solution.
 =C2=A0<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">BR, Dan. </span><span><u></u><u=
></u></span></p>
<p class=3D"MsoNormal"><span><u></u>=C2=A0<u></u></span></p>
<div>
<div style=3D"border-color:rgb(225,225,225) currentcolor currentcolor;borde=
r-style:solid none none;border-width:1pt medium medium;padding:3pt 0cm 0cm"=
>
<p class=3D"MsoNormal"><b><span lang=3D"EN-US">From:</span></b><span lang=
=3D"EN-US"> netmod &lt;<a href=3D"mailto:netmod-bounces@ietf.org" target=3D=
"_blank">netmod-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Benoit Claise<br>
<b>Sent:</b> 19 February 2020 10:46<br>
<b>To:</b> Sch=C3=B6nw=C3=A4lder, J=C3=BCrgen &lt;<a href=3D"mailto:J.Schoe=
nwaelder@jacobs-university.de" target=3D"_blank">J.Schoenwaelder@jacobs-uni=
versity.de</a>&gt;; Joel Jaeggli &lt;<a href=3D"mailto:joelja@bogus.com" ta=
rget=3D"_blank">joelja@bogus.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf=
.org</a><br>
<b>Subject:</b> Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></span></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">J=C3=BCrgen,<br>
<br>
To tell that I was skeptical about the SUPA work is just wrong.<br>
<br>
I had great hopes for SUPA, as having consistent policy constructs in YANG =
module was key. The big hope was that those SUPA constructs could be re-use=
d in other YANG modules<br>
=C2=A0=C2=A0=C2=A0 example: routing, ACL, security ... <br>
=C2=A0=C2=A0=C2=A0 Regardless of the location: in a network element or in a=
 controller/orchestrator<br>
=C2=A0=C2=A0=C2=A0 Regardless of the function: network element and service =
YANG modules<br>
If successful, in the end, SUPA would have helped to reuse code.<br>
=C2=A0<br>
Was I disappointed by the progress? Yes. The results were not there while t=
he rest of the world uses their YANG policy constructs. Timing was key so, =
as AD, I had to pull the plug.<br>
The world has moved on. So be it.<br>
You can&#39;t infer skepticism from pragmatism.<br>
<br>
Now, back to the draft.<br>
>From a network element point, I stressed the need to take have <u>simple </=
u>ECA rules directly routers.<br>
Think about RMON event/alarm but for YANG. Think about removing the RMON ev=
ent/alarm restrictions that it works only for integer/counter.
<br>
If your point is that the draft is not perfect, fair point.<br>
Should we solve attempt to solve that issue? Yes.<br>
<br>
A confusion comes from the abstract that implies that this work is based on=
 SUPA.<u></u><u></u></p>
<pre><span class=3D"gmail-m_2820592277180736278mh">Abstract</span><u></u><u=
></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>=C2=A0=C2=A0 RFC8328 defines a policy-based management framework that =
allows<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 definition of a data model to be used to represent high-l=
evel,<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 possibly network-wide policies.=C2=A0 Policy discussed in=
 RFC8328 are<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 classified into imperative policy and declarative policy,=
 Event<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 Condition Action (ECA) policy is an typical example of im=
perative<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 policy.=C2=A0 This document defines a YANG data model for=
 the ECA policy<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 management.=C2=A0 The ECA policy YANG provides the abilit=
y for the network<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 management function (within a network element) to control=
 the<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 configuration and monitor state change and take simple an=
d instant<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 action on the server when a trigger condition on the syst=
em state is<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 met.<u></u><u></u></pre>
<p class=3D"MsoNormal">Actually, in my mind, the abstract should be simplif=
ied to something such as (and yes, it could be improved)<u></u><u></u></p>
<pre><span class=3D"gmail-m_2820592277180736278mh">Abstract</span><u></u><u=
></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>=C2=A0 =C2=A0This document defines a YANG data model for the ECA polic=
y<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 management.=C2=A0 The ECA policy YANG provides the abilit=
y for the network<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 management function (within a network element) to control=
 the<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 configuration and monitor state change and take simple an=
d instant<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 action on the server when a trigger condition on the syst=
em state is<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 met.<u></u><u></u></pre>
<p class=3D"MsoNormal">And then, somewhere in the introduction, the followi=
ng text should be reused:
<u></u><u></u></p>
<pre>=C2=A0=C2=A0=C2=A0RFC8328 defines a policy-based management framework =
that allows<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 definition of a data model to be used to represent high-l=
evel,<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 possibly network-wide policies.=C2=A0 Policy discussed in=
 RFC8328 are<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 classified into imperative policy and declarative policy,=
 Event<u></u><u></u></pre>
<pre>=C2=A0=C2=A0 Condition Action (ECA) policy is an typical example of im=
perative<u></u><u></u></pre>
<pre>=C2=A0 =C2=A0policy. <u></u><u></u></pre>
<p class=3D"MsoNormal"><br>
Regards, Benoit.<u></u><u></u></p>
</div>
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt">
<pre>On Tue, Feb 18, 2020 at 08:44:18AM -0800, Joel Jaeggli wrote:<u></u><u=
></u></pre>
<blockquote style=3D"margin-top:5pt;margin-bottom:5pt">
<pre>This email begins a 2 week working group adoption poll for:<u></u><u><=
/u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre><a href=3D"https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06"=
 target=3D"_blank">https://tools.ietf.org/html/draft-wwx-netmod-event-yang-=
06</a><u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>Please voice your support or objections before the poll completes on<u=
></u><u></u></pre>
<pre>March 3rd.<u></u><u></u></pre>
</blockquote>
<pre><u></u>=C2=A0<u></u></pre>
<pre>I am against adoption of this draft. I wonder whether Benoit will<u></=
u><u></u></pre>
<pre>explain his contributions to this document; Benoit was added as a<u></=
u><u></u></pre>
<pre>co-author in -06 and he used to be rather sceptical about the SUPA<u><=
/u><u></u></pre>
<pre>work (and this is essentially part of the SUPA work resubmitted to the=
<u></u><u></u></pre>
<pre>NETMOD WG). Despite this, the YANG definitions are clearly not up to<u=
></u><u></u></pre>
<pre>the level one would expect for WG adoption. Many descriptions are<u></=
u><u></u></pre>
<pre>just repetition of leaf names and there are obvious errors such as<u><=
/u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 leaf-list day-o=
f-month {<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 typ=
e uint8 {<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 range &quot;0..59&quot;;<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 }<u=
></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 des=
cription<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 &quot;A set of days of the month at which this<u></u><u></u></pre=
>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 scheduling timing will trigger.&quot;;<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 }<u></u><u></u>=
</pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>Despite the strange range, it is unclear how a number will in the<u></=
u><u></u></pre>
<pre>range will identify a set. Note, this is an example, there are lots of=
<u></u><u></u></pre>
<pre>them in the document. The examples provides are not convincing and<u><=
/u><u></u></pre>
<pre>technically wrong (how can &lt;interval&gt;10m&lt;/interval&gt; match<=
u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 leaf interval {=
<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 typ=
e uint32 {<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 range &quot;1..max&quot;;<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 }<u=
></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 uni=
ts &quot;seconds&quot;;<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0man=
datory true;<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 des=
cription<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 &quot;The number of seconds between two triggers<u></u><u></u></p=
re>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0 generated by this periodic timing object.&quot;;<u></u><u><=
/u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 }<u></u><u></u>=
</pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>and I have serious doubts that the design is anywhere close to be<u></=
u><u></u></pre>
<pre>practically usable. There need to be mechanisms to bind &#39;variables=
&#39;<u></u><u></u></pre>
<pre>while matching conditions that and be reused in action definitions, it=
<u></u><u></u></pre>
<pre>is not scalable to have constants such as interface names in the<u></u=
><u></u></pre>
<pre>examples hard-coded in policy rules - this would lead to a huge number=
<u></u><u></u></pre>
<pre>of rules if you want to apply policy rules to all interfaces.<u></u><u=
></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>There is also a lack of extensibility, which is important for a core<u=
></u><u></u></pre>
<pre>policy language, and definitions like:<u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>=C2=A0 identity function-type {<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0 description<u></u><u></u></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 &quot;Possible values are:<u></u><u></u=
></pre>
<pre>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 plus, minus, mult, divide, remain=
.&quot;;<u></u><u></u></pre>
<pre>=C2=A0 }<u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>without ever defining these operators feels strange. I also not<u></u>=
<u></u></pre>
<pre>convinced that the resulting expressions are expressive enough for<u><=
/u><u></u></pre>
<pre>real-world use.<u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>This document is in a state that requires way too much effort to fix<u=
></u><u></u></pre>
<pre>in a WG process. I also doubt that expressing policies in such a<u></u=
><u></u></pre>
<pre>low-level format is usable in practice. Policy languages for network<u=
></u><u></u></pre>
<pre>management have a long history and this proposal seems to ignore the<u=
></u><u></u></pre>
<pre>lessons learned in the past.<u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
<pre>/js<u></u><u></u></pre>
<pre><u></u>=C2=A0<u></u></pre>
</blockquote>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>

_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--0000000000007281a4059f5684b6--


From nobody Mon Feb 24 13:13:50 2020
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 714993A134C; Mon, 24 Feb 2020 13:13:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZG1b8Ths4Ysn; Mon, 24 Feb 2020 13:13:43 -0800 (PST)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2103.outbound.protection.outlook.com [40.107.236.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2535A3A134B; Mon, 24 Feb 2020 13:13:42 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jmh4kn7hvlHUVTMmGPhGm0Lj8WHaBm7lkS/e4bblYLWmT2RZPGGGCvbZHy39glDoU9Djn5gN8c8tV6dHZ25IBPNNZVzwj/CiyDoHD6CkJiXXbRxftEypHSiR5g1MrOYiYY7U87bP+W/WlPVhO8sNwk1ZYGr45Ch8uQkVZLLJ9/RJhyKEd1ie9N0J/63/45AsYOsr7/yPum7pAS/9z4kbCmjo1I+DQD6rPTwP/NURawzhZODilONTB1z8TX/tBtU0LIdzUdPRKmYzkjxuJVTLhGHcn37ljagf6lbXIm9Iylc/AddiJ4a5QllB/ODIrMYaKnAIDoQ3B4tEAgarprkY6A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NEm644lN7f2QWOXfxzjNvtNMjbAsTw59ya3BkVTlrVg=; b=JLZXSxDzQEcsJXfuziCpKAe0h+O9IHM+DEJaQ3G25kw16BMSUurJUdF4dBnZ9+1+rOrkDa9nY61a2wFAbR0Ih1hx+AeIy6TZGRRBvaPhja7kgL7CPByGY3lz/x/HvEfVvHf7pciyC6npXI0OyXdQvRl6hQ2xiMb2DHQwx2Y4oudAwUEdXkzaiJbz4nVbAafggYHDJskKrMzOnhV3SfYHc43UYoUbzDm3sJVBJySaIOF5U8bePDF+98QWMLayyTD6YHX9fUHhQVI+JaSiJk0uNyxVDL1x73rI33rrFp4SKu5yHJ5Q6F94rQFXRTmA0dZ8TtFTRAr7GjvWpKOOzDQqnw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NEm644lN7f2QWOXfxzjNvtNMjbAsTw59ya3BkVTlrVg=; b=wQPohwSXaabQz0YvCfkPLQYSqYF0EMGh9Y0SeGp6r++Z7MSfd1IA2cTFVUtCWRw0eABJmLKyxPd8KY6wCW+L3X1qumh7RMG68+fdBttZxUO0eX/AuRwqrWcj4iWpGrd1ljWidaBw4QerSaRo9Xz779wUqX0jm0Neav/YBuY47fQ=
Received: from DM5PR08MB2633.namprd08.prod.outlook.com (2603:10b6:3:ca::21) by DM5PR08MB3531.namprd08.prod.outlook.com (2603:10b6:4:64::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.17; Mon, 24 Feb 2020 21:13:40 +0000
Received: from DM5PR08MB2633.namprd08.prod.outlook.com ([fe80::455:66cb:efa2:fabb]) by DM5PR08MB2633.namprd08.prod.outlook.com ([fe80::455:66cb:efa2:fabb%9]) with mapi id 15.20.2750.021; Mon, 24 Feb 2020 21:13:40 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: Martin Bjorklund <mbj@tail-f.com>, =?iso-8859-1?Q?Oscar_Gonz=E1lez_de_Dios?= <oscar.gonzalezdedios@telefonica.com>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
Thread-Index: AQHV4Xjaema+meZLWk2xNgC8vQWlkqgq6sMQ
Date: Mon, 24 Feb 2020 21:13:40 +0000
Message-ID: <DM5PR08MB263323245AA83D8045A8400D9BEC0@DM5PR08MB2633.namprd08.prod.outlook.com>
References: <AM6PR06MB5653DFBCFC89E54F28E45AECFD180@AM6PR06MB5653.eurprd06.prod.outlook.com> <20200211.105956.997059335051594687.mbj@tail-f.com> <AM6PR06MB5653B347EE8C00708CBE7EC5FD180@AM6PR06MB5653.eurprd06.prod.outlook.com> <20200212.084745.340561451697677336.mbj@tail-f.com>
In-Reply-To: <20200212.084745.340561451697677336.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-originating-ip: [65.110.215.75]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: f8a2e9f3-efd3-48a1-2a95-08d7b96e6c26
x-ms-traffictypediagnostic: DM5PR08MB3531:|DM5PR08MB3531:
x-ld-processed: 5d471751-9675-428d-917b-70f44f9630b0,ExtAddr
x-microsoft-antispam-prvs: <DM5PR08MB3531F904D5869891E018C5299BEC0@DM5PR08MB3531.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 032334F434
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(376002)(396003)(136003)(366004)(346002)(39860400002)(189003)(199004)(5660300002)(81156014)(71200400001)(4326008)(9686003)(478600001)(26005)(6506007)(110136005)(53546011)(8936002)(52536014)(8676002)(81166006)(55016002)(33656002)(966005)(86362001)(66946007)(76116006)(54906003)(66446008)(2906002)(66574012)(66476007)(64756008)(186003)(7696005)(316002)(66556008); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR08MB3531; H:DM5PR08MB2633.namprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: RRo+AOzaQu1qcHUIe7B47Aseoz+SQkXs/lESpv4kGK6jq7A/X5ZcBb6bJkx6rwgV9he7NYODda2gQ85oMv01tnfLXsCl4aQIggKAAaqAR87DeR5iBQWhgF4Px5VXIvRAuyH1oB08O7WMf/+tecU06A==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f8a2e9f3-efd3-48a1-2a95-08d7b96e6c26
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2020 21:13:40.5217 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FsSltCYPNUTJ3t8W9XtKlztpmrnDAxEkkfppuAvwDwRg0Yjogwac69DnV2hayJ93DMyQcUuhFiUeY2ussaF8GA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR08MB3531
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Yf_pZ9ZKlVncgBlFj9Zjw7OsE5A>
Subject: Re: [netmod] Question on how to design a Yang model to reflect auto-asignment of a give leaf
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Feb 2020 21:13:46 -0000

Agree that ideally we avoid (a) in running. Unfortunately I think we used (=
a) in ietf-interfaces though:

         leaf type {
           type identityref {
             base interface-type;
           }
           mandatory true;
           description
             "The type of the interface.

              When an interface entry is created, a server MAY
              initialize the type leaf with a valid value, e.g., if it
              is possible to derive the type from the name of the
              interface.

I do like (c) but note that it means the value calculated by the server may=
 not be persistent (e.g. across reboot). It depends how the server calculat=
es the value. If it is "allocated" from some sort of free list, then at reb=
oot it may select a different value than the previously selected value.

Jason

> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Martin Bjorklund
> Sent: Wednesday, February 12, 2020 2:48 AM
> To: Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com>
> Cc: opsawg@ietf.org; netmod@ietf.org
> Subject: Re: [netmod] Question on how to design a Yang model to reflect a=
uto-
> asignment of a give leaf
>=20
> Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:
> >
> >
> > -----Mensaje original-----
> > De: Martin Bjorklund <mbj@tail-f.com>
> > Enviado el: martes, 11 de febrero de 2020 11:00
> > Para: Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com>
> > CC: opsawg@ietf.org; netmod@ietf.org
> > Asunto: Re: [netmod] Question on how to design a Yang model to reflect
> > auto-asignment of a give leaf
> >
> > Hi,
> >
> > Oscar Gonz=E1lez de Dios <oscar.gonzalezdedios@telefonica.com> wrote:
> > > Dear OPSAWG and Netmod colleagues,
> > >
> > >                 During last IETF Opsawg meeting we raised a question =
(and
> > >                 there was some discussion during the meeting) that we=
 have
> > >                 found yet no good answer and we would like to discuss=
 it
> > >                 with
> > >                 operations and Yang experts.
> > >
> > >                 The use case is the following: We have a yang module =
which
> > >                 holds certain optional leafs. The behaviors that we w=
ould
> > >                 like
> > >                 to have (and distinguish between them) are:
> > >
> > >
> > > a) The user does not provide the value and such value is auto-assigne=
d
> > > by the system (a device (if it is a device module) or a controller (i=
f
> > > it is a network/service module)).
> >
> > I assume that this value not a static default value?
> >
> > [Oscar] True. Should the leaf have a default value, it implies that
> > "if the value is not set, the default value is taken".
> >
> > > b) The user does not provide a value and wants that such value IS NOT
> > > set by the system (as assigning a value has implications). That is,
> > > intentionally it is aimed at being left "empty" and should not be
> > > expanded. So, either the value is set or should remain empty
> >
> > Do you mean that you want (a) and (b) at the same time for the same
> > leaf?
> >
> > [Oscar] No. Depending on the leaf, we would like to specify behavior a
> > or behavior b. Behavior a is ok for most of the cases.  The problem is
> > that in some cases, assigning a value has way more implications and
> > the service will not work properly. Those case are the ones we wanted
> > to specifically tackle.
>=20
> Ok.  See below.
>=20
> > > What is the best way to model this behavior? I see that some yang
> > > modules have added an "auto-assignment" leaf to express if
> > > auto-assignment is desired or not. (hence, auto-assignment false, and
> > > leaf not set, would do not assign).
> > >
> > > Which is the "default" rule for a leaf that is not set? It is that th=
e
> > > system is free to create it (via template or any means of
> > > auto-assignment) or should leave it as is, that is, empty?
> > >
> > > In NMDA, the system is allowed to expand a given configuration. This
> > > fact, in my personal view, implies that by "default" any system could
> > > implement the "auto-assignment" behavior being compliant with
> > > Neconf/Restconf/NMDA rules (but I am not sure if the interpretation i=
s
> > > correct).
> >
> > There are (at least) three ways to interpret "auto-assign".  The
> > client writes to running, and then the server auto-assigns X:
> >
> >   (a) in running
> >   (b) in intended
> >   (c) in the operational state
> >
> > (c) is uncontroversial and simple to implement in all servers, and
> > simple to understand.
> > [Oscar] agree
> >
> > (b) is allowed by NMDA but requires more of the server implementation;
> > specifically it requires the server to support that intended is
> > different from running.
> > [Oscar] Agree . "Theoretically speaking" this is the behavior I would
> > consider strictly follows NMDA guidelines. Reality is implementations
> > are yet far from this...
> >
> > (a) is not recommended in general; running should be fully owned by
> > the client(s) and not modified by the server.
> > [Oscar] Agree.
> >
> > [Oscar] So... what would be the best way to specify the behavior?
> > Explicitly adding an auto-assign leaf to identify the behavior? Just
> > "obey" NMDA rules?
>=20
> For your "auto-assignment" case, I would describe the behaviour in the
> description statement.  Something like: "If this leaf has not been
> configured, the server will calculate a value [... specify how ... ]
> and use that value operationally.  This calculated value is available
> in the operational state."
>=20
> For your other case (the user really doesn't want a value) I also
> would document this in the description (unless it's obvious).
>=20
>=20
>=20
> /martin
>=20
>=20
>=20
>=20
>=20
> >
> >
> > /martin
> >
> >
> >
> > >
> > > Best Regards,
> > >
> > >                 =D3scar
> > >
> > > ________________________________
> > >
> > > Este mensaje y sus adjuntos se dirigen exclusivamente a su
> > > destinatario, puede contener informaci=F3n privilegiada o confidencia=
l y
> > > es para uso exclusivo de la persona o entidad de destino. Si no es
> > > usted. el destinatario indicado, queda notificado de que la lectura,
> > > utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede estar
> > > prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este
> > > mensaje por error, le rogamos que nos lo comunique inmediatamente por
> > > esta misma v=EDa y proceda a su destrucci=F3n.
> > >
> > > The information contained in this transmission is privileged and
> > > confidential information intended only for the use of the individual
> > > or entity named above. If the reader of this message is not the
> > > intended recipient, you are hereby notified that any dissemination,
> > > distribution or copying of this communication is strictly prohibited.
> > > If you have received this transmission in error, do not read it.
> > > Please immediately reply to the sender that you have received this
> > > communication in error and then delete it.
> > >
> > > Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> > > destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confidenci=
al e =E9
> > > para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vos=
sa
> > > senhoria o destinat=E1rio indicado, fica notificado de que a leitura,
> > > utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode =
estar proibida
> > > em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por er=
ro,
> > > rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> > > proceda a sua destrui=E7=E3o
> >
> > ________________________________
> >
> > Este mensaje y sus adjuntos se dirigen exclusivamente a su
> > destinatario, puede contener informaci=F3n privilegiada o confidencial =
y
> > es para uso exclusivo de la persona o entidad de destino. Si no es
> > usted. el destinatario indicado, queda notificado de que la lectura,
> > utilizaci=F3n, divulgaci=F3n y/o copia sin autorizaci=F3n puede estar
> > prohibida en virtud de la legislaci=F3n vigente. Si ha recibido este
> > mensaje por error, le rogamos que nos lo comunique inmediatamente por
> > esta misma v=EDa y proceda a su destrucci=F3n.
> >
> > The information contained in this transmission is privileged and
> > confidential information intended only for the use of the individual
> > or entity named above. If the reader of this message is not the
> > intended recipient, you are hereby notified that any dissemination,
> > distribution or copying of this communication is strictly
> > prohibited. If you have received this transmission in error, do not
> > read it. Please immediately reply to the sender that you have received
> > this communication in error and then delete it.
> >
> > Esta mensagem e seus anexos se dirigem exclusivamente ao seu
> > destinat=E1rio, pode conter informa=E7=E3o privilegiada ou confidencial=
 e =E9
> > para uso exclusivo da pessoa ou entidade de destino. Se n=E3o =E9 vossa
> > senhoria o destinat=E1rio indicado, fica notificado de que a leitura,
> > utiliza=E7=E3o, divulga=E7=E3o e/ou c=F3pia sem autoriza=E7=E3o pode es=
tar proibida
> > em virtude da legisla=E7=E3o vigente. Se recebeu esta mensagem por erro=
,
> > rogamos-lhe que nos o comunique imediatamente por esta mesma via e
> > proceda a sua destrui=E7=E3o
> >
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod


From nobody Mon Feb 24 18:21:46 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0EFC3A1800; Mon, 24 Feb 2020 18:21:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IDc1AX68OgkC; Mon, 24 Feb 2020 18:21:43 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 325083A17FF; Mon, 24 Feb 2020 18:21:43 -0800 (PST)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id D60388E4ECD4C3F751DC; Tue, 25 Feb 2020 02:21:41 +0000 (GMT)
Received: from lhreml721-chm.china.huawei.com (10.201.108.72) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 25 Feb 2020 02:21:41 +0000
Received: from lhreml721-chm.china.huawei.com (10.201.108.72) by lhreml721-chm.china.huawei.com (10.201.108.72) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Tue, 25 Feb 2020 02:21:41 +0000
Received: from DGGEML405-HUB.china.huawei.com (10.3.17.49) by lhreml721-chm.china.huawei.com (10.201.108.72) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Tue, 25 Feb 2020 02:21:41 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by dggeml405-hub.china.huawei.com ([10.3.17.49]) with mapi id 14.03.0439.000; Tue, 25 Feb 2020 10:21:37 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXrgaJW15GUCIJxTyeJn+VVC6Y7WQ==
Date: Tue, 25 Feb 2020 02:21:36 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E1E1D@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAAD4E1E1Ddggeml511mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/e-AX_q9c7ys87Yy_NaLE2NlfIoc>
Subject: Re: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 02:21:46 -0000

--_000_B8F9A780D330094D99AF023C5877DABAAD4E1E1Ddggeml511mbxchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAAD4E1E1Ddggeml511mbxchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:=CE=A2=C8=ED=D1=C5=BA=DA;
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"\@=CE=A2=C8=ED=D1=C5=BA=DA";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML =D4=A4=C9=E8=B8=F1=CA=BD Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.HTMLChar
	{mso-style-name:"HTML =D4=A4=C9=E8=B8=F1=CA=BD Char";
	mso-style-priority:99;
	mso-style-link:"HTML =D4=A4=C9=E8=B8=F1=CA=BD";
	font-family:"Courier New";
	mso-fareast-language:EN-US;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
p.HTMLPreformatted, li.HTMLPreformatted, div.HTMLPreformatted
	{mso-style-name:"HTML Preformatted";
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";
	mso-fareast-language:EN-GB;}
span.EmailStyle23
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:495076583;
	mso-list-type:hybrid;
	mso-list-template-ids:237383226 134807567 134807577 134807579 134807567 13=
4807577 134807579 134807567 134807577 134807579;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D;mso-fareast-language:ZH-CN">Thanks Rob for good review and propose=
d text, I will incorporate them in v-13, the only comment I am not sure is =
comment 3, I have nothing to add for instruction
 for RFC editor besides<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D;mso-fareast-language:ZH-CN">RFC Editor note in the YANG data model=
 code to remind the RFC Editor to replace RFC xxx and related date to actua=
l RFC number and publication date respectively.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D;mso-fareast-language:ZH-CN"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;color=
:#1F497D;mso-fareast-language:ZH-CN">-Qin<o:p></o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-family:&quot;=CE=A2=C8=ED=D1=
=C5=BA=DA&quot;,sans-serif;mso-fareast-language:ZH-CN">=B7=A2=BC=FE=C8=CB<s=
pan lang=3D"EN-US">:</span></span></b><span lang=3D"EN-US" style=3D"font-fa=
mily:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif;mso-fareast-language:Z=
H-CN"> Rob Wilton (rwilton) [mailto:rwilton@cisco.com]
<br>
</span><b><span style=3D"font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,s=
ans-serif;mso-fareast-language:ZH-CN">=B7=A2=CB=CD=CA=B1=BC=E4<span lang=3D=
"EN-US">:</span></span></b><span lang=3D"EN-US" style=3D"font-family:&quot;=
=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif;mso-fareast-language:ZH-CN"> 2020=
</span><span style=3D"font-family:&quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans=
-serif;mso-fareast-language:ZH-CN">=C4=EA<span lang=3D"EN-US">2</span>=D4=
=C2<span lang=3D"EN-US">25</span>=C8=D5<span lang=3D"EN-US">
 0:05<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> draft-ietf-netmod-factory-default@ietf.org; netmod@ietf.org<br>
</span><b>=B3=AD=CB=CD<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Warren Kumari &lt;warren@kumari.net&gt;<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> [Incoming] AD review of draft-ietf-netmod-factory-default-12<o:p></o:p></=
span></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Hi,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Thanks for writing this documen=
t.&nbsp; I found this document to be well written, clear and understandable=
.&nbsp; However, there are a few issues which I think could be addressed be=
fore kicking off IETF LC.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">I have the following comments: =
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"1" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Title: The title of the document may be clearer as: =A1=B0</span><span =
lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot=
;;color:black;mso-fareast-language:EN-GB">A YANG Data Model
 for Factory Default Settings</span><span lang=3D"EN-GB">=A1=B1.<o:p></o:p>=
</span></li></ol>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"2" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Abstract: I would suggest condensing the abstract, which is currently v=
ery similar to the introduction, perhaps to the following text:<o:p></o:p><=
/span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<pre><span lang=3D"EN-GB"> =A1=B0<span style=3D"color:black">This document =
defines a YANG data model to allow clients to<o:p></o:p></span></span></pre=
>
<pre><span lang=3D"EN-GB" style=3D"color:black">&nbsp; reset a server back =
to its factory default condition.&nbsp; It<o:p></o:p></span></pre>
<pre><span lang=3D"EN-GB" style=3D"color:black">&nbsp; also defines a =A1=
=B0factory-default=A1=B1 datastore to allow clients<o:p></o:p></span></pre>
<pre><span lang=3D"EN-GB" style=3D"color:black">&nbsp; to read the factory =
default configuration for the device.<o:p></o:p></span></pre>
<pre><span lang=3D"EN-GB" style=3D"color:black"><o:p>&nbsp;</o:p></span></p=
re>
<pre><span lang=3D"EN-GB" style=3D"color:black">&nbsp; The YANG data model =
in this document conforms to the Network<o:p></o:p></span></pre>
<pre><span lang=3D"EN-GB" style=3D"color:black">&nbsp; Management Datastore=
 Architecture (NMDA) defined in <a href=3D"https://tools.ietf.org/html/rfc8=
342">RFC 8342</a>.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">&nbsp; &nbsp;=A1=B1<o:p></o:p><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"3" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Introduction: It might be useful to include instructions for the RFC ed=
itor at the beginning of the introduction to summarize what actions are req=
uired before publication.<o:p></o:p></span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<ol style=3D"margin-top:0cm" start=3D"4" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Terminology (section 1.1). &nbsp;&nbsp;For the definition of the factor=
y-default datastore, I would add the sentence =A1=B0</span><span lang=3D"EN=
-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;color:bl=
ack;mso-fareast-language:EN-GB">This
 datastore is referred to as &quot;&lt;factory-default&gt;.</span><span lan=
g=3D"EN-GB">=A1=B1<o:p></o:p></span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<ol style=3D"margin-top:0cm" start=3D"5" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Terminology (section 1.1).&nbsp; I propose that you also important the =
term =A1=B0datastore schema=A1=B1 from RFC 8342, for use with a proposed up=
date to section 3.<o:p></o:p></span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<ol style=3D"margin-top:0cm" start=3D"6" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Section 2, third bullet.&nbsp; It might be better to replace =A1=B0</sp=
an><span lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier=
 New&quot;;color:black;mso-fareast-language:EN-GB">ephemeral datastores</sp=
an><span lang=3D"EN-GB">=A1=B1
 with =A1=B0</span><span lang=3D"EN-GB" style=3D"font-size:10.0pt;font-fami=
ly:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">dynamic =
configuration datastores</span><span lang=3D"EN-GB">=A1=B1, since that is t=
he reference is RFC 8342.<o:p></o:p></span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<ol style=3D"margin-top:0cm" start=3D"7" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Section 3, first paragraph.&nbsp; I suggest removing the word minimal, =
i.e. =A1=B0</span><span lang=3D"EN-GB" style=3D"font-size:10.0pt;font-famil=
y:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">preconfig=
ured
 minimal initial configuration</span><span lang=3D"EN-GB">=A1=B1 =3D&gt; =
=A1=B0</span><span lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&qu=
ot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">preconfigured =
initial configuration</span><span lang=3D"EN-GB">=A1=B1, since it isn=A1=AF=
t
 required that the factory default configuration is minimal, although it wo=
uld normally be so.<o:p></o:p></span></li></ol>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"8" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Section 3. I think that the document must define what the schema is for=
 the =A1=B0factory-default=A1=B1.&nbsp; Hence, rather than =A1=B0</span><sp=
an lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier New&q=
uot;;color:black;mso-fareast-language:EN-GB">YANG
 modules: all</span><span lang=3D"EN-GB">=A1=B1, perhaps =A1=B0</span><span=
 lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier New&quo=
t;;color:black;mso-fareast-language:EN-GB">YANG modules: The factory defaul=
t datastore schema MUST either be the same as the conventional
 configuration datastores, or a subset of the datastore schema for the conv=
entional configuration datastores.</span><span lang=3D"EN-GB">=A1=B1&nbsp;
<o:p></o:p></span></li></ol>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"9" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">Section 3. Probably add the following sentence to the end of section 3:=
 =A1=B0</span><span lang=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&q=
uot;Courier New&quot;;color:black;mso-fareast-language:EN-GB">If
 supported, the factory-default datastore MUST be included in the list of d=
atastores in YANG library [RFC 8525].</span><span lang=3D"EN-GB">=A1=B1&nbs=
p; This would probably also add RFC 8525 as a normative reference.<o:p></o:=
p></span></li></ol>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"10" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">YANG module, rpc factory-reset description.&nbsp; I suggest changing th=
e description to
<o:p></o:p></span></li></ol>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span>=
</p>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB">=A1=B0</span><span lang=
=3D"EN-GB" style=3D"font-size:10.0pt;font-family:&quot;Courier New&quot;;co=
lor:black;mso-fareast-language:EN-GB">The server resets all datastores to t=
heir factory default content and any non-volatile storage
 back to factory condition, deleting all dynamically generated files, inclu=
ding those containing keys, certificates, logs, and other temporary files.<=
o:p></o:p></span></p>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB" style=3D"font-size:10.0p=
t;font-family:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-G=
B"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoListParagraph"><span lang=3D"EN-GB" style=3D"font-size:10.0p=
t;font-family:&quot;Courier New&quot;;color:black;mso-fareast-language:EN-G=
B">Depending on the factory default configuration, after being reset, the d=
evice may become unreachable on the network</span><span lang=3D"EN-GB">.=A1=
=B1<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<ol style=3D"margin-top:0cm" start=3D"11" type=3D"1">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1"><span lang=3D"EN-=
GB">I think that the security section needs to explicitly mention that non =
volatile storage is expected to be wiped clean and reset back to the factor=
y default state, but that there is no
 guarantee that the data is wiped to any particular data cleansing particul=
ar standard, and the owner of the device MUST NOT rely on any temporary dat=
a (e.g., including private keys) being unrecoverable after the factory-rese=
t RPC has been invoked.<o:p></o:p></span></li></ol>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Nits:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Section 2: <o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=A1=B0are all reset to=A1=B1 =
=3D&gt; =A1=B0are reset to=A1=B1<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=A1=B0datastores(e.g. =A1=B0 =
=3D&gt; =A1=B0datastores (e.g., =A1=B0<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Section 3:<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">=A1=B0with &lt;operational&gt; =
=3D&gt; =A1=B0with the &lt;operational&gt;=A1=B1.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Section 7: =A1=B0, Susan Hares =
to review this draft and provide important input to this document=A1=B1 =3D=
&gt; =A1=B0, and Susan Hares for reviewing this document and providing impo=
rtant input=A1=B1.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Regards,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB">Rob<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-GB"><o:p>&nbsp;</o:p></span></p>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABAAD4E1E1Ddggeml511mbxchi_--


From nobody Tue Feb 25 01:00:41 2020
Return-Path: <liupengyjy@outlook.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 372273A0A73; Tue, 25 Feb 2020 01:00:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.597
X-Spam-Level: 
X-Spam-Status: No, score=-0.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, RCVD_IN_SORBS_WEB=1.5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=outlook.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dkOUqNsd98Ts; Tue, 25 Feb 2020 01:00:38 -0800 (PST)
Received: from APC01-PU1-obe.outbound.protection.outlook.com (mail-oln040092254027.outbound.protection.outlook.com [40.92.254.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87DD43A0A72; Tue, 25 Feb 2020 01:00:37 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AGpkDtvTyR5oZCPxKvJQtYZ0q6DjiGnMexYir2z5Z4zkmP7XDBC0Vql4+D8RwbThppmfddlDaB8vvIxe2Ed1cY/v/obAggE0hb2ApseIH1JqWEgyjEf2hfrQ8glbf2f1ByCK/4eFscdlBrrCZ7Z9QOPAAhZ1Bztj3cxXV09hP5Bxpdz8qDzuCzppqbsXL+Vm6aE4g1oVCkbTwP5wq8yJZZYw+To49+XsHbeXI4GF5A6B6Hl8YtBEftQ9t92sgzEMgS0ERy/dmWsXmsnFBySbv+O33Zoz7MAZ+SkBuXKbEhaQrBmz8ftF3LBcN4r8aMoil6e8OLHTAO/SYdoGAKq4YA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ja/kXUkUhbo+BCrG/qoA7S3ZSdaSod2mq/sQsfKloH4=; b=D2bmBy/NFiVMKKgZyZ0XvE8HFsTdkL9lSNrfy3HTrILzW8L01wy4uu+Aw61TT9KW2oXtqaOo+Z73YCGhtL8bJyIhh/Pj7cfxM1QQH/tg/gYEA3nn48cd3gddlzRHOtV70O6OHuPdTvSojzp9lC8qkzZDBAWY464NjnDtheRFB82y+M64YPLjGP54DTC2R/O/72xsSo0WGMZzJdtRd6X6KyyPAQjyUPUOz+toxHpYhHfUnBGok05M/nHrzO3QOPjQ9ZxjIVRAxJP4XXasAI1H4iFEPANr8/umwtP77XyjQo6MDtbt9oOMovam3haS4LjslEMveFZSkWZVd8vL60MhNg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ja/kXUkUhbo+BCrG/qoA7S3ZSdaSod2mq/sQsfKloH4=; b=n40S8aS9hqcQ3DG8B8i3qyxHnEHB0iqIoQt04CllVHHzVivoTEIY5znRQEUPJF2Z6W8Bu0B82YIkjWQyvs/k5vj9nX1BL9vsi8GfscZ2m4JNrEngF4JEttDw2Yru8SKfaqdc13OueOZUMR+T5SsYYHxSM1B3Bm6PLugOX8dPmrqGzYmmJu5aoxzYvgOwUkzB4Xvt3PzKxTXnJ9JmIp8Yr7+d5rpnmWBnQB2eYuJboZRsVAjbJSSA8fcX0H54z+I53JODlZuhv+T9mK/O1ZdgUe3VOKFG+2/KToYOCYb6XgqEYzJopx140lyXOlbergoq9nWy5eiAg8N+V/RiwZw/MA==
Received: from PU1APC01FT014.eop-APC01.prod.protection.outlook.com (2a01:111:e400:7ebe::3a) by PU1APC01HT240.eop-APC01.prod.protection.outlook.com (2a01:111:e400:7ebe::254) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.19; Tue, 25 Feb 2020 09:00:31 +0000
Received: from PU1PR06MB2215.apcprd06.prod.outlook.com (10.152.252.56) by PU1APC01FT014.mail.protection.outlook.com (10.152.252.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.18 via Frontend Transport; Tue, 25 Feb 2020 09:00:31 +0000
Received: from PU1PR06MB2215.apcprd06.prod.outlook.com ([fe80::a958:b7ef:77a6:adb4]) by PU1PR06MB2215.apcprd06.prod.outlook.com ([fe80::a958:b7ef:77a6:adb4%6]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 09:00:31 +0000
Received: from Peng (117.136.0.193) by HK2PR02CA0152.apcprd02.prod.outlook.com (2603:1096:201:1f::12) with Microsoft SMTP Server (version=TLS1_1, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) id 15.20.2750.18 via Frontend Transport; Tue, 25 Feb 2020 09:00:29 +0000
From: =?utf-8?B?5YiYIOm5jw==?= <liupengyjy@outlook.com>
To: netmod-bounces <netmod-bounces@ietf.org>
CC: netmod <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5nrGRuy6gexPPk2TqGQjqLyRmw==
Date: Tue, 25 Feb 2020 09:00:31 +0000
Message-ID: <PU1PR06MB2215AA7E56E20FD995A3093DDAED0@PU1PR06MB2215.apcprd06.prod.outlook.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>, <20200218231700.3tho6ngescf2k4zh@anna.jacobs.jacobs-university.de>, <4b29cb4d-d252-b139-a46c-b5530f998a3b@cisco.com>, <CWXP265MB0775983A3A9DB3FABC23D932D6100@CWXP265MB0775.GBRP265.PROD.OUTLOOK.COM>, <CAEz6PPSgRX=NEfhDj_HyVddCMPHtQ9Zoo84mvyvLsdmmF4givQ@mail.gmail.com>, <B8F9A780D330094D99AF023C5877DABAAD4E2298@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: HK2PR02CA0152.apcprd02.prod.outlook.com (2603:1096:201:1f::12) To PU1PR06MB2215.apcprd06.prod.outlook.com (2603:1096:803:38::11)
x-incomingtopheadermarker: OriginalChecksum:893FFCADFBC8989C2ADF50EB3677FACD8FB6CCB104B9942CB9E5438FA492414D; UpperCasedChecksum:7AB5B270E4365E45F97534DBAFCF7B7FB2DDF7B9EC44B9F88ADEFD44F9F6C38A; SizeAsReceived:7917; Count:53
x-ms-exchange-messagesentrepresentingtype: 1
x-guid: C1161D1E-9940-493E-AFB4-E6A6FC58586B
x-has-attach: no
x-mailer: Foxmail 7.2.9.115[cn]
x-tmn: [Wb7ok4k5XRc6phKkXhStTuE/OvbKn5jL]
x-microsoft-original-message-id: <2020022517003043323011@outlook.com>
x-ms-publictraffictype: Email
x-incomingheadercount: 53
x-eopattributedmessage: 0
x-ms-office365-filtering-correlation-id: 4d01c591-a7a9-4d4d-7092-08d7b9d12a08
x-ms-traffictypediagnostic: PU1APC01HT240:
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: VG08FjgaXCk4i8YI0EQYi9UJqN2TK55F1olNDx/2qlNfiokFIOJEhtg+P4GIVERV3FZ9dR2iYgvG4w4KNABcpJ7QKVnSJdI0B/BWA1jHZtfFrKbXejtHa4ATsfNxexrqbZxwx34q8VszvfLPsv/3DFdkCr5vRSfn21YtGYws7aFZm0QntHj1AlC/e9yOrqRxkWDuyygPq2ub2LYFVXe0TOBvBxL1pA/byu3ak6RoUAA=
x-ms-exchange-antispam-messagedata: R9ug0eyBDlkjU8GDXs9mC6809QzVKayZeV8/qaUoRnbh7530IRilHon7pZRVEDL5Ytx4JFT0irVRuTbbkVmYZmu5cdG//uSMJPEiO9mfjAGDyO2gKkx67UTXUgcXF/gl8N7UKLHHTPvXV6fgdLDyKw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_PU1PR06MB2215AA7E56E20FD995A3093DDAED0PU1PR06MB2215apcp_"
MIME-Version: 1.0
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-Network-Message-Id: 4d01c591-a7a9-4d4d-7092-08d7b9d12a08
X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 09:00:31.0808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Internet
X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PU1APC01HT240
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/jlLoOcv90SmLjagPPEE0ToXeZGo>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 09:00:40 -0000

--_000_PU1PR06MB2215AA7E56E20FD995A3093DDAED0PU1PR06MB2215apcp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_PU1PR06MB2215AA7E56E20FD995A3093DDAED0PU1PR06MB2215apcp_
Content-Type: text/html; charset="utf-8"
Content-ID: <A7F4EC38BC001A4399A66A62940BFD86@apcprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_PU1PR06MB2215AA7E56E20FD995A3093DDAED0PU1PR06MB2215apcp_--


From nobody Tue Feb 25 02:23:16 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3A503A089D; Tue, 25 Feb 2020 02:23:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level: 
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FAOtnvDV; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=ZVQ/5pAg
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vmcmu0ySaa73; Tue, 25 Feb 2020 02:23:12 -0800 (PST)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3C253A088F; Tue, 25 Feb 2020 02:23:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=39718; q=dns/txt; s=iport; t=1582626191; x=1583835791; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=tpH3lYxnPXnvWbMjC1IgKxcTkJb4uPCpNyAgp4uzHzM=; b=FAOtnvDVOYDQlXEFXTz6miiVqPXvE4zSU0BX8kk3+sKDLLur57PmO8bF Fjq1Rq8KUu9JonvGM8joZlswOMrzjBdr00nIGrVZObl5xih+aWdQS2qYg XHbjNcEWzclSbiszEU7MPcZLHq2uH7OMC1Tl6eLDGSBVa+SRT142w700u Q=;
IronPort-PHdr: =?us-ascii?q?9a23=3AuODIaBVeC0L62Htrz0Gopcjreh3V8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA92J8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtankgA8VGSFhj13q6KkNSXs35Yg6arw=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ArEwB/9FRe/5RdJa1lGwEBAQEBAQE?= =?us-ascii?q?FAQEBEQEBAwMBAQGBe4ElLyQFJwVsWCAECyoKhAqDRgOKcjOCLJgUgUKBEAN?= =?us-ascii?q?UCQEBAQwBAR8OAgQBAYRAAhc1AQSBLCQ4EwIDDQEBBQEBAQIBBQRthTcMgim?= =?us-ascii?q?DOgEBAQEDEhEKEwEBNwEPAgEGAg4DAQMBASEBBgMCAgIwFAMGCAEBBAENBQg?= =?us-ascii?q?agwWBfU0DLgEOkTqQZwKBOYhidYEygn8BAQWFAhiCDAMGgTiLfiYagUE/gRF?= =?us-ascii?q?HgU5+PoJkAQEDgUkBAhgrCYJbMoIskGWFcJlFCoI8h1GPMIJJiBuETot8jnC?= =?us-ascii?q?BTYcvkksCBAIEBQIOAQEFgWkiKoEFCx5wFRohgmxQGA2OHYEnAQmCQoUUhUF?= =?us-ascii?q?0gSmLSQEnBIEHATBfAQE?=
X-IronPort-AV: E=Sophos;i="5.70,483,1574121600";  d="scan'208,217";a="459561206"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Feb 2020 10:23:09 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 01PAN5vu030143 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 25 Feb 2020 10:23:09 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 04:23:08 -0600
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 04:23:08 -0600
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 25 Feb 2020 05:23:08 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AFnrf8b9Y5akGgoSR5GmSH2rhpf6q4qvBKE0DpXwfgAW0kyhRk/IX6KoQelyGYQB1edzJ2wRzIaqBSCTjQKaUQR/4WHX4ZaeMZioS6290xVSO4qel6DG6pVMYRhT5QUmhzLIKQOzWctkuJ2Z+3NDubvjS88hkLSulFXoD2YXzwhZW+oO6cIPDoq+5L3ezK11S2quk0t3cIpu5lzFnxwrW5Er5N4qrqytoVvCqbHz15Ovz6hi5btUpy1EEU5vEyMCMB5cZT311H+NZ8O46suXCt25RYopt/felE34QN8LQ51kRbKhRGM6Hh43k+9+Cc79IWWni6a+RW8AG9cXD1UdIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tpH3lYxnPXnvWbMjC1IgKxcTkJb4uPCpNyAgp4uzHzM=; b=cax4qDKzZJ7NKYZSB56WxhP34AXagkkr9CleoJ0ljHzWT5ztHJEqzlKgOutOzhXwzlUK8lgdSpEVoRkxIqjX4Rm8jEiRb+gVL4kCXd1LhLU3kM23Tv2Z/6I0uRMB9NDbAO52AfYFoEapVE7tftHfE/cfucz8LOZvV0r01mCDqOkcukR2CvJAJfmcDTcgs2XQ2NxobRVApcMNw0IFfR1Dz1GGs/N9RZ6Rl7RfjPRz1JqHgCMHLZNc6RSASK1nDYTgur9gZewYoWMqRkUajuNqsC4TTDKdHp/IhVOm+oVlCF2ml4VzvttINS13n74kavY/QPZ9+TMPI9YaFaLij1VYGA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tpH3lYxnPXnvWbMjC1IgKxcTkJb4uPCpNyAgp4uzHzM=; b=ZVQ/5pAgs6235vxE7VVjVYvWoUwHW+CqEZGV9wbeqfOgQ7KLgTL1WCCPjOQ0fFyWCtpBrhXgw/UJEybJ3uuOMVu5wwi5SylyBMI9mXWddWeotZ6uVaMOn4OJZFK9UmanpT0BqGNDsZmUoa+WZylGucLEaiCvaH3LyU1S8WgTilA=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4461.namprd11.prod.outlook.com (2603:10b6:208:192::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Tue, 25 Feb 2020 10:23:06 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 10:23:06 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXrgaJW15GUCIJxTyeJn+VVC6Y7WQAQuEsA
Date: Tue, 25 Feb 2020 10:23:05 +0000
Message-ID: <MN2PR11MB4366648110251DD62D24CAC2B5ED0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E1E1D@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E1E1D@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.55]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e945a0bc-8109-4787-ebf4-08d7b9dcb40e
x-ms-traffictypediagnostic: MN2PR11MB4461:
x-microsoft-antispam-prvs: <MN2PR11MB44612FB2CC71D57534CE8951B5ED0@MN2PR11MB4461.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(136003)(39860400002)(366004)(396003)(346002)(189003)(199004)(55016002)(5660300002)(86362001)(9686003)(6506007)(53546011)(8936002)(316002)(7696005)(4326008)(110136005)(9326002)(52536014)(81156014)(33656002)(2906002)(8676002)(26005)(71200400001)(478600001)(186003)(76116006)(66946007)(81166006)(66556008)(66446008)(66476007)(64756008)(21314003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4461; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: v2z+ikqs5humA4OGFT9t6f4a0dTSVMyqZzcndl6teptvf1cThw2vfYCLorBIoZtBATIuZ+njVUz+l7HTo5LMCJ/zJnPwgRikciDTKyi6Nemc9NmMvO7m7i12T8Tv4jGGiTZ4vR65Fx7vpq61OVS2Ig==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB4366648110251DD62D24CAC2B5ED0MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e945a0bc-8109-4787-ebf4-08d7b9dcb40e
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 10:23:05.7996 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: aNYFiJGDHNCzbcKUdw6NGi9uxG7+gM9BeoaeAF2nW7GLR0InzwLP/BNlYTbnQELDU2lTFQtaHT4nA9IgL2098g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4461
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/rHrsXmVQF3-m9u9ZI-Cf8ycO7i4>
Subject: Re: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 10:23:15 -0000

--_000_MN2PR11MB4366648110251DD62D24CAC2B5ED0MN2PR11MB4366namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366648110251DD62D24CAC2B5ED0MN2PR11MB4366namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366648110251DD62D24CAC2B5ED0MN2PR11MB4366namp_--


From nobody Tue Feb 25 02:44:27 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 060B13A0937; Tue, 25 Feb 2020 02:44:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jUaOqvEcsSZN; Tue, 25 Feb 2020 02:44:20 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 443003A0939; Tue, 25 Feb 2020 02:44:20 -0800 (PST)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id A7F93173316E55E3D2ED; Tue, 25 Feb 2020 10:44:15 +0000 (GMT)
Received: from lhreml708-chm.china.huawei.com (10.201.108.57) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 25 Feb 2020 10:44:15 +0000
Received: from lhreml708-chm.china.huawei.com (10.201.108.57) by lhreml708-chm.china.huawei.com (10.201.108.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Tue, 25 Feb 2020 10:44:14 +0000
Received: from DGGEML403-HUB.china.huawei.com (10.3.17.33) by lhreml708-chm.china.huawei.com (10.201.108.57) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Tue, 25 Feb 2020 10:44:14 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by DGGEML403-HUB.china.huawei.com ([fe80::74d9:c659:fbec:21fa%31]) with mapi id 14.03.0439.000; Tue, 25 Feb 2020 18:44:09 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXrx8T4XASZFvhaQAqg95m5Nqbs3A==
Date: Tue, 25 Feb 2020 10:44:08 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E358B@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAAD4E358Bdggeml511mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/aJX0Ix62leVDddct0oMYTVkKEtc>
Subject: Re: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 10:44:25 -0000

--_000_B8F9A780D330094D99AF023C5877DABAAD4E358Bdggeml511mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAAD4E358Bdggeml511mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAAD4E358Bdggeml511mbxchi_--


From nobody Tue Feb 25 04:10:02 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 983183A0AC7; Tue, 25 Feb 2020 04:10:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level: 
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FPi7r8+/; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=tC4Pw2Nh
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HpYlIPZ4JLKh; Tue, 25 Feb 2020 04:09:58 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10E833A0AC6; Tue, 25 Feb 2020 04:09:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=52084; q=dns/txt; s=iport; t=1582632598; x=1583842198; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=00xKoYf+NYnGMpGFcRtbgPG9fYjKfjuyh+Fvn3R0upI=; b=FPi7r8+/9V/geyiwIQC7ClzqN4ZCYcRboCiftR7ZxVVhBTlycSSsh7Hl llNsAfE+vKSL+oqxMKeVeYCcLOpJwcaMhnTX4FOirMCh9S1ASRAPfTKvk 3lQbgXyRHz+EnxHrfWLdys1d13065Z6BLEqJDs48C2I/PfMkp7Td4TKTn g=;
IronPort-PHdr: =?us-ascii?q?9a23=3ALkLvgh9t839ul/9uRHGN82YQeigqvan1NQcJ65?= =?us-ascii?q?0hzqhDabmn44+8ZB7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUER?= =?us-ascii?q?oMiMEYhQslVdSaCEnnK/jCZC0hF8MEX1hgrDm2?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ArEwBiDVVe/4QNJK1lGwEBAQEBAQE?= =?us-ascii?q?FAQEBEQEBAwMBAQGBe4ElLyQFJwVsWCAECyoKhAqDRgOKcTOCLJgUgUKBEAN?= =?us-ascii?q?UCQEBAQwBAR8OAgQBAYRAAhc1AQSBLSQ4EwIDDQEBBQEBAQIBBQRthTcMgim?= =?us-ascii?q?DOgEBAQEDEhEKEwEBNwEPAgEGAg4DAQMBASEBBgMCAgIwFAMGCAEBBAENBQg?= =?us-ascii?q?agwWBfU0DLgEOkU+QZwKBOYhidYEygn8BAQWFCBiCDAMGgTiLfiYagUE/gRF?= =?us-ascii?q?HgU5+PoJkAQEDgUkBAhgrCYJbMoIskGWFcJlFCoI8h1GPMIJJiBuETot8jnC?= =?us-ascii?q?BTYcvkksCBAIEBQIOAQEFgWkiKoEFCx5wFRohgmxQGA2OHYEnAQmCQoUUhUF?= =?us-ascii?q?0gSmLSQEnBIEHATBfAQE?=
X-IronPort-AV: E=Sophos;i="5.70,484,1574121600";  d="scan'208,217";a="436576530"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Feb 2020 12:09:56 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 01PC9uCw004483 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 25 Feb 2020 12:09:56 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 06:09:56 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 06:09:55 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 25 Feb 2020 06:09:55 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TVkVZK5IOqCugFKsVmaGGrfxK28jYjnKYUVbviaGQ1vcOhDgTkQ4PwHDxx/xvOmIFxdyRNCr+l6TzjKpEKjQ+9xnUfAQEeeEsAysHJZMb4lmDEhVNRw/Ehq2zFEqx8pmo7KrpPZLYriDrdBfN5cNfQIFdgnuSGuM/1fnCP/N3Vg5Pcyty8H/2vS/egLN6lryIMChFXbM30B30SvHlCMcYFSwpDZxVrfMi+DDdHY1XiHyhYVbsJTJACEF9ip8ngB8CefcWwOObhjJya9+RKy8mg45tgE6wwmH07FjY3nVeSixMEv2UFvUBGQSLRgLvX18S/qhp8z1LGMIjnQuUfwT6A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=00xKoYf+NYnGMpGFcRtbgPG9fYjKfjuyh+Fvn3R0upI=; b=RdfXWPz+ybZKEcIEAEYxjPUDvrNDzielWVIMwo0lsEOtHDDJ6OFCXbnGKGLRhxDaSKlHcxlwEc29NXXwFemXQygY+So2SHocFPIWWRG2XNakaMrrEqSLFs/gtwpgd+bLDuvXGg7B63lcoOF0lWu5ylm5OSPv2V2JbeiQRMK1Io9Wch0ehjoB+fZuzmcb0Ug+IDhy+aBPWFxx/eXvTKukUamMcJBUVZlll6OtjRwB6PLZ0tuTeskXFevaUE5x6kHmouo6F4jm4dpZVnUJO+NgBg/TI50imMBWklewHSRe+cB8/K6KOWJtjf9Dg5PotAckNWmgJ9I324d9yHaakvl39Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=00xKoYf+NYnGMpGFcRtbgPG9fYjKfjuyh+Fvn3R0upI=; b=tC4Pw2NhnvfbZqvWowUZlGqTTHC+Lq2Vlto+jrfpyu+GDtyTaR2veseJNLErV38vX0FycRQq7CHxscrMSCcBPaFKRzANzXd+OrkC30tFrtkn/XvgnSDC9Q5CvC1xbfbj+VpVc56Q38DHcK6hJLMIJRyOHNju7o9mUnHztmo5s5w=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB3920.namprd11.prod.outlook.com (2603:10b6:208:153::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Tue, 25 Feb 2020 12:09:54 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 12:09:54 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXrx8T4XASZFvhaQAqg95m5Nqbs3AAAeXoQ
Date: Tue, 25 Feb 2020 12:09:53 +0000
Message-ID: <MN2PR11MB4366041A8FC032069867EA7CB5ED0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E358B@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E358B@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.55]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bac86117-50e9-4ff3-4846-08d7b9eb9f95
x-ms-traffictypediagnostic: MN2PR11MB3920:
x-microsoft-antispam-prvs: <MN2PR11MB39202B12DD5B5ABB46095DB0B5ED0@MN2PR11MB3920.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(346002)(39860400002)(376002)(136003)(366004)(199004)(189003)(86362001)(4326008)(66946007)(55016002)(64756008)(66446008)(110136005)(76116006)(5660300002)(66556008)(316002)(66476007)(52536014)(9686003)(2906002)(186003)(33656002)(478600001)(8676002)(81166006)(81156014)(7696005)(8936002)(71200400001)(9326002)(6506007)(53546011)(26005)(21314003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3920; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: Ut5yd1SbMSV2xMU3Y8C/a6fJTnvunAGRoAT55RkLfY6/ijvEPfemLCpUtDpK/NIIpu+GdCsJByT3pRB6lRqCyLno1XdJrkT39h8/vscPoDvP+uPcbanLFaDojcgxp3Ah+KHY2TLu2s6pcscTQC9ozg==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR11MB4366041A8FC032069867EA7CB5ED0MN2PR11MB4366namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: bac86117-50e9-4ff3-4846-08d7b9eb9f95
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 12:09:54.0749 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GIcB/H9Rm39gXofne91pP0MrQkpgZ2lajGfxVto9PW2oS7WNvlyEO9rrD7EyZ52GjuozVN8Ru1AOmUSMQzoe7A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3920
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/j_rUTk547wBnBRlaF05suXB-eaM>
Subject: Re: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 12:10:01 -0000

--_000_MN2PR11MB4366041A8FC032069867EA7CB5ED0MN2PR11MB4366namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366041A8FC032069867EA7CB5ED0MN2PR11MB4366namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_MN2PR11MB4366041A8FC032069867EA7CB5ED0MN2PR11MB4366namp_--


From nobody Tue Feb 25 04:12:22 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5ECA3A0AD0; Tue, 25 Feb 2020 04:12:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xns0m7YDPaVA; Tue, 25 Feb 2020 04:12:18 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC2AA3A0ACE; Tue, 25 Feb 2020 04:12:17 -0800 (PST)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 3BF8FEB07CD2F3543EDF; Tue, 25 Feb 2020 12:12:14 +0000 (GMT)
Received: from DGGEML402-HUB.china.huawei.com (10.3.17.38) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 25 Feb 2020 12:12:13 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by DGGEML402-HUB.china.huawei.com ([fe80::fca6:7568:4ee3:c776%31]) with mapi id 14.03.0439.000; Tue, 25 Feb 2020 20:12:10 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "draft-ietf-netmod-factory-default@ietf.org" <draft-ietf-netmod-factory-default@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
CC: Warren Kumari <warren@kumari.net>
Thread-Topic: [Incoming] AD review of draft-ietf-netmod-factory-default-12
Thread-Index: AdXr1LMZoZ2z9KUZRNWHqOAQQrQ0Sw==
Date: Tue, 25 Feb 2020 12:12:10 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E35E3@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAAD4E35E3dggeml511mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/DzlK8iRSgBFhfOqyXH71AqdFvKM>
Subject: Re: [netmod] [Incoming] AD review of draft-ietf-netmod-factory-default-12
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 12:12:21 -0000

--_000_B8F9A780D330094D99AF023C5877DABAAD4E35E3dggeml511mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAAD4E35E3dggeml511mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_B8F9A780D330094D99AF023C5877DABAAD4E35E3dggeml511mbxchi_--


From nobody Tue Feb 25 04:36:05 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 97A5C3A08E0; Tue, 25 Feb 2020 04:35:58 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.118.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158263415852.15580.5789396939636577371@ietfa.amsl.com>
Date: Tue, 25 Feb 2020 04:35:58 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/kigG9oslOE5IhoUcz8ZrmFcmr8Y>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 12:35:59 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : A YANG Data Model for Factory Default Settings
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-13.txt
	Pages           : 12
	Date            : 2020-02-25

Abstract:
   This document defines a YANG data model to allow clients to reset a
   server back to its factory default condition.  It also defines a
   "factory-default" datastore to allow clients to read the factory
   default configuration for the device.

   The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) defined in RFC 8342.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-13
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-13

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-13


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/



From nobody Tue Feb 25 04:39:02 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 223C43A08F3 for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 04:39:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iq-HcNgLfUVW for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 04:38:59 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7D9423A08E8 for <netmod@ietf.org>; Tue, 25 Feb 2020 04:38:59 -0800 (PST)
Received: from LHREML712-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 0CD55C8E800AEBEE8BC2 for <netmod@ietf.org>; Tue, 25 Feb 2020 12:38:58 +0000 (GMT)
Received: from DGGEML405-HUB.china.huawei.com (10.3.17.49) by LHREML712-CAH.china.huawei.com (10.201.108.35) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 25 Feb 2020 12:38:57 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by dggeml405-hub.china.huawei.com ([10.3.17.49]) with mapi id 14.03.0439.000; Tue, 25 Feb 2020 20:38:50 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXr2IMAD0g3SlFzSkOFaoDGbtP2GQ==
Date: Tue, 25 Feb 2020 12:38:50 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E3635@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/_wty9BOFdZIC0wQPkbgOUivIajg>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 12:39:01 -0000
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From nobody Tue Feb 25 10:01:43 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 930363A123F for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 10:01:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level: 
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GdQkUWm+; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=mOyjZBYi
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gZzeu3mGxXcM for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 10:01:38 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93F6C3A1248 for <netmod@ietf.org>; Tue, 25 Feb 2020 10:01:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5938; q=dns/txt; s=iport; t=1582653698; x=1583863298; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=GdQkUWm+AZURP1OWg0ePqJ8VySjHUWA2o+TRtbOtrwm/hobsFRILMtGA PyIY25wSDrwB7K7FtfK6vPs7xFSWMfJer+j0x6g/lQmmK3ZQHZvTgN8Dh dwjRNwnO3LpfN8hPyrbDFYTFXQSki+Nu3aobtxvWi2d70AKqqii5W619o U=;
IronPort-PHdr: =?us-ascii?q?9a23=3Al7U70BfOtty5DZDfecNBU0QrlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwGRD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFn?= =?us-ascii?q?pnwd4TgxRmBceEDUPhK/u/dTM7GNhFUndu/mqwNg5eH8OtL1A=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0B4DwCrX1Ve/5hdJa1lHgELHINPUAV?= =?us-ascii?q?sWCAECyoKhAqDRgOKc06CEZgUgUKBEANUCQEBAQwBARgNCAIEAQGDe0UCF4F?= =?us-ascii?q?nJDgTAgMNAQEFAQEBAgEFBG2FNwyFYwEBAQEDAQEQEREMAQEsDAsEAgEGAg4?= =?us-ascii?q?DAQMBAQMCIwMCAgIlCxQBAgYIAQEEARIIARmDBYJKAy4BDpI1kGcCgTmIYnW?= =?us-ascii?q?BMoJ/AQEFgS8BAwIOQYMGGIIMCYEOKowkGoFBP4ERR4JMPoJZCwEBAQEBARi?= =?us-ascii?q?BLwEBAhiDDzKCLJBlnzUKgjyHUY8wgkl9hx6ETot8jnCBTYcvhTCNGwIEAgQ?= =?us-ascii?q?FAg4BAQWBaSKBWHAVGiGCbAlHGA2OHYNzhRSFQXQCgSeLGgEnBIEHAYEPAQE?=
X-IronPort-AV: E=Sophos;i="5.70,485,1574121600"; d="scan'208";a="436836979"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Feb 2020 18:01:36 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 01PI1a2m002272 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 25 Feb 2020 18:01:36 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 12:01:35 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 25 Feb 2020 13:01:35 -0500
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 25 Feb 2020 12:01:35 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DSNSXdUhPcrc9SgE2mkmBShsuG9x3sUe2QNA2fZExaEkVDJ3ozgUQ1O51g4Zr/A+jyxQpsDtfGAIG56cCIANRt7RSepGPIqbJsD4ad17Nd8JbRBDKHjHqIDNj9zbwxSyYaJWwbFKYz3sJxle/cTLh5kuzR3WUmaPloYUBz2t+8pN62uTLBkebCclY98F1wMmVs0ofAZmxlVxxCaT5Dsk8lBFb4ZezcULbPRCnRjdXsssnrPpgDfYUzTW/TSb+Sg3h4H9RpRIMky5s+5Cloc8+Pqgkfn5dMjvZyeKKe46+XTfD6n6c9psDhe+naPE6rdc2327joS2Y0w3Bw5ocq7m5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=WiKM79chFpbIZP/lOACmePnrC9qOGbBFgAM+XlM5EtyZ4I3Nifo/HaePrfESic4Bwpw79ZyCRY1ilJoYK0fQdJnkTexcElf7+bN9JIE61uPx6ZG+aXLjfGLZytnyeLUhIoIRuykRn1uFOaINOak1rpL9rCeJLkCBc1T52gBK2aWok5MCAsx7K/NSRYlCYrct1a2MsCanXmonOF7mbeCNtPNSYZsVTWfUpOaBJK2UO7iqDWZJMe32Q+sUMhjMNbpD7uTZ5TjK8XMknMaJYGk5xV/3GXptZKulgQlvFORK1h3hRcXqHwNXW5Ea0SHexHFLTtlsSS8/YyZXqCKEzqJX4g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t09idkWs0h/SLXzDu3omFHPxHRu7SQjT0nYUVJgvtbQ=; b=mOyjZBYi3EJDtntfEAIbQ9MfxBwUyOAbGDl1ffKjS9wtmTn133jwUL6+Fk2FX27UKOuXzJOceXIYC/uvIswbST/RYaECTSteo/X7gK+g4xjVN6NpOqWetUDyajEMEgwoFBtzod0mDkMpUwKqoWBbPPeojNCVtpVJ8DxYphrW9pk=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB3967.namprd11.prod.outlook.com (2603:10b6:208:13d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.17; Tue, 25 Feb 2020 18:01:34 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Tue, 25 Feb 2020 18:01:34 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXr2IMAD0g3SlFzSkOFaoDGbtP2GQAKuw9Q
Date: Tue, 25 Feb 2020 18:01:33 +0000
Message-ID: <MN2PR11MB4366AC76CCE57CFCE7B3A620B5ED0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E3635@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E3635@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.55]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 99d3ff11-c563-4fe0-06d6-08d7ba1cc012
x-ms-traffictypediagnostic: MN2PR11MB3967:
x-microsoft-antispam-prvs: <MN2PR11MB39677421BA8BB05F8FF1B24DB5ED0@MN2PR11MB3967.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(39860400002)(376002)(366004)(396003)(346002)(189003)(199004)(66574012)(81156014)(110136005)(5660300002)(33656002)(316002)(2906002)(8676002)(966005)(478600001)(71200400001)(8936002)(81166006)(6506007)(66556008)(64756008)(76116006)(52536014)(26005)(55016002)(186003)(66946007)(66446008)(66476007)(7696005)(53546011)(86362001)(9686003); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3967; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: E3EaA6QCqlxlsLLqVIZc+wKJFwGpppA6I05mVn+7BDt//kzzUoRJypXh530idjBpIMq0a6iDvvmiyWGw0KaZr72NOTcmHBD3XjoQaD85pl9Xc0AzpwOH1vGsSDPWrs5XS1PwfmAm/TOOKv7hiTsdvw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 99d3ff11-c563-4fe0-06d6-08d7ba1cc012
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 18:01:33.7843 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EErKplLU4cwaep1oITueld0AkGnvL+2BIc/P4E4m9hVLdf0iFP0E2Aimmy0Vb4mnJLraLzLrn8mvqPnlq6zdkQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3967
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ZxaKycuZuTvT4nom_IhpbJ-k1n4>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 18:01:42 -0000
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From nobody Tue Feb 25 12:01:14 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FBEA3A14F7 for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 12:01:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hT02DiBTy3EV for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 12:01:03 -0800 (PST)
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2128.outbound.protection.outlook.com [40.107.220.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A449E3A1532 for <netmod@ietf.org>; Tue, 25 Feb 2020 12:01:03 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XGILIz6E5piu5M4/LgKLoPXSjm6+4oXdx0OdX7IS4jakOOjzT1LUJP8ddG5SzP4t2CUMi9WDiNYGXSDKerxJhWl3EJrHU/x+y6DwiemjE78Ck9xM+6fsrkvKon55bWn6wi+88K2n0CsOBGN4uT0QZ+vDImagGEJkaLXYuAuTZweHneYzX0wS/ix4TtBFvKbQwYbVPkpMW9JGKWYA9Omz0+htDfa8vN+ANBbH2QnDROjyVJqK/VLYoqRlCvEx+AQVg9S3c0DYySrpJb4O7CWWOqMTgBXIrtwzJ64blarQFhDlPDTqpawBB/zCyWvillVPM2NsxmsmnY5BSWQEbxhcew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ULWca8l8io4ul2n/5uXTR4ncRHDNAzBSZ3u8esKuehc=; b=ZcYqJ7O+xRTQ9qLrARb052uwCZkhAe+lRV05bgJmQMqMZZXWGG7ajDjbJ37F2scbfQs56rEPWNSY8vJqtKHPUMNriIcjBJjGcyfi0h8GpSPU6BU4zUN+MLYxyCoDb6CnE12dszqzNfbR2lHJRg7HEXCP1y6KnQkWzCTdUoLnSRDBswZ0Cd5BS47AQ4fx4UACTeTRKc1CEQ6+yCLvWy9R8xPMaQZ2CBvmHvXbqqWk3Do/utpAcGQRJoEpW0hKJyKvMoBlkYkE49vgx8lONumYoiX0YPJ4eKAexHuX8JvlR7kgdJGSiWolua16EpaMvwQtWi4UdWFb8Eo3HCBCLBPObA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ULWca8l8io4ul2n/5uXTR4ncRHDNAzBSZ3u8esKuehc=; b=n1KRbCUzWWA0DJzxae2RPDdJlxpcuTwU7EPA31tzCobA9pmCJQpry7ZRml2nxj1eLrLD9aSu0AbdVSgWGNylcFtFqwp8L3xR+EeLc0UCdORVT1tNQa7jMtdU51N6Ed1jjxadCV0eWfb4wrFAKj3RD0j/oq7bCskgSf2d+BNRcWQ=
Received: from BY5PR13MB3300.namprd13.prod.outlook.com (2603:10b6:a03:1ae::21) by BY5PR13MB3876.namprd13.prod.outlook.com (2603:10b6:a03:22c::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.14; Tue, 25 Feb 2020 20:01:01 +0000
Received: from BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385]) by BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385%3]) with mapi id 15.20.2772.012; Tue, 25 Feb 2020 20:01:01 +0000
From: Alexander Clemm <alex@futurewei.com>
To: Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5nqyUkhN2CSKkkal6VOj9CUTx6gsVb8w
Date: Tue, 25 Feb 2020 20:01:01 +0000
Message-ID: <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>
In-Reply-To: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0f7500eb-9cff-40a1-3042-08d7ba2d704b
x-ms-traffictypediagnostic: BY5PR13MB3876:
x-microsoft-antispam-prvs: <BY5PR13MB3876B0006378E207B44D9586DBED0@BY5PR13MB3876.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(39850400004)(376002)(136003)(396003)(346002)(189003)(199004)(6506007)(478600001)(53546011)(26005)(66446008)(66476007)(66556008)(64756008)(186003)(52536014)(5660300002)(7696005)(9686003)(966005)(55016002)(76116006)(86362001)(66946007)(81156014)(9326002)(8936002)(71200400001)(8676002)(81166006)(110136005)(316002)(2906002)(33656002)(554374003); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB3876; H:BY5PR13MB3300.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 6q/FfQOOzPujBL/rYXo9lRRWHzGIgJXKBQ6e47f9kRj4LQGgk/vZrCvSlWEHaSJ2KWGoYxycDidV5SJfzK25MkpOVJg/1YlJ8ePCaqmjLnJ/TFJcxiex1BVNnOkhmxRPAHiusoxqJc1WMSr9Jxm5YA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR13MB3300D2B430DF7958503A3D05DBED0BY5PR13MB3300namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f7500eb-9cff-40a1-3042-08d7ba2d704b
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 20:01:01.4765 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Clkcy/kflVm11vAGnMEm0gSCNxCRBgIqFzrHGIEdWOBsecNCoiz4t7P0Dt7iF5H/ulEVt2nqWNJ1RZp1RwUdIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3876
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/J7WK4wyJnbFQzC1JKmN-1UtH2Eg>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 20:01:13 -0000

--_000_BY5PR13MB3300D2B430DF7958503A3D05DBED0BY5PR13MB3300namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BY5PR13MB3300D2B430DF7958503A3D05DBED0BY5PR13MB3300namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQph
OmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xv
cjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0Kc3Bhbi5FbWFpbFN0eWxlMTkN
Cgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtY29tcG9zZTsNCglmb250LWZhbWlseToiQ2FsaWJy
aSIsc2Fucy1zZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21z
by1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29y
ZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBp
biAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi0tPjwv
c3R5bGU+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6ZXh0PSJl
ZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBndGUgbXNv
IDldPjx4bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2OmV4dD0i
ZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0tLT4NCjwv
aGVhZD4NCjxib2R5IGxhbmc9IkVOLVVTIiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxlIj4NCjxk
aXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5IaSw8bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+SSBzdXBwb3J0IHRoaXMgZHJhZnQgYW5kIHdvdWxkIGxpa2UgdG8g
c2VlIG5ldG1vZCB3b3JrIG9uIHRoaXMsIGJ1dCBJIGRvIHRoaW5rIHNvbWUgYXNwZWN0cyBuZWVk
IG1vcmUgbWF0dXJpbmcgYW5kIHBhcnRzIG9mIHRoaXMgcHJvYmFibHkgc2hvdWxkIGJlIHJlc2Nv
cGVkLiZuYnNwOyBTaG91bGQgdGhlIGRyYWZ0IGJlIGFkb3B0ZWQgbm93LCBvciBzaG91bGQgaXQg
YmUgaW1wcm92ZWQgZmlyc3QgYW5kIGFkb3B0ZWQgbGF0ZXI/Jm5ic3A7DQogTm90IHN1cmUuICZu
YnNwO0kgd291bGQgbGlrZSB0byBzZWUgdGhlIHdvcmsgY29udGludWUsIHNvIGluIHRoYXQgc2Vu
c2UgSSB3b3VsZCBjbGVhcmx5IGxpa2UgdG8gc2VlIHRoZSB3b3JrIGFkb3B0ZWQ7IGF0IHRoZSBz
YW1lJm5ic3A7IHRpbWUgdGhlcmUgYXJlIGEgbnVtYmVyIG9mIGlzc3VlcyB0aGF0IElNSE8gcmVh
bGx5IG5lZWQgdG8gYmUgYWRkcmVzc2VkLiZuYnNwOw0KPG86cD48L286cD48L3A+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
Pkkgc2hhcmUgc29tZSBvZiB0aGUgY29uY2VybnMgcmFpc2VkIGJ5IEp1ZXJnZW4gYW5kIEFuZHku
Jm5ic3A7IFNwZWNpZmljYWxseSwgSSB0aGluayB0aGUgcHJlY2lzZSBwcm9ibGVtIG5lZWRzIHRv
IGJlIGRlZmluZWQgbW9yZSBjbGVhcmx5LiZuYnNwOyBJbiB0aGUgZGlzY3Vzc2lvbiBpdCB3YXMg
bWVudGlvbmVkIFJNT04g4oCTIHdvdWxkIGl0IGJlIHRoYXQsIG9yIHBlcmhhcHMgYSBiZXR0ZXIg
YW5hbG9neSBFdmVudCBNSUI/Jm5ic3A7IFNlY3Rpb24NCiAzIG1lbnRpb25zIHRoYXQgdGhpcyBp
cyB0byBzcGVjaWZ5IHRyaWdnZXIgY29uZGl0aW9ucyBmb3Igd2hlbiB0byBzZW5kIHB1c2ggdXBk
YXRlcy4gJm5ic3A7VGhhdCBpcyBwZXJoYXBzIGNvbnNpc3RlbnQgd2l0aCBhbiBFdmVudCBNSUIs
IGJ1dCBhIHNsaWdodGx5IGRpZmZlcmVudCBwcm9ibGVtIGZyb20gRUNBcy4mbmJzcDsgU2VjdGlv
biA0LjIgdGhlbiBwcm9jZWVkcyB0byBhbGxvdyBmb3IgdGhlIGRlZmluaXRpb24gb2Yg4oCcZXZl
bnRz4oCdIOKAkyBidXQgcmVhbGx5DQogb25seSBkZWZpbmluZyBhIOKAnHRpbWVyIGV2ZW504oCd
LCB3aXRoIHRoZSBFQ0EgbW9kZWwgb21pdHRpbmcgdGllLWluIGUuZy4gd2l0aCBub3RpZmljYXRp
b25zLiZuYnNwOyBJbmNsdWRpbmcgYSB0aHJlc2hvbGQgbWVjaGFuaXNtIGhlcmUgaXMgYSBiaXQg
ZGlzdHJhY3RpbmcgYW5kIHNob3VsZCBwZXJoYXBzIGJlIHRha2VuIG91dCDigJMgd2hpbGUgdGhl
IGNyb3NzaW5nIG9mIGEgdGhyZXNob2xkIG1pZ2h0IGNvbnN0aXR1dGUgYW4gZXZlbnQsIEkgZG9u
4oCZdCB0aGluaw0KIHRoaXMgc2hvdWxkIGJlIHRpZWQgaW5zaWRlIGFuIEVDQSBidXQgYmUgc29t
ZXRoaW5nIHRoYXQgc3RhbmRzIG9uIGl0cyBvd24uJm5ic3A7IChUaGUgcHJpb3IgZHJhZnQgb24g
U21hcnQgRmlsdGVycyBmb3IgUHVzaCBVcGRhdGVzIGFkZHJlc3NlZCB0aGlzIOKAkyBpdCBoYXMg
bGF5ZWQgZG9ybWFudCBmb3IgYSB3aGlsZSBhbmQgaW4gdGhpcyBzZW5zZSBJIGNhbuKAmXQgb2Jq
ZWN0IGZvciB0aGlzIHdvcmsgdG8gYmUgcGlja2VkIHNvbWVwbGFjZSBlbHNlLCBidXQNCiBsb2dp
Y2FsbHkgcmVhbGx5IGl0IGRvZXMgbm90IGJlbG9uZyBoZXJlIGJ1dCBzaG91bGQgYmUgc2VwYXJh
dGUuKSZuYnNwOyBUaGUgYWN0aW9ucywgZmluYWxseSwgZGVzY3JpYmUgbm90IHNpbXBseSBtYW5h
Z2VtZW50IG9wZXJhdGlvbnMuJm5ic3A7IEkgdW5kZXJzdGFuZCB0aGUgaW50ZW50IGlzIHRvIGhh
dmUgYW4gZXNjYXBlIG1lY2hhbmlzbSBhbGxvd2luZyB0byDigJxjYWxsIG91dOKAnSBvdGhlciBm
dW5jdGlvbnMgLyBzY3JpcHRzIGRlcGxveWVkIGF0IGEgZGV2aWNlLA0KIGJ1dCB0aGlzIGludGVu
dCBuZWVkcyB0byBiZSBjYWxsZWQgb3V0IG1vcmUgY2xlYXJseS4mbmJzcDsgPG86cD48L286cD48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPlNvLCBpbiBzdW1tYXJ5LCBJIHRoaW5rIHRoZSBXRyBzaG91bGQgY29uc2lk
ZXIgcmVzY29waW5nIHRoaXMgZHJhZnQgYSBiaXQg4oCTIG1heWJlIGRpdmlkZWQgaW50byBzZXBh
cmF0ZSBkcmFmdHMsIGVhY2ggYWRkcmVzc2luZyBhIHNlcGFyYXRlIGNvbmNlcm4sIHdoaWNoIHdp
bGwgcHJvdmlkZSBmb2N1cyBhbmQgbWFrZSB0aGUgcHJvYmxlbSBiZWluZyBzb2x2ZWQgY2xlYXJl
cjombmJzcDsgT25lIHRvIGRlZmluZSBhbiBFQ0ENCiBmcmFtZXdvcmsuICZuYnNwO0luIHRoaXMs
IGNsYXJpZnkgdGhlIGludm9jYXRpb24gb2YgYWN0aW9ucywgYW5kIGFsbG93IGZvciB0aWUtaW4g
b2Ygbm90aWZpY2F0aW9ucy4mbmJzcDsgVGhpcyB3b3VsZCBiZSB0aGlzIGRyYWZ0LiZuYnNwOyBB
bm90aGVyIG9uZSB0byBhbGxvdyB0aGUgZGVmaW5pdGlvbiBvZiBjdXN0b20gZXZlbnRzL25vdGlm
aWNhdGlvbnMsIG9yIHNtYXJ0IGZpbHRlcnMgZm9yIHB1c2ggdXBkYXRlcy4mbmJzcDsgKFdlIHNo
b3VsZCBicmluZyBiYWNrIHRoZSBlYXJsaWVyDQogZHJhZnQuKSZuYnNwOyBBIHRoaXJkIG9uZSB0
byBwZXJoYXBzIGFsbG93IGZvciB0aGUgZGVmaW5pdGlvbiBvZiDigJxjdXN0b20gUlBDc+KAnSB0
aGF0IGFsbG93IHRvIGludm9rZSBjdXN0b20gc2NyaXB0cy9mdW5jdGlvbnMgdmlhIE5ldGNvbmYv
UmVzdGNvbmYgb3BlcmF0aW9ucywgdGhlbiB0aWUgdGhhdCAsIHdoaWNoIGFyZSB0aGVuIGludm9r
ZWQgdXNpbmcgdGhlIHJlZ3VsYXIgUlBDLiZuYnNwOyAoVGhpcyB3b3VsZCBiZSBhIG5ldyBkcmFm
dCkmbmJzcDsNCjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJz
cDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4tLS0gQWxleDxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2IHN0eWxl
PSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCBibHVlIDEuNXB0O3BhZGRpbmc6MGluIDBp
biAwaW4gNC4wcHQiPg0KPGRpdj4NCjxkaXYgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci10b3A6
c29saWQgI0UxRTFFMSAxLjBwdDtwYWRkaW5nOjMuMHB0IDBpbiAwaW4gMGluIj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiPjxiPkZyb206PC9iPiBuZXRtb2QgJmx0O25ldG1vZC1ib3VuY2VzQGlldGYu
b3JnJmd0OyA8Yj5PbiBCZWhhbGYgT2YNCjwvYj5Kb2VsIEphZWdnbGk8YnI+DQo8Yj5TZW50Ojwv
Yj4gVHVlc2RheSwgRmVicnVhcnkgMTgsIDIwMjAgODo0NCBBTTxicj4NCjxiPlRvOjwvYj4gbmV0
bW9kQGlldGYub3JnPGJyPg0KPGI+U3ViamVjdDo8L2I+IFtuZXRtb2RdIEFkb3B0aW9uIHBvbGwg
Zm9yIGRyYWZ0LXd3eC1uZXRtb2QtZXZlbnQteWFuZzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8
L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5UaGlzIGVtYWlsIGJlZ2lucyBhIDIgd2VlayB3
b3JraW5nIGdyb3VwIGFkb3B0aW9uIHBvbGwgZm9yOiA8bzpwPg0KPC9vOnA+PC9wPg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQo8YSBocmVmPSJodHRwczovL25hbTAz
LnNhZmVsaW5rcy5wcm90ZWN0aW9uLm91dGxvb2suY29tLz91cmw9aHR0cHMlM0ElMkYlMkZ0b29s
cy5pZXRmLm9yZyUyRmh0bWwlMkZkcmFmdC13d3gtbmV0bW9kLWV2ZW50LXlhbmctMDYmYW1wO2Rh
dGE9MDIlN0MwMSU3Q2FsZXglNDBmdXR1cmV3ZWkuY29tJTdDZmM0OTMxMmYwODJkNDBkN2MwNzkw
OGQ3YjQ5MWQyZjYlN0MwZmVlOGZmMmEzYjI0MDE4OWM3NTNhMWQ1NTkxZmVkYyU3QzElN0MwJTdD
NjM3MTc2NDEwNzI0NzIwOTE2JmFtcDtzZGF0YT1Sb3dLdkxrbCUyQlVvUjlIMThOczNBWCUyRiUy
RmUlMkZ6dTV0JTJGcVltQlZFTkVkaVBjVSUzRCZhbXA7cmVzZXJ2ZWQ9MCI+aHR0cHM6Ly90b29s
cy5pZXRmLm9yZy9odG1sL2RyYWZ0LXd3eC1uZXRtb2QtZXZlbnQteWFuZy0wNjwvYT48bzpwPjwv
bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxicj4NCjxicj4N
CjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+UGxl
YXNlIHZvaWNlIHlvdXIgc3VwcG9ydCBvciBvYmplY3Rpb25zIGJlZm9yZSB0aGUgcG9sbCBjb21w
bGV0ZXMgb24gTWFyY2ggM3JkLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PGJyPg0KPGJyPg0KPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPlRoYW5rczxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCI+am9lbDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjwv
ZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_BY5PR13MB3300D2B430DF7958503A3D05DBED0BY5PR13MB3300namp_--


From nobody Tue Feb 25 12:17:21 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CF733A1519; Tue, 25 Feb 2020 12:17:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id heekK-bONhnk; Tue, 25 Feb 2020 12:17:18 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2133.outbound.protection.outlook.com [40.107.237.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 895BC3A1517; Tue, 25 Feb 2020 12:17:18 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DiIdmtlYhx5ViyZJidtKvHzV9Z+r6w4Jks3C6/JuM3r+xtUyRbm95svHWMkRnlTSHJxJQ6QwjxEj5rDcO5SR++xYPGcux+Ilpvzf1lssLA/nVdZ3gkVrIxpZIl2b4mjFfnnyRYzY5itoBOv3sOF7P8phAPPzShkUYe/F4qZjzfJGO94byx2aiILxNC16pnpGogX2796Juv2VoUff89ORKzgIDtI2UhHVh/kVq+/185GcrxF7jYEQb2nUh1MCH7JgtxGXGze5bBxhFmAKc3acjE809poZB54jTUQW+oRXifBbdK5rHl4DPSt/ONbcD0mO0PV3YC4Y3w1IbT60uYdMZw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l8QNglUkO32lj88enygly0Pm2qyR757Y4hLCYwa4FsI=; b=QfjHaKKd+3llpZvh5uNaBsEa6nUBaBtuWJn4+QTgauFD9c9Mk1Jw1ajBOOBymVgWZkD4EUwp2OpM/Cz37dyVNfI8mG+g51nwKU4gdUFppLdfmO6dH6SQ0j6aexudAGgEZdBtu0Bmyk56RlMffm13paIXbgx4vvo3a+44JRZtctJNZZP3cesRdYopexi4S7c6sALuiAhGqYyuIDXohlbVHftg5Zdk8Q0s7S4aFWLC0ZFK3kkPPjWGKAzKFLViDy1TwqF/6UP18NWeTtvu5O0vnS3XUgrl99uaq5IbCflvXPalkjOoOQdl2ndntTyDgsZTo9fo4lNypRAKozjqvDDFFw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l8QNglUkO32lj88enygly0Pm2qyR757Y4hLCYwa4FsI=; b=AUpzYqBABCjaT5CL7S4/p3MDtLMXNKJ2egU7T7JrE4DbHXwfPGp5acEjQCiYgSkzj4e5WtYlzlqjs+Q4yL/QE9I4AxZdK4rUSJHyVPqUIH5I1PY7PDwsMhhe78Hib20CLf/dWOAG4Tlee0WN3YrKB8kc/Soh+mH2BKHtPPMNORI=
Received: from BY5PR13MB3300.namprd13.prod.outlook.com (2603:10b6:a03:1ae::21) by BY5PR13MB3315.namprd13.prod.outlook.com (2603:10b6:a03:1a1::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.10; Tue, 25 Feb 2020 20:17:16 +0000
Received: from BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385]) by BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385%3]) with mapi id 15.20.2772.012; Tue, 25 Feb 2020 20:17:15 +0000
From: Alexander Clemm <alex@futurewei.com>
To: Joel Jaeggli <joelja@bogus.com>, "draft-ietf-netmod-nmda-diff@ietf.org" <draft-ietf-netmod-nmda-diff@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
Thread-Index: AQHV5cq3QyMLYx+hSU+9ss4veWFom6gsZHFA
Date: Tue, 25 Feb 2020 20:17:15 +0000
Message-ID: <BY5PR13MB33002F04671DBA4E4FBFC44CDBED0@BY5PR13MB3300.namprd13.prod.outlook.com>
References: <14dcbe36-43c3-0a21-4ec8-ad78019eefea@bogus.com>
In-Reply-To: <14dcbe36-43c3-0a21-4ec8-ad78019eefea@bogus.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 27f4f5b9-7693-4004-9369-08d7ba2fb505
x-ms-traffictypediagnostic: BY5PR13MB3315:
x-microsoft-antispam-prvs: <BY5PR13MB331582D62804382F96E29AB0DBED0@BY5PR13MB3315.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-forefront-prvs: 0324C2C0E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(396003)(376002)(346002)(136003)(366004)(39850400004)(199004)(189003)(8936002)(33656002)(316002)(86362001)(8676002)(52536014)(5660300002)(110136005)(81166006)(81156014)(966005)(66556008)(2906002)(66476007)(66446008)(64756008)(478600001)(6506007)(9686003)(55016002)(53546011)(45080400002)(26005)(71200400001)(66946007)(76116006)(186003)(7696005); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB3315; H:BY5PR13MB3300.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 6yUI6JaSpiQ0UUJEcLG23JZ0iXpG28eoXwdjo0QGuApTXKbODjahpWfBcTuX5xeYEdwWpcs8ANLAP7C7XBIPtwN1so8/OYJ/d6Jt+tLDO8bNOgGzGEqrTL1raWjrnDGP0qJa+XqaZX1ZNfAq3UQDdg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 27f4f5b9-7693-4004-9369-08d7ba2fb505
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Feb 2020 20:17:15.7806 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GEVZTLNj8RYG/Dt94Sb0Y3rkvKA9dl7f6cYl9tT2oF9QniqHKlrdHcSzBEfwQOZI+nFToM2jO0k6oQhgKEWZXA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3315
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/IwvvebZ39C9lP7RJE24zywMiWEE>
Subject: Re: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Feb 2020 20:17:20 -0000

WWVzLCB0aGUgSVBSIGhhcyBiZWVuIGRpc2Nsb3NlZCBpbiBjb21wbGlhbmNlIHdpdGggSUVURiBJ
UFIgcnVsZXMuICANCihCYWNrIGluIDIwMTc7IHNlZSBkYXRhdHJhY2tlcikNCi0tLSBBbGV4DQoN
Cj4gLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCj4gRnJvbTogbmV0bW9kIDxuZXRtb2QtYm91
bmNlc0BpZXRmLm9yZz4gT24gQmVoYWxmIE9mIEpvZWwgSmFlZ2dsaQ0KPiBTZW50OiBNb25kYXks
IEZlYnJ1YXJ5IDE3LCAyMDIwIDExOjQ1IEFNDQo+IFRvOiBkcmFmdC1pZXRmLW5ldG1vZC1ubWRh
LWRpZmZAaWV0Zi5vcmc7IG5ldG1vZEBpZXRmLm9yZw0KPiBTdWJqZWN0OiBbbmV0bW9kXSBkcmFm
dC1pZXRmLW5ldG1vZC1ubWRhLWRpZmYgLSBJUFIgdmVyZmljYXRpb24gcmVxdWVzdA0KPiANCj4g
QXV0aG9ycywgQ29udHJpYnV0b3JzLCBXRywNCj4gDQo+IEFzIHBhcnQgb2YgdGhlIHByZXBhcmF0
aW9uIGZvciBXRyBMYXN0IENhbGw6DQo+IA0KPiBBcmUgeW91IGF3YXJlIG9mIGFueSBJUFIgdGhh
dCBhcHBsaWVzIHRvIGRyYWZ0cyBpZGVudGlmaWVkIGFib3ZlPw0KPiANCj4gUGxlYXNlIHN0YXRl
IGVpdGhlcjoNCj4gDQo+ICJObywgSSdtIG5vdCBhd2FyZSBvZiBhbnkgSVBSIHRoYXQgYXBwbGll
cyB0byB0aGlzIGRyYWZ0Ig0KPiBvcg0KPiAiWWVzLCBJJ20gYXdhcmUgb2YgSVBSIHRoYXQgYXBw
bGllcyB0byB0aGlzIGRyYWZ0Ig0KPiANCj4gSWYgc28sIGhhcyB0aGlzIElQUiBiZWVuIGRpc2Ns
b3NlZCBpbiBjb21wbGlhbmNlIHdpdGggSUVURiBJUFIgcnVsZXMgKHNlZSBSRkNzDQo+IDM2Njks
IDUzNzggYW5kIDgxNzkgZm9yIG1vcmUgZGV0YWlscyk/DQo+IA0KPiBJZiB5ZXMgdG8gdGhlIGFi
b3ZlLCBwbGVhc2Ugc3RhdGUgZWl0aGVyOg0KPiANCj4gIlllcywgdGhlIElQUiBoYXMgYmVlbiBk
aXNjbG9zZWQgaW4gY29tcGxpYW5jZSB3aXRoIElFVEYgSVBSIHJ1bGVzIg0KPiBvcg0KPiAiTm8s
IHRoZSBJUFIgaGFzIG5vdCBiZWVuIGRpc2Nsb3NlZCINCj4gDQo+IElmIHlvdSBhbnN3ZXIgbm8s
IHBsZWFzZSBwcm92aWRlIGFueSBhZGRpdGlvbmFsIGRldGFpbHMgeW91IHRoaW5rIGFwcHJvcHJp
YXRlLg0KPiANCj4gSWYgeW91IGFyZSBsaXN0ZWQgYXMgYSBkb2N1bWVudCBhdXRob3Igb3IgY29u
dHJpYnV0b3IgcGxlYXNlIGFuc3dlciB0aGUgYWJvdmUNCj4gYnkgcmVzcG9uZGluZyB0byB0aGlz
IGVtYWlsIHJlZ2FyZGxlc3Mgb2Ygd2hldGhlciBvciBub3QgeW91IGFyZSBhd2FyZSBvZiBhbnkN
Cj4gcmVsZXZhbnQgSVBSLiBUaGlzIGRvY3VtZW50IHdpbGwgbm90IGFkdmFuY2UgdG8gdGhlIG5l
eHQgc3RhZ2UgdW50aWwgYSByZXNwb25zZQ0KPiBoYXMgYmVlbiByZWNlaXZlZCBmcm9tIGVhY2gg
YXV0aG9yIGFuZCBsaXN0ZWQgY29udHJpYnV0b3IuIE5PVEU6IFRISVMNCj4gQVBQTElFUyBUTyBB
TEwgT0YgWU9VIExJU1RFRCBJTiBUSElTIE1FU1NBR0UnUyBUTyBMSU5FUy4NCj4gDQo+IElmIHlv
dSBhcmUgb24gdGhlIFdHIGVtYWlsIGxpc3Qgb3IgYXR0ZW5kIFdHIG1lZXRpbmdzIGJ1dCBhcmUg
bm90IGxpc3RlZCBhcyBhbg0KPiBhdXRob3Igb3IgY29udHJpYnV0b3IsIHdlIHJlbWluZCB5b3Ug
b2YgeW91ciBvYmxpZ2F0aW9ucyB1bmRlciB0aGUgSUVURiBJUFINCj4gcnVsZXMgd2hpY2ggZW5j
b3VyYWdlcyB5b3UgdG8gbm90aWZ5IHRoZSBJRVRGIGlmIHlvdSBhcmUgYXdhcmUgb2YgSVBSIG9m
IG90aGVycw0KPiBvbiBhbiBJRVRGIGNvbnRyaWJ1dGlvbiwgb3IgdG8gcmVmcmFpbiBmcm9tIHBh
cnRpY2lwYXRpbmcgaW4gYW55IGNvbnRyaWJ1dGlvbiBvcg0KPiBkaXNjdXNzaW9uIHJlbGF0ZWQg
dG8geW91ciB1bmRpc2Nsb3NlZCBJUFIuIEZvciBtb3JlIGluZm9ybWF0aW9uLCBwbGVhc2Ugc2Vl
DQo+IHRoZSBSRkNzIGxpc3RlZCBhYm92ZSBhbmQNCj4gaHR0cHM6Ly9uYW0wMy5zYWZlbGlua3Mu
cHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHAlM0ElMkYlMkZ0cmFjLnRvDQo+IG9scy5p
ZXRmLm9yZyUyRmdyb3VwJTJGaWVzZyUyRnRyYWMlMkZ3aWtpJTJGSW50ZWxsZWN0dWFsUHJvcGVy
dHkmYW1wO2RhdA0KPiBhPTAyJTdDMDElN0NhbGV4JTQwZnV0dXJld2VpLmNvbSU3QzQ4YTE1MDNi
ODVjZTQ0NDdjOTMwMDhkN2IzZTFkDQo+IDczMiU3QzBmZWU4ZmYyYTNiMjQwMTg5Yzc1M2ExZDU1
OTFmZWRjJTdDMSU3QzAlN0M2MzcxNzU2NTQ5MDE5NjkNCj4gNTQ1JmFtcDtzZGF0YT0yQWVVblpD
TUxuVDRjMzRsY0FRMGo0UEFqYiUyRiUyQndBYXZrTGZjWHZwdFF2NCUzDQo+IEQmYW1wO3Jlc2Vy
dmVkPTAuDQo+IA0KPiBUaGFuayB5b3UsDQo+IE5ldE1vZCBXRyBDaGFpcnMNCj4gDQo+IFBTIFBs
ZWFzZSBpbmNsdWRlIGFsbCBsaXN0ZWQgaW4gdGhlIGhlYWRlcnMgb2YgdGhpcyBtZXNzYWdlIGlu
IHlvdXIgcmVzcG9uc2UuDQo+IA0KDQo=


From nobody Tue Feb 25 16:43:53 2020
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC0B23A09D5 for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 16:43:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.799
X-Spam-Level: 
X-Spam-Status: No, score=-1.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VjufgjcBGVox for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 16:43:50 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C44FB3A09D4 for <netmod@ietf.org>; Tue, 25 Feb 2020 16:43:49 -0800 (PST)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 7D5D184FC9192AE30D1C for <netmod@ietf.org>; Wed, 26 Feb 2020 00:43:47 +0000 (GMT)
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 26 Feb 2020 00:43:46 +0000
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0439.000; Wed, 26 Feb 2020 08:43:42 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Alexander Clemm <alex@futurewei.com>, Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5nrHEDr/EDJDMEywMeMyZUvvDagr2YmAgADRlmA=
Date: Wed, 26 Feb 2020 00:43:41 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com>
In-Reply-To: <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.108.203.162]
Content-Type: multipart/alternative; boundary="_000_BBA82579FD347748BEADC4C445EA0F21BF24EF23NKGEML515MBXchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/8Peob-BlEP8ZfIRX-n3_1xbkUNg>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 00:43:52 -0000

--_000_BBA82579FD347748BEADC4C445EA0F21BF24EF23NKGEML515MBXchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BBA82579FD347748BEADC4C445EA0F21BF24EF23NKGEML515MBXchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BBA82579FD347748BEADC4C445EA0F21BF24EF23NKGEML515MBXchi_--


From nobody Tue Feb 25 17:14:48 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C687A3A0788 for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 17:14:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id woSxH41wqnwY for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 17:14:44 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A591E3A0783 for <netmod@ietf.org>; Tue, 25 Feb 2020 17:14:43 -0800 (PST)
Received: from LHREML714-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id D7A7D22D67B8B17408E3 for <netmod@ietf.org>; Wed, 26 Feb 2020 01:14:41 +0000 (GMT)
Received: from lhreml745-chm.china.huawei.com (10.201.108.195) by LHREML714-CAH.china.huawei.com (10.201.108.37) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 26 Feb 2020 01:14:41 +0000
Received: from lhreml745-chm.china.huawei.com (10.201.108.195) by lhreml745-chm.china.huawei.com (10.201.108.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 26 Feb 2020 01:14:41 +0000
Received: from DGGEML405-HUB.china.huawei.com (10.3.17.49) by lhreml745-chm.china.huawei.com (10.201.108.195) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Wed, 26 Feb 2020 01:14:40 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by dggeml405-hub.china.huawei.com ([10.3.17.49]) with mapi id 14.03.0439.000; Wed, 26 Feb 2020 09:14:36 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXsP+leryuA4u6PTwK1QY7Ar/2/jg==
Date: Wed, 26 Feb 2020 01:14:36 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E42C7@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/uF5_8pNhD9vyp0S6ck2nA4DjlUM>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 01:14:46 -0000
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From nobody Tue Feb 25 17:33:17 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 442143A07EE; Tue, 25 Feb 2020 17:33:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B0LD7R4DJdFx; Tue, 25 Feb 2020 17:33:13 -0800 (PST)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760104.outbound.protection.outlook.com [40.107.76.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15CB63A07ED; Tue, 25 Feb 2020 17:33:12 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CFxeL3DboeiouwM5z4UslpTFNahL4ck8okylYrAZTqT8RdHrclXV26OP7rRU9uucpteiP/miO3hTBqIh0HNDq12lra8NOR3UTBf88r1P/0gRCh3/Ndm3Y1Vt7BeDUaBOA/kjv+1gMsiUqhVkkHAw7t3CC1NdtU2v+U8LqiG1PVEzqkazcsBzS8R3WeK0su8dE2AAaBIqjg0hWO5FOOtltI0MjRrKeJzsK9qOSTcuY7KbL4JImqTzO2m2a3U+en6u0vJJsYluYbpmuIP8tvXRrrWz5BcC91J+JyISVz002fvu/5mj6qDjCOkbRE8aPZFe4t6+uoNu4K6yt/HEiibi5w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dTaQGtMEug+OKWx9rXfv6NOlmoRkfJjXzOtmIXgOHPo=; b=nKatmQ/AbX2B9JR02jCfrcl2XyQXPFjowdGOAtEU6q+hYyvdr+FNr67fRI1PQwpBJMMKYGCr8bjjIaQopHYL2zGbdbHLx6z1lUHw8q/AmfN9l88Y8drVtL7uVBnYC7LBjh7/eM1wLYwc9Orri1dQBM3e3iIbvP1Hgcld72z982F5naboYGOmvdwre6CdFHy8vk+xGxFsna7cj1i/68GlLaZmi4IApLo2+WR3xsrF7jiHdiFY5b0qgAI8dp6Q5ruNmmSZ4lz/lo0S5PZ6SAxIM/0CYOyc7Y0wpEfBoYz4UxTWvJaNcpXINzD6BPTMHP64ipLjQy6kdejcwsxkHZZ7pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dTaQGtMEug+OKWx9rXfv6NOlmoRkfJjXzOtmIXgOHPo=; b=SvG727ervNlnVD4hT2UOgnhERoTzYcLz3/LECFJZnKyaskuI0Go/YDUqNKFBJDOuo9NXG9sMfncO1t+BT15I86O2W4KHc+k6+4Ucya1bYoI0i+beW6mB8bLo+NT4jDapxSmwfd4R1it27sl/Qn5RwPTOHE9xvdhbnTJHyG7PGI0=
Received: from MN2PR13MB3309.namprd13.prod.outlook.com (2603:10b6:208:15a::30) by MN2PR13MB3104.namprd13.prod.outlook.com (2603:10b6:208:136::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.5; Wed, 26 Feb 2020 01:33:08 +0000
Received: from MN2PR13MB3309.namprd13.prod.outlook.com ([fe80::e46a:4e64:29bf:8532]) by MN2PR13MB3309.namprd13.prod.outlook.com ([fe80::e46a:4e64:29bf:8532%6]) with mapi id 15.20.2772.012; Wed, 26 Feb 2020 01:33:08 +0000
From: Alexander Clemm <alex@futurewei.com>
To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>, Joel Jaeggli <joelja@bogus.com>
CC: "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
Thread-Index: AQHV5cpbkGrB2wq/g0eF4L9huLkRAqgiv8AAgAmmr5A=
Date: Wed, 26 Feb 2020 01:33:08 +0000
Message-ID: <MN2PR13MB330960834522F5BFD4012284DBEA0@MN2PR13MB3309.namprd13.prod.outlook.com>
References: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com> <20200219165727.ha6hhu5onoueznvw@anna.jacobs.jacobs-university.de>
In-Reply-To: <20200219165727.ha6hhu5onoueznvw@anna.jacobs.jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 64bc91bf-642c-47bd-cb94-08d7ba5bd571
x-ms-traffictypediagnostic: MN2PR13MB3104:
x-microsoft-antispam-prvs: <MN2PR13MB31044CF98CA58000B66DB688DBEA0@MN2PR13MB3104.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10001)(10019020)(4636009)(346002)(366004)(376002)(39850400004)(396003)(136003)(189003)(199004)(6506007)(53546011)(54906003)(52536014)(966005)(81156014)(316002)(9686003)(8936002)(81166006)(55016002)(66476007)(8676002)(64756008)(66446008)(66946007)(45080400002)(4326008)(26005)(110136005)(66556008)(186003)(7696005)(2906002)(5660300002)(86362001)(71200400001)(33656002)(76116006)(478600001)(66574012); DIR:OUT; SFP:1102; SCL:1; SRVR:MN2PR13MB3104; H:MN2PR13MB3309.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: APistoxgqcyweBq64/6uFduR4SKK9UJyCau+WSxmlbXdIARu2MnXdk07YaBCOq33oz3es9bmlP9jR5ZyRWuRucy5eacKsx63CGXzsGLlMvvDsA7FXjkZgAjqXasL/KLJnuiCr8R8uf+GL2LTVADhQg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 64bc91bf-642c-47bd-cb94-08d7ba5bd571
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 01:33:08.0600 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Esg6tUAH0fBBVHSRAV0aAEht/J0XikIvZfo3v7vRqlUnmY5CBmyuFxrZqPwjbNEm6Rn/64xFw8zSpAS7yaWpsg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR13MB3104
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BhKPQfaM4Fx8sbKpR1ifbg8g1AU>
Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 01:33:15 -0000

Hi Juergen,

thank you for your comments!  Please find replies inline, <ALEX>

--- Alex

> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, J=FC=
rgen
> Sent: Wednesday, February 19, 2020 8:57 AM
> To: Joel Jaeggli <joelja@bogus.com>
> Cc: netmod-chairs@ietf.org; netmod@ietf.org
> Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-
> netmod-nmda-diff-03
>=20
> Hi,
>=20
> this is a good document that deserves to go forward. Some comments...
>=20
> - In the introduction, you may want to mention that applied config
>   often differs from config because applied config includes stuff that
>   was learned or generated by the system (e.g., IP addresses obtained
>   via DHCP or generated by the kernel itself). This applies to systems
>   that otherwise implement NC or RC in a synchronous update manner,
>   i.e., a difference between <intended> and <applied> is for many
>   operational systems likely the normal situation and not an
>   exceptional one.

<ALEX> =20
Agreed.  Adding the following text in the Introduction to bring this out cl=
earer: " Likewise, during the course of operation, some data values may be =
learned or updated by the system itself over time, causing datastores to di=
verge. "
</ALEX>

>=20
> - I do not understand this:
>=20
>       [...]  (The filter dow not contain expressions that
>       would match values data nodes, as this is not required by most use
>       cases and would complicate the scheme, from implementation to
>       dealing with race conditions.)
>=20
>   Despite the wording nits, I fail to understand the race condition
>   argument. It seems the filters are the same as we have them in other
>   places and this is good and a strong argument by itself. Reusing
>   concepts is a good thing. Just state that and remove potentially
>   hand-waving arguments about race conditions created by filtering on
>   values. (And subtree filters can filter out certain interfaces by
>   matching the <name/> element.)

<ALEX>  What this meant to explain is that the filter simply defines which =
nodes are in and out of scope, independent of their actual value.  In other=
 words, you would not be able to specify something like "have this be in sc=
ope, but only if its value is between 5 and 10".  This is to keep things si=
mple; the race condition concerns if there are different speeds at which va=
lues propagate. =20
In order to simplify this, I suggest we simply remove the text in paranthes=
es (which was meant to provide clarification, but seems to add confusion, h=
ence best to simply strike.) =20
</ALEX>

>=20
> - I think you should import the term 'schema node' (and if necessary
>   also other terms) from RFC 7950. Perhaps merge section 2+3 into a
>   section Terminology that has the RFC2119 blurb and states that this
>   specification uses the terminology defined in RFC 7950 and RFC 8342.
>=20

<ALEX>
OK, we are merging 2+3 (both are very short anyway).  Putting the following=
 sentence in lieu of the acronyms: This specification uses the terminology =
defined in [RFC7950] and [RFC8342].  For definitions of terms such as "data=
store", "schema node", "<intended>",  or "origin", please refer to those RF=
Cs. =20
</ALEX>

> - Given that the applied configuration includes learned and system
>   provided data, it may make a lot of sense to filter on origin so
>   that learned or system generated config is not part of the
>   comparison. I think this is really missing. Of course, one can
>   filter the result to get rid of all 'learned' items but the whole
>   point of the compare RPC is to avoid long responses that are not
>   needed. The get-data operation defined in RFC 8526 has an origin
>   filter that may be reused. (Perhaps it makes sense to align the
>   parameters with RFC 8526 get-data even further.)

<ALEX>Hmm, what are you exactly suggesting here?  We could add a parameter =
to include (or exclude) data of a certain origin.  However, that would rais=
e the possibility that some differences are not found whose cause is precis=
ely that they have a different origin than anticipated (e.g., for which it =
was not clear that they could be learned, or that they would be preconfigur=
ed).  Hence not making changes just yet; could you explain your requirement=
/suggestion a little more? =20
</ALEX>
>=20
> - Why do we need the 'no-matches' leaf? Why not simply return an empty
>   'differences' container?
>=20
<ALEX>
I guess this is a design choice.  I guess we could return an empty containe=
r as well; the "no-matches" makes it more "explicit", and in terms of respo=
nse size it does not make a difference.  Unless there is a strong preferenc=
e, we would like to prefer to keep it.  (Or perhaps Andy wants to jump in?)
</ALEX>

> - Nit
>=20
>   OLD
>=20
>    RPC request to compare <operational< (source of the comparison) with
>    <intended>(target of the comparison):
>=20
>   NEW
>=20
>    RPC request to compare <operational> (source of the comparison) with
>    <intended> (target of the comparison):

<ALEX> fixed the spacing=20
</ALEX>

>=20
> - I have not validated the examples.
>=20
> - Section 7 talks about rejecting frequent requests. It may be useful
>   to specify which error response is returned in this case so that
>   coders implement the same behavior.
>=20
<ALEX> We could add that.  Which one would be appropriate to return / what =
should be returned? =20
Should we simply return error-type "rpc", with error-tag "resource-denied"?=
  =20
If we do that, should we also include error-info, specifying a time interva=
l after which it would be "safe" to issue the next diff request? =20
</ALEX>

> - Perhaps the document should spell out how compare interacts with
>   NACM. I kind of assume that NACM rules are applied before the
>   content is compared, i.e., data that is not accessible won't get
>   compared. Well, whatever the correct behavior is, I think this
>   deserves to be spelled out.

<ALEX> Per RFC 8341, the same access control rules apply to all datastores =
subjected to NACM - presumably also to all datastores that can be subjected=
 to nmda-diff.  From that perspective we didn't think it necessary to spell=
 it out, but perhaps it should be. =20
How about adding the following at the end of the first paragraph of Section=
 4:
"Any access control rules as configured by NACM [RFC 8341] are applied by t=
he server before the comparison is performed, that is, only datastore schem=
a nodes for which the client has read access are included in the comparison=
." =20
</ALEX>

>=20
> - I would probably have picked in ietf-interfaces example to avoid a
>   reference to a work in progress but this does not really matter
>   much.

<ALEX> That would have been possible as well.  We prefer sticking with this=
 example (it's just an example, so non-normative) if acceptable since it ge=
nerates less work, however, if there is insistence that we update, we will =
be happy to do so.=20

Thanks (end of my replies here)
--- Alex
</ALEX>

>=20
> /js
>=20
> On Mon, Feb 17, 2020 at 11:42:01AM -0800, Joel Jaeggli wrote:
> > Greetings,
> >
> > This was supposed to get processed shortly after IETF 106, however I lo=
st
> track of it. We are therefore running a 2 week WGLC on draft-ietf-netmod-
> nmda-diff-03.
> >
> >
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatat=
r
> acker.ietf.org%2Fdoc%2Fdraft-ietf-netmod-nmda-
> diff%2F&amp;data=3D02%7C01%7Calex%40futurewei.com%7C27cc7820468c4c5f
> 7bb208d7b55cd5c9%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C63
> 7177282659984332&amp;sdata=3DhMaCe8q44NEdcaPy74s29tAkLIJbEBQhjnRp5Y
> mtkB0%3D&amp;reserved=3D0
> >
> > the 02 - 03 diff is available here:
> >
> >
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i
> etf.org%2Frfcdiff%3Furl1%3Ddraft-ietf-netmod-nmda-diff-
> 02%26url2%3Ddraft-ietf-netmod-nmda-diff-
> 03&amp;data=3D02%7C01%7Calex%40futurewei.com%7C27cc7820468c4c5f7bb2
> 08d7b55cd5c9%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637177
> 282659984332&amp;sdata=3Djm03o26D0LMjaUfERALelo3RtNG4%2BliglxPWR3Ls
> 99c%3D&amp;reserved=3D0
> >
> > Please send email to the list indicating your support or concerns.
> >
> > This WGLC will conclude Monday March 2nd.
> >
> >
> > Thank you,
> > NETMOD WG Chairs
> >
>=20
>=20
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> >
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i
> etf.org%2Fmailman%2Flistinfo%2Fnetmod&amp;data=3D02%7C01%7Calex%40fu
> turewei.com%7C27cc7820468c4c5f7bb208d7b55cd5c9%7C0fee8ff2a3b240189
> c753a1d5591fedc%7C1%7C0%7C637177282659984332&amp;sdata=3DkMP6EgO
> qJ6N3FkPnCCt%2F25Xt9v4p9XAUGvpCv2Go47Y%3D&amp;reserved=3D0
>=20
>=20
> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103
> <https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww
> .jacobs-
> university.de%2F&amp;data=3D02%7C01%7Calex%40futurewei.com%7C27cc782
> 0468c4c5f7bb208d7b55cd5c9%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%
> 7C0%7C637177282659984332&amp;sdata=3DBlWciwRclsZnEzcugWnkxr7vAWvsS
> E%2BKGodwzUMRS9Q%3D&amp;reserved=3D0>
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i
> etf.org%2Fmailman%2Flistinfo%2Fnetmod&amp;data=3D02%7C01%7Calex%40fu
> turewei.com%7C27cc7820468c4c5f7bb208d7b55cd5c9%7C0fee8ff2a3b240189
> c753a1d5591fedc%7C1%7C0%7C637177282659984332&amp;sdata=3DkMP6EgO
> qJ6N3FkPnCCt%2F25Xt9v4p9XAUGvpCv2Go47Y%3D&amp;reserved=3D0


From nobody Tue Feb 25 17:57:28 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00EE63A08C7 for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 17:57:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3832kFAjBcYq for <netmod@ietfa.amsl.com>; Tue, 25 Feb 2020 17:57:24 -0800 (PST)
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (mail-eopbgr690106.outbound.protection.outlook.com [40.107.69.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92F0D3A08C6 for <netmod@ietf.org>; Tue, 25 Feb 2020 17:57:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gRlR2oikOJayEFC6YwRHwdnUyy2G3Iku/2gCoRUDKD8G6dTUAYFueG+dFSpHGcLW+2uAyXu/BpMupxXQTqoI4QtF1hyakXMLwV0Lv+PHS1kOGT+aXov95XZuOn3j61OoaSNlqfcWX4C97FC/Uub/4NgXVQY4IBHHChj30jT8sZ9IQxK/Ucd8AOD1tlC84EGwdeVUfcFGCYcrRrTzrsBP2+PjcNtpJlhpOuYSwHLtDuC8rxdmwmOzsn8jhPmAOZ4AL+eruyeoSOgqnemvo17Wpp9Xxd96l7d7c5YP/ZWzB6hOd2SCaq2gcn/S1kwcI+GJN/v7WWmXO5dxt1xse69WsA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CzDKKpPLxobW3kZuhO03ygVCg6d/uKFnQFGAyXjvZWU=; b=jXjMlrT6B7NzoM12VS+tiXmuSELjPIgKMwH6vgy3yyunfGxYOnHoCxBWbvdGuJbP7MAyBJI7VY15r+mWJH6dbQWa8ATpoPqlXVwjkh0QQJtuSyLaI4YGDW28RANMH9XUhZJXkNFSf0EPuUxKdTOEkkpVkXZVOIIA1PqNpOmH0N37Kk3xg7e9jYNsWw+CuGaSds6R2xflW6V6OkG8tzde3DvOGcV5l3WLo0UTyMORL2d94mIDwnB7fMDBFmlgcn/86F7XHaTcKR915aQ0W0QtEc0xA/A8n7Y4lhtpti1fMs1MJhFX6OQE0GTHP65bdMmZ6AYfFMwuTbti9bBCyB0gxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CzDKKpPLxobW3kZuhO03ygVCg6d/uKFnQFGAyXjvZWU=; b=YjULUnHAOaNhHyrQolIQj1OnzVppWPQ4fw3wE3hwjY9row8MfI+05PZMz508Zn0ixQyeZzUMCAo8O68O/8F0Q+vy9Rzz/DklKFm7KsKSmcgMGrYc4dnPzvvWU4zI6oV6vKIIcF9Ubb8vBuSFZ/R+oNmyvfEVYXANeQS1ZHN4/pI=
Received: from BY5PR13MB3300.namprd13.prod.outlook.com (2603:10b6:a03:1ae::21) by BY5PR13MB2982.namprd13.prod.outlook.com (2603:10b6:a03:186::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.6; Wed, 26 Feb 2020 01:57:21 +0000
Received: from BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385]) by BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385%3]) with mapi id 15.20.2772.012; Wed, 26 Feb 2020 01:57:21 +0000
From: Alexander Clemm <alex@futurewei.com>
To: Tianran Zhou <zhoutianran@huawei.com>, Joel Jaeggli <joelja@bogus.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5nqyUkhN2CSKkkal6VOj9CUTx6gsVb8wgABY4ICAAA9/EA==
Date: Wed, 26 Feb 2020 01:57:21 +0000
Message-ID: <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com> <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com>
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 791920d6-5bd8-47f3-41c2-08d7ba5f37d4
x-ms-traffictypediagnostic: BY5PR13MB2982:
x-microsoft-antispam-prvs: <BY5PR13MB298215C6D5E599A9D6478856DBEA0@BY5PR13MB2982.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(376002)(396003)(346002)(39850400004)(136003)(199004)(189003)(71200400001)(53546011)(86362001)(81166006)(26005)(186003)(5660300002)(8936002)(8676002)(81156014)(478600001)(966005)(6506007)(76116006)(52536014)(316002)(110136005)(66556008)(66446008)(66946007)(66476007)(64756008)(7696005)(55016002)(9686003)(2906002)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB2982; H:BY5PR13MB3300.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: LvNmPlcBqBzIt8G1yfyXXdwYsKThU7X3nxJpC0hn9ineH3V81Mr/nj10p39RAegNN9BguBBTap8n85xmNSjh4YexuAnHjJOwpuVsp7nOKbTUX2c71p2dFaLEICHPRR9Po9c0Lt6L8FTq/kUFrReImw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0BY5PR13MB3300namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 791920d6-5bd8-47f3-41c2-08d7ba5f37d4
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 01:57:21.4822 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SwNa6n1WTRNONaoIU1e/S/oSA01qmO6eOml6FSshBClqYcUNdOwDpfp3aJaoKe0R1UpVtOc9NuWtBJZC9MRRGw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB2982
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/PPhm346UjgZPP-QaN1kC9JvVF6I>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 01:57:27 -0000

--_000_BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0BY5PR13MB3300namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0BY5PR13MB3300namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0BY5PR13MB3300namp_--


From nobody Tue Feb 25 18:48:14 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EDBD3A0A91; Tue, 25 Feb 2020 18:48:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZojgFgliQRis; Tue, 25 Feb 2020 18:48:09 -0800 (PST)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2108.outbound.protection.outlook.com [40.107.243.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B8523A0A93; Tue, 25 Feb 2020 18:48:09 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MuB3UVk344bboVhAh0wWrQfIh/ZE8+LrtJ2tPr7ZDfGu/BluKs6Rt73J3nfxLtpg4fFi5dpl2yN6KgY3kXGdO2HO7FhEaakrTfD/h4tMd4kyPTbb4p2FBWGN0/6YMV+UsmzNdqIi/7fqxq+/r5bIb9Rlnk2lwNX0D0qmmnpw3ctIFW/o6Tp6It8P8D/2/gH3YPVSjViF7Qr+dJr80GXd7/FPV12uDj+77t1EEF6WCcXS9BmO84lUurzTKWWvBGd1Fuw/xCQP4JbuihiCBy3orSW47MVtlwCZbKuM8JwRqzSardH5oLKC7+c1wrbol0Zv8V/vpNL5B+j1YXTVh05VIw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7TzEqmQKK9d2DAq3AOFsrLH42RtgyP08bEynGC0ErnM=; b=dymbXfU/S945br78dXRx6/SIHBS7jYQiB6aP/RrOvyOiCrb3kGceoKj295z68jsM6x66DTxxK2ZIlYrqIjNqw19FG+1W1jMMrhxI2Elu5n+f3g8Daa9wJxgK/Nu1mMUQMUr8cSeOIddYT275LsLe9Oy6oWH0LUC8zzuIcXdr8xnEKn31uBKTljn0Ei9Gf9fZm7l1evHwV1KIws8blFvUWDo/esEsDhBGXDSsryLcGiaeCjSH8PRXNrjJaHj22e7JBKLNyF/Jztbpbetyrw+7alj/rO5bn11AUEthZOs51GCtKLZsok0Do0utfRDoVDiIb7rxKwuDW3Q9FqZJJgh/kQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7TzEqmQKK9d2DAq3AOFsrLH42RtgyP08bEynGC0ErnM=; b=kDaDujI3infmtDYQ6/p2XtVkrLjlCi/5zEVv86bjO0OuvEDPxDqQoqIJ1nugLyFQNDB8Kanm3yzGQmgTwJNl8sg4Lq2/IJ9rcNUUPfy3BM9f/nxcYmeUg0RNnBtWKTMnjx01inF4UxEwQ4oQo/7TUCjdY89jlE7ESlkBfGPJqQs=
Received: from BY5PR13MB3300.namprd13.prod.outlook.com (2603:10b6:a03:1ae::21) by BY5PR13MB3013.namprd13.prod.outlook.com (2603:10b6:a03:185::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.6; Wed, 26 Feb 2020 02:48:05 +0000
Received: from BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385]) by BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385%3]) with mapi id 15.20.2772.012; Wed, 26 Feb 2020 02:48:05 +0000
From: Alexander Clemm <alex@futurewei.com>
To: Martin Bjorklund <mbj@tail-f.com>, "joelja@bogus.com" <joelja@bogus.com>
CC: "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
Thread-Index: AQHV5cpbkGrB2wq/g0eF4L9huLkRAqgkUmQAgAhyvHA=
Date: Wed, 26 Feb 2020 02:48:05 +0000
Message-ID: <BY5PR13MB33007DC2DBA6B9FC5E585837DBEA0@BY5PR13MB3300.namprd13.prod.outlook.com>
References: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com> <20200220.175834.640820639957432794.mbj@tail-f.com>
In-Reply-To: <20200220.175834.640820639957432794.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d9aa8a33-261a-4ee7-f94d-08d7ba664deb
x-ms-traffictypediagnostic: BY5PR13MB3013:
x-microsoft-antispam-prvs: <BY5PR13MB30134CA38B3A3C2E6D3B2EB5DBEA0@BY5PR13MB3013.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10001)(10019020)(4636009)(376002)(396003)(39850400004)(366004)(346002)(136003)(189003)(199004)(81156014)(64756008)(9686003)(186003)(71200400001)(66446008)(81166006)(66556008)(66476007)(76116006)(966005)(86362001)(55016002)(4326008)(66946007)(26005)(6506007)(53546011)(2906002)(8676002)(54906003)(5660300002)(45080400002)(8936002)(7696005)(33656002)(110136005)(478600001)(52536014)(316002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB3013; H:BY5PR13MB3300.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kH53Sb+2MFtZSjfoDFKrywyylO4fBpGS76uRy+DwMTazL3sCyq4MjPDYc2aV9gj/D+LratQOvvb1ouooZXXJthQlVtoD3RKz23FdQcANY8sna79Yb8mA3vPaeamDSrCW9lJXYq8xFRqHVAA8MHOHCmSAMiiwZVYCersq0a3NDLBg+arbJZuaYGMQIBE4+dqMfmXTDbFw+IaJZxaM7yM5lTd/0vdMRABxKCaJbZOMXEGUB1Wz2kqDg5q/Vf/7hpWXSkt9JJOyL7yzUWGISnv1gxmnK0ggne/SW2EqRX5l66qvkxTNW60iysxS0Im/JSTMc6oVfkmjfQJCrh0err9tqpPfLcqKaSmdqUiPp5DtBhzTHjmAz2TFTAwABABoIRQXNh/SGOonuR/CgfEBiK8JcVz2jC4yQl/Zdgbp1mKRH2LvrkmWgSZGVu1UGOFnk9Go87iEqvOjR07KjsCGFKuFH3yaeXQhlvmD+JvyeF/CYWfkyetceR4l7UhLapZVrBcSs5wpL6IS9pqbE7kZpQJvbe5C+IywNQzDKFPr4jLLalA9sqHvrSfL8jGzvhUA6oQUS0rCQQ5VDGyh3WapWKvVWbTn0mQb1/QTYHtml27jMo5twD+iuAzT3QRMmWXjeZVq
x-ms-exchange-antispam-messagedata: muUbm0X7HvJiGgC5oiPVklWBnE4Z9vBrjd54r9hjCt3nYJT/jkf6qsA3KwWDTcVTgY13WxauT/23Ss/YecC3kacktM0PJ+VAs25eQXQyQ2Omd769SpPDREU/lZsLdlDJtqcg8t9bbl8TFwcMvrmZVw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d9aa8a33-261a-4ee7-f94d-08d7ba664deb
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 02:48:05.1396 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ttkP6+GJRN/NesODWY14/jPEN6rYWjEkv++8+FpUjdgmo6QbS0BFIVcofcUBBlg8aeu0uSO+yVDS+c6ggbLeDQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3013
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/f1zLE7iF91p0lIYDg11TpKXcG3Y>
Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 02:48:12 -0000

Hi Martin,

thank you for your comments!  Please see replies inline, <ALEX>

--- Alex

> -----Original Message-----
> From: netmod <netmod-bounces@ietf.org> On Behalf Of Martin Bjorklund
> Sent: Thursday, February 20, 2020 8:59 AM
> To: joelja@bogus.com
> Cc: netmod-chairs@ietf.org; netmod@ietf.org
> Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-
> netmod-nmda-diff-03
>=20
> Hi,
>=20
> Joel Jaeggli <joelja@bogus.com> wrote:
> > Greetings,
> >
> > This was supposed to get processed shortly after IETF 106, however I lo=
st
> track of it. We are therefore running a 2 week WGLC on draft-ietf-netmod-
> nmda-diff-03.
> >
> >
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatat=
r
> acker.ietf.org%2Fdoc%2Fdraft-ietf-netmod-nmda-
> diff%2F&amp;data=3D02%7C01%7Calex%40futurewei.com%7C2a7d8572a82d4d
> c6fb8208d7b6263e8c%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C6
> 37178147700288369&amp;sdata=3Dz8dXlaWjYttnG2vFn8YWLzld3i2TpQoMkHXks
> I9xm%2Bc%3D&amp;reserved=3D0
> >
> > the 02 - 03 diff is available here:
> >
> >
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i
> etf.org%2Frfcdiff%3Furl1%3Ddraft-ietf-netmod-nmda-diff-
> 02%26url2%3Ddraft-ietf-netmod-nmda-diff-
> 03&amp;data=3D02%7C01%7Calex%40futurewei.com%7C2a7d8572a82d4dc6fb8
> 208d7b6263e8c%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C63717
> 8147700298323&amp;sdata=3D1uye5dZqb7dhIJ5DZaGb4yChrLD6BUCg8R%2BwK
> Pvnlm4%3D&amp;reserved=3D0
> >
> > Please send email to the list indicating your support or concerns.
>=20
>=20
> I have reviewed draft-ietf-netmod-nmda-diff-03 and have some comments.
>=20
> o  Section 4
>=20
>       (The filter dow not contain expressions that
>       would match values data nodes, as this is not required by most use
>       cases and would complicate the scheme, from implementation to
>       dealing with race conditions.)
>=20
>   I don't think it is a good idea to reject filters that match
>   values.  For example, suppose I want to compare the config for a
>   specific interface.  I could do /interfaces/interfac[name=3D'eth0'],
>   or a subtree filter.  Why should this not be possible?
>=20
>   Besides, the mechanism of rejecting such filters is not defined.
>   The only text we have is this sentence within parentheses.
>=20

<ALEX> In my response to Juergen, I suggested to simply remove the text in =
the parantheses as it is apparently confusing. =20
Our intent was to keep it simple and simply use the filter to "scope" the o=
peration.  If we want to include matching values, things get a bit more com=
plex with no clear benefit (when you would even want to specify such filter=
), but admittedly we were thinking of e.g. rapidly changing operational dat=
a.  For example, what if the value matches in the source but not the target=
, or vice versa - do we need to specify which one we mean (source, target, =
or any)?  There are also the mentioned "race conditions" if snap shots are =
taken at different times - although I guess those would be implementation l=
imitations. =20

That said, we can of course add it in if you do feel we should have that op=
tion (and we don't get objections).  You are correct that we should specify=
 an error for rejecting the filter. =20
</ALEX>

>=20
> o  leaf all in the YANG module
>=20
>    s/Specifically, if one/For example, if one/
>=20

<ALEX> Changed </ALEX>
>=20
> o  leaf xpath-filter
>=20
>   The description needs to specify the XPath context, see RFC 6991.
>=20

<ALEX> Not sure what we need to be done here; the leaf uses the type defini=
tion from RFC 6991 (i.t. type yang:xpath1.0); is there anything else - plea=
se advise
</ALEX>=20

>=20
> o  container differences
>=20
>   It is not clear what the YANG patch records reflect.  Is it the
>   patches that are required to go from "source" to "target"?  Or the
>   other way around?
>=20

<ALEX> It is from source to target.  This is stated e.g. here: "The YANG-Pa=
tch data model is augmented to indicate the value of source datastore nodes=
 in addition to the patch itself that would need to be applied to the sourc=
e to produce the target."
I updated the description in the container "differences" as follows:
"            "The list of differences, encoded per RFC8072,=20
             indicating the patches that need to be applied to=20
             the source in order to arrive at the target,=20
             with an augmentation to include source values where=20
             applicable.";"
</ALEX>

>=20
> o  anydata source-value
>=20
>   This description needs work.  The current text isn't correct
>   ('value' is not present when the operation is 'move').
>=20
>   The description should explain what this is supposed to contain.
>=20

<ALEX> When the operation is 'move', we want to be able to indicate the ord=
er prior to the move.  What would you call it? =20
</ALEX>

>=20
> o  Section 6
>=20
>   The example is confusing.  It seems the diff is the patches required
>   to go from target to source.  And the source-value contains the
>   origin present in the target, is that correct?  And the value
>   contains an origin that isn't present in neither the source nor the
>   target.
>=20

<ALEX> We will review the example to ensure it's correct; will get back to =
you on that tomorrow.  The diff contains the patches to go from source to t=
arget, ie the patches that, when applied to source, give you the target. =20

Thanks again for your review!
</ALEX>

>=20
>=20
> /martin
>=20
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.i
> etf.org%2Fmailman%2Flistinfo%2Fnetmod&amp;data=3D02%7C01%7Calex%40fu
> turewei.com%7C2a7d8572a82d4dc6fb8208d7b6263e8c%7C0fee8ff2a3b24018
> 9c753a1d5591fedc%7C1%7C0%7C637178147700298323&amp;sdata=3DW1xgXQS
> lSzklkBAE1m324pwfJHnS%2B88OschqnJDdEBw%3D&amp;reserved=3D0


From nobody Tue Feb 25 22:42:28 2020
Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B15C63A0EEA; Tue, 25 Feb 2020 22:42:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JF2ekk1O3AOv; Tue, 25 Feb 2020 22:42:25 -0800 (PST)
Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC3FF3A0EDD; Tue, 25 Feb 2020 22:42:25 -0800 (PST)
Received: by mail-pl1-x62a.google.com with SMTP id ay11so907158plb.0; Tue, 25 Feb 2020 22:42:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=content-transfer-encoding:from:mime-version:subject:message-id:date :cc:to; bh=KID+1V1SqicUZPChyfHjMuVGrJjot5REl7FXTE0tUvA=; b=tjKaw+sRGCTkTXBUBqBB7R7Zedr0HIiC9uYWelZcoqmOS0b1e4dePP7vV0VOLv4aGx 0rhZdHmpUbOufGku5RvSMWdcW3512dq7MNeQFvs+iGbew04AEY1zw4T3cm26NdClJ2GG o/4m0cLs+EGQDDzpnRE37yd8C/fS5JQLaGshGo/XUWHbpxhFHtg15AB5yfgLMd4/JwZp vcrXiIxkOH9dIFoXI52/Ioi2YZSv0JIW+r47Rt3aUhuf+rJ51QuH/VqRNNtCej1VnyAA kF3BKHx8viuHLjT7Rs1Sy4XLQWoJwPr403VnPAS0RJOiefoPnlItlwHrolOHtb6LjwUy cKLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:message-id:date:cc:to; bh=KID+1V1SqicUZPChyfHjMuVGrJjot5REl7FXTE0tUvA=; b=qIS0t9QnI2t5jsnRkEm5Jh2yS57zAVvUKFJmiWJPcZELjFwhJf9dVdEv+sqlu6/wqt zihb/ui+aaxwVmRe+MpIERboo9eqVdGbu6E46xSi1Ll5wGeYzCNZR2ejv2a9qpIn5PCK pSdmwVhtDqNkRqNwTglShDtG6nOZaeIiOBf0m4FJC1Pttbb/WGYK+wYiN1UftTkIZt1/ svndUfA/ciy1tOilf4i/GWeqgmDVFxGNY2fVf2jJ6Jn/zyfclLYlNeTnTsC8RGao0qvH Su/4/fsI8xPx7oumsk+MYzFaFGaKOtI4PETDbCYrFtwtJd7P+eE8Y6ZDprG6A1UIJQKL YgdQ==
X-Gm-Message-State: APjAAAX9XaKA/ikws7eD9tSjs0sBuu1ftLtjpyrBW+uUKtwbb7Tx8L/T QcmtdmNvJEdgOvswHt9gNxtsgz5L
X-Google-Smtp-Source: APXvYqz+1GYSO4Hutd8aIgflQfKSVuDhMZ6x7zkRSJi5uk75Fc/pFdaj5r1/HxBQZ9cNaU6dM+ufEQ==
X-Received: by 2002:a17:902:aa81:: with SMTP id d1mr2713049plr.16.1582699344403;  Tue, 25 Feb 2020 22:42:24 -0800 (PST)
Received: from [192.168.1.24] (c-73-63-232-212.hsd1.ca.comcast.net. [73.63.232.212]) by smtp.gmail.com with ESMTPSA id t15sm1158883pgr.60.2020.02.25.22.42.22 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 25 Feb 2020 22:42:23 -0800 (PST)
Content-Type: multipart/signed; boundary=Apple-Mail-5B4B142A-C9D5-4602-A995-15435644C849; protocol="application/pkcs7-signature"; micalg=sha-256
Content-Transfer-Encoding: 7bit
From: Jeff Tantsura <jefftant.ietf@gmail.com>
Mime-Version: 1.0 (1.0)
Message-Id: <95377678-1417-4C30-BAD5-16E8DABE9360@gmail.com>
Date: Tue, 25 Feb 2020 22:42:18 -0800
Cc: "draft-ietf-netmod-nmda-diff@ietf.org" <draft-ietf-netmod-nmda-diff@ietf.org>, netmod@ietf.org
To: Joel Jaeggli <joelja@bogus.com>
X-Mailer: iPad Mail (17D50)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/hgPAwXWOKFJIhTYKqmzahjzcLeE>
Subject: Re: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 06:42:27 -0000

--Apple-Mail-5B4B142A-C9D5-4602-A995-15435644C849
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

=EF=BB=BFJoel,

No, I'm not aware of any IPR that applies to this draft.

Cheers,
Jeff

> On Feb 17, 2020, at 11:44, Joel Jaeggli <joelja@bogus.com> wrote:
>=20
> No, I'm not aware of any IPR that applies to this draft

--Apple-Mail-5B4B142A-C9D5-4602-A995-15435644C849
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail-5B4B142A-C9D5-4602-A995-15435644C849--


From nobody Wed Feb 26 00:55:05 2020
Return-Path: <J.Schoenwaelder@jacobs-university.de>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 063713A10E3; Wed, 26 Feb 2020 00:55:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=jacobsuniversity.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H253cAj6TvTn; Wed, 26 Feb 2020 00:54:59 -0800 (PST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2068.outbound.protection.outlook.com [40.107.21.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 041C73A10E2; Wed, 26 Feb 2020 00:54:56 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ljdLGyDkp18gCXIp+DR4uheADK7co6Ep4/3DgC6/6x8yc493+/OggVEX3G+4fnAPAoKSbFai4LHIcJoqODSvkvVAS8xRrkLB0czlHRZ9iVdxTSR0tVNsidL8nivBLX4UgA+e+iBpSXESY1ae/YNUAHyOWf2vT5aLJudzzcNumoDhU+o/aSRnQT3Vwh6ryEoEdos5QRgy8L+jOTd/MKEd6En84CkeiXS8I/aj6qyK5nn9O0XkpmqkC3smjjaicgXxQ3nAWqh0NdUfqWokinc2nvFeHTrStgfRWRIDEpwyqZN666dFMFCDlYFmKrBJPChaJMYfy10I+nfeZePIUllvaQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Vin5CWlWVeB7fM2S3Pp1z/LDy67FvQu3DcoV9J1AYWE=; b=VOTWgvULaqZT+0kys+6p9xBmVKrecKCA51hsQk+S4wF3DUfYzgK0lNbAX6FjdtVeiORZE3y1ToKNRYkTXo66/al2s3eUglW8udgeC14Jlm37TaI9Ulacorz7tTs3aAjnwb5VlXPVFFBnTkFxEbQmgSwwhFoMon9s6gPLXFc3C9mMVPeoFmmT/AeLUyDApbJz+Gy7hlRGCRwTzLQKaddFsOEKVVLd/8C65fodcIWGHiUPV8Yu89lErK+4qXb0DYWVm4lArie8gYDSTpPjQdr7oJJFQczl8AbQJDoi4U/i3dQsAGzcM3OJy4PjEKWNMu+IyGe3yno9gRXkTEToen7UHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=jacobs-university.de; dmarc=pass action=none header.from=jacobs-university.de; dkim=pass header.d=jacobs-university.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jacobsuniversity.onmicrosoft.com; s=selector2-jacobsuniversity-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Vin5CWlWVeB7fM2S3Pp1z/LDy67FvQu3DcoV9J1AYWE=; b=PajbJ/nhYlxBNuUAN6hLsfKuNyJjmSxyNAsqcKl5hPK+l0APQCkiRcGytwwKJvzj8DU53+33zEdB0cD61KJb9jBrV6MfkyYBWd0/a/d9lz19zcAcbwG0O32HO+k9hEpOaoOHgmDXTMr2U1qE5vWtvYyCsZfmVozYC3IhwO3d4YE=
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (10.165.140.31) by DB6P190MB0295.EURP190.PROD.OUTLOOK.COM (10.175.242.10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Wed, 26 Feb 2020 08:54:53 +0000
Received: from DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579]) by DB6P190MB0312.EURP190.PROD.OUTLOOK.COM ([fe80::2cda:e754:4835:c579%3]) with mapi id 15.20.2772.012; Wed, 26 Feb 2020 08:54:53 +0000
Received: from localhost (212.201.44.247) by FR2P281CA0010.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:a::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.18 via Frontend Transport; Wed, 26 Feb 2020 08:54:53 +0000
From: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
To: Alexander Clemm <alex@futurewei.com>
CC: Joel Jaeggli <joelja@bogus.com>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
Thread-Index: AQHV5cpjTZuQg6TmkkSwH9n+2ZnT06giv7+AgAn+EQCAAHtsAA==
Date: Wed, 26 Feb 2020 08:54:53 +0000
Message-ID: <20200226085452.xcwtwpjun2qer64p@anna.jacobs.jacobs-university.de>
References: <687b863b-4d54-db67-e3af-b08588c85360@bogus.com> <20200219165727.ha6hhu5onoueznvw@anna.jacobs.jacobs-university.de> <MN2PR13MB330960834522F5BFD4012284DBEA0@MN2PR13MB3309.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB330960834522F5BFD4012284DBEA0@MN2PR13MB3309.namprd13.prod.outlook.com>
Reply-To: =?iso-8859-1?Q?Sch=F6nw=E4lder=2C_J=FCrgen?= <J.Schoenwaelder@jacobs-university.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: FR2P281CA0010.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:a::20) To DB6P190MB0312.EURP190.PROD.OUTLOOK.COM (2603:10a6:6:34::31)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=J.Schoenwaelder@jacobs-university.de; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [212.201.44.247]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 018e9f13-d7a1-4bcf-f573-08d7ba998bab
x-ms-traffictypediagnostic: DB6P190MB0295:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DB6P190MB0295A96678611B8E29998963DEEA0@DB6P190MB0295.EURP190.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400004)(396003)(376002)(346002)(136003)(366004)(189003)(199004)(2906002)(66574012)(786003)(316002)(26005)(478600001)(52116002)(6496006)(54906003)(53546011)(3450700001)(186003)(4326008)(1076003)(956004)(6916009)(8936002)(71200400001)(81156014)(81166006)(8676002)(6486002)(5660300002)(66446008)(66946007)(16526019)(66476007)(66556008)(86362001)(64756008); DIR:OUT; SFP:1101; SCL:1; SRVR:DB6P190MB0295; H:DB6P190MB0312.EURP190.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: jacobs-university.de does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: lO7xIYe8/W2wgZK4ZYr8ARL/a5V+7hPGfFg43+hYkuagifQtf5fapPpgPYIQlRR/5rokHhOr9QFJO8UNdyximMMZpynd6J2wf2fpAWAq97FuuyI8zqqV1f4hzUZzn48eIKk4RdYTZOBhw+T3Z5UlTA==
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <B9905F9F8F53364A9EE81815B2860FD1@EURP190.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: jacobs-university.de
X-MS-Exchange-CrossTenant-Network-Message-Id: 018e9f13-d7a1-4bcf-f573-08d7ba998bab
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 08:54:53.3758 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f78e973e-5c0b-4ab8-bbd7-9887c95a8ebd
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: e5ntk90W0V+g7xUZhSZbCoXPE+jwdb1lzFpFX9Y+Qp7cSm3qPNmRgtk87Zp3BL3bVrPp0h1p9acRTEPUzf1nZHzhRCwOzXZ/8O8PodgVN3A=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P190MB0295
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/Ou5BcW1KF_56ICxfHpIXx0XuHRI>
Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf-netmod-nmda-diff-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 08:55:03 -0000

On Wed, Feb 26, 2020 at 01:33:08AM +0000, Alexander Clemm wrote:
> Hi Juergen,
>=20
> thank you for your comments!  Please find replies inline, <ALEX>
>=20
> --- Alex
>=20
> > -----Original Message-----
> > From: netmod <netmod-bounces@ietf.org> On Behalf Of Sch=F6nw=E4lder, J=
=FCrgen
> > Sent: Wednesday, February 19, 2020 8:57 AM
> > To: Joel Jaeggli <joelja@bogus.com>
> > Cc: netmod-chairs@ietf.org; netmod@ietf.org
> > Subject: Re: [netmod] WGLC - Comparison of NMDA datastores - draft-ietf=
-
> > netmod-nmda-diff-03
> >=20
> > Hi,
> >=20
> > this is a good document that deserves to go forward. Some comments...
> >=20
> > - In the introduction, you may want to mention that applied config
> >   often differs from config because applied config includes stuff that
> >   was learned or generated by the system (e.g., IP addresses obtained
> >   via DHCP or generated by the kernel itself). This applies to systems
> >   that otherwise implement NC or RC in a synchronous update manner,
> >   i.e., a difference between <intended> and <applied> is for many
> >   operational systems likely the normal situation and not an
> >   exceptional one.
>=20
> <ALEX> =20
> Agreed.  Adding the following text in the Introduction to bring this out =
clearer: " Likewise, during the course of operation, some data values may b=
e learned or updated by the system itself over time, causing datastores to =
diverge. "
> </ALEX>

OK

> > - I do not understand this:
> >=20
> >       [...]  (The filter dow not contain expressions that
> >       would match values data nodes, as this is not required by most us=
e
> >       cases and would complicate the scheme, from implementation to
> >       dealing with race conditions.)
> >=20
> >   Despite the wording nits, I fail to understand the race condition
> >   argument. It seems the filters are the same as we have them in other
> >   places and this is good and a strong argument by itself. Reusing
> >   concepts is a good thing. Just state that and remove potentially
> >   hand-waving arguments about race conditions created by filtering on
> >   values. (And subtree filters can filter out certain interfaces by
> >   matching the <name/> element.)
>=20
> <ALEX>  What this meant to explain is that the filter simply defines whic=
h nodes are in and out of scope, independent of their actual value.  In oth=
er words, you would not be able to specify something like "have this be in =
scope, but only if its value is between 5 and 10".  This is to keep things =
simple; the race condition concerns if there are different speeds at which =
values propagate. =20
> In order to simplify this, I suggest we simply remove the text in paranth=
eses (which was meant to provide clarification, but seems to add confusion,=
 hence best to simply strike.) =20
> </ALEX>

If the filters work exactly the same way as they do elsewhere, then I
am happy and yes removing the text in parenthesis is good.

> > - I think you should import the term 'schema node' (and if necessary
> >   also other terms) from RFC 7950. Perhaps merge section 2+3 into a
> >   section Terminology that has the RFC2119 blurb and states that this
> >   specification uses the terminology defined in RFC 7950 and RFC 8342.
> >=20
>=20
> <ALEX>
> OK, we are merging 2+3 (both are very short anyway).  Putting the followi=
ng sentence in lieu of the acronyms: This specification uses the terminolog=
y defined in [RFC7950] and [RFC8342].  For definitions of terms such as "da=
tastore", "schema node", "<intended>",  or "origin", please refer to those =
RFCs. =20
> </ALEX>

This works for me.

> > - Given that the applied configuration includes learned and system
> >   provided data, it may make a lot of sense to filter on origin so
> >   that learned or system generated config is not part of the
> >   comparison. I think this is really missing. Of course, one can
> >   filter the result to get rid of all 'learned' items but the whole
> >   point of the compare RPC is to avoid long responses that are not
> >   needed. The get-data operation defined in RFC 8526 has an origin
> >   filter that may be reused. (Perhaps it makes sense to align the
> >   parameters with RFC 8526 get-data even further.)
>=20
> <ALEX>Hmm, what are you exactly suggesting here?  We could add a paramete=
r to include (or exclude) data of a certain origin.  However, that would ra=
ise the possibility that some differences are not found whose cause is prec=
isely that they have a different origin than anticipated (e.g., for which i=
t was not clear that they could be learned, or that they would be preconfig=
ured).  Hence not making changes just yet; could you explain your requireme=
nt/suggestion a little more? =20
> </ALEX>

I believe that there will be quite large differences between say
<running> and <operational> due to learned applied config (think of
address mapping tables or forwarding table entries originating from
control plane protocols) and if I am not interested in this learned
state, I like to have a filter that allows me to express that I like
to have some of the learned data ignored. Similarly, I having a filter
to express that I like to have all config false leafs ignored seems
useful if I compare a configuration datastore with <operational>.
There are several useful filters in the definition of get-data [RFC
8526] and I feel we are missing several of them here.

Yes, there may be cases where I do not want to use some of the filters
but that does not justify that other use cases like comparing
<running> against <operational> are not well supported.

> > - Why do we need the 'no-matches' leaf? Why not simply return an empty
> >   'differences' container?
> >=20
> <ALEX>
> I guess this is a design choice.  I guess we could return an empty contai=
ner as well; the "no-matches" makes it more "explicit", and in terms of res=
ponse size it does not make a difference.  Unless there is a strong prefere=
nce, we would like to prefer to keep it.  (Or perhaps Andy wants to jump in=
?)
> </ALEX>

$ diff rfc7950.txt rfc7950.txt
$ echo $?
0

Good old tools tend to return an empty diff and not a special value if
there is no difference hence I found the design a bit surprising.
Perhaps there is a reason behind the design but then it is not obvious
to me.

> > - Nit
> >=20
> >   OLD
> >=20
> >    RPC request to compare <operational< (source of the comparison) with
> >    <intended>(target of the comparison):
> >=20
> >   NEW
> >=20
> >    RPC request to compare <operational> (source of the comparison) with
> >    <intended> (target of the comparison):
>=20
> <ALEX> fixed the spacing=20
> </ALEX>

OK
=20
> > - I have not validated the examples.
> >=20
> > - Section 7 talks about rejecting frequent requests. It may be useful
> >   to specify which error response is returned in this case so that
> >   coders implement the same behavior.
> >=20
> <ALEX> We could add that.  Which one would be appropriate to return / wha=
t should be returned? =20
> Should we simply return error-type "rpc", with error-tag "resource-denied=
"?  =20
> If we do that, should we also include error-info, specifying a time inter=
val after which it would be "safe" to issue the next diff request? =20
> </ALEX>

I don't have the answer but obviously it makes sense to clearly spell
out the error behavior. ;-)

> > - Perhaps the document should spell out how compare interacts with
> >   NACM. I kind of assume that NACM rules are applied before the
> >   content is compared, i.e., data that is not accessible won't get
> >   compared. Well, whatever the correct behavior is, I think this
> >   deserves to be spelled out.
>=20
> <ALEX> Per RFC 8341, the same access control rules apply to all datastore=
s subjected to NACM - presumably also to all datastores that can be subject=
ed to nmda-diff.  From that perspective we didn't think it necessary to spe=
ll it out, but perhaps it should be. =20
> How about adding the following at the end of the first paragraph of Secti=
on 4:
> "Any access control rules as configured by NACM [RFC 8341] are applied by=
 the server before the comparison is performed, that is, only datastore sch=
ema nodes for which the client has read access are included in the comparis=
on." =20
> </ALEX>

OK
=20
> > - I would probably have picked in ietf-interfaces example to avoid a
> >   reference to a work in progress but this does not really matter
> >   much.
>=20
> <ALEX> That would have been possible as well.  We prefer sticking with th=
is example (it's just an example, so non-normative) if acceptable since it =
generates less work, however, if there is insistence that we update, we wil=
l be happy to do so.=20
>

As I said, this does not really matter much to me. (I would have
picked ietf-interfaces because it is stable and most likely widely
understood by pretty much everybody and it nicely can be used to
explain why <running> and <operational> differ in many different ways,
i.e., loopback addresses configured by the system, IP privacy
addresses created by the system, IP addresses obtained by DHCP, IP
addresses not in <operational> due to hardware not present.)

/js

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Feb 26 02:03:06 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 646793A11F5 for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 02:03:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level: 
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Bcq3dQ1K; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gFsTdmaT
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5uJSIUvVM1k6 for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 02:03:03 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4240A3A11F1 for <netmod@ietf.org>; Wed, 26 Feb 2020 02:03:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9652; q=dns/txt; s=iport; t=1582711383; x=1583920983; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=D57NuQSYdKCJmiuh//Cz9gOApgiMXyP1yfuY68FEHjc=; b=Bcq3dQ1KD6+LLTET+t+aWmUWh3/8z9h8qes1EcAlhVk1OC6cxd+bC8HZ f3jaMHifuU78dNg9HhflO5a3a6z+9ZKOQZ82sIwqsOSuutXdoT1UToQi5 8OKb+vIpYqdmju+D2BfurK751Wfe4AsPPUS6PoP3Kdr+eIlUpFgkarbtY s=;
IronPort-PHdr: =?us-ascii?q?9a23=3AwyvuGxKVxUh8N6YLuNmcpTVXNCE6p7X5OBIU4Z?= =?us-ascii?q?M7irVIN76u5InmIFeBvad2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUg?= =?us-ascii?q?Mdz8AfngguGsmAXFfkLfr2aCoSF8VZX1gj9Ha+YgBY?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AJDgBiQVZe/5xdJa1mHgELHINPUAV?= =?us-ascii?q?sWCAECyoKhAqDRgOKYU6CEZgUgUKBEANUCQEBAQwBARgLCgIEAQGDe0UCF4F?= =?us-ascii?q?pJDgTAgMNAQEFAQEBAgEFBG2FNwyFYwEBAQECAQEBEBERDAEBLAwEBwQCAQY?= =?us-ascii?q?CDgMBAwEBAwIjAwICAiULFAECBggBAQQBEggBEAmDBYJKAw4gAQ6SRJBnAoE?= =?us-ascii?q?5iGJ1gTKCfwEBBYEvAQMCDkGDCBiCDAmBDiqMJBqBQT+BEUeCTD6CWQsBAQE?= =?us-ascii?q?BAQEYgS8BAQIYgw8ygiyNTAeDEp81CoI8h1GMSYJngkl9hx6ETot8jTaBOoF?= =?us-ascii?q?Nhy+FMI0bAgQCBAUCDgEBBYFpIoFYcBUaIYJsCUcYDYEajQODc4UUhUF0AoE?= =?us-ascii?q?njXMBJwSBBwGBDwEB?=
X-IronPort-AV: E=Sophos;i="5.70,487,1574121600"; d="scan'208";a="437007086"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Feb 2020 10:03:02 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 01QA32XX014511 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 26 Feb 2020 10:03:02 GMT
Received: from xhs-aln-003.cisco.com (173.37.135.120) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 26 Feb 2020 04:03:01 -0600
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 26 Feb 2020 04:03:01 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 26 Feb 2020 04:03:01 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OJTVrd0G9FhShuevtg/HB3CaamkOUBTrTZDsmvI//eOV8KUaL/zylbla8LD5jTcIR24MveyBQL6erLEbsOjzXDfJ/zKNQdRM1MVMW2Rcr+xJcMMgLEJiS1CmEC9yJ5vfARH3S7Epy/rJGFuyaoLXiSwqXXHgFN8AahhjrsZoHBW0nICP8gPtDTjB8HK/XwrmWoMAEws+2QIGbdhVk+5R8NUT/X+HIPOfg5qr5HjI+wv2pPNa8RCm8n3ih6xD0woLK4lXcZPzLCfNB0Zf4O04TTYpYU9MsNt0V1uI6lN6OZWm9jXCO7kN40BLxSScrUwCsc2IR4EPQzRpdZgFOhDMDw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D57NuQSYdKCJmiuh//Cz9gOApgiMXyP1yfuY68FEHjc=; b=k5uOQLVEPUvIkoJcz7Hw6WMJjvy7Dr1qSQ29OhJSi6uxbf8juezyD88M586XgSi1NbfVDShSSFk/+o8ptFxhdYzwcb8bLcKyqgLCTLYu+m/fpQILns5NMi2Ow8eLDT6Wnw7FuvdWXSvVS2L9ZalI3MeR86yCCCfm7s6kXfkkAWnB4dfS+/YvD13xJTSxWxO/vLA0iTFx7VzSd31uwscMtmWbtVe2ovmS3ZqCHKtzx0fzypG9VQbmUs6B+tl8xIeq7YEH3+wXGW0zfi//b4V1dnpnhDCEJ2dEOcW3xYJGPECvG8NTz0B2WGu0UDEd3BHBEroGJHzYeSGmuEN9MDURtQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=D57NuQSYdKCJmiuh//Cz9gOApgiMXyP1yfuY68FEHjc=; b=gFsTdmaTNIq2XHUwjeVGK7WVHI6i2xFZnrMTyMSePvIf8sidiYzDVAQKQouxr91C29/2gq+v0rqxU03r0A1SVTnXtOSPFALe9DKLPeNFHQvNhY6c7QMmVMzO/H4RVo3QjSWXHZ9gNrApfw2i+dRDo13dhsaCs3uskA4Oy9uIFGI=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4206.namprd11.prod.outlook.com (2603:10b6:208:188::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Wed, 26 Feb 2020 10:03:00 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Wed, 26 Feb 2020 10:03:00 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXsP+leryuA4u6PTwK1QY7Ar/2/jgAR78pw
Date: Wed, 26 Feb 2020 10:02:59 +0000
Message-ID: <MN2PR11MB4366839027EA71554A2E05BAB5EA0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E42C7@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E42C7@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.50]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8b537e52-8ee6-4965-3606-08d7baa30fa8
x-ms-traffictypediagnostic: MN2PR11MB4206:
x-microsoft-antispam-prvs: <MN2PR11MB4206C244C6DDFA1617D203A6B5EA0@MN2PR11MB4206.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(366004)(39860400002)(376002)(346002)(136003)(199004)(189003)(55016002)(33656002)(9686003)(26005)(7696005)(478600001)(316002)(966005)(186003)(86362001)(53546011)(6506007)(81156014)(81166006)(76116006)(5660300002)(52536014)(64756008)(8936002)(71200400001)(110136005)(2906002)(66556008)(66446008)(66574012)(66476007)(66946007)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4206; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 58Q9v3YsTU4PKp/2Fd7WCOdlSZXzXMjQP4cZfWSvW7XxAx7Eu1IDww8KE/YVuzfbs5yC8vAaztCdmfwNAD58A5b7YsmtyZ3AtrbOv3KlxUNUsUPxyMmffEpgIDDo1EVifOSKWSkLRSXHf5Wx4QxwCw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b537e52-8ee6-4965-3606-08d7baa30fa8
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 10:02:59.8673 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tzlp3yzMwfsD+fYKTllDYrx94UngrQJUPfk2V1BSNoN074yJCie8BdJwbiw2J7Iqergzch9Tpn7jQb2PKtFG7A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4206
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/BjumtdK2BJ3HEECWcsf6f9NfHYY>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 10:03:05 -0000
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From nobody Wed Feb 26 04:28:26 2020
Return-Path: <bill.wu@huawei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A79E03A094A for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 04:28:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yw5tz_haaSeG for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 04:28:21 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C35353A0945 for <netmod@ietf.org>; Wed, 26 Feb 2020 04:28:20 -0800 (PST)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 4571BAF4770A6F04B637 for <netmod@ietf.org>; Wed, 26 Feb 2020 12:28:18 +0000 (GMT)
Received: from DGGEML422-HUB.china.huawei.com (10.1.199.39) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 26 Feb 2020 12:28:17 +0000
Received: from DGGEML511-MBX.china.huawei.com ([169.254.1.89]) by dggeml422-hub.china.huawei.com ([10.1.199.39]) with mapi id 14.03.0439.000; Wed, 26 Feb 2020 20:28:14 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXsoAkozsA67961Tg6jiYKM+sl4qw==
Date: Wed, 26 Feb 2020 12:28:13 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAAD4E48C5@dggeml511-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/SrKwjPbqpspmj5RSIjqMS8IvW6Y>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 12:28:25 -0000
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=


From nobody Wed Feb 26 04:36:32 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 99E923A0973; Wed, 26 Feb 2020 04:36:22 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.118.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158272058255.17827.12174575765400449319@ietfa.amsl.com>
Date: Wed, 26 Feb 2020 04:36:22 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/tR-9mFkupYty2g4NXe2Zks2F4iw>
Subject: [netmod] I-D Action: draft-ietf-netmod-factory-default-14.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 12:36:23 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : A YANG Data Model for Factory Default Settings
        Authors         : Qin Wu
                          Balazs Lengyel
                          Ye Niu
	Filename        : draft-ietf-netmod-factory-default-14.txt
	Pages           : 12
	Date            : 2020-02-26

Abstract:
   This document defines a YANG data model to allow clients to reset a
   server back to its factory default condition.  It also defines a
   "factory-default" datastore to allow clients to read the factory
   default configuration for the device.

   The YANG data model in this document conforms to the Network
   Management Datastore Architecture (NMDA) defined in RFC 8342.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-factory-default/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-factory-default-14
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-factory-default-14

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-factory-default-14


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/



From nobody Wed Feb 26 04:49:49 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D5C03A09B5 for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 04:49:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level: 
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=lsJefgTo; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=I8ybBLRE
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HqioXdDfWBQN for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 04:49:45 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7668E3A09B4 for <netmod@ietf.org>; Wed, 26 Feb 2020 04:49:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11262; q=dns/txt; s=iport; t=1582721385; x=1583930985; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=/5j9Qg0tbPLgthprAEjyhW6BOcfZ14FM/39h4gItkEo=; b=lsJefgToSpn0PdSNmSBJy0ohvtM14sJdac7Oxu0NyhS5qGB67qO3Vqen giILYcWtJQvcv9eG+z6OrqxvvhS2MQbVNL3/bqYMr+tIpwmM9DeQxCZSH 462QhI3JyxfU9YzrsvjtvGfWf6BUaIjed7yYrukUgP5nzf8whBCNQfuuv U=;
IronPort-PHdr: =?us-ascii?q?9a23=3A2YTknxV7BTQthq+Q1vlZ9ERzliLV8LGuZFwc94?= =?us-ascii?q?YnhrRSc6+q45XlOgnF6O5wiEPSA92J8OpK3uzRta2oGXcN55qMqjgjSNRNTF?= =?us-ascii?q?dE7KdehAk8GIiAAEz/IuTtankgA8VGSFhj13q6KkNSXs35Yg6arw=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CwBQALaFZe/4YNJK1mHAEBAQEBBwE?= =?us-ascii?q?BEQEEBAEBgXuBVFAFbFggBAsqCoQKg0YDimGCX5gUgUKBEANUCQEBAQwBARg?= =?us-ascii?q?LCgIEAQGDe0UCF4FqJDgTAgMNAQEFAQEBAgEFBG2FNwyFYwEBAQEDAQEQERE?= =?us-ascii?q?MAQEsCwELBAIBBgIOAwEDAQEDAiMDAgICJQsUAQIGCAEBBAENBQgBEAmDBYJ?= =?us-ascii?q?KAy4BDpIzkGcCgTmIYnWBMoJ/AQEFgS8BAwIOQYMDGIIMCYEOKowkGoFBP4E?= =?us-ascii?q?RR4JMPoJZCwEBAQEBARiBLwEBAhiDDzKCLI1MB4MSnzUKgjyHUYxJgmeCSX2?= =?us-ascii?q?HHoROi3yNNoE6gU2HL4UwjRsCBAIEBQIOAQEFgWkigVhwFRohgmwJRxgNgRq?= =?us-ascii?q?NA4NzhRSFQXQCgSeNcwEnBIEHAYEPAQE?=
X-IronPort-AV: E=Sophos;i="5.70,488,1574121600"; d="scan'208";a="723887885"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Feb 2020 12:49:44 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 01QCniUt024931 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 26 Feb 2020 12:49:44 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 26 Feb 2020 06:49:43 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 26 Feb 2020 06:49:42 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 26 Feb 2020 07:49:42 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L/PEOi8/c+b8n9kSOuURtG70q18Pxq1fGoEg/Vzb8h3V8ly/y2OOCNeutGLc4bX0fFOsKOyCMZ+knn0myVNNbAc8oagfc8YZ/yHMOpr6FXptnOmqbQK0mrSO4WnE0Ng2+Nex4pGs0Rm6+z8LOCVHSi2wquPzYmU2nFuib/cFBeHmFhKFInRWeYMHqodtmfRs5LgT/SNhXByH6oo0/0WcsFiiuKODhd9siGKvI3AjcOEl7UlHcTxeu3mKGqSLIGC74jdODO2pX/OGaHQYd/WWiNjyafHQit8Nd8Xb2e/xeuIfZbOsTNFtF77JEACo/olKe+mggCi1mD+7YR/KR73FKQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/5j9Qg0tbPLgthprAEjyhW6BOcfZ14FM/39h4gItkEo=; b=hEHGrL7+Q8B08woIpk4b2i55Ug8XU1C5/C47Wc0LNu+fbAGThDj7h0/q6VtB+2HV3UG2lHBDC/aG1iddvMB0zXEi0hVDFf1q8nkfXpPjZ+Ed6Hp7T7drxGCm8etNu4/JB/kvmzyIvyLTIA7TY49unzwXBtdzQBzyDc6mm70qKsdV4fjOItGG5X9jOqLvKyjZmDus0zKJzclzMkxdQXCk0QvFdZo6yWzcPKAH2olfpRQAeFkjAwjwIMG4i9M0hRoxzNzlxwLTESpFNkZlSWBxy5BAEgWrVM8pGBTdz0tK1i0/JIQe64x/POlvM/ijWSi6Zuf4j5DlxCGafjLI/NRV4Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/5j9Qg0tbPLgthprAEjyhW6BOcfZ14FM/39h4gItkEo=; b=I8ybBLRE/Oe9qFDEM+GjaEPfrUlZFUJBH09aowQd1gvbAfUMtp/ZItBOwNjgz//swYgJzRcFv1RCpm7DCve52G+orKGWt2YN1rwRi0p+KklQytmsLP3Maz7qwTN8+HTJg9NYKpPU5F4he9mFpQcmGjcItHfHsDzuQEiTN/032dk=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4518.namprd11.prod.outlook.com (2603:10b6:208:24f::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2750.21; Wed, 26 Feb 2020 12:49:40 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2750.021; Wed, 26 Feb 2020 12:49:40 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Qin Wu <bill.wu@huawei.com>, Warren Kumari <warren@kumari.net>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netmod-factory-default-13.txt
Thread-Index: AdXsoAkozsA67961Tg6jiYKM+sl4qwAArNZg
Date: Wed, 26 Feb 2020 12:49:40 +0000
Message-ID: <MN2PR11MB4366927357DB4BB34F128F7EB5EA0@MN2PR11MB4366.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAAD4E48C5@dggeml511-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAAD4E48C5@dggeml511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [173.38.220.50]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dd552395-f6a9-41f5-6c63-08d7baba587d
x-ms-traffictypediagnostic: MN2PR11MB4518:
x-microsoft-antispam-prvs: <MN2PR11MB45183632FE917A235BFA674DB5EA0@MN2PR11MB4518.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0325F6C77B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(396003)(39860400002)(136003)(376002)(199004)(189003)(26005)(66574012)(66556008)(66446008)(7696005)(66476007)(6506007)(76116006)(55016002)(53546011)(9686003)(52536014)(478600001)(66946007)(64756008)(186003)(8676002)(316002)(33656002)(81156014)(966005)(8936002)(71200400001)(2906002)(4326008)(81166006)(110136005)(86362001)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4518; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: ySdhztzKNU6FjqLUHjrWIfSvx4ZIvyAVU1tVvZnTSzV/k7O0+EYwlKIvODsp1yRiYgSMDyGRbRXnNUlr+0ymoy4o23Fi8vY+AL4nnN8gahEr5RKGdbfXiHkbrmPvlBhqJ8T8MeqR8fRZpQ2iKyz9Aw==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: dd552395-f6a9-41f5-6c63-08d7baba587d
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Feb 2020 12:49:40.5843 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t01Aaku5iejsyGKNAqUKBqJ1b6ueEr5WX8Y/RhE4uu+CUc5UlPytqIZBdRbrvKxdGv49lTueN4Tl5rzuEZNq4g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4518
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/hx_jlDiGjE-eb0B_zzKhRlHGxeU>
Subject: Re: [netmod] I-D Action: draft-ietf-netmod-factory-default-13.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 12:49:48 -0000
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From nobody Wed Feb 26 10:10:51 2020
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16B5D3A0FC6 for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 10:10:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.787
X-Spam-Level: 
X-Spam-Status: No, score=-1.787 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1qK1VhNDvCa7 for <netmod@ietfa.amsl.com>; Wed, 26 Feb 2020 10:10:46 -0800 (PST)
Received: from mail-yw1-xc35.google.com (mail-yw1-xc35.google.com [IPv6:2607:f8b0:4864:20::c35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6DC23A0FBB for <netmod@ietf.org>; Wed, 26 Feb 2020 10:10:27 -0800 (PST)
Received: by mail-yw1-xc35.google.com with SMTP id x184so308471ywd.6 for <netmod@ietf.org>; Wed, 26 Feb 2020 10:10:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GpdAGInnPXSG8Cm/TSYk3WNyhyCQrEd1ee9PQiZjuxs=; b=mJwDAwXSEGOJB7QbZNMNBcV55MPM8sHZGcLqREijmIPTTGe7NZal0CQBx+zBcDyjIt SuKXMyseeWbVgOWQvQR4x5W+OBooPAzdixN/w+/is0wqHauTN9ZP0Z/Gvl4JCJn2fPQ8 DKmbhLbpKYbTmpk6y1ud1FTwibF67vy8qJ5fOZTly0Xwb3/EqrcCT7Yt8BlwTSlzfxd7 veMde0ZnErTXIA4TyQ8JSJ03zRMkf0h/MZoAp+1T4FPWpn1aBfY6309+ubkyY9mCcYmd nm6jq5sS5K+dotQAB7VHp3F7grhafb0sEjCuL1MDfQ1Ay5dPseIscVn2LQb27mCoi7Df QgGg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GpdAGInnPXSG8Cm/TSYk3WNyhyCQrEd1ee9PQiZjuxs=; b=ZCZRgOToRYcT5NtvDUd53+dHj0DrHP6t/QzdLugY1BXMk1lyOwCmavH7x9I95YGmcj Tq6OXC2eYdwfIdSYUdOVbn+Y/PlsgSmRuQ6aa+5ULjpPx3POoDgbqTCoV6ChSOzx0CgF 06X6m7nwKcMBq3ad2celfOu3vRxI3jLa146vqXionKYmRIkQqAroWj7j5IrEb6lCma1i 8+Zb5bxIQLyK2HLhh/pUDNkOfMjmlmyiA/+CmXgn/fnC1w3sqjwWOYCO5UrvSo72vhn5 KsZWmsy8Ok8BbOfG2GfIO12b3A3e7N0qKYMLCEjP/vm3p0aEP9FkBlrG7o8GX6/R3Hcn SIvQ==
X-Gm-Message-State: APjAAAXNfOpsNeajh1iHhQK/9h1jegQi5kmHppuzqUzh262pIfO2w8qk qrV1BsOiVx2d+Kv9GAlgkJWHmisY9/SG3xdCWjcGv8lT
X-Google-Smtp-Source: APXvYqwVNdBkSSE9H8q/Ima27NM+9UlPRLOLBcZ6/FXx9Mcdrn1zlq2GkrvCWB3IfiSF3TA0I7ExqML33HvoLdmUOsM=
X-Received: by 2002:a81:1155:: with SMTP id 82mr429332ywr.262.1582740624933; Wed, 26 Feb 2020 10:10:24 -0800 (PST)
MIME-Version: 1.0
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com> <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com> <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com>
In-Reply-To: <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Wed, 26 Feb 2020 10:10:14 -0800
Message-ID: <CABCOCHTJoxJ7RLUTQRdWf8CjfvmjrLUYHsidZEmKPeUOxeJGKw@mail.gmail.com>
To: Alexander Clemm <alex@futurewei.com>
Cc: Tianran Zhou <zhoutianran@huawei.com>, Joel Jaeggli <joelja@bogus.com>,  "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b89bbd059f7e84d8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/_J7Xj8y8dL5a0hGBUAw6fE9-68I>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Feb 2020 18:10:49 -0000

--000000000000b89bbd059f7e84d8
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi,


On Tue, Feb 25, 2020 at 5:57 PM Alexander Clemm <alex@futurewei.com> wrote:

> In my view, an ECA model allows to define rules for events =E2=80=93 cond=
itions =E2=80=93
> actions, i.e. what actions to perform when an event occurs and a conditio=
n
> met.  A smart filter filters an input stream, letting some objects pass b=
ut
> not others.  They are not the same.
>
>
>
> There is a connection in that you could define the passing of an object b=
y
> a smart filter as an event.  So, it is conceivable to include an ability =
to
> define events in this draft. If this is the intent it should be stated so
> clearly.  The question then becomes if you would want those be used also
> independently of the ECA model =E2=80=93 there may be benefit in defining=
 a new
> event without tying it to a rule (i.e. a condition and action) but simply
> emitting it.  (Same thing for the timer notification, which might have us=
es
> beyond ECA.) In the draft these things are all mashed together, but
> separating the ability to define an event from the ability to specify an
> ECA rule (which refers to / is triggered by an event) can benefit
> reusability.
>
>
>
> Anyway, as mentioned I think this work is relevant and I would like to se=
e
> it go forward; IMHO some reframing and perhaps splitting of the draft
> should be considered whether that occurs before WG adoption or afterwards=
.
>
>
>

I do not agree that refactoring this draft solves any adoption issues.
YANG-based management already has events (specified with notification-stmt)=
.
The ECA data model should not duplicate other functionality such as alarms.
Any event that can be received on an event stream (RFC 8639) should
automatically
be usable in any ECA logic.  Working on a solution without agreement on
even the most
basic ECA architecture or problem scope is a recipe for failure.

Programming with YANG data models as the logic for conditions and actions
has never been proven to work.  Even the trivial examples are complex
and real-world use-cases seem near impossible. (nobody has ever provided on=
e
so we have to speculate). Achieving interoperability with a workable
solution
will not be easy. Other solutions have got "Hello world" to work, declared
victory,
and then went away forever.  Why will this time be different?


Andy





--- Alex
>
>
>
> *From:* Tianran Zhou <zhoutianran@huawei.com>
> *Sent:* Tuesday, February 25, 2020 4:44 PM
> *To:* Alexander Clemm <alex@futurewei.com>; Joel Jaeggli <joelja@bogus.co=
m>;
> netmod@ietf.org
> *Subject:* RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> Hi the authors,
>
>
>
> >=E2=80=9CAnother one to allow the definition of custom events/notificati=
ons, or
> smart filters for push updates.  (We should bring back the earlier draft.=
)=E2=80=9D
>
> As we worked on the smart filter before. We want to use the ECA model.
>
> It seems this model enabled the generic programmability. Can we just use
> it to program any filter or what potentially need to augment/customize fo=
r
> a specific model?
>
> Thanks,
>
> Tianran
>
>
>
> *From:* netmod [mailto:netmod-bounces@ietf.org <netmod-bounces@ietf.org>]=
 *On
> Behalf Of *Alexander Clemm
> *Sent:* Wednesday, February 26, 2020 4:01 AM
> *To:* Joel Jaeggli <joelja@bogus.com>; netmod@ietf.org
> *Subject:* Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> Hi,
>
>
>
> I support this draft and would like to see netmod work on this, but I do
> think some aspects need more maturing and parts of this probably should b=
e
> rescoped.  Should the draft be adopted now, or should it be improved firs=
t
> and adopted later?  Not sure.  I would like to see the work continue, so =
in
> that sense I would clearly like to see the work adopted; at the same  tim=
e
> there are a number of issues that IMHO really need to be addressed.
>
>
>
> I share some of the concerns raised by Juergen and Andy.  Specifically, I
> think the precise problem needs to be defined more clearly.  In the
> discussion it was mentioned RMON =E2=80=93 would it be that, or perhaps a=
 better
> analogy Event MIB?  Section 3 mentions that this is to specify trigger
> conditions for when to send push updates.  That is perhaps consistent wit=
h
> an Event MIB, but a slightly different problem from ECAs.  Section 4.2 th=
en
> proceeds to allow for the definition of =E2=80=9Cevents=E2=80=9D =E2=80=
=93 but really only defining
> a =E2=80=9Ctimer event=E2=80=9D, with the ECA model omitting tie-in e.g. =
with
> notifications.  Including a threshold mechanism here is a bit distracting
> and should perhaps be taken out =E2=80=93 while the crossing of a thresho=
ld might
> constitute an event, I don=E2=80=99t think this should be tied inside an =
ECA but be
> something that stands on its own.  (The prior draft on Smart Filters for
> Push Updates addressed this =E2=80=93 it has layed dormant for a while an=
d in this
> sense I can=E2=80=99t object for this work to be picked someplace else, b=
ut
> logically really it does not belong here but should be separate.)  The
> actions, finally, describe not simply management operations.  I understan=
d
> the intent is to have an escape mechanism allowing to =E2=80=9Ccall out=
=E2=80=9D other
> functions / scripts deployed at a device, but this intent needs to be
> called out more clearly.
>
>
>
> So, in summary, I think the WG should consider rescoping this draft a bit
> =E2=80=93 maybe divided into separate drafts, each addressing a separate =
concern,
> which will provide focus and make the problem being solved clearer:  One =
to
> define an ECA framework.  In this, clarify the invocation of actions, and
> allow for tie-in of notifications.  This would be this draft.  Another on=
e
> to allow the definition of custom events/notifications, or smart filters
> for push updates.  (We should bring back the earlier draft.)  A third one
> to perhaps allow for the definition of =E2=80=9Ccustom RPCs=E2=80=9D that=
 allow to invoke
> custom scripts/functions via Netconf/Restconf operations, then tie that ,
> which are then invoked using the regular RPC.  (This would be a new draft=
)
>
>
>
> --- Alex
>
>
>
> *From:* netmod <netmod-bounces@ietf.org> *On Behalf Of *Joel Jaeggli
> *Sent:* Tuesday, February 18, 2020 8:44 AM
> *To:* netmod@ietf.org
> *Subject:* [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> This email begins a 2 week working group adoption poll for:
>
>
> https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
> <https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftool=
s.ietf.org%2Fhtml%2Fdraft-wwx-netmod-event-yang-06&data=3D02%7C01%7Calex%40=
futurewei.com%7Cf00fff51c8fb423b991208d7ba54f73b%7C0fee8ff2a3b240189c753a1d=
5591fedc%7C1%7C0%7C637182746419078457&sdata=3DIVHfOxhE7fTkLJ132TEGAM7mmIxdq=
2546iftp%2FbU5YE%3D&reserved=3D0>
>
>
>
> Please voice your support or objections before the poll completes on Marc=
h
> 3rd.
>
>
>
> Thanks
>
> joel
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--000000000000b89bbd059f7e84d8
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi,</div><div><br></div><br><div class=3D"gmail_quote=
"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Feb 25, 2020 at 5:57 PM Ale=
xander Clemm &lt;<a href=3D"mailto:alex@futurewei.com">alex@futurewei.com</=
a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"EN-US">
<div class=3D"gmail-m_4687965674855867860WordSection1">
<p class=3D"MsoNormal">In my view, an ECA model allows to define rules for =
events =E2=80=93 conditions =E2=80=93 actions, i.e. what actions to perform=
 when an event occurs and a condition met.=C2=A0 A smart filter filters an =
input stream, letting some objects pass but not others.=C2=A0
 They are not the same.=C2=A0 <u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">There is a connection in that you could define the p=
assing of an object by a smart filter as an event.=C2=A0 So, it is conceiva=
ble to include an ability to define events in this draft. If this is the in=
tent it should be stated so clearly.=C2=A0 The
 question then becomes if you would want those be used also independently o=
f the ECA model =E2=80=93 there may be benefit in defining a new event with=
out tying it to a rule (i.e. a condition and action) but simply emitting it=
.=C2=A0 (Same thing for the timer notification,
 which might have uses beyond ECA.) In the draft these things are all mashe=
d together, but separating the ability to define an event from the ability =
to specify an ECA rule (which refers to / is triggered by an event) can ben=
efit reusability.=C2=A0
<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Anyway, as mentioned I think this work is relevant a=
nd I would like to see it go forward; IMHO some reframing and perhaps split=
ting of the draft should be considered whether that occurs before WG adopti=
on or afterwards.=C2=A0
<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0</p></div></div></blockquote><div><br><=
/div><div>I do not agree that refactoring this draft solves any adoption is=
sues.</div><div>YANG-based management already has events (specified with no=
tification-stmt).</div><div>The ECA data model should not duplicate other f=
unctionality such as alarms.</div><div>Any event that can be received on an=
 event stream (RFC 8639) should automatically</div><div>be usable in any EC=
A logic.=C2=A0 Working on a solution without agreement on even the most</di=
v><div>basic ECA architecture or problem scope is a recipe for failure.</di=
v><div><br></div><div>Programming with YANG data models as the logic for co=
nditions and actions</div><div>has never been proven to work.=C2=A0 Even th=
e trivial examples are complex</div><div>and real-world use-cases seem near=
 impossible. (nobody has ever provided one</div><div>so we have to speculat=
e). Achieving interoperability with a workable solution</div><div>will not =
be easy. Other solutions have got &quot;Hello world&quot; to work, declared=
 victory,</div><div>and then went away forever.=C2=A0 Why will this time be=
 different?</div><div><br></div><div><br></div><div>Andy</div><div><br></di=
v><div><br></div><div><br></div><div><br></div><div><br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex"><div lang=3D"EN-US"><div class=3D"gmai=
l-m_4687965674855867860WordSection1"><p class=3D"MsoNormal"><u></u></p>
<p class=3D"MsoNormal">--- Alex<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> Tianran Zhou &lt;<a href=3D"mailto:zhou=
tianran@huawei.com" target=3D"_blank">zhoutianran@huawei.com</a>&gt; <br>
<b>Sent:</b> Tuesday, February 25, 2020 4:44 PM<br>
<b>To:</b> Alexander Clemm &lt;<a href=3D"mailto:alex@futurewei.com" target=
=3D"_blank">alex@futurewei.com</a>&gt;; Joel Jaeggli &lt;<a href=3D"mailto:=
joelja@bogus.com" target=3D"_blank">joelja@bogus.com</a>&gt;; <a href=3D"ma=
ilto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br>
<b>Subject:</b> RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Hi the authors,=
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)"><u></u>=C2=A0<u=
></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">&gt;=E2=80=9CAn=
other one to allow the definition of custom events/notifications, or smart =
filters for push updates.=C2=A0 (We should bring back the earlier draft.)=
=E2=80=9D<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">As we worked on=
 the smart filter before. We want to use the ECA model.<u></u><u></u></span=
></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">It seems this m=
odel enabled the generic programmability. Can we just use it to program any=
 filter or what potentially need to augment/customize for a specific model?=
<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Thanks,<u></u><=
u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)">Tianran<u></u><=
u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(31,73,125)"><u></u>=C2=A0<u=
></u></span></p>
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> netmod [<a href=3D"mailto:netmod-bounce=
s@ietf.org" target=3D"_blank">mailto:netmod-bounces@ietf.org</a>]
<b>On Behalf Of </b>Alexander Clemm<br>
<b>Sent:</b> Wednesday, February 26, 2020 4:01 AM<br>
<b>To:</b> Joel Jaeggli &lt;<a href=3D"mailto:joelja@bogus.com" target=3D"_=
blank">joelja@bogus.com</a>&gt;;
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<b>Subject:</b> Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">I support this draft and would like to see netmod wo=
rk on this, but I do think some aspects need more maturing and parts of thi=
s probably should be rescoped.=C2=A0 Should the draft be adopted now, or sh=
ould it be improved first and adopted later?=C2=A0
 Not sure.=C2=A0 I would like to see the work continue, so in that sense I =
would clearly like to see the work adopted; at the same=C2=A0 time there ar=
e a number of issues that IMHO really need to be addressed.=C2=A0
<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">I share some of the concerns raised by Juergen and A=
ndy.=C2=A0 Specifically, I think the precise problem needs to be defined mo=
re clearly.=C2=A0 In the discussion it was mentioned RMON =E2=80=93 would i=
t be that, or perhaps a better analogy Event MIB?=C2=A0 Section
 3 mentions that this is to specify trigger conditions for when to send pus=
h updates.=C2=A0 That is perhaps consistent with an Event MIB, but a slight=
ly different problem from ECAs.=C2=A0 Section 4.2 then proceeds to allow fo=
r the definition of =E2=80=9Cevents=E2=80=9D =E2=80=93 but really
 only defining a =E2=80=9Ctimer event=E2=80=9D, with the ECA model omitting=
 tie-in e.g. with notifications.=C2=A0 Including a threshold mechanism here=
 is a bit distracting and should perhaps be taken out =E2=80=93 while the c=
rossing of a threshold might constitute an event, I don=E2=80=99t think
 this should be tied inside an ECA but be something that stands on its own.=
=C2=A0 (The prior draft on Smart Filters for Push Updates addressed this =
=E2=80=93 it has layed dormant for a while and in this sense I can=E2=80=99=
t object for this work to be picked someplace else, but
 logically really it does not belong here but should be separate.)=C2=A0 Th=
e actions, finally, describe not simply management operations.=C2=A0 I unde=
rstand the intent is to have an escape mechanism allowing to =E2=80=9Ccall =
out=E2=80=9D other functions / scripts deployed at a device,
 but this intent needs to be called out more clearly.=C2=A0 <u></u><u></u><=
/p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">So, in summary, I think the WG should consider resco=
ping this draft a bit =E2=80=93 maybe divided into separate drafts, each ad=
dressing a separate concern, which will provide focus and make the problem =
being solved clearer:=C2=A0 One to define an ECA
 framework.=C2=A0 In this, clarify the invocation of actions, and allow for=
 tie-in of notifications.=C2=A0 This would be this draft.=C2=A0 Another one=
 to allow the definition of custom events/notifications, or smart filters f=
or push updates.=C2=A0 (We should bring back the earlier
 draft.)=C2=A0 A third one to perhaps allow for the definition of =E2=80=9C=
custom RPCs=E2=80=9D that allow to invoke custom scripts/functions via Netc=
onf/Restconf operations, then tie that , which are then invoked using the r=
egular RPC.=C2=A0 (This would be a new draft)=C2=A0
<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">--- Alex<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> netmod &lt;<a href=3D"mailto:netmod-bou=
nces@ietf.org" target=3D"_blank">netmod-bounces@ietf.org</a>&gt;
<b>On Behalf Of </b>Joel Jaeggli<br>
<b>Sent:</b> Tuesday, February 18, 2020 8:44 AM<br>
<b>To:</b> <a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf=
.org</a><br>
<b>Subject:</b> [netmod] Adoption poll for draft-wwx-netmod-event-yang<u></=
u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">This email begins a 2 week working group adoption po=
ll for: <u></u>
<u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><br>
<a href=3D"https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Ftools.ietf.org%2Fhtml%2Fdraft-wwx-netmod-event-yang-06&amp;data=3D02%7C=
01%7Calex%40futurewei.com%7Cf00fff51c8fb423b991208d7ba54f73b%7C0fee8ff2a3b2=
40189c753a1d5591fedc%7C1%7C0%7C637182746419078457&amp;sdata=3DIVHfOxhE7fTkL=
J132TEGAM7mmIxdq2546iftp%2FbU5YE%3D&amp;reserved=3D0" target=3D"_blank">htt=
ps://tools.ietf.org/html/draft-wwx-netmod-event-yang-06</a><u></u><u></u></=
p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><u></u>=C2=A0<u></u></p=
>
</div>
<div>
<p class=3D"MsoNormal">Please voice your support or objections before the p=
oll completes on March 3rd.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><u></u>=C2=A0<u></u></p=
>
</div>
<p class=3D"MsoNormal">Thanks<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">joel<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>

_______________________________________________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--000000000000b89bbd059f7e84d8--


From nobody Wed Feb 26 20:03:15 2020
Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 375153A106F; Wed, 26 Feb 2020 20:03:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level: 
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id klbIYy4wmP9W; Wed, 26 Feb 2020 20:03:12 -0800 (PST)
Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF3D83A106E; Wed, 26 Feb 2020 20:03:11 -0800 (PST)
Received: by mail-qk1-x72b.google.com with SMTP id m2so1880034qka.7; Wed, 26 Feb 2020 20:03:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=date:from:to:cc:message-id:in-reply-to:references:subject :mime-version; bh=Gag7cTB0HFAuOTRwY3Zokrt+7j6kaqYoI8PAyX18T3I=; b=d251ZuOYs2z3DBCfAvQF8tvCc9OB655VNzjEqZ95DcJaIKXSidU4RoQA/rnXCsA3J0 Y8ZCKMBFkt8lVgmMrGZQGIN7ZWh6QVJQeoymGlw+8HpGW7QR+7bqrzjwbxZ1ERfHxKwk Ai1rNZ7sRlCYjuEXIDyIOPmM2uCIDxrC5UxYtg23UYl2vpi+U7O7B4Tl1+z5un7OgMda P4u19m41zQYDtJIlXxNVh9H1VLzEy8+DO/tELo5KU90ltaqXrWwXGWwKx6jS6uQivwlg x/F/O0SenVkXdCjr5WpC4Ilbv8FyP9LPlrjW0OXZR4MxdJeEFWsyd4D/Bgeux0/+Xt/k VZwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:message-id:in-reply-to :references:subject:mime-version; bh=Gag7cTB0HFAuOTRwY3Zokrt+7j6kaqYoI8PAyX18T3I=; b=gMYRsYDLKZdgfNBVC8VkDIC8rNmCDH/0oz73iYyyG8lNrRq3EqB9EBseHs0woQcjn8 JzDaeQfzW4JlN3z9vH+MmrCGvRdW3l4LTMnEVRJ1+NqVTea5hJxUBhx6tpRmhxVVhxnO txOZ3d6MhGtiZyS2n5ZPPN8z9NEU0SANBV6nkLJL72OaVqASrgCJrV6nz+sOX6zPFqQS //6nEvzipJlxsdSNtTrFvglJGeJcmw0UMC8tHg4EHnchYRDqWl63NLtSg+cQFxDbq1i7 yQNrI0YiHZgpU1zGGbYxf/6cP4UMuc2Sx13d3hLcl1r6thQt+WtJA9acD2LNAHR296Pw 2uVg==
X-Gm-Message-State: APjAAAURdgdHwotloBDPMMNR9JIglnKFdnsczAX31TEEzmEC1SODm3N0 cGi2X840SlGZzPzELScFYE8=
X-Google-Smtp-Source: APXvYqyS+58KiYJw1/QN0G35P/NK+t5jYUdWQo6y9OmHFube6Qze76arNYB/xICmsIL/URNOF4fkDw==
X-Received: by 2002:a05:620a:492:: with SMTP id 18mr3174733qkr.142.1582776190951;  Wed, 26 Feb 2020 20:03:10 -0800 (PST)
Received: from [172.20.1.150] (rrcs-24-103-231-30.nyc.biz.rr.com. [24.103.231.30]) by smtp.gmail.com with ESMTPSA id t30sm2360396qtd.67.2020.02.26.20.03.10 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 26 Feb 2020 20:03:10 -0800 (PST)
Date: Wed, 26 Feb 2020 23:03:03 -0500
From: Jeff Tantsura <jefftant.ietf@gmail.com>
To: Joel Jaeggli <joelja@bogus.com>
Cc: "=?utf-8?Q?draft-ietf-netmod-nmda-diff=40ietf.org?=" <draft-ietf-netmod-nmda-diff@ietf.org>, netmod@ietf.org
Message-ID: <f954fa76-5fea-43c5-9149-2c7ea0f8f0fb@Spark>
In-Reply-To: <95377678-1417-4C30-BAD5-16E8DABE9360@gmail.com>
References: <95377678-1417-4C30-BAD5-16E8DABE9360@gmail.com>
X-Readdle-Message-ID: f954fa76-5fea-43c5-9149-2c7ea0f8f0fb@Spark
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="5e573f7d_d34b6a8_ba8d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/nZP0aecXQC1_MCIfAXjsmID2QE8>
Subject: Re: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2020 04:03:13 -0000

--5e573f7d_d34b6a8_ba8d
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Joel,

Corrected statement -=C2=A0No, I'm not aware of any IPR that applies to t=
his draft that has not been previously disclosed.

Cheers,
Jeff
On =46eb 26, 2020, 1:42 AM -0500, Jeff Tantsura <jefftant.ietf=40gmail.co=
m>, wrote:
> Joel,
>
> No, I'm not aware of any IPR that applies to this draft.
>
> Cheers,
> Jeff
>
> > On =46eb 17, 2020, at 11:44, Joel Jaeggli <joelja=40bogus.com> wrote:=

> >
> > No, I'm not aware of any IPR that applies to this draft

--5e573f7d_d34b6a8_ba8d
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<html xmlns=3D=22http://www.w3.org/1999/xhtml=22>
<head>
<title></title>
</head>
<body>
<div name=3D=22messageBodySection=22>
<div dir=3D=22auto=22>
<div dir=3D=22auto=22>Joel,</div>
<div dir=3D=22auto=22><br /></div>
Corrected statement -&=23160;<span style=3D=22color: var(--textColor); ba=
ckground-color: var(--backgroundColor);=22>No, I'm not aware of any IPR t=
hat applies to this draft that has not been previously disclosed.&=23160;=
</span></div>
</div>
<div name=3D=22messageSignatureSection=22><br />
<div class=3D=22match=46ont=22>Cheers,
<div>Jeff</div>
</div>
</div>
<div name=3D=22messageReplySection=22>On =46eb 26, 2020, 1:42 AM -0500, J=
eff Tantsura &lt;jefftant.ietf=40gmail.com&gt;, wrote:<br />
<blockquote type=3D=22cite=22 class=3D=22spark=5Fquote=22 style=3D=22marg=
in: 5px 5px; padding-left: 10px; border-left: thin solid =231abc9c;=22>=EF=
=BB=BFJoel,<br />
<br />
No, I'm not aware of any IPR that applies to this draft.<br />
<br />
Cheers,<br />
Jeff<br />
<br />
<blockquote type=3D=22cite=22 class=3D=22spark=5Fquote=22 style=3D=22marg=
in: 5px 5px; padding-left: 10px; border-left: thin solid =23e67e22;=22>On=
 =46eb 17, 2020, at 11:44, Joel Jaeggli &lt;joelja=40bogus.com&gt; wrote:=
<br />
<br />
No, I'm not aware of any IPR that applies to this draft<br /></blockquote=
>
</blockquote>
</div>
</body>
</html>

--5e573f7d_d34b6a8_ba8d--


From nobody Thu Feb 27 06:30:33 2020
Return-Path: <i_bryskin@yahoo.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51DB53A0A09 for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 06:30:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PV4x3a5TYgnz for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 06:30:28 -0800 (PST)
Received: from sonic301-31.consmr.mail.ne1.yahoo.com (sonic301-31.consmr.mail.ne1.yahoo.com [66.163.184.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D6173A0A08 for <netmod@ietf.org>; Thu, 27 Feb 2020 06:30:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1582813827; bh=6KRkqxlp1vpxir0nEAALkLd5gKUKN0i8XOVo+PrHFH4=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From:Subject; b=rfrjWAHWs+5qy0aBwz9SUdTkkozCsHBm2UUC3dS1foFn0Rw3TlK30SscvpJcoSJaEVnnqUfp6wUOiWahqMB/Q8ImutZU6ypaZvrJ1+gep8w42GZWoNf/ZkJiaQIG9aXVmZdqDvgvVvXenU+59IfpPevFXFqA5xTS8xsZRxk8Kh8YJnUgSalRVVEfZ8Ix2hJSQxiC44yJN0t3fzMTCp2k5kUuxDEI26elYjuS5gCwbcnky1QbQ3BA6STdZ5w6wkeVuQ/h6DzhndLZUx9/0xsvkWVoBAh61ZaNfynAVqtTfjGWsD/y/QAFrLXYukJNSMNbVZm7dYF8nn6N+DDdkwyYbg==
X-YMail-OSG: ydaLkdQVM1ko3YYFYZRMBZzQvGtFf8JNZb7GXu1Y26VnxS9xpxWIeBmFUdYqdUV .PqwmLTt7v8g6qJh7wVCgxBEpEhxA1hHzfG_4lP0vPRydqdLgTdRBwoN5Un8hUeEDG3ECxA1X8bf J__8YqX9FTTG9Tf3_ghyRZWXM8sR7.N08_x0HlpXLft7m56eWcjLNKVYpqH8eSg9b4smT8LFiZLg Le1hAR57lnWIvjGtEVylYKQzpgoIuwQvF6NmKXH40tp4YfZ8TxlZj1_q5SrLRkSBm3JJMF7rjkUX wF8W2N649dHYFHPqjXr3BENfAtiSGdVogTCSsoExohEaVjpkmPkwpJN1bpunQsPCNZVbYO.0mavw 9WKBUkkE.vnnhU9m1DwRtlqwdtWZ8OczdN2lVbRb8rIhgQ2gLIVxTZSjZY6bZnFJq5exX.bxAZd2 .ebbj_QNfl7wFVP0b1qeDaN0gjmSrxZVvbrE2CZHd4sblG8SnotmIvMY5SpsnU8RdfOpHSMCiN6U 0y0ZJ6nCb2R57Lqd4qD2uzTmklafC7kUkz6OzikX.zh1TKybziLdIviA5ASJXt3RER0IdEv0UJzS XCfgC8Mobf5ZH6hqnS3jS3sEMA0lFaEDiE3R2Em6U5RSLuGrc2DYW4YVy2gqOdegSkYdxw2NfXgf UXC5O1OyxOL8YJ5A9JXK2WIJ6sMpefaRDIDosTlInQ8fptFdwK.C9UfzmtJ1Qz9t2yJCC77ocsGt GoKqRGOC1wvfYMJcRrmUViX_vuvZR_PY4uC87GRxuPa0wpgS3U9ydKyPxtWKCppG4BF.I7XyLgk. QM2WHcmNQOIA5O6x9pAtBP3yZhNRozLx3ckwcGsMeSkeiHsb.3fXitYIh.mz3oeXamD.gk8NFA4l Ha60s0U3nmAXkHxAvCt72ZKSwYxhdjr7BnuPuK._TvxvdeDu1O8qiV_NJCFlPgh1MziKx37CO9x. 868FtoApSCsfwr8ULEnGVbI7HxUhqxbHcckI7p606mL7tKXcGscZL.2w_SCUxrHDbU6jsVl2_V7K ao8wswM0iED7KR4N5_j6l3hd1YnsVl28A5FqfiHLiv6WuoYMfAoFL.YD0k4Hm80mLJTfVwMowe5N iY3DIre7wJ9COdmAyavLvWmakEimXMoCm8imnp22BnyOFcVa6D8UvmziJt5wOOcjYVS679FQJNAl OxSzHU_O1EXF4rLpWr5bb2vpLEhVEm_bEPRMFQaTXBm61op4GsjeYgEPMBg6Q2.TqHR2hgXc.vFG YcZNfsmntkfwlkwF0vJZ2Xq1zmXhDGdmCh_DvUJHDOoiUj04x8TC.ffRdT_iZ.FHUIdH3Yi.Kv4r 1GZJXqqO9ckDETmEbDshZpMINmeMx0wOeAoHszlBKpw--
Received: from sonic.gate.mail.ne1.yahoo.com by sonic301.consmr.mail.ne1.yahoo.com with HTTP; Thu, 27 Feb 2020 14:30:27 +0000
Date: Thu, 27 Feb 2020 14:30:25 +0000 (UTC)
From: Igor Bryskin <i_bryskin@yahoo.com>
To: Alexander Clemm <alex@futurewei.com>, Andy Bierman <andy@yumaworks.com>
Cc: "netmod@ietf.org" <netmod@ietf.org>
Message-ID: <125136191.1383787.1582813825889@mail.yahoo.com>
In-Reply-To: <CABCOCHTJoxJ7RLUTQRdWf8CjfvmjrLUYHsidZEmKPeUOxeJGKw@mail.gmail.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com> <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com> <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com> <CABCOCHTJoxJ7RLUTQRdWf8CjfvmjrLUYHsidZEmKPeUOxeJGKw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;  boundary="----=_Part_1383786_1590471192.1582813825886"
X-Mailer: WebService/1.1.15302 YMailNorrin Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/fEGd-QNgFh4QJ4dh69bW5jZDfGU>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2020 14:30:32 -0000

------=_Part_1383786_1590471192.1582813825886
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

 Hi Andy, Jurgen, Alex and All,

I believe that YANG could be a useful participant in a successful ECA frame=
work if the following is kept in mind:


1. It is not feasible to realize an ECA framework relying solely on YANG.=
=C2=A0 It is reasonable to expect ECA capable servers to support to a suffi=
cient degree Xpath Expressions language and some sort of general purpose sc=
ripting=C2=A0 environment , such as Python, JunoScript, TCL/TKL, etc.;

2. ECA YANG model should define (and/or use definitions produced by other Y=
ANG models for) certain ECA components, such as Events, Policy Variables (P=
Vs) and Actions (e.g. network re-configurations, client notifications, invo=
king of RPCs, etc.), but everything to do with Conditions and logical and m=
athematical expressions (which should be expected to be potentially very co=
mplex), should be left to XPath (i.e. configured as XPath expression string=
s). Although it is possible to define elementary micro conditions, it would=
 be impractical (too tedious) for the clients to build conditions hierarchi=
cally (bottom up) and too cumbersome for the servers to process such constr=
ucts;

3.Likewise, it would be too demanding to expect servers implementing interp=
reters for specific purpose of interpretation of an ECA directly as it conf=
igured in YANG. Rather , it would be prudent to expect a server, upon recei=
ving an ECA configuration, to generate out of it a micro-script in a locall=
y supported scripting language and arrange said micro-script execution at t=
he moment of the Event (or timer) firing;

4. In short, the objective of the ECA YANG configuration is to provide a un=
iversal ECA representation that could be converted into a micro-script of t=
he server's choice.

What do you think?

Igor


    On Wednesday, February 26, 2020, 1:11:00 PM EST, Andy Bierman <andy@yum=
aworks.com> wrote: =20
=20
 Hi,

On Tue, Feb 25, 2020 at 5:57 PM Alexander Clemm <alex@futurewei.com> wrote:


In my view, an ECA model allows to define rules for events =E2=80=93 condit=
ions =E2=80=93 actions, i.e. what actions to perform when an event occurs a=
nd a condition met.=C2=A0 A smart filter filters an input stream, letting s=
ome objects pass but not others.=C2=A0 They are not the same.=C2=A0=20

=C2=A0

There is a connection in that you could define the passing of an object by =
a smart filter as an event.=C2=A0 So, it is conceivable to include an abili=
ty to define events in this draft. If this is the intent it should be state=
d so clearly.=C2=A0 The question then becomes if you would want those be us=
ed also independently of the ECA model =E2=80=93 there may be benefit in de=
fining a new event without tying it to a rule (i.e. a condition and action)=
 but simply emitting it..=C2=A0 (Same thing for the timer notification, whi=
ch might have uses beyond ECA.) In the draft these things are all mashed to=
gether, but separating the ability to define an event from the ability to s=
pecify an ECA rule (which refers to / is triggered by an event) can benefit=
 reusability.=C2=A0

=C2=A0

Anyway, as mentioned I think this work is relevant and I would like to see =
it go forward; IMHO some reframing and perhaps splitting of the draft shoul=
d be considered whether that occurs before WG adoption or afterwards.=C2=A0

=C2=A0


I do not agree that refactoring this draft solves any adoption issues.YANG-=
based management already has events (specified with notification-stmt).The =
ECA data model should not duplicate other functionality such as alarms.Any =
event that can be received on an event stream (RFC 8639) should automatical=
lybe usable in any ECA logic.=C2=A0 Working on a solution without agreement=
 on even the mostbasic ECA architecture or problem scope is a recipe for fa=
ilure.
Programming with YANG data models as the logic for conditions and actionsha=
s never been proven to work.=C2=A0 Even the trivial examples are complexand=
 real-world use-cases seem near impossible. (nobody has ever provided oneso=
 we have to speculate). Achieving interoperability with a workable solution=
will not be easy. Other solutions have got "Hello world" to work, declared =
victory,and then went away forever.=C2=A0 Why will this time be different?

Andy








--- Alex

=C2=A0

From: Tianran Zhou <zhoutianran@huawei.com>=20
Sent: Tuesday, February 25, 2020 4:44 PM
To: Alexander Clemm <alex@futurewei.com>; Joel Jaeggli <joelja@bogus.com>; =
netmod@ietf.org
Subject: RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang

=C2=A0

Hi the authors,

=C2=A0

>=E2=80=9CAnother one to allow the definition of custom events/notification=
s, or smart filters for push updates.=C2=A0 (We should bring back the earli=
er draft.)=E2=80=9D

As we worked on the smart filter before. We want to use the ECA model.

It seems this model enabled the generic programmability. Can we just use it=
 to program any filter or what potentially need to augment/customize for a =
specific model?

Thanks,

Tianran

=C2=A0

From: netmod [mailto:netmod-bounces@ietf.org]On Behalf Of Alexander Clemm
Sent: Wednesday, February 26, 2020 4:01 AM
To: Joel Jaeggli <joelja@bogus.com>;netmod@ietf.org
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang

=C2=A0

Hi,

=C2=A0

I support this draft and would like to see netmod work on this, but I do th=
ink some aspects need more maturing and parts of this probably should be re=
scoped.=C2=A0 Should the draft be adopted now, or should it be improved fir=
st and adopted later?=C2=A0 Not sure.=C2=A0 I would like to see the work co=
ntinue, so in that sense I would clearly like to see the work adopted; at t=
he same=C2=A0 time there are a number of issues that IMHO really need to be=
 addressed.=C2=A0

=C2=A0

I share some of the concerns raised by Juergen and Andy.=C2=A0 Specifically=
, I think the precise problem needs to be defined more clearly.=C2=A0 In th=
e discussion it was mentioned RMON =E2=80=93 would it be that, or perhaps a=
 better analogy Event MIB?=C2=A0 Section 3 mentions that this is to specify=
 trigger conditions for when to send push updates.=C2=A0 That is perhaps co=
nsistent with an Event MIB, but a slightly different problem from ECAs.=C2=
=A0 Section 4.2 then proceeds to allow for the definition of =E2=80=9Cevent=
s=E2=80=9D =E2=80=93 but really only defining a =E2=80=9Ctimer event=E2=80=
=9D, with the ECA model omitting tie-in e.g. with notifications.=C2=A0 Incl=
uding a threshold mechanism here is a bit distracting and should perhaps be=
 taken out =E2=80=93 while the crossing of a threshold might constitute an =
event, I don=E2=80=99t think this should be tied inside an ECA but be somet=
hing that stands on its own.=C2=A0 (The prior draft on Smart Filters for Pu=
sh Updates addressed this =E2=80=93 it has layed dormant for a while and in=
 this sense I can=E2=80=99t object for this work to be picked someplace els=
e, but logically really it does not belong here but should be separate.)=C2=
=A0 The actions, finally, describe not simply management operations.=C2=A0 =
I understand the intent is to have an escape mechanism allowing to =E2=80=
=9Ccall out=E2=80=9D other functions / scripts deployed at a device, but th=
is intent needs to be called out more clearly.=C2=A0=20

=C2=A0

So, in summary, I think the WG should consider rescoping this draft a bit =
=E2=80=93 maybe divided into separate drafts, each addressing a separate co=
ncern, which will provide focus and make the problem being solved clearer:=
=C2=A0 One to define an ECA framework.=C2=A0 In this, clarify the invocatio=
n of actions, and allow for tie-in of notifications.=C2=A0 This would be th=
is draft.=C2=A0 Another one to allow the definition of custom events/notifi=
cations, or smart filters for push updates.=C2=A0 (We should bring back the=
 earlier draft.)=C2=A0 A third one to perhaps allow for the definition of =
=E2=80=9Ccustom RPCs=E2=80=9D that allow to invoke custom scripts/functions=
 via Netconf/Restconf operations, then tie that , which are then invoked us=
ing the regular RPC.=C2=A0 (This would be a new draft)=C2=A0

=C2=A0

--- Alex

=C2=A0

From: netmod <netmod-bounces@ietf.org>On Behalf Of Joel Jaeggli
Sent: Tuesday, February 18, 2020 8:44 AM
To: netmod@ietf..org
Subject: [netmod] Adoption poll for draft-wwx-netmod-event-yang

=C2=A0

This email begins a 2 week working group adoption poll for:=20


https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06

=C2=A0

Please voice your support or objections before the poll completes on March =
3rd.

=C2=A0

Thanks

joel
_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod
 =20
------=_Part_1383786_1590471192.1582813825886
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<html><head></head><body><div class=3D"ydp2934b01fyahoo-style-wrap" style=
=3D"font-family: Helvetica, Arial, sans-serif; font-size: 13px;"><div></div=
>
        <div dir=3D"ltr" data-setdir=3D"false"><div><div dir=3D"ltr" data-s=
etdir=3D"false"><div>Hi Andy, Jurgen, Alex and All,<br><div dir=3D"ltr" dat=
a-setdir=3D"false"><br><div>I believe that YANG could be a useful participa=
nt in a successful ECA framework if the following is kept in mind:<br></div=
></div></div><div><br><div><br><div>1. It is not feasible to realize an ECA=
 framework relying solely on=20
YANG.&nbsp; It is reasonable to expect ECA capable servers to support to a=
=20
sufficient degree Xpath Expressions language and some sort of general=20
purpose scripting&nbsp; environment , such as Python, JunoScript, TCL/TKL,=
=20
etc.;<br><br></div></div></div></div><div>2. ECA YANG model should define=
=20
(and/or use definitions produced by other YANG models for) certain ECA comp=
onents, such as Events, Policy Variables (PVs) and=20
Actions (e.g. network re-configurations, client notifications, invoking=20
of RPCs, etc.), but everything to do with Conditions and logical and=20
mathematical expressions (which should be expected to be potentially=20
very complex), should be left to XPath (i.e. configured as XPath=20
expression strings). Although it is possible to define elementary micro=20
conditions, it would be impractical (too tedious) for the clients to=20
build conditions hierarchically (bottom up) and too cumbersome for the=20
servers to process such constructs;<br><br></div><div>3.Likewise, it=20
would be too demanding to expect servers implementing interpreters for=20
specific purpose of interpretation of an ECA directly as it configured=20
in YANG. Rather , it would be prudent to expect a server, upon receiving
 an ECA configuration, to generate out of it a micro-script in a locally
 supported scripting language and arrange said micro-script execution at
 the moment of the Event (or timer) firing;<br><br></div><div>4. In short, =
the=20
objective of the ECA YANG configuration is to provide a universal ECA=20
representation that could be converted into a micro-script of the=20
server's choice.<br><div dir=3D"ltr" data-setdir=3D"false"><br><div>What do=
 you think?<br><div dir=3D"ltr" data-setdir=3D"false"><br><div>Igor</div></=
div></div></div></div><br clear=3D"none"></div><div><br></div></div><div><b=
r></div>
       =20
        </div><div id=3D"yahoo_quoted_3461802742" class=3D"yahoo_quoted">
            <div style=3D"font-family:'Helvetica Neue', Helvetica, Arial, s=
ans-serif;font-size:13px;color:#26282a;">
               =20
                <div>
                    On Wednesday, February 26, 2020, 1:11:00 PM EST, Andy B=
ierman &lt;andy@yumaworks.com&gt; wrote:
                </div>
                <div><br></div>
                <div><br></div>
                <div><div id=3D"yiv9951459541"><div><div dir=3D"ltr"><div>H=
i,</div><div><br clear=3D"none"></div><br clear=3D"none"><div class=3D"yiv9=
951459541gmail_quote"><div class=3D"yiv9951459541gmail_attr" dir=3D"ltr">On=
 Tue, Feb 25, 2020 at 5:57 PM Alexander Clemm &lt;<a rel=3D"nofollow" shape=
=3D"rect" ymailto=3D"mailto:alex@futurewei.com" target=3D"_blank" href=3D"m=
ailto:alex@futurewei.com">alex@futurewei.com</a>&gt; wrote:<br clear=3D"non=
e"></div><blockquote class=3D"yiv9951459541gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex;">





<div lang=3D"EN-US">
<div class=3D"yiv9951459541gmail-m_4687965674855867860WordSection1">
<p class=3D"yiv9951459541MsoNormal">In my view, an ECA model allows to defi=
ne rules for events =E2=80=93 conditions =E2=80=93 actions, i.e. what actio=
ns to perform when an event occurs and a condition met.&nbsp; A smart filte=
r filters an input stream, letting some objects pass but not others.&nbsp;
 They are not the same.&nbsp; <u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">There is a connection in that you could=
 define the passing of an object by a smart filter as an event.&nbsp; So, i=
t is conceivable to include an ability to define events in this draft. If t=
his is the intent it should be stated so clearly.&nbsp; The
 question then becomes if you would want those be used also independently o=
f the ECA model =E2=80=93 there may be benefit in defining a new event with=
out tying it to a rule (i.e. a condition and action) but simply emitting it=
..&nbsp; (Same thing for the timer notification,
 which might have uses beyond ECA.) In the draft these things are all mashe=
d together, but separating the ability to define an event from the ability =
to specify an ECA rule (which refers to / is triggered by an event) can ben=
efit reusability.&nbsp;
<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">Anyway, as mentioned I think this work =
is relevant and I would like to see it go forward; IMHO some reframing and =
perhaps splitting of the draft should be considered whether that occurs bef=
ore WG adoption or afterwards.&nbsp;
<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;</p></div></div></blockquo=
te><div><br clear=3D"none"></div><div>I do not agree that refactoring this =
draft solves any adoption issues.</div><div>YANG-based management already h=
as events (specified with notification-stmt).</div><div>The ECA data model =
should not duplicate other functionality such as alarms.</div><div>Any even=
t that can be received on an event stream (RFC 8639) should automatically</=
div><div>be usable in any ECA logic.&nbsp; Working on a solution without ag=
reement on even the most</div><div>basic ECA architecture or problem scope =
is a recipe for failure.</div><div><br clear=3D"none"></div><div>Programmin=
g with YANG data models as the logic for conditions and actions</div><div>h=
as never been proven to work.&nbsp; Even the trivial examples are complex</=
div><div>and real-world use-cases seem near impossible. (nobody has ever pr=
ovided one</div><div>so we have to speculate). Achieving interoperability w=
ith a workable solution</div><div>will not be easy. Other solutions have go=
t "Hello world" to work, declared victory,</div><div>and then went away for=
ever.&nbsp; Why will this time be different?</div><div><br clear=3D"none"><=
/div><div><br clear=3D"none"></div><div>Andy</div><div class=3D"yiv99514595=
41yqt9291867774" id=3D"yiv9951459541yqtfd27340"><div><br clear=3D"none"></d=
iv><div><br clear=3D"none"></div><div><br clear=3D"none"></div><div><br cle=
ar=3D"none"></div><div><br clear=3D"none"></div><blockquote class=3D"yiv995=
1459541gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid=
 rgb(204,204,204);padding-left:1ex;"><div lang=3D"EN-US"><div class=3D"yiv9=
951459541gmail-m_4687965674855867860WordSection1"><p class=3D"yiv9951459541=
MsoNormal"><u></u></p>
<p class=3D"yiv9951459541MsoNormal">--- Alex<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt;">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in;">
<p class=3D"yiv9951459541MsoNormal"><b>From:</b> Tianran Zhou &lt;<a rel=3D=
"nofollow" shape=3D"rect" ymailto=3D"mailto:zhoutianran@huawei.com" target=
=3D"_blank" href=3D"mailto:zhoutianran@huawei.com">zhoutianran@huawei.com</=
a>&gt; <br clear=3D"none">
<b>Sent:</b> Tuesday, February 25, 2020 4:44 PM<br clear=3D"none">
<b>To:</b> Alexander Clemm &lt;<a rel=3D"nofollow" shape=3D"rect" ymailto=
=3D"mailto:alex@futurewei.com" target=3D"_blank" href=3D"mailto:alex@future=
wei.com">alex@futurewei.com</a>&gt;; Joel Jaeggli &lt;<a rel=3D"nofollow" s=
hape=3D"rect" ymailto=3D"mailto:joelja@bogus.com" target=3D"_blank" href=3D=
"mailto:joelja@bogus.com">joelja@bogus.com</a>&gt;; <a rel=3D"nofollow" sha=
pe=3D"rect" ymailto=3D"mailto:netmod@ietf.org" target=3D"_blank" href=3D"ma=
ilto:netmod@ietf.org">netmod@ietf.org</a><br clear=3D"none">
<b>Subject:</b> RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">H=
i the authors,<u></u><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);"><=
u></u>&nbsp;<u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">&=
gt;=E2=80=9CAnother one to allow the definition of custom events/notificati=
ons, or smart filters for push updates.&nbsp; (We should bring back the ear=
lier draft.)=E2=80=9D<u></u><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">A=
s we worked on the smart filter before. We want to use the ECA model.<u></u=
><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">I=
t seems this model enabled the generic programmability. Can we just use it =
to program any filter or what potentially need to augment/customize for a s=
pecific model?<u></u><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">T=
hanks,<u></u><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);">T=
ianran<u></u><u></u></span></p>
<p class=3D"yiv9951459541MsoNormal"><span style=3D"color:rgb(31,73,125);"><=
u></u>&nbsp;<u></u></span></p>
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in;">
<p class=3D"yiv9951459541MsoNormal"><b>From:</b> netmod [<a rel=3D"nofollow=
" shape=3D"rect" ymailto=3D"mailto:netmod-bounces@ietf.org" target=3D"_blan=
k" href=3D"mailto:netmod-bounces@ietf.org">mailto:netmod-bounces@ietf.org</=
a>]
<b>On Behalf Of </b>Alexander Clemm<br clear=3D"none">
<b>Sent:</b> Wednesday, February 26, 2020 4:01 AM<br clear=3D"none">
<b>To:</b> Joel Jaeggli &lt;<a rel=3D"nofollow" shape=3D"rect" ymailto=3D"m=
ailto:joelja@bogus.com" target=3D"_blank" href=3D"mailto:joelja@bogus.com">=
joelja@bogus.com</a>&gt;;
<a rel=3D"nofollow" shape=3D"rect" ymailto=3D"mailto:netmod@ietf.org" targe=
t=3D"_blank" href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br clear=
=3D"none">
<b>Subject:</b> Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">I support this draft and would like to =
see netmod work on this, but I do think some aspects need more maturing and=
 parts of this probably should be rescoped.&nbsp; Should the draft be adopt=
ed now, or should it be improved first and adopted later?&nbsp;
 Not sure.&nbsp; I would like to see the work continue, so in that sense I =
would clearly like to see the work adopted; at the same&nbsp; time there ar=
e a number of issues that IMHO really need to be addressed.&nbsp;
<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">I share some of the concerns raised by =
Juergen and Andy.&nbsp; Specifically, I think the precise problem needs to =
be defined more clearly.&nbsp; In the discussion it was mentioned RMON =E2=
=80=93 would it be that, or perhaps a better analogy Event MIB?&nbsp; Secti=
on
 3 mentions that this is to specify trigger conditions for when to send pus=
h updates.&nbsp; That is perhaps consistent with an Event MIB, but a slight=
ly different problem from ECAs.&nbsp; Section 4.2 then proceeds to allow fo=
r the definition of =E2=80=9Cevents=E2=80=9D =E2=80=93 but really
 only defining a =E2=80=9Ctimer event=E2=80=9D, with the ECA model omitting=
 tie-in e.g. with notifications.&nbsp; Including a threshold mechanism here=
 is a bit distracting and should perhaps be taken out =E2=80=93 while the c=
rossing of a threshold might constitute an event, I don=E2=80=99t think
 this should be tied inside an ECA but be something that stands on its own.=
&nbsp; (The prior draft on Smart Filters for Push Updates addressed this =
=E2=80=93 it has layed dormant for a while and in this sense I can=E2=80=99=
t object for this work to be picked someplace else, but
 logically really it does not belong here but should be separate.)&nbsp; Th=
e actions, finally, describe not simply management operations.&nbsp; I unde=
rstand the intent is to have an escape mechanism allowing to =E2=80=9Ccall =
out=E2=80=9D other functions / scripts deployed at a device,
 but this intent needs to be called out more clearly.&nbsp; <u></u><u></u><=
/p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">So, in summary, I think the WG should c=
onsider rescoping this draft a bit =E2=80=93 maybe divided into separate dr=
afts, each addressing a separate concern, which will provide focus and make=
 the problem being solved clearer:&nbsp; One to define an ECA
 framework.&nbsp; In this, clarify the invocation of actions, and allow for=
 tie-in of notifications.&nbsp; This would be this draft.&nbsp; Another one=
 to allow the definition of custom events/notifications, or smart filters f=
or push updates.&nbsp; (We should bring back the earlier
 draft.)&nbsp; A third one to perhaps allow for the definition of =E2=80=9C=
custom RPCs=E2=80=9D that allow to invoke custom scripts/functions via Netc=
onf/Restconf operations, then tie that , which are then invoked using the r=
egular RPC.&nbsp; (This would be a new draft)&nbsp;
<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<p class=3D"yiv9951459541MsoNormal">--- Alex<u></u><u></u></p>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt;">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in;">
<p class=3D"yiv9951459541MsoNormal"><b>From:</b> netmod &lt;<a rel=3D"nofol=
low" shape=3D"rect" ymailto=3D"mailto:netmod-bounces@ietf.org" target=3D"_b=
lank" href=3D"mailto:netmod-bounces@ietf.org">netmod-bounces@ietf.org</a>&g=
t;
<b>On Behalf Of </b>Joel Jaeggli<br clear=3D"none">
<b>Sent:</b> Tuesday, February 18, 2020 8:44 AM<br clear=3D"none">
<b>To:</b> <a rel=3D"nofollow" shape=3D"rect" ymailto=3D"mailto:netmod@ietf=
.org" target=3D"_blank" href=3D"mailto:netmod@ietf.org">netmod@ietf..org</a=
><br clear=3D"none">
<b>Subject:</b> [netmod] Adoption poll for draft-wwx-netmod-event-yang<u></=
u><u></u></p>
</div>
</div>
<p class=3D"yiv9951459541MsoNormal"><u></u>&nbsp;<u></u></p>
<div>
<div>
<p class=3D"yiv9951459541MsoNormal">This email begins a 2 week working grou=
p adoption poll for: <u></u>
<u></u></p>
<div>
<div>
<p class=3D"yiv9951459541MsoNormal"><br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" target=3D"_blank" href=3D"https://nam03.=
safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml=
%2Fdraft-wwx-netmod-event-yang-06&amp;data=3D02%7C01%7Calex%40futurewei.com=
%7Cf00fff51c8fb423b991208d7ba54f73b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%=
7C0%7C637182746419078457&amp;sdata=3DIVHfOxhE7fTkLJ132TEGAM7mmIxdq2546iftp%=
2FbU5YE%3D&amp;reserved=3D0">https://tools.ietf.org/html/draft-wwx-netmod-e=
vent-yang-06</a><u></u><u></u></p>
</div>
<div>
<p class=3D"yiv9951459541MsoNormal" style=3D"margin-bottom:12pt;"><u></u>&n=
bsp;<u></u></p>
</div>
<div>
<p class=3D"yiv9951459541MsoNormal">Please voice your support or objections=
 before the poll completes on March 3rd.<u></u><u></u></p>
</div>
<div>
<p class=3D"yiv9951459541MsoNormal" style=3D"margin-bottom:12pt;"><u></u>&n=
bsp;<u></u></p>
</div>
<p class=3D"yiv9951459541MsoNormal">Thanks<u></u><u></u></p>
</div>
<div>
<p class=3D"yiv9951459541MsoNormal">joel<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>

_______________________________________________<br clear=3D"none">
netmod mailing list<br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" ymailto=3D"mailto:netmod@ietf.org" targe=
t=3D"_blank" href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><br clear=
=3D"none">
<a rel=3D"nofollow" shape=3D"rect" target=3D"_blank" href=3D"https://www.ie=
tf.org/mailman/listinfo/netmod">https://www.ietf.org/mailman/listinfo/netmo=
d</a><br clear=3D"none">
</blockquote></div></div></div></div></div><div class=3D"yqt9291867774" id=
=3D"yqtfd34926">_______________________________________________<br clear=3D=
"none">netmod mailing list<br clear=3D"none"><a shape=3D"rect" ymailto=3D"m=
ailto:netmod@ietf.org" href=3D"mailto:netmod@ietf.org">netmod@ietf.org</a><=
br clear=3D"none"><a shape=3D"rect" href=3D"https://www.ietf.org/mailman/li=
stinfo/netmod" target=3D"_blank">https://www.ietf.org/mailman/listinfo/netm=
od</a><br clear=3D"none"></div></div>
            </div>
        </div></body></html>
------=_Part_1383786_1590471192.1582813825886--


From nobody Thu Feb 27 14:13:23 2020
Return-Path: <andy@yumaworks.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CD2243A0D6B for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 14:13:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.787
X-Spam-Level: 
X-Spam-Status: No, score=-1.787 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VEKIKgFYWjYR for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 14:13:19 -0800 (PST)
Received: from mail-yw1-xc30.google.com (mail-yw1-xc30.google.com [IPv6:2607:f8b0:4864:20::c30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C037F3A0D6A for <netmod@ietf.org>; Thu, 27 Feb 2020 14:13:18 -0800 (PST)
Received: by mail-yw1-xc30.google.com with SMTP id i126so1236505ywe.7 for <netmod@ietf.org>; Thu, 27 Feb 2020 14:13:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/rSo3APYVFuyUePHMeD7vgoeN2b6JZp5NxbdVosos5Y=; b=R/AwPC6oTnT4L/SaOvnwP7CSMZO/q6JgUSsZ95NxEPUvZLstLECYZVOuk60zoCjeVB PtAHj0KSZdT4bxQax8LPkT8mf8BWXLdVS04VyQLVHMfbsJfkdv5ItsjK3K7HliEbzAuN 8prNn71qkase8Mg0+zjB53eL4hYuhlB1wYHlDcII/mw5HlvvTjzg4EFJu711+u+4Tsxu +tinjnB+8PTEb/C6ff2UF872gY09L1/Y4mb5nv0Wo5671QlAl4UgZZOWkqnF8esn1BT0 aorJlpms7h0+4PJrDa+yLF4ItwrWri1BIIt1/yoilE5P1KQ/LIlxoDvxOfDpGT7w5xib 4Srw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/rSo3APYVFuyUePHMeD7vgoeN2b6JZp5NxbdVosos5Y=; b=ZgLq7jQo/qO73xKR+ETnGoFzncZM4/Y4afq5/gJaXwHI8r2vYtLgl2iPKZZGomZiNE TqBbcSpbnIFj7FKV1+st8EdRATiUosl2uEUP33cqkkqcrQmFIfPF9kLGIHst/EuQMr1c ZYGA1NXxqOGMQw2nIM/5FSTkGHrsrL9H9oXakMb11fAyhzecmB1qJlJc3h4Q49HpIfpf OuyGY8P0K2/tnT4sGj+tZTg8zzPN1BUHjLsih12oCmObbp6HF6/3aJcr1FwZOgxtgdae ROA+iaupaHIBMlnVE5Ex9rRkDoh3dYYa08/R71scuzYAXDOvN7yU3l3+awf5aJ2afYs/ 0pRg==
X-Gm-Message-State: APjAAAVzs9DeK/EvKoGK0yYle1gUZwpoIYcORP9yjOljVT5DfYjExarX JLSf96jPOP2q5tjOklyUMj1BrPYctCvGSo6MyyWLKQ==
X-Google-Smtp-Source: APXvYqxeZ5UVxziY0fQx7oPagvslAWtwerODeOMFJ8FCN3BCq50RS6iScE3PQXNUSziDi+6bHSh0H24KNOS6QtjR0l8=
X-Received: by 2002:a25:bd85:: with SMTP id f5mr933398ybh.274.1582841597638; Thu, 27 Feb 2020 14:13:17 -0800 (PST)
MIME-Version: 1.0
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com> <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com> <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com> <CABCOCHTJoxJ7RLUTQRdWf8CjfvmjrLUYHsidZEmKPeUOxeJGKw@mail.gmail.com> <125136191.1383787.1582813825889@mail.yahoo.com>
In-Reply-To: <125136191.1383787.1582813825889@mail.yahoo.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 27 Feb 2020 14:13:06 -0800
Message-ID: <CABCOCHQeQZzo=kQAb6Aq_q83NVwvM_dXXd_rOUXj6jmpbWKOnA@mail.gmail.com>
To: Igor Bryskin <i_bryskin@yahoo.com>
Cc: Alexander Clemm <alex@futurewei.com>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000029d120059f9607c7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/lOmXss3BjoDbCi2i4sk0NvplnQo>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2020 22:13:22 -0000

--00000000000029d120059f9607c7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Feb 27, 2020 at 6:30 AM Igor Bryskin <i_bryskin@yahoo.com> wrote:

> Hi Andy, Jurgen, Alex and All,
>
> I believe that YANG could be a useful participant in a successful ECA
> framework if the following is kept in mind:
>
>
> 1. It is not feasible to realize an ECA framework relying solely on YANG.
> It is reasonable to expect ECA capable servers to support to a sufficient
> degree Xpath Expressions language and some sort of general purpose
> scripting  environment , such as Python, JunoScript, TCL/TKL, etc.;
>
>
I think some constrained scripting is required.
It is important that the WG understand the boundaries between
interoperability
and implementation choice.



> 2. ECA YANG model should define (and/or use definitions produced by other
> YANG models for) certain ECA components, such as Events, Policy Variables
> (PVs) and Actions (e.g. network re-configurations, client notifications,
> invoking of RPCs, etc.), but everything to do with Conditions and logical
> and mathematical expressions (which should be expected to be potentially
> very complex), should be left to XPath (i.e. configured as XPath expressi=
on
> strings). Although it is possible to define elementary micro conditions, =
it
> would be impractical (too tedious) for the clients to build conditions
> hierarchically (bottom up) and too cumbersome for the servers to process
> such constructs;
>


XPath +  PVs + new XPath functions might work.
Can this be done without reinventing components like alarms?
It would be way better to integrate existing models than create new ones
within ECA.
For example:

   event =3D=3D generation of RFC 8632 <alarm-notification> event
   condition =3D=3D script to extract relevant fields from event and check
condition
   action =3D=3D script to use extracted fields from condition to send comm=
ands
to server

If the event stream management and event field extraction is standardized
(with YANG objects)
then that would help a lot. Access to metadata from the execution
environment (e,g, server) is also
important to standardize.



> 3.Likewise, it would be too demanding to expect servers implementing
> interpreters for specific purpose of interpretation of an ECA directly as
> it configured in YANG. Rather , it would be prudent to expect a server,
> upon receiving an ECA configuration, to generate out of it a micro-script
> in a locally supported scripting language and arrange said micro-script
> execution at the moment of the Event (or timer) firing;
>
>
This approach could help.
The "send RPC command" solution is too simplistic.
Maybe psuedo-code would work better.
Even a simple "edit" can be very different on each server (e.g., candidate,
running, defaults)



> 4. In short, the objective of the ECA YANG configuration is to provide a
> universal ECA representation that could be converted into a micro-script =
of
> the server's choice.
>
>
The implementation details are always a server choice.
I agree that mechanisms to bind ECA components to real scripting languages
has more promise than using YANG objects entirely, or creating a new
scripting language.


What do you think?
>
> Igor
>
>
Andy


>
>
> On Wednesday, February 26, 2020, 1:11:00 PM EST, Andy Bierman <
> andy@yumaworks.com> wrote:
>
>
> Hi,
>
>
> On Tue, Feb 25, 2020 at 5:57 PM Alexander Clemm <alex@futurewei.com>
> wrote:
>
> In my view, an ECA model allows to define rules for events =E2=80=93 cond=
itions =E2=80=93
> actions, i.e. what actions to perform when an event occurs and a conditio=
n
> met.  A smart filter filters an input stream, letting some objects pass b=
ut
> not others.  They are not the same.
>
>
>
> There is a connection in that you could define the passing of an object b=
y
> a smart filter as an event.  So, it is conceivable to include an ability =
to
> define events in this draft. If this is the intent it should be stated so
> clearly.  The question then becomes if you would want those be used also
> independently of the ECA model =E2=80=93 there may be benefit in defining=
 a new
> event without tying it to a rule (i.e. a condition and action) but simply
> emitting it..  (Same thing for the timer notification, which might have
> uses beyond ECA.) In the draft these things are all mashed together, but
> separating the ability to define an event from the ability to specify an
> ECA rule (which refers to / is triggered by an event) can benefit
> reusability.
>
>
>
> Anyway, as mentioned I think this work is relevant and I would like to se=
e
> it go forward; IMHO some reframing and perhaps splitting of the draft
> should be considered whether that occurs before WG adoption or afterwards=
.
>
>
>
>
> I do not agree that refactoring this draft solves any adoption issues.
> YANG-based management already has events (specified with
> notification-stmt).
> The ECA data model should not duplicate other functionality such as alarm=
s.
> Any event that can be received on an event stream (RFC 8639) should
> automatically
> be usable in any ECA logic.  Working on a solution without agreement on
> even the most
> basic ECA architecture or problem scope is a recipe for failure.
>
> Programming with YANG data models as the logic for conditions and actions
> has never been proven to work.  Even the trivial examples are complex
> and real-world use-cases seem near impossible. (nobody has ever provided
> one
> so we have to speculate). Achieving interoperability with a workable
> solution
> will not be easy. Other solutions have got "Hello world" to work, declare=
d
> victory,
> and then went away forever.  Why will this time be different?
>
>
> Andy
>
>
>
>
>
> --- Alex
>
>
>
> *From:* Tianran Zhou <zhoutianran@huawei.com>
> *Sent:* Tuesday, February 25, 2020 4:44 PM
> *To:* Alexander Clemm <alex@futurewei.com>; Joel Jaeggli <joelja@bogus.co=
m>;
> netmod@ietf.org
> *Subject:* RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> Hi the authors,
>
>
>
> >=E2=80=9CAnother one to allow the definition of custom events/notificati=
ons, or
> smart filters for push updates.  (We should bring back the earlier draft.=
)=E2=80=9D
>
> As we worked on the smart filter before. We want to use the ECA model.
>
> It seems this model enabled the generic programmability. Can we just use
> it to program any filter or what potentially need to augment/customize fo=
r
> a specific model?
>
> Thanks,
>
> Tianran
>
>
>
> *From:* netmod [mailto:netmod-bounces@ietf.org <netmod-bounces@ietf.org>]=
 *On
> Behalf Of *Alexander Clemm
> *Sent:* Wednesday, February 26, 2020 4:01 AM
> *To:* Joel Jaeggli <joelja@bogus.com>; netmod@ietf.org
> *Subject:* Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> Hi,
>
>
>
> I support this draft and would like to see netmod work on this, but I do
> think some aspects need more maturing and parts of this probably should b=
e
> rescoped.  Should the draft be adopted now, or should it be improved firs=
t
> and adopted later?  Not sure.  I would like to see the work continue, so =
in
> that sense I would clearly like to see the work adopted; at the same  tim=
e
> there are a number of issues that IMHO really need to be addressed.
>
>
>
> I share some of the concerns raised by Juergen and Andy.  Specifically, I
> think the precise problem needs to be defined more clearly.  In the
> discussion it was mentioned RMON =E2=80=93 would it be that, or perhaps a=
 better
> analogy Event MIB?  Section 3 mentions that this is to specify trigger
> conditions for when to send push updates.  That is perhaps consistent wit=
h
> an Event MIB, but a slightly different problem from ECAs.  Section 4.2 th=
en
> proceeds to allow for the definition of =E2=80=9Cevents=E2=80=9D =E2=80=
=93 but really only defining
> a =E2=80=9Ctimer event=E2=80=9D, with the ECA model omitting tie-in e.g. =
with
> notifications.  Including a threshold mechanism here is a bit distracting
> and should perhaps be taken out =E2=80=93 while the crossing of a thresho=
ld might
> constitute an event, I don=E2=80=99t think this should be tied inside an =
ECA but be
> something that stands on its own.  (The prior draft on Smart Filters for
> Push Updates addressed this =E2=80=93 it has layed dormant for a while an=
d in this
> sense I can=E2=80=99t object for this work to be picked someplace else, b=
ut
> logically really it does not belong here but should be separate.)  The
> actions, finally, describe not simply management operations.  I understan=
d
> the intent is to have an escape mechanism allowing to =E2=80=9Ccall out=
=E2=80=9D other
> functions / scripts deployed at a device, but this intent needs to be
> called out more clearly.
>
>
>
> So, in summary, I think the WG should consider rescoping this draft a bit
> =E2=80=93 maybe divided into separate drafts, each addressing a separate =
concern,
> which will provide focus and make the problem being solved clearer:  One =
to
> define an ECA framework.  In this, clarify the invocation of actions, and
> allow for tie-in of notifications.  This would be this draft.  Another on=
e
> to allow the definition of custom events/notifications, or smart filters
> for push updates.  (We should bring back the earlier draft.)  A third one
> to perhaps allow for the definition of =E2=80=9Ccustom RPCs=E2=80=9D that=
 allow to invoke
> custom scripts/functions via Netconf/Restconf operations, then tie that ,
> which are then invoked using the regular RPC.  (This would be a new draft=
)
>
>
>
> --- Alex
>
>
>
> *From:* netmod <netmod-bounces@ietf.org> *On Behalf Of *Joel Jaeggli
> *Sent:* Tuesday, February 18, 2020 8:44 AM
> *To:* netmod@ietf..org <netmod@ietf.org>
> *Subject:* [netmod] Adoption poll for draft-wwx-netmod-event-yang
>
>
>
> This email begins a 2 week working group adoption poll for:
>
>
> https://tools.ietf.org/html/draft-wwx-netmod-event-yang-06
> <https://nam03.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Ftool=
s.ietf.org%2Fhtml%2Fdraft-wwx-netmod-event-yang-06&data=3D02%7C01%7Calex%40=
futurewei.com%7Cf00fff51c8fb423b991208d7ba54f73b%7C0fee8ff2a3b240189c753a1d=
5591fedc%7C1%7C0%7C637182746419078457&sdata=3DIVHfOxhE7fTkLJ132TEGAM7mmIxdq=
2546iftp%2FbU5YE%3D&reserved=3D0>
>
>
>
> Please voice your support or objections before the poll completes on Marc=
h
> 3rd.
>
>
>
> Thanks
>
> joel
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--00000000000029d120059f9607c7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Thu, Feb 27, 2020 at 6:30 AM Igor =
Bryskin &lt;<a href=3D"mailto:i_bryskin@yahoo.com" target=3D"_blank">i_brys=
kin@yahoo.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddi=
ng-left:1ex"><div><div style=3D"font-family:Helvetica,Arial,sans-serif;font=
-size:13px"><div></div>
        <div dir=3D"ltr"><div><div dir=3D"ltr"><div>Hi Andy, Jurgen, Alex a=
nd All,<br><div dir=3D"ltr"><br><div>I believe that YANG could be a useful =
participant in a successful ECA framework if the following is kept in mind:=
<br></div></div></div><div><br><div><br><div>1. It is not feasible to reali=
ze an ECA framework relying solely on=20
YANG.=C2=A0 It is reasonable to expect ECA capable servers to support to a=
=20
sufficient degree Xpath Expressions language and some sort of general=20
purpose scripting=C2=A0 environment , such as Python, JunoScript, TCL/TKL,=
=20
etc.;<br><br></div></div></div></div></div></div></div></div></blockquote><=
div><br></div><div>I think some constrained scripting is required.</div><di=
v>It is important that the WG understand the boundaries between interoperab=
ility</div><div>and implementation choice.</div><div><br></div><div>=C2=A0<=
/div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bo=
rder-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div style=3D"f=
ont-family:Helvetica,Arial,sans-serif;font-size:13px"><div dir=3D"ltr"><div=
><div dir=3D"ltr"><div><div><div></div></div></div></div><div>2. ECA YANG m=
odel should define=20
(and/or use definitions produced by other YANG models for) certain ECA comp=
onents, such as Events, Policy Variables (PVs) and=20
Actions (e.g. network re-configurations, client notifications, invoking=20
of RPCs, etc.), but everything to do with Conditions and logical and=20
mathematical expressions (which should be expected to be potentially=20
very complex), should be left to XPath (i.e. configured as XPath=20
expression strings). Although it is possible to define elementary micro=20
conditions, it would be impractical (too tedious) for the clients to=20
build conditions hierarchically (bottom up) and too cumbersome for the=20
servers to process such constructs;<br></div></div></div></div></div></bloc=
kquote><div><br></div><div><br></div><div>XPath=C2=A0+=C2=A0 PVs=C2=A0+ new=
 XPath functions might work.</div><div>Can this be done without reinventing=
 components like alarms?</div><div>It would be way better to integrate exis=
ting models than create new ones within ECA.</div><div>For example:</div><d=
iv><br></div><div>=C2=A0 =C2=A0event =3D=3D generation of RFC 8632 &lt;alar=
m-notification&gt; event</div><div>=C2=A0 =C2=A0condition =3D=3D script to =
extract relevant fields from event and check condition</div><div>=C2=A0 =C2=
=A0action =3D=3D script to use extracted fields from condition to send comm=
ands to server</div><div><br></div><div>If the event stream management and =
event field extraction is standardized (with YANG objects)</div><div>then t=
hat would help a lot. Access to metadata from the execution environment (e,=
g, server) is also</div><div>important to standardize.</div><div><br></div>=
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0p=
x 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div =
style=3D"font-family:Helvetica,Arial,sans-serif;font-size:13px"><div dir=3D=
"ltr"><div><div><br></div><div>3.Likewise, it=20
would be too demanding to expect servers implementing interpreters for=20
specific purpose of interpretation of an ECA directly as it configured=20
in YANG. Rather , it would be prudent to expect a server, upon receiving
 an ECA configuration, to generate out of it a micro-script in a locally
 supported scripting language and arrange said micro-script execution at
 the moment of the Event (or timer) firing;<br><br></div></div></div></div>=
</div></blockquote><div><br></div><div>This approach could help.</div><div>=
The &quot;send RPC command&quot; solution is too simplistic.</div><div>Mayb=
e psuedo-code would work better.</div><div>Even a simple &quot;edit&quot; c=
an be very different on each server (e.g., candidate, running, defaults)</d=
iv><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div><div style=3D"font-family:Helvetica,Arial,sans-serif;font-s=
ize:13px"><div dir=3D"ltr"><div><div></div><div>4. In short, the=20
objective of the ECA YANG configuration is to provide a universal ECA=20
representation that could be converted into a micro-script of the=20
server&#39;s choice.<br><div dir=3D"ltr"><br></div></div></div></div></div>=
</div></blockquote><div><br></div><div>The implementation details are alway=
s a server choice.</div><div>I agree that mechanisms to bind ECA components=
=C2=A0to real scripting languages</div><div>has more promise than using YAN=
G objects entirely, or creating a new scripting language.</div><div><br></d=
iv><div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><d=
iv style=3D"font-family:Helvetica,Arial,sans-serif;font-size:13px"><div dir=
=3D"ltr"><div><div><div dir=3D"ltr"><div>What do you think?<br><div dir=3D"=
ltr"><br><div>Igor</div></div></div></div></div><br clear=3D"none"></div></=
div></div></div></blockquote><div><br></div><div>Andy</div><div>=C2=A0</div=
><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border=
-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div style=3D"font-=
family:Helvetica,Arial,sans-serif;font-size:13px"><div dir=3D"ltr"><div></d=
iv><div><br></div></div><div><br></div>
       =20
        </div><div id=3D"m_-57425631349239183m_-4648317272446116885gmail-m_=
-50428704369834681yahoo_quoted_3461802742">
            <div style=3D"font-family:&quot;Helvetica Neue&quot;,Helvetica,=
Arial,sans-serif;font-size:13px;color:rgb(38,40,42)">
               =20
                <div>
                    On Wednesday, February 26, 2020, 1:11:00 PM EST, Andy B=
ierman &lt;<a href=3D"mailto:andy@yumaworks.com" target=3D"_blank">andy@yum=
aworks.com</a>&gt; wrote:
                </div>
                <div><br></div>
                <div><br></div>
                <div><div id=3D"m_-57425631349239183m_-4648317272446116885g=
mail-m_-50428704369834681yiv9951459541"><div><div dir=3D"ltr"><div>Hi,</div=
><div><br clear=3D"none"></div><br clear=3D"none"><div><div dir=3D"ltr">On =
Tue, Feb 25, 2020 at 5:57 PM Alexander Clemm &lt;<a rel=3D"nofollow" shape=
=3D"rect" href=3D"mailto:alex@futurewei.com" target=3D"_blank">alex@futurew=
ei.com</a>&gt; wrote:<br clear=3D"none"></div><blockquote style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"EN-US">
<div>
<p>In my view, an ECA model allows to define rules for events =E2=80=93 con=
ditions =E2=80=93 actions, i.e. what actions to perform when an event occur=
s and a condition met.=C2=A0 A smart filter filters an input stream, lettin=
g some objects pass but not others.=C2=A0
 They are not the same.=C2=A0 <u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<p>There is a connection in that you could define the passing of an object =
by a smart filter as an event.=C2=A0 So, it is conceivable to include an ab=
ility to define events in this draft. If this is the intent it should be st=
ated so clearly.=C2=A0 The
 question then becomes if you would want those be used also independently o=
f the ECA model =E2=80=93 there may be benefit in defining a new event with=
out tying it to a rule (i.e. a condition and action) but simply emitting it=
..=C2=A0 (Same thing for the timer notification,
 which might have uses beyond ECA.) In the draft these things are all mashe=
d together, but separating the ability to define an event from the ability =
to specify an ECA rule (which refers to / is triggered by an event) can ben=
efit reusability.=C2=A0
<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<p>Anyway, as mentioned I think this work is relevant and I would like to s=
ee it go forward; IMHO some reframing and perhaps splitting of the draft sh=
ould be considered whether that occurs before WG adoption or afterwards.=C2=
=A0
<u></u><u></u></p>
<p><u></u>=C2=A0</p></div></div></blockquote><div><br clear=3D"none"></div>=
<div>I do not agree that refactoring this draft solves any adoption issues.=
</div><div>YANG-based management already has events (specified with notific=
ation-stmt).</div><div>The ECA data model should not duplicate other functi=
onality such as alarms.</div><div>Any event that can be received on an even=
t stream (RFC 8639) should automatically</div><div>be usable in any ECA log=
ic.=C2=A0 Working on a solution without agreement on even the most</div><di=
v>basic ECA architecture or problem scope is a recipe for failure.</div><di=
v><br clear=3D"none"></div><div>Programming with YANG data models as the lo=
gic for conditions and actions</div><div>has never been proven to work.=C2=
=A0 Even the trivial examples are complex</div><div>and real-world use-case=
s seem near impossible. (nobody has ever provided one</div><div>so we have =
to speculate). Achieving interoperability with a workable solution</div><di=
v>will not be easy. Other solutions have got &quot;Hello world&quot; to wor=
k, declared victory,</div><div>and then went away forever.=C2=A0 Why will t=
his time be different?</div><div><br clear=3D"none"></div><div><br clear=3D=
"none"></div><div>Andy</div><div id=3D"m_-57425631349239183m_-4648317272446=
116885gmail-m_-50428704369834681yiv9951459541yqtfd27340"><div><br clear=3D"=
none"></div><div><br clear=3D"none"></div><div><br clear=3D"none"></div><di=
v><br clear=3D"none"></div><div><br clear=3D"none"></div><blockquote style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex"><div lang=3D"EN-US"><div><p><u></u></p>
<p>--- Alex<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p><b>From:</b> Tianran Zhou &lt;<a rel=3D"nofollow" shape=3D"rect" href=3D=
"mailto:zhoutianran@huawei.com" target=3D"_blank">zhoutianran@huawei.com</a=
>&gt; <br clear=3D"none">
<b>Sent:</b> Tuesday, February 25, 2020 4:44 PM<br clear=3D"none">
<b>To:</b> Alexander Clemm &lt;<a rel=3D"nofollow" shape=3D"rect" href=3D"m=
ailto:alex@futurewei.com" target=3D"_blank">alex@futurewei.com</a>&gt;; Joe=
l Jaeggli &lt;<a rel=3D"nofollow" shape=3D"rect" href=3D"mailto:joelja@bogu=
s.com" target=3D"_blank">joelja@bogus.com</a>&gt;; <a rel=3D"nofollow" shap=
e=3D"rect" href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.or=
g</a><br clear=3D"none">
<b>Subject:</b> RE: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p><u></u>=C2=A0<u></u></p>
<p><span style=3D"color:rgb(31,73,125)">Hi the authors,<u></u><u></u></span=
></p>
<p><span style=3D"color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<p><span style=3D"color:rgb(31,73,125)">&gt;=E2=80=9CAnother one to allow t=
he definition of custom events/notifications, or smart filters for push upd=
ates.=C2=A0 (We should bring back the earlier draft.)=E2=80=9D<u></u><u></u=
></span></p>
<p><span style=3D"color:rgb(31,73,125)">As we worked on the smart filter be=
fore. We want to use the ECA model.<u></u><u></u></span></p>
<p><span style=3D"color:rgb(31,73,125)">It seems this model enabled the gen=
eric programmability. Can we just use it to program any filter or what pote=
ntially need to augment/customize for a specific model?<u></u><u></u></span=
></p>
<p><span style=3D"color:rgb(31,73,125)">Thanks,<u></u><u></u></span></p>
<p><span style=3D"color:rgb(31,73,125)">Tianran<u></u><u></u></span></p>
<p><span style=3D"color:rgb(31,73,125)"><u></u>=C2=A0<u></u></span></p>
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p><b>From:</b> netmod [<a rel=3D"nofollow" shape=3D"rect" href=3D"mailto:n=
etmod-bounces@ietf.org" target=3D"_blank">mailto:netmod-bounces@ietf.org</a=
>]
<b>On Behalf Of </b>Alexander Clemm<br clear=3D"none">
<b>Sent:</b> Wednesday, February 26, 2020 4:01 AM<br clear=3D"none">
<b>To:</b> Joel Jaeggli &lt;<a rel=3D"nofollow" shape=3D"rect" href=3D"mail=
to:joelja@bogus.com" target=3D"_blank">joelja@bogus.com</a>&gt;;
<a rel=3D"nofollow" shape=3D"rect" href=3D"mailto:netmod@ietf.org" target=
=3D"_blank">netmod@ietf.org</a><br clear=3D"none">
<b>Subject:</b> Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang<=
u></u><u></u></p>
</div>
</div>
<p><u></u>=C2=A0<u></u></p>
<p>Hi,<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<p>I support this draft and would like to see netmod work on this, but I do=
 think some aspects need more maturing and parts of this probably should be=
 rescoped.=C2=A0 Should the draft be adopted now, or should it be improved =
first and adopted later?=C2=A0
 Not sure.=C2=A0 I would like to see the work continue, so in that sense I =
would clearly like to see the work adopted; at the same=C2=A0 time there ar=
e a number of issues that IMHO really need to be addressed.=C2=A0
<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<p>I share some of the concerns raised by Juergen and Andy.=C2=A0 Specifica=
lly, I think the precise problem needs to be defined more clearly.=C2=A0 In=
 the discussion it was mentioned RMON =E2=80=93 would it be that, or perhap=
s a better analogy Event MIB?=C2=A0 Section
 3 mentions that this is to specify trigger conditions for when to send pus=
h updates.=C2=A0 That is perhaps consistent with an Event MIB, but a slight=
ly different problem from ECAs.=C2=A0 Section 4.2 then proceeds to allow fo=
r the definition of =E2=80=9Cevents=E2=80=9D =E2=80=93 but really
 only defining a =E2=80=9Ctimer event=E2=80=9D, with the ECA model omitting=
 tie-in e.g. with notifications.=C2=A0 Including a threshold mechanism here=
 is a bit distracting and should perhaps be taken out =E2=80=93 while the c=
rossing of a threshold might constitute an event, I don=E2=80=99t think
 this should be tied inside an ECA but be something that stands on its own.=
=C2=A0 (The prior draft on Smart Filters for Push Updates addressed this =
=E2=80=93 it has layed dormant for a while and in this sense I can=E2=80=99=
t object for this work to be picked someplace else, but
 logically really it does not belong here but should be separate.)=C2=A0 Th=
e actions, finally, describe not simply management operations.=C2=A0 I unde=
rstand the intent is to have an escape mechanism allowing to =E2=80=9Ccall =
out=E2=80=9D other functions / scripts deployed at a device,
 but this intent needs to be called out more clearly.=C2=A0 <u></u><u></u><=
/p>
<p><u></u>=C2=A0<u></u></p>
<p>So, in summary, I think the WG should consider rescoping this draft a bi=
t =E2=80=93 maybe divided into separate drafts, each addressing a separate =
concern, which will provide focus and make the problem being solved clearer=
:=C2=A0 One to define an ECA
 framework.=C2=A0 In this, clarify the invocation of actions, and allow for=
 tie-in of notifications.=C2=A0 This would be this draft.=C2=A0 Another one=
 to allow the definition of custom events/notifications, or smart filters f=
or push updates.=C2=A0 (We should bring back the earlier
 draft.)=C2=A0 A third one to perhaps allow for the definition of =E2=80=9C=
custom RPCs=E2=80=9D that allow to invoke custom scripts/functions via Netc=
onf/Restconf operations, then tie that , which are then invoked using the r=
egular RPC.=C2=A0 (This would be a new draft)=C2=A0
<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<p>--- Alex<u></u><u></u></p>
<p><u></u>=C2=A0<u></u></p>
<div style=3D"border-top:none;border-right:none;border-bottom:none;border-l=
eft:1.5pt solid blue;padding:0in 0in 0in 4pt">
<div>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p><b>From:</b> netmod &lt;<a rel=3D"nofollow" shape=3D"rect" href=3D"mailt=
o:netmod-bounces@ietf.org" target=3D"_blank">netmod-bounces@ietf.org</a>&gt=
;
<b>On Behalf Of </b>Joel Jaeggli<br clear=3D"none">
<b>Sent:</b> Tuesday, February 18, 2020 8:44 AM<br clear=3D"none">
<b>To:</b> <a rel=3D"nofollow" shape=3D"rect" href=3D"mailto:netmod@ietf.or=
g" target=3D"_blank">netmod@ietf..org</a><br clear=3D"none">
<b>Subject:</b> [netmod] Adoption poll for draft-wwx-netmod-event-yang<u></=
u><u></u></p>
</div>
</div>
<p><u></u>=C2=A0<u></u></p>
<div>
<div>
<p>This email begins a 2 week working group adoption poll for: <u></u>
<u></u></p>
<div>
<div>
<p><br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" href=3D"https://nam03.safelinks.protecti=
on.outlook.com/?url=3Dhttps%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-wwx-netmo=
d-event-yang-06&amp;data=3D02%7C01%7Calex%40futurewei.com%7Cf00fff51c8fb423=
b991208d7ba54f73b%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637182746419=
078457&amp;sdata=3DIVHfOxhE7fTkLJ132TEGAM7mmIxdq2546iftp%2FbU5YE%3D&amp;res=
erved=3D0" target=3D"_blank">https://tools.ietf.org/html/draft-wwx-netmod-e=
vent-yang-06</a><u></u><u></u></p>
</div>
<div>
<p style=3D"margin-bottom:12pt"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p>Please voice your support or objections before the poll completes on Mar=
ch 3rd.<u></u><u></u></p>
</div>
<div>
<p style=3D"margin-bottom:12pt"><u></u>=C2=A0<u></u></p>
</div>
<p>Thanks<u></u><u></u></p>
</div>
<div>
<p>joel<u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>

_______________________________________________<br clear=3D"none">
netmod mailing list<br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" href=3D"mailto:netmod@ietf.org" target=
=3D"_blank">netmod@ietf.org</a><br clear=3D"none">
<a rel=3D"nofollow" shape=3D"rect" href=3D"https://www.ietf.org/mailman/lis=
tinfo/netmod" target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmo=
d</a><br clear=3D"none">
</blockquote></div></div></div></div></div><div id=3D"m_-57425631349239183m=
_-4648317272446116885gmail-m_-50428704369834681yqtfd34926">________________=
_______________________________<br clear=3D"none">netmod mailing list<br cl=
ear=3D"none"><a shape=3D"rect" href=3D"mailto:netmod@ietf.org" target=3D"_b=
lank">netmod@ietf.org</a><br clear=3D"none"><a shape=3D"rect" href=3D"https=
://www.ietf.org/mailman/listinfo/netmod" target=3D"_blank">https://www.ietf=
.org/mailman/listinfo/netmod</a><br clear=3D"none"></div></div>
            </div>
        </div></div></blockquote></div></div>

--00000000000029d120059f9607c7--


From nobody Thu Feb 27 14:41:04 2020
Return-Path: <alex@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 063D83A0E12 for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 14:41:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0UVgA3N9z2lv for <netmod@ietfa.amsl.com>; Thu, 27 Feb 2020 14:41:00 -0800 (PST)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760104.outbound.protection.outlook.com [40.107.76.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20C803A0DF8 for <netmod@ietf.org>; Thu, 27 Feb 2020 14:40:59 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GJU3JdHsg8zIItUVJ+aE33ApZWmntlTAmUB7ALJorjP1elPHJRfFSD0v5u93YtyKZBAQV5kkP39GWFtsKE0A5Oc6iFmpir2Sk5B2LI4Cqc4uW+2zVHfRiEzQlrIiRMxQGlwKzAfKp5Y06OGx8BPUAaMrpxdCXxCCLYbCdV/i9Ulal0XaxU//8x+TbjwNoFDONQv+34m6uYzV2q2pmFaqF+lznmsSrVcIOF2wvKK7EqOnRmaQbpqb7AZQLLpCsZ7jUkR2XPLvlaxXNBOW02gpQOruL+6oXawkrztQWC91JLE9DDM4yTQYQMvoAG3FIwCJJzq55P+4kIyfhs9BKtKYGA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j3ykiM31av28AyRkDm1NiQBspMxDi9ghewwYpk/Em1w=; b=ctFKQbdvVPw7nt9cnW4+sYN8cTz27gev5I1njDSEVUskKYoAwU6Yz3rDFD3+nCsp/9YKPSa63yZojZTk++XiskgIQIPJ5Miqb9Vp1pYHjX/kR5hmtQVmvKaOaMTUIcr6zLnfzMJwMVz4tWa1FPgaqDo840yU9MBqp/g4frXCQBtbq2HUikJdgKgjt2BfTWErwnVgobhnhlUrO6Gkri4OiKdwctnws7qern+XjuQi39fTrYHVQB4HNpVRdRsGz7h0ptRfEcKiVEDJA5t6OVrGQnd1lMyze+4IN72d1/jRDbI4AGPPvgEJ38Z6lYuLUletL0xgasd5jkfUTZCaUZPL+g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j3ykiM31av28AyRkDm1NiQBspMxDi9ghewwYpk/Em1w=; b=Qrrr/f0kuP4PCMWqoATp6a28pB95heok3kqjLbkUyRYgfN6BU/QUHDz79FvO8NQqn/iX/myk98fdRv3HA1vJCWgMjeWHe80BD9OMOYWYUn9Yvrxwu/Sgf7KOBdxer9f/m+uePFcM5gOLBTC2gNEFnZIylJN25EjSM44W8qmgEU8=
Received: from BY5PR13MB3300.namprd13.prod.outlook.com (2603:10b6:a03:1ae::21) by BY5PR13MB3873.namprd13.prod.outlook.com (2603:10b6:a03:229::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.14; Thu, 27 Feb 2020 22:40:57 +0000
Received: from BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385]) by BY5PR13MB3300.namprd13.prod.outlook.com ([fe80::c13e:12f9:5ebb:3385%3]) with mapi id 15.20.2772.012; Thu, 27 Feb 2020 22:40:57 +0000
From: Alexander Clemm <alex@futurewei.com>
To: Igor Bryskin <i_bryskin@yahoo.com>, Andy Bierman <andy@yumaworks.com>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Adoption poll for draft-wwx-netmod-event-yang
Thread-Index: AQHV5nqyUkhN2CSKkkal6VOj9CUTx6gsVb8wgABY4ICAAA9/EIABFOgAgAFU6oCAAIaWsA==
Date: Thu, 27 Feb 2020 22:40:57 +0000
Message-ID: <BY5PR13MB33005938A703B9347C65D6D2DBEB0@BY5PR13MB3300.namprd13.prod.outlook.com>
References: <e655193d-79f5-f339-7043-65e2044c406e@bogus.com> <BY5PR13MB3300D2B430DF7958503A3D05DBED0@BY5PR13MB3300.namprd13.prod.outlook.com> <BBA82579FD347748BEADC4C445EA0F21BF24EF23@NKGEML515-MBX.china.huawei.com> <BY5PR13MB3300D54286BD9F6EE8A57A4EDBEA0@BY5PR13MB3300.namprd13.prod.outlook.com> <CABCOCHTJoxJ7RLUTQRdWf8CjfvmjrLUYHsidZEmKPeUOxeJGKw@mail.gmail.com> <125136191.1383787.1582813825889@mail.yahoo.com>
In-Reply-To: <125136191.1383787.1582813825889@mail.yahoo.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=alex@futurewei.com; 
x-originating-ip: [12.111.81.95]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 242bb769-b9d3-426f-bb85-08d7bbd61cd2
x-ms-traffictypediagnostic: BY5PR13MB3873:
x-microsoft-antispam-prvs: <BY5PR13MB3873CCCF5D48FB5E3D5DB409DBEB0@BY5PR13MB3873.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03264AEA72
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39850400004)(346002)(366004)(396003)(136003)(376002)(189003)(199004)(316002)(110136005)(9326002)(71200400001)(4326008)(55016002)(9686003)(8936002)(66446008)(66556008)(81156014)(64756008)(76116006)(66476007)(478600001)(966005)(7696005)(86362001)(186003)(33656002)(5660300002)(2906002)(26005)(52536014)(6506007)(66946007)(8676002)(53546011)(81166006)(69594002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB3873; H:BY5PR13MB3300.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: JbktDVu+iT6d3BLGGXWQzeBh2tdceAx8lTpudKhcCDANGh7z1Uo30EsyaWlKQ7MAulQxgyGxNWxns0JDKG/SVzsVmZ/vyapkRCBP5jj5O5+3conuo7MuaA92dLvcuXEUMtisUR3FHTSYcdvD6svSlQ==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR13MB33005938A703B9347C65D6D2DBEB0BY5PR13MB3300namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 242bb769-b9d3-426f-bb85-08d7bbd61cd2
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Feb 2020 22:40:57.5473 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jesK0qctowX21OEmtNKUD582+IxIpUCQ/KXKKK+toH7CWizRXIvuK6mvUjXqAnoW5/rx7XGghB5/ou+6bRXxVQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3873
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/2kBDvZ11Mou-28jEKsxPWzsbcNo>
Subject: Re: [netmod] Adoption poll for draft-wwx-netmod-event-yang
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Feb 2020 22:41:03 -0000

--_000_BY5PR13MB33005938A703B9347C65D6D2DBEB0BY5PR13MB3300namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BY5PR13MB33005938A703B9347C65D6D2DBEB0BY5PR13MB3300namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BY5PR13MB33005938A703B9347C65D6D2DBEB0BY5PR13MB3300namp_--


From nobody Fri Feb 28 14:06:00 2020
Return-Path: <yingzhen.qu@futurewei.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A640F3A1ED6; Fri, 28 Feb 2020 14:05:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5xVPjTk-bZ6B; Fri, 28 Feb 2020 14:05:56 -0800 (PST)
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10on2099.outbound.protection.outlook.com [40.107.94.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EFFB3A1ED1; Fri, 28 Feb 2020 14:05:55 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kIU8HvlFxRIe9jBZfFwxoQ+JLnEQphGa3zoqnvB0QXUfURdbjwH5M4oUQOQA3T/AaY39Q4yYU+gDUTWs383agZBmt70jPK7BMATekZfer4LN1Q9tKdLBZCbZkEKgggNbeagttyvIlGtrxe7rmJy28ISzYPqtQ87/4/Ji/UI0oO1nuDPtXp/LLoc8H3CGkfAWsyV2FUgkJ0Oc5U7qs/71Pz8ZEZ1Qs0Cfb0gX/2PKMZIXxXT3jFzP0FylwKpYqETmPg0Te9jakzVpAnhcrKhXDnXcPKdRRJp7wE8eJBVwYCCKjM7OS/b1f+irpR8ZJBGy/wugfIOQhpKf9UlMlbQAzQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2bgr8OsxwbKEKs9qO8BO+Y+oIkym0yfhzYwJZ14haY4=; b=FCGuXImViR9yiv/C+aB4krGo24gDSfNyv1tTwASXzTv74xk6CWejruFW6rFp3YbS9gLMbSH0l8H+2ktwnsNVsOvzzF5IKriYkDRUZcxGSFQxPuPr5r1YbqpJ+C7ornRsCdoc8zsO0zJAiMe4+/gB3xiRw73LCPt8OVrdRh8q6lga02DQ9aBUY4Ivr5/HN9/ciVYHigR8piHmHTh5mUOnnUHf7hvfzTM4+eWC2H+Kl67JRR8vgmtLU+eWHilWmu6+pFA/1awozRuqLpSW9qcwx43PMoZjj4vbkqjApKnToo4W/lDbs30VAPHAzV66rAuAimkNg/In+biGo4K7WA1yfw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2bgr8OsxwbKEKs9qO8BO+Y+oIkym0yfhzYwJZ14haY4=; b=rSMw1OgSSRQ234BW3Q+4a9nqOn4SUik9YbvOLYFZHaRaLV22v2TrraK+p3Z6IqeD+fs0bGjACQr2hworWvQJ+Se7fOmj1JcFk7qqydNUsMIdEo51517HdlSfPvcMWtM2iRO8GgQU6HtrG5JQKbPTUJ08jOeCidPKA42OSMmKyW8=
Received: from BY5PR13MB3206.namprd13.prod.outlook.com (2603:10b6:a03:181::23) by BY5PR13MB3221.namprd13.prod.outlook.com (2603:10b6:a03:18a::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.11; Fri, 28 Feb 2020 22:05:52 +0000
Received: from BY5PR13MB3206.namprd13.prod.outlook.com ([fe80::91ba:b33b:6283:d300]) by BY5PR13MB3206.namprd13.prod.outlook.com ([fe80::91ba:b33b:6283:d300%7]) with mapi id 15.20.2793.003; Fri, 28 Feb 2020 22:05:52 +0000
From: Yingzhen Qu <yingzhen.qu@futurewei.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>, Joel Jaeggli <joelja@bogus.com>
CC: "draft-ietf-netmod-nmda-diff@ietf.org" <draft-ietf-netmod-nmda-diff@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: draft-ietf-netmod-nmda-diff - IPR verfication request
Thread-Index: AQHV7G/r5vS8TAKXHUixq6Qk9k9gZqgwp36A
Date: Fri, 28 Feb 2020 22:05:52 +0000
Message-ID: <10B472F9-4F8C-4773-B23A-1EC80C4D61D3@futurewei.com>
References: <95377678-1417-4C30-BAD5-16E8DABE9360@gmail.com>
In-Reply-To: <95377678-1417-4C30-BAD5-16E8DABE9360@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=yingzhen.qu@futurewei.com; 
x-originating-ip: [12.111.81.71]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2de5a941-cf75-4be4-528f-08d7bc9a6074
x-ms-traffictypediagnostic: BY5PR13MB3221:
x-microsoft-antispam-prvs: <BY5PR13MB32210EF22662924F16CFE516E1E80@BY5PR13MB3221.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 0327618309
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(396003)(39850400004)(376002)(136003)(346002)(199004)(189003)(316002)(6486002)(54906003)(110136005)(8936002)(2906002)(81166006)(81156014)(8676002)(5660300002)(86362001)(558084003)(26005)(186003)(36756003)(71200400001)(6506007)(53546011)(2616005)(478600001)(44832011)(66946007)(66556008)(66446008)(33656002)(64756008)(66476007)(6512007)(4326008)(76116006); DIR:OUT; SFP:1102; SCL:1; SRVR:BY5PR13MB3221; H:BY5PR13MB3206.namprd13.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: futurewei.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: QjH/xA/xhbhOUi1MR96+pgQC8CIj4PQgIiGjGFFynAZzRFNe6Q9TXdkbvHYpORb3J3Rv323Hfpwo6zWF/KdAJBqqrlFT3KbsVIwnPOFJ/oZV1Dg0z7ksRJp62VV6XrDKOxHNoam5QKDiz01JxXTkLIRJrg6ofrckaywqx5GVwbNlikv+WqBRzRMpgdqFOaCeK+YR43+v8RcTe1X3GJ+KSzzZyRjmNgoZLzXo9m+ZjjVGlwOznaf56EMCj+xSlNhXjqJVbxAp5k2fhWkVqZ44qnZuiMJXJG0yTUX3EAHV8vYsCC8OT1l2mEUIqjRugX+l6loj5tXvAR/1J83/5lUvCiICrsXENWoOBCx1WYMvQVakaCqhJ9u4tOrz23N9QeDIrM6glbwTpMFAazXbn2ifWW6aI4TPZd45VK8Kv2HBwGKftPFOXb0dutFkU0fTsSvc
x-ms-exchange-antispam-messagedata: i3jwfbXH8NMuHJpdHAsGUEmId1lv8SRFeJgVs1JHeckNCkKVftcVZAItekPjITIXhEnHr8BZSPmnjZ+Rjg0ZShCAjePcXet1P+5ub0jnlpLN361HGg8RLXnxl4VLGbZIpmP9Cy11Ja4VwiSHHsrmqA==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <5624A8B9E47F60409C422D9D9DC57F16@namprd13.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2de5a941-cf75-4be4-528f-08d7bc9a6074
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2020 22:05:52.3217 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: HGCSZGefDdiaLFMn2Nq+zLmeQxS+LDCiKtnVqdK+C6SirNgnxkuNmN7sm1oJZXPgZE9CGUjAGwCx00SUmmvFEg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR13MB3221
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/rHeXNNv_Ie3ge7YfmUn_vuvzVlE>
Subject: Re: [netmod] draft-ietf-netmod-nmda-diff - IPR verfication request
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 22:05:58 -0000

SSdtIG5vdCBhd2FyZSBvZiBhbnkgSVBSIGJlc2lkZXMgdGhlIG9uZSBkaXNjbG9zZWQuDQoNClRo
YW5rcywNCllpbmd6aGVuDQoNCg0K77u/T24gMi8yNS8yMCwgMTA6NDIgUE0sICJKZWZmIFRhbnRz
dXJhIiA8amVmZnRhbnQuaWV0ZkBnbWFpbC5jb20+IHdyb3RlOg0KDQogICAgSm9lbCwNCiAgICAN
CiAgICBObywgSSdtIG5vdCBhd2FyZSBvZiBhbnkgSVBSIHRoYXQgYXBwbGllcyB0byB0aGlzIGRy
YWZ0Lg0KICAgIA0KICAgIENoZWVycywNCiAgICBKZWZmDQogICAgDQogICAgPiBPbiBGZWIgMTcs
IDIwMjAsIGF0IDExOjQ0LCBKb2VsIEphZWdnbGkgPGpvZWxqYUBib2d1cy5jb20+IHdyb3RlOg0K
ICAgID4gDQogICAgPiBObywgSSdtIG5vdCBhd2FyZSBvZiBhbnkgSVBSIHRoYXQgYXBwbGllcyB0
byB0aGlzIGRyYWZ0DQogICAgDQoNCg==


From nobody Fri Feb 28 14:36:00 2020
Return-Path: <agenda@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EBBC3A1F79; Fri, 28 Feb 2020 14:35:01 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <netmod-chairs@ietf.org>, <joelja@bogus.com>
Cc: ibagdona@gmail.com, netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.119.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <158292930103.19931.11094715138755998649@ietfa.amsl.com>
Date: Fri, 28 Feb 2020 14:35:01 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/w05-Q3dUDep1BpojyKyDmS5Sa3A>
Subject: [netmod] netmod - Requested sessions have been scheduled for IETF 107
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 22:35:08 -0000

Dear Joel Jaeggli,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


    netmod Session 1 (2:00 requested)
    Monday, 23 March 2020, Afternoon Session I 1330-1530
    Room Name: Plaza B/C size: 300
    ---------------------------------------------
    netmod Session 2 (1:00 requested)
    Monday, 23 March 2020, Afternoon Session III 1810-1910
    Room Name: Regency E size: 150
    ---------------------------------------------


iCalendar: https://datatracker.ietf.org/meeting/107/sessions/netmod.ics

Request Information:


---------------------------------------------------------
Working Group Name: Network Modeling
Area Name: Operations and Management Area
Session Requester: Joel Jaeggli

Number of Sessions: 2
Length of Session(s):  2 Hours, 1 Hour
Number of Attendees: 100
Conflicts to Avoid: 
 Chair Conflict: netconf
 Technology Overlap: rtgwg i2rs teas
 Key Participant Conflict: saag


People who must be present:
  Ignas Bagdonas
  Kent Watsen
  Joel Jaeggli
  Lou Berger
  Robert Wilton

Resources Requested:

Special Requests:
  Please place the first session in the first half of the week (i.e., M-W).
---------------------------------------------------------



From nobody Fri Feb 28 23:21:28 2020
Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0381A3A0A75; Fri, 28 Feb 2020 23:21:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level: 
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=eswxKu6t; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=cUelNR3V
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FD_EwrZXaDCk; Fri, 28 Feb 2020 23:21:23 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D6003A0A71; Fri, 28 Feb 2020 23:21:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10150; q=dns/txt; s=iport; t=1582960883; x=1584170483; h=from:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=EdmukxpnBUYXCzPBEQv/75r5NbsrFGRhGN43JKzkPlo=; b=eswxKu6tqE/LF9yaaqXpMcnkKCj0BBRB5zVY6pLf6h0vYe8H6ibVm7NG Y4n6nkp3sn1tNHp1euARfgJ9BfkF9nLvl6Rp/idB67ZVzG0a8w40x/OBI PYNCbfpKoTlNp/xPBrwin897MsgnFm31HFEWwZvGYcETDIXevUrHvMCvE s=;
IronPort-PHdr: =?us-ascii?q?9a23=3ALISFIBeDC15ObwjC7vBPJt6PlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwGRD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFn?= =?us-ascii?q?pnwd4TgxRmBceEDUPhK/u/dTM7GNhFUndu/mqwNg5eH8OtL1A=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ACCwC1D1pe/4ENJK1mHQEBAQkBEQU?= =?us-ascii?q?FAYF7gVRQBWxYIAQLKgqECoNGA4pmToIRmBWCUgNUCQEBAQwBARgLCgIEAQG?= =?us-ascii?q?De0UCF4FzJDgTAgMNAQEFAQEBAgEFBG2FVgyFYwEBAQEEARALBhEMAQEsBAg?= =?us-ascii?q?LBgEZBAEBAQICJgIEJQsVCAkBBAESCBMHgwWCSgMuAQMLowACgTmIYnWBMoJ?= =?us-ascii?q?/AQEFgUNBgwwYggwJgQ4qjCUagUE/gViCIAGDTgEBAgEBGIExGoMPMoIsjh2?= =?us-ascii?q?CSIYUmSYKgjwEh02PMIJJf4cgkEmOcIFNhy+STAIEAgQFAg4BAQWBaSKBWHA?= =?us-ascii?q?VGiGCbAlHGA2OHQwXg1CFFIVBdIEpjTkBgQ8BAQ?=
X-IronPort-AV: E=Sophos;i="5.70,499,1574121600"; d="scan'208";a="439350888"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Feb 2020 07:21:21 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 01T7LLeE001699 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 29 Feb 2020 07:21:21 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 29 Feb 2020 01:21:20 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 29 Feb 2020 01:21:20 -0600
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sat, 29 Feb 2020 02:21:20 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mSvJI+ckTCasmngA+7T0WrLWsLhjyvR5Z1uR3Z0MGmhh7yL7E+3YxwDIzBq9lg6es+7JMQrC+8Ul483A1K/6hnjyH/kjdQsGSNIudqNHfNzrwX/ZX66E7LRFmCxVlFFUlhMf0aATVBF3cJjSUWMb+y4z/hbg3avAWGNjMAN9V/dE+wHjtJGUDP/EUhBJpZfdnti/LPFrUYCQ9YkTIYIR+MOO7t2tbtbaDteCDq+SFUWrBPxenAEfpY4eAEtWzu3SInQyzv9IYYsedXSviVY5Xed/yhdbRhTKGKd8pXAHetxPdYB7WDyDEpTs9QWT2MAxcPFzXizv/XJUgwl7F5nhZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EdmukxpnBUYXCzPBEQv/75r5NbsrFGRhGN43JKzkPlo=; b=PwNONeNIbqf8HyecdzKcBevm3oHp7S5yw1kyXqbtX9Jcp0qFF6Twfrcsu5MA4+46EWZg3pQQ63SJf79WXb6nCl9aa9rckmYbgKOfuC3ytgBaK6s0xrJyit+a4WVN93ZwVVPXrM/8BlZpooJD6xKfnhDhG97JZl+N7r5YPRywc5onxMpabcyueNMvk5uciD7BrkWJZ9JP3eKv2nvJZlfvFKzIUl+JlHI0cgh7p5AwQkdR6dUnEbAMYb1KKtcl+phjh5qD6jvI1vt9gTOyTsIO0I4qbpnyz5Ln3Jkzcqy36cvX+YYG6FmQAXuViMP6cRhVU9z3+G4b09dLYCMyUEY1Ww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EdmukxpnBUYXCzPBEQv/75r5NbsrFGRhGN43JKzkPlo=; b=cUelNR3V+M5g34je3kOw/YFP5dX/Ls7yyt7o1dB+vQVGuwlvvIremVJRafGnd6dh/g9Rkn7AW24RVUcsmXSC96hvdqcE0+9wU79thbqTgu6flrDg5CwquHRAivLZX1RxC/GZM1396JN64zjlvaxCK91goxwGJqUnvgjXi6vED48=
Received: from MN2PR11MB4366.namprd11.prod.outlook.com (2603:10b6:208:190::17) by MN2PR11MB4143.namprd11.prod.outlook.com (2603:10b6:208:137::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.14; Sat, 29 Feb 2020 07:21:17 +0000
Received: from MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1]) by MN2PR11MB4366.namprd11.prod.outlook.com ([fe80::b9ce:1058:5fa6:44a1%7]) with mapi id 15.20.2772.012; Sat, 29 Feb 2020 07:21:17 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "netmod@ietf.org" <netmod@ietf.org>, "netmod-chairs@ietf.org" <netmod-chairs@ietf.org>
Thread-Topic: Version selection draft posted
Thread-Index: AdXuz2bmAhyGvMGQSleOvBvTWXwOSQ==
Date: Sat, 29 Feb 2020 07:21:17 +0000
Message-ID: <MN2PR11MB43662EF4151EA4A4F3D9C9A6B5E90@MN2PR11MB4366.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rwilton@cisco.com; 
x-originating-ip: [82.15.79.32]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 06c70fea-4325-4e91-0b73-08d7bce7f7b6
x-ms-traffictypediagnostic: MN2PR11MB4143:
x-microsoft-antispam-prvs: <MN2PR11MB414389BE157757AB955D72C6B5E90@MN2PR11MB4143.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 03283976A6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(396003)(39860400002)(366004)(376002)(346002)(199004)(189003)(186003)(450100002)(66446008)(66556008)(66476007)(64756008)(66946007)(5660300002)(71200400001)(66574012)(2906002)(966005)(53546011)(6506007)(52536014)(26005)(33656002)(3480700007)(55016002)(81166006)(110136005)(81156014)(7696005)(8936002)(8676002)(86362001)(478600001)(316002)(9686003)(76116006); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB4143; H:MN2PR11MB4366.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Z+SlC3Sa7zjwCejHxYaBU8HPpBBL0clL7HwklTrgUJ+GUh5Db5xggkyyiBXloksTqVOyMVaAgm4L72pqNdXRUsoIIRPMmhgXWmYdATrIjEw1S0j7gyc7mU+4kyY+UYUH5CSlBx9nfH+b9UjmPnYdPXWJgLOpvG6SqhzQ8HH7NPngbipcpO/VIoY6CqrhEq3+Q8AzSD0scdojwuvbIbF7pRO/Kn1zsFe5wfA1vMHA1aXaGScH7msCqCNltzPWyfpC5BWHmy0YHR58qOd0APKhYmcH81q+gIiw0LdhUXfa7eZlG9b+lJstu7tmZ9w2Ia9PevS1DX8IXNzha1oZoB3mTtvS88mhoqXEISXM6rDkIOxJtjv27zQrrUQ2owUWn0yrT5iSYTmbSlKjibIlP/sMtaUY9aScDN9LxxRc6+p0OWzHGCIvZSOFZuxxSlLeZaOXZtEN3uS1GdMMLukSUaCO3qUhfxF2LxBO8tDbdes2qrspQm3Ghi0ZoWs17DM6KmQbuTk6j+3vjzcEEE7zG4Az8g==
x-ms-exchange-antispam-messagedata: oNL5GhN5IacYHdic5xMDUx5sjjbIOfqMsnBzjlxlzJsO+s2rPY6CHgYU0waCWXbicIf+ZbgNRCryAJLRnlfzg1gSQTz5Q/i98zR+P3OuLRec/XeWbyJ0XQQqAnFGbXqxzSxn5AdSqBllCkyMoMe5Jg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 06c70fea-4325-4e91-0b73-08d7bce7f7b6
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Feb 2020 07:21:17.3285 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3ifVv54ZIbbsBDdw57QxzK8gfr7oern2skoQr4rBidDT8lGpZXCzG+pAAbtbKJwRpZXjixj/H9a9W8CSvAE7Mg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4143
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.15, xch-aln-005.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/wrXwScB9ngu0C91KriBsJXkWiLk>
Subject: [netmod] Version selection draft posted
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Feb 2020 07:21:27 -0000
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From nobody Sat Feb 29 18:44:38 2020
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netmod@ietf.org
Delivered-To: netmod@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2784A3A0957; Sat, 29 Feb 2020 18:44:34 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netmod@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.119.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netmod@ietf.org
Message-ID: <158303067398.4958.9535195772318793074@ietfa.amsl.com>
Date: Sat, 29 Feb 2020 18:44:34 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/0P-mX7QBao8_nBajqrKp2xkhgn4>
Subject: [netmod] I-D Action: draft-ietf-netmod-module-tags-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Mar 2020 02:44:35 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Modeling WG of the IETF.

        Title           : YANG Module Tags
        Authors         : Christian Hopps
                          Lou Berger
                          Dean Bogdanovic
	Filename        : draft-ietf-netmod-module-tags-10.txt
	Pages           : 18
	Date            : 2020-02-29

Abstract:
   This document provides for the association of tags with YANG modules.
   The expectation is for such tags to be used to help classify and
   organize modules.  A method for defining, reading and writing a
   modules tags is provided.  Tags may be registered and assigned during
   module definition; assigned by implementations; or dynamically
   defined and set by users.  This document also provides guidance to
   future model writers; as such, this document updates RFC8407.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netmod-module-tags/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netmod-module-tags-10
https://datatracker.ietf.org/doc/html/draft-ietf-netmod-module-tags-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netmod-module-tags-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


