
From nobody Sun Dec  2 10:03:15 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B575127598 for <netconf@ietfa.amsl.com>; Sun,  2 Dec 2018 10:03:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.359
X-Spam-Level: 
X-Spam-Status: No, score=-3.359 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VJ3U-l6vTdid for <netconf@ietfa.amsl.com>; Sun,  2 Dec 2018 10:03:11 -0800 (PST)
Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F327F126CC7 for <netconf@ietf.org>; Sun,  2 Dec 2018 10:03:10 -0800 (PST)
Received: by mail-lf1-x131.google.com with SMTP id l10so7439876lfh.9 for <netconf@ietf.org>; Sun, 02 Dec 2018 10:03:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=lElCKqJl/FSLyvW0Uj2Vm6toeemhMpoHXoUWG8mk2ps=; b=biLEplnsQXGdnPc6/tlMvAjdZ9pRNORc+j8SYnAWd+ehiBua8XqblZVfKR9tZyytt5 7KSXOk7SR7x4u0wIc9kMe1d6+RVS19110duABJa6TvZ2X/sTBoCnO8dZNP3T1XsTtwxN uLSpt2UYJIv7TBcPpwMJ85MjJaesI5w/q3rjPimE/34XZsuyZLq0FAmNxaPSbYSvh/rb 19HdNEZ6POewW0+4Vp7XQ19F0yhzg50urqML0/9swtMriC7PU0ChJMVfM1f4SIdvZRU0 mp6EY2aDPWifZ0ud7tvTweW1HrVjjrBsLglbV5A4YDrgj6RSQTI5tDST8PfJ6C+dsC4U A/QQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=lElCKqJl/FSLyvW0Uj2Vm6toeemhMpoHXoUWG8mk2ps=; b=qHppAKmdbllh2f64GeuLvgUuop1D2Rc06eC6L6jK1WRjNX3+worLN5mzoRZenC/TO9 1op8CNwyVU/I/m8FAtPPGRdd5dbF3K2gJa0DHQXCmJEC5nQ03FFNo1IFIwNKJ+n/WeN7 BWfCN+o0BAhFdOzEjsxyJKTjcrorMJVpZ0Memij8t9c8Ki3yeMP2jrX60UU8YPPl1DlT lgmlganpgVT1AJ3kOVJmdmC55Q0TT9k6ugxoz49va0tTsGWgJ+NLfk+Re8EicFMH5HMP XCeO+BXQuAH5nGyz9Z7JpdHQ2aO8ZdULrMQBIVKPmK+A25E8Qy1kU3u6v/4TuEj3WPDt K1gQ==
X-Gm-Message-State: AA+aEWbMLIPHlipvC2ciNOwYY8DpXsrwlz16nH3j+FPK5vkgsKo3MPfB 7/+5goC/Zo5te7wMvEn3Gry5+5wx/OYM3ZjF6qt8uykQ
X-Google-Smtp-Source: AFSGD/U79xwJ18+PlZKu4TrwqvtG/xFCTcvULiSNJ2Pogdx+Qty2HOOimmncccOkU/uQgdXbdYCh9U5q9R2e2zuy9ro=
X-Received: by 2002:a19:d58e:: with SMTP id m136mr8053125lfg.70.1543773788403;  Sun, 02 Dec 2018 10:03:08 -0800 (PST)
MIME-Version: 1.0
From: Andy Bierman <andy@yumaworks.com>
Date: Sun, 2 Dec 2018 10:02:57 -0800
Message-ID: <CABCOCHRBwr0L=9rTH040hL5P3MFma3uvn_ZQyGZG+oPiyiZpdw@mail.gmail.com>
To: Netconf <netconf@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000458fd1057c0dd8f6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/TQFTkxBWCHrS757tooUYr7enXwc>
Subject: [Netconf] comments on draft-wu-netconf-restconf-factory-restore-03
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Dec 2018 18:03:14 -0000

--000000000000458fd1057c0dd8f6
Content-Type: text/plain; charset="UTF-8"

Hi,

I have comments and questions on the functional requirements and
scope of the problem(s) to be solved. Scope seem to be:
   G1) reset device to factory config
   G2) set any datastore to contents of the factory config with
<copy-config>
   G3) retrieve contents of factory-config with <get-data>

Q1) what is the factory datastore?

The concept of a factory default config is universal but the implementation
is not.
This needs to be precisely defined in the draft.

There is actually a factory-startup (--> running) and factory-intended.
By default the factory-startup is likely an empty config (i.e. just the
YANG defaults
supported by the server).  The factory-intended is implementation-specific.

So what is standardized? factory-startup or factory-intended? both?

Q2) leaf-list of datastores to reset

Setting specific datastores to factory default is complex and dangerous.
It is unlikely a server will support all possible combinations.
A simple RPC to return the entire server to factory default is much easier
to use
and implement. Vendors can add input parameters to support their variants.

Q3) filtered retrieval of the factory settings

If a real datastore is used as proposed, then is subtree and XPath
filtering required?
It seems all operations except edit have to be supported by the server.

Q4) why no retrieval without NMDA, factory-default-as-datastore feature?

It would be useful to know what will happen if <reset-datastore> is invoked
by retrieving the contents of the factory config. This is not possible if
the datastore feature is not supported. I suggest another RPC

   rpc get-factory-defaults {
      if-feature "not factory-default-as-datastore";
      output {
        anydata data;
      }
   }


Andy

--000000000000458fd1057c0dd8f6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I have comments and questions on th=
e functional requirements and</div><div>scope of the problem(s) to be solve=
d. Scope seem to be:</div><div>=C2=A0 =C2=A0G1) reset device to factory con=
fig</div><div>=C2=A0 =C2=A0G2) set any datastore to contents of the factory=
 config with &lt;copy-config&gt;</div><div>=C2=A0 =C2=A0G3) retrieve conten=
ts of factory-config with &lt;get-data&gt;</div><div><br></div><div>Q1) wha=
t is the factory datastore?</div><div><br></div><div>The concept of a facto=
ry default config is universal but the implementation is not.</div><div>Thi=
s needs to be precisely defined in the draft.</div><div><br></div><div>Ther=
e is actually a factory-startup (--&gt; running) and factory-intended.</div=
><div>By default the factory-startup is likely an empty config (i.e. just t=
he YANG defaults</div><div>supported by the server).=C2=A0 The factory-inte=
nded is implementation-specific.</div><div><br></div><div>So what is standa=
rdized? factory-startup or factory-intended? both?</div><div><br></div><div=
>Q2) leaf-list of datastores to reset</div><div><br></div><div>Setting spec=
ific datastores to factory default is complex and dangerous.</div><div>It i=
s unlikely a server will support all possible combinations.</div><div>A sim=
ple RPC to return the entire server to factory default is much easier to us=
e</div><div>and implement. Vendors can add input parameters to support thei=
r variants.</div><div><br></div><div>Q3) filtered retrieval of the factory =
settings</div><div><br></div><div>If a real datastore is used as proposed, =
then is subtree and XPath filtering required?</div><div>It seems all operat=
ions except edit have to be supported by the server.</div><div><br></div><d=
iv>Q4) why no retrieval without NMDA, factory-default-as-datastore feature?=
</div><div><br></div><div>It would be useful to know what will happen if &l=
t;reset-datastore&gt; is invoked</div><div>by retrieving the contents of th=
e factory config. This is not possible if</div><div>the datastore feature i=
s not supported. I suggest another RPC</div><div><br></div><div>=C2=A0 =C2=
=A0rpc get-factory-defaults {</div><div>=C2=A0 =C2=A0 =C2=A0 if-feature &qu=
ot;not factory-default-as-datastore&quot;;</div><div>=C2=A0 =C2=A0 =C2=A0 o=
utput {</div><div>=C2=A0 =C2=A0 =C2=A0 =C2=A0 anydata data;</div><div>=C2=
=A0 =C2=A0 =C2=A0 }</div><div>=C2=A0 =C2=A0}</div><div><br></div><div><br><=
/div><div>Andy</div><div><br></div></div>

--000000000000458fd1057c0dd8f6--


From nobody Sun Dec  2 21:57:47 2018
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F69812D4EA for <netconf@ietfa.amsl.com>; Sun,  2 Dec 2018 21:57:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oGqNATLFfOxp for <netconf@ietfa.amsl.com>; Sun,  2 Dec 2018 21:57:44 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50E0E124408 for <netconf@ietf.org>; Sun,  2 Dec 2018 21:57:44 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id B72D1B8122E; Sun,  2 Dec 2018 21:57:37 -0800 (PST)
To: andy@yumaworks.com, mbj@tail-f.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, kwatsen@juniper.net, mjethanandani@gmail.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: bill.wu@huawei.com, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20181203055737.B72D1B8122E@rfc-editor.org>
Date: Sun,  2 Dec 2018 21:57:37 -0800 (PST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/XcF9r3ek3LvZ4DjF-7_B8kxuiwA>
Subject: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 05:57:46 -0000

The following errata report has been submitted for RFC8040,
"RESTCONF Protocol".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata/eid5565

--------------------------------------
Type: Technical
Reported by: Qin Wu <bill.wu@huawei.com>

Section: 7

Original Text
-------------
              +-------------------------+------------------+
              | error-tag               | status code      |
              +-------------------------+------------------+
              | in-use                  | 409              |
              | lock-denied             | 409              |
              | resource-denied         | 409              |
              | data-exists             | 409              |
              | data-missing            | 409              |


Corrected Text
--------------
              +-------------------------+------------------+
              | error-tag               | status code      |
              +-------------------------+------------------+
              | in-use                  | 409              |
              | lock-denied             | 409              |
              | resource-denied         | 409              |
              | data-exists             | 409              |
              | data-missing            | 404              |


Notes
-----
The <error-tag> data missing should be mapped to status code '404' instead of '409' to get consistent with the defintion of data-missing in RFC6241.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC8040 (draft-ietf-netconf-restconf-18)
--------------------------------------
Title               : RESTCONF Protocol
Publication Date    : January 2017
Author(s)           : A. Bierman, M. Bjorklund, K. Watsen
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Mon Dec  3 00:58:25 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CE3A130E01 for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 00:58:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wyCI3YhRJqJN for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 00:58:21 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 316A1126C01 for <netconf@ietf.org>; Mon,  3 Dec 2018 00:58:21 -0800 (PST)
Received: from localhost (h-39-108.A165.priv.bahnhof.se [213.136.39.108]) by mail.tail-f.com (Postfix) with ESMTPSA id EFCD41AE0386; Mon,  3 Dec 2018 09:58:19 +0100 (CET)
Date: Mon, 03 Dec 2018 09:54:09 +0100 (CET)
Message-Id: <20181203.095409.224403340529984673.mbj@tail-f.com>
To: rfc-editor@rfc-editor.org
Cc: andy@yumaworks.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, mjethanandani@gmail.com, bill.wu@huawei.com, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <20181203055737.B72D1B8122E@rfc-editor.org>
References: <20181203055737.B72D1B8122E@rfc-editor.org>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/9u8iTO6TA4B3bv2Zhkff8edTe5c>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 08:58:23 -0000

Hi,

I don't think this errata should be accepted.  404 means that the
requested resource doesn't exist, but "data-missing" can be returned
e.g. if you try to patch an existing resource of type leafref to point
to a non-existing leaf.


/martin


RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> The following errata report has been submitted for RFC8040,
> "RESTCONF Protocol".
> 
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata/eid5565
> 
> --------------------------------------
> Type: Technical
> Reported by: Qin Wu <bill.wu@huawei.com>
> 
> Section: 7
> 
> Original Text
> -------------
>               +-------------------------+------------------+
>               | error-tag               | status code      |
>               +-------------------------+------------------+
>               | in-use                  | 409              |
>               | lock-denied             | 409              |
>               | resource-denied         | 409              |
>               | data-exists             | 409              |
>               | data-missing            | 409              |
> 
> 
> Corrected Text
> --------------
>               +-------------------------+------------------+
>               | error-tag               | status code      |
>               +-------------------------+------------------+
>               | in-use                  | 409              |
>               | lock-denied             | 409              |
>               | resource-denied         | 409              |
>               | data-exists             | 409              |
>               | data-missing            | 404              |
> 
> 
> Notes
> -----
> The <error-tag> data missing should be mapped to status code '404' instead of '409' to get consistent with the defintion of data-missing in RFC6241.
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> can log in to change the status and edit the report, if necessary. 
> 
> --------------------------------------
> RFC8040 (draft-ietf-netconf-restconf-18)
> --------------------------------------
> Title               : RESTCONF Protocol
> Publication Date    : January 2017
> Author(s)           : A. Bierman, M. Bjorklund, K. Watsen
> Category            : PROPOSED STANDARD
> Source              : Network Configuration
> Area                : Operations and Management
> Stream              : IETF
> Verifying Party     : IESG
> 


From nobody Mon Dec  3 01:38:49 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1B0A130E2F for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 01:38:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VgdlB_dB6ieB for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 01:38:45 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FCC5130E4A for <netconf@ietf.org>; Mon,  3 Dec 2018 01:38:45 -0800 (PST)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 3281C92472129 for <netconf@ietf.org>; Mon,  3 Dec 2018 09:38:28 +0000 (GMT)
Received: from lhreml707-chm.china.huawei.com (10.201.108.56) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 3 Dec 2018 09:38:29 +0000
Received: from lhreml707-chm.china.huawei.com (10.201.108.56) by lhreml707-chm.china.huawei.com (10.201.108.56) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Mon, 3 Dec 2018 09:38:29 +0000
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml707-chm.china.huawei.com (10.201.108.56) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1591.10 via Frontend Transport; Mon, 3 Dec 2018 09:38:28 +0000
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.69]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Mon, 3 Dec 2018 17:38:22 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Martin Bjorklund <mbj@tail-f.com>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>
CC: "andy@yumaworks.com" <andy@yumaworks.com>, "kwatsen@juniper.net" <kwatsen@juniper.net>, "ibagdona@gmail.com" <ibagdona@gmail.com>, "warren@kumari.net" <warren@kumari.net>, "mjethanandani@gmail.com" <mjethanandani@gmail.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC8040 (5565)
Thread-Index: AQHUis0fOWI85JR8KUeCGWx7iiB8pKVsL8uAgACRE7A=
Date: Mon, 3 Dec 2018 09:38:21 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com>
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com>
In-Reply-To: <20181203.095409.224403340529984673.mbj@tail-f.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/wKhSu848x_sop9YK2cpnCNVh6NA>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 09:38:48 -0000
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From nobody Mon Dec  3 01:48:13 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 222D0130E2F for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 01:48:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mZVXHLQFeiyf for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 01:48:09 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 6846B130DE2 for <netconf@ietf.org>; Mon,  3 Dec 2018 01:48:09 -0800 (PST)
Received: from localhost (h-39-108.A165.priv.bahnhof.se [213.136.39.108]) by mail.tail-f.com (Postfix) with ESMTPSA id 7E22D1AE0386; Mon,  3 Dec 2018 10:48:08 +0100 (CET)
Date: Mon, 03 Dec 2018 10:48:08 +0100 (CET)
Message-Id: <20181203.104808.838283353261944785.mbj@tail-f.com>
To: bill.wu@huawei.com
Cc: rfc-editor@rfc-editor.org, andy@yumaworks.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, mjethanandani@gmail.com, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com>
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/hkVDdHK4xA74NgvXzWP0zObMiyY>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 09:48:12 -0000
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From nobody Mon Dec  3 02:14:10 2018
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E311130E3E for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:14:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O1iVGwMBxHdf for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:14:06 -0800 (PST)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE0ED130E19 for <netconf@ietf.org>; Mon,  3 Dec 2018 02:14:05 -0800 (PST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 38D98B08; Mon,  3 Dec 2018 11:14:04 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id Lxnh3TIdZaad; Mon,  3 Dec 2018 11:14:04 +0100 (CET)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Mon,  3 Dec 2018 11:14:04 +0100 (CET)
Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 2067D2003F; Mon,  3 Dec 2018 11:14:04 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id l9UwLVdiuAPK; Mon,  3 Dec 2018 11:14:03 +0100 (CET)
Received: from exchange.jacobs-university.de (SXCHMB02.jacobs.jacobs-university.de [10.70.0.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 7756620044; Mon,  3 Dec 2018 11:14:02 +0100 (CET)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1591.10; Mon, 3 Dec 2018 11:14:01 +0100
Received: by anna.localdomain (Postfix, from userid 501) id 0A02630048D55F; Mon,  3 Dec 2018 11:14:00 +0100 (CET)
Date: Mon, 3 Dec 2018 11:14:00 +0100
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Martin Bjorklund <mbj@tail-f.com>
CC: <bill.wu@huawei.com>, <ibagdona@gmail.com>, <netconf@ietf.org>, <warren@kumari.net>, <rfc-editor@rfc-editor.org>
Message-ID: <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Martin Bjorklund <mbj@tail-f.com>, bill.wu@huawei.com, ibagdona@gmail.com, netconf@ietf.org, warren@kumari.net, rfc-editor@rfc-editor.org
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20181203.104808.838283353261944785.mbj@tail-f.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB02.jacobs.jacobs-university.de (10.70.0.121) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/KOT6eU9PkpVX-oeKXACimmXyB4w>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:14:08 -0000

On Mon, Dec 03, 2018 at 10:48:08AM +0100, Martin Bjorklund wrote:
> 
> So, maybe the proper fix is
> 
>                | data-missing            | 404, 409           |
>

And then you hope that different implementors will come to the same
conclusions when to return 404 or 409. I have some doubts that this
will work well...

Are there implementations that return 404 for data-missing today?

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon Dec  3 02:20:29 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3DA1130E3E for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:20:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4J8lHeJb6oTY for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:20:23 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 48FFE130DDA for <netconf@ietf.org>; Mon,  3 Dec 2018 02:20:23 -0800 (PST)
Received: from localhost (h-39-108.A165.priv.bahnhof.se [213.136.39.108]) by mail.tail-f.com (Postfix) with ESMTPSA id 1E33F1AE0386; Mon,  3 Dec 2018 11:20:22 +0100 (CET)
Date: Mon, 03 Dec 2018 11:20:21 +0100 (CET)
Message-Id: <20181203.112021.415049598342701506.mbj@tail-f.com>
To: j.schoenwaelder@jacobs-university.de
Cc: bill.wu@huawei.com, ibagdona@gmail.com, netconf@ietf.org, warren@kumari.net, rfc-editor@rfc-editor.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de>
References: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com> <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/XfoOpKslbdbGbX8HZrQHtNRvVkw>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:20:27 -0000

Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> wrote:
> On Mon, Dec 03, 2018 at 10:48:08AM +0100, Martin Bjorklund wrote:
> > 
> > So, maybe the proper fix is
> > 
> >                | data-missing            | 404, 409           |
> >
> 
> And then you hope that different implementors will come to the same
> conclusions when to return 404 or 409. I have some doubts that this
> will work well...

Yes, I started to write that we also need additional text to explain
this.  But that would probably be too much for an errata.


> Are there implementations that return 404 for data-missing today?

I'm pretty sure that all implementations return 404 if someone tries
to DELETE a non-existing resource, which in NETCONF would be a
"data-missing" reply to an edit-config.

But it is not quite clear if the table in section 7 of RFC 8040 is
supposed to be used in this case...



/martin



> 
> /js
> 
> -- 
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
> 


From nobody Mon Dec  3 02:27:03 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57BDD130E19 for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:27:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0XN7LwzUvjzr for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:26:59 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 768CC12875B for <netconf@ietf.org>; Mon,  3 Dec 2018 02:26:59 -0800 (PST)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 1413B92DEE542 for <netconf@ietf.org>; Mon,  3 Dec 2018 10:26:42 +0000 (GMT)
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 3 Dec 2018 10:26:43 +0000
Received: from lhreml709-chm.china.huawei.com (10.201.108.58) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Mon, 3 Dec 2018 10:26:43 +0000
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml709-chm.china.huawei.com (10.201.108.58) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1591.10 via Frontend Transport; Mon, 3 Dec 2018 10:26:43 +0000
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.69]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Mon, 3 Dec 2018 18:26:24 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "andy@yumaworks.com" <andy@yumaworks.com>, "kwatsen@juniper.net" <kwatsen@juniper.net>, "ibagdona@gmail.com" <ibagdona@gmail.com>, "warren@kumari.net" <warren@kumari.net>, "mjethanandani@gmail.com" <mjethanandani@gmail.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC8040 (5565)
Thread-Index: AQHUis0fOWI85JR8KUeCGWx7iiB8pKVsL8uAgACRE7D//34CAIAAjuzg
Date: Mon, 3 Dec 2018 10:26:23 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B177963@nkgeml513-mbs.china.huawei.com>
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com>
In-Reply-To: <20181203.104808.838283353261944785.mbj@tail-f.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/swrElmwh3UVTGko2r_yB5ZLx6sE>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:27:02 -0000
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From nobody Mon Dec  3 02:29:15 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B743012875B for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:29:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RETX_ZPeHvdX for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:29:11 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C641130E4A for <netconf@ietf.org>; Mon,  3 Dec 2018 02:29:11 -0800 (PST)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 600BD7EE9EBFF; Mon,  3 Dec 2018 10:29:07 +0000 (GMT)
Received: from lhreml708-chm.china.huawei.com (10.201.108.57) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 3 Dec 2018 10:29:09 +0000
Received: from lhreml708-chm.china.huawei.com (10.201.108.57) by lhreml708-chm.china.huawei.com (10.201.108.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Mon, 3 Dec 2018 10:29:08 +0000
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml708-chm.china.huawei.com (10.201.108.57) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1591.10 via Frontend Transport; Mon, 3 Dec 2018 10:29:08 +0000
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.69]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Mon, 3 Dec 2018 18:29:02 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Martin Bjorklund <mbj@tail-f.com>, "j.schoenwaelder@jacobs-university.de" <j.schoenwaelder@jacobs-university.de>
CC: "ibagdona@gmail.com" <ibagdona@gmail.com>, "netconf@ietf.org" <netconf@ietf.org>, "warren@kumari.net" <warren@kumari.net>, "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>
Thread-Topic: [Netconf] [Technical Errata Reported] RFC8040 (5565)
Thread-Index: AQHUis0fOWI85JR8KUeCGWx7iiB8pKVsL8uAgACRE7D//34CAIAABzoAgAABxoCAAIhIIA==
Date: Mon, 3 Dec 2018 10:29:02 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B17797D@nkgeml513-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com> <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de> <20181203.112021.415049598342701506.mbj@tail-f.com>
In-Reply-To: <20181203.112021.415049598342701506.mbj@tail-f.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/JY4AU4gJhIEtiOieTWTvVTtQxJI>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:29:14 -0000

LS0tLS3Tyrz+1K28/i0tLS0tDQq3orz+yMs6IE1hcnRpbiBCam9ya2x1bmQgW21haWx0bzptYmpA
dGFpbC1mLmNvbV0gDQq3osvNyrG85DogMjAxOMTqMTLUwjPI1SAxODoyMA0KytW8/sjLOiBqLnNj
aG9lbndhZWxkZXJAamFjb2JzLXVuaXZlcnNpdHkuZGUNCrOty806IFFpbiBXdTsgaWJhZ2RvbmFA
Z21haWwuY29tOyBuZXRjb25mQGlldGYub3JnOyB3YXJyZW5Aa3VtYXJpLm5ldDsgcmZjLWVkaXRv
ckByZmMtZWRpdG9yLm9yZw0K1vfM4jogUmU6IFtOZXRjb25mXSBbVGVjaG5pY2FsIEVycmF0YSBS
ZXBvcnRlZF0gUkZDODA0MCAoNTU2NSkNCg0KSnVlcmdlbiBTY2hvZW53YWVsZGVyIDxqLnNjaG9l
bndhZWxkZXJAamFjb2JzLXVuaXZlcnNpdHkuZGU+IHdyb3RlOg0KPiBPbiBNb24sIERlYyAwMywg
MjAxOCBhdCAxMDo0ODowOEFNICswMTAwLCBNYXJ0aW4gQmpvcmtsdW5kIHdyb3RlOg0KPiA+IA0K
PiA+IFNvLCBtYXliZSB0aGUgcHJvcGVyIGZpeCBpcw0KPiA+IA0KPiA+ICAgICAgICAgICAgICAg
IHwgZGF0YS1taXNzaW5nICAgICAgICAgICAgfCA0MDQsIDQwOSAgICAgICAgICAgfA0KPiA+DQo+
IA0KPiBBbmQgdGhlbiB5b3UgaG9wZSB0aGF0IGRpZmZlcmVudCBpbXBsZW1lbnRvcnMgd2lsbCBj
b21lIHRvIHRoZSBzYW1lIA0KPiBjb25jbHVzaW9ucyB3aGVuIHRvIHJldHVybiA0MDQgb3IgNDA5
LiBJIGhhdmUgc29tZSBkb3VidHMgdGhhdCB0aGlzIA0KPiB3aWxsIHdvcmsgd2VsbC4uLg0KDQpZ
ZXMsIEkgc3RhcnRlZCB0byB3cml0ZSB0aGF0IHdlIGFsc28gbmVlZCBhZGRpdGlvbmFsIHRleHQg
dG8gZXhwbGFpbiB0aGlzLiAgQnV0IHRoYXQgd291bGQgcHJvYmFibHkgYmUgdG9vIG11Y2ggZm9y
IGFuIGVycmF0YS4NCg0KW1Fpbl06IENvcnJlY3QuDQo=


From nobody Mon Dec  3 02:38:17 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CBBA130E3E for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:38:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SqyPgvaAXCcl for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:38:13 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 5429D126C7E for <netconf@ietf.org>; Mon,  3 Dec 2018 02:38:13 -0800 (PST)
Received: from localhost (h-39-108.A165.priv.bahnhof.se [213.136.39.108]) by mail.tail-f.com (Postfix) with ESMTPSA id 869431AE0403; Mon,  3 Dec 2018 11:38:12 +0100 (CET)
Date: Mon, 03 Dec 2018 11:38:12 +0100 (CET)
Message-Id: <20181203.113812.958331272714674182.mbj@tail-f.com>
To: bill.wu@huawei.com
Cc: rfc-editor@rfc-editor.org, andy@yumaworks.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, mjethanandani@gmail.com, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9B177963@nkgeml513-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177963@nkgeml513-mbs.china.huawei.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/TksfHOndNDQsa_1WhHv3j_8GPY0>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:38:16 -0000
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From nobody Mon Dec  3 02:41:34 2018
Return-Path: <lhotka@nic.cz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA329124BE5 for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:41:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l8oH46fbRQjo for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 02:41:30 -0800 (PST)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id E4952130E4D for <netconf@ietf.org>; Mon,  3 Dec 2018 02:41:28 -0800 (PST)
Received: by trail.lhotka.name (Postfix, from userid 109) id 9C7D01821356; Mon,  3 Dec 2018 11:49:56 +0100 (CET)
Received: from localhost (unknown [195.113.220.122]) by trail.lhotka.name (Postfix) with ESMTPSA id EE81E1820056; Mon,  3 Dec 2018 11:49:48 +0100 (CET)
From: Ladislav Lhotka <lhotka@nic.cz>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Martin Bjorklund <mbj@tail-f.com>
Cc: ibagdona@gmail.com, rfc-editor@rfc-editor.org, warren@kumari.net, netconf@ietf.org
In-Reply-To: <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de>
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com> <20181203101400.ua4s7jlhaxoeyp3o@anna.jacobs.jacobs-university.de>
Date: Mon, 03 Dec 2018 11:41:19 +0100
Message-ID: <87wooq3nao.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/28toY6sfnf6tKrxlrLv2LTT1MXU>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 10:41:33 -0000

Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> writes:

> On Mon, Dec 03, 2018 at 10:48:08AM +0100, Martin Bjorklund wrote:
>> 
>> So, maybe the proper fix is
>> 
>>                | data-missing            | 404, 409           |
>>
>
> And then you hope that different implementors will come to the same
> conclusions when to return 404 or 409. I have some doubts that this
> will work well...

data-missing is a misleading error tag, if it is used for validity
problem.

>
> Are there implementations that return 404 for data-missing today?

Yes, JetConf returns 404 if the client attempts to delete a non-existent
resource.

An edit leading to invalid data doesn't apply to JetConf because
validation is only performed at commit, i.e. not after every edit.

Lada

>
> /js
>
> -- 
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Mon Dec  3 12:40:40 2018
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DFF712F1AC for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 12:40:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kSD0HOcc-np4 for <netconf@ietfa.amsl.com>; Mon,  3 Dec 2018 12:40:36 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1C76128A6E for <netconf@ietf.org>; Mon,  3 Dec 2018 12:40:36 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 73D6DB813BC; Mon,  3 Dec 2018 12:40:29 -0800 (PST)
To: andy@yumaworks.com, mbj@tail-f.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, kwatsen@juniper.net, mjethanandani@gmail.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: mbj@tail-f.com, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20181203204029.73D6DB813BC@rfc-editor.org>
Date: Mon,  3 Dec 2018 12:40:29 -0800 (PST)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/M4zo001vergL4AsAzK7rvVe6kGo>
Subject: [Netconf] [Technical Errata Reported] RFC8040 (5566)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Dec 2018 20:40:39 -0000

The following errata report has been submitted for RFC8040,
"RESTCONF Protocol".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata/eid5566

--------------------------------------
Type: Technical
Reported by: Martin BjÃ¶rklund <mbj@tail-f.com>

Section: B.3.2

Original Text
-------------
          "player" : {
            "gap" : 0.5
          }


Corrected Text
--------------
          "player" : {
            "gap" : "0.5"
          }


Notes
-----
The quoted text occurs twice; p 128 and p 130.

The leaf "gap" is defined as type decimal64 in A.1.  According to RFC 7951, section 6.1, a decimal64 type is represented as a string in JSON.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC8040 (draft-ietf-netconf-restconf-18)
--------------------------------------
Title               : RESTCONF Protocol
Publication Date    : January 2017
Author(s)           : A. Bierman, M. Bjorklund, K. Watsen
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Mon Dec  3 22:28:59 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 86ACD127B4C; Mon,  3 Dec 2018 22:28:51 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Benjamin Kaduk <kaduk@mit.edu>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com>
Date: Mon, 03 Dec 2018 22:28:51 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/a0vUuE6UmDS4Wxv16cNPbCxG7X0>
Subject: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Dec 2018 06:28:52 -0000

Benjamin Kaduk has entered the following ballot position for
draft-ietf-netconf-zerotouch-25: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

First off, thanks for this clear and considered document and design; it
really lays out the scenario of applicability and the functionality quite
well.  I just have a couple lingering places that we might want to nail
down a little bit tighter...

(1) SSH key formats

The module in Section 7.3 says:

           leaf-list ssh-host-key {
             type binary;
             description
               "The binary public key data for this SSH key, as
                specified by RFC 4253, Section 6.6, i.e.:

                  string    certificate or public key format
                            identifier
                  byte[n]   key/certificate data.";
             reference
               "RFC 4253: The Secure Shell (SSH) Transport Layer
                          Protocol";

but RFC 4523 Section 6.6 says:

   The key type MUST always be explicitly known (from algorithm
   negotiation or some other source).  It is not normally included in
   the key blob.

   Certificates and public keys are encoded as follows:

      string    certificate or public key format identifier
      byte[n]   key/certificate data

How is the key type known for the SZTP usage?

(2) Privilege escalation by design

There's text in Section 2.1 (and, really, throughout) that indicates that a
device being boostrap should allow a trusted bootstrap server to behave as
(i.e., supply) a trust anchor for verifying a different service.  In some
sense this is elevating an EE cert to a CA cert, and I had hoped to see
some discussion of this escalation in the security considerations.  (Same
for the owner cert, though there's a stronger argument that the owner
should be considered fully privileged here.)

(3) Nonce length

Section 7.3 describes the nonce leaf:

         leaf nonce {
           type binary {
             length "8..32";

There is probably some discussion to be had about the minimum nonce length
(not necessarily in the document itself).  Do you have a pointer handy to
previous disucsions or do we need to have it now?
(I do see that this is just following RFC 8366, so hopefully this is an
easy question.)

(4) OPTION_V4_ZEROTOUCH_REDIRECT repeated instances

(In Section 8.1.)

I think I may just be misunderstanding things here, but aren't

   As the list of URIs may exceed the maximum allowed length of a single
   DHCPv4 option (255 octets), the client MUST implement [RFC3396],
   allowing the URI list to be split across a number of
   OPTION_V4_ZEROTOUCH_REDIRECT option instances.

and

   The DHCPv4 server MAY include a single instance of Option
   OPTION_V4_ZEROTOUCH_REDIRECT in DHCP messages it sends.  Servers MUST
   NOT send more than one instance of the OPTION_V4_ZEROTOUCH_REDIRECT
   option.

in conflict about sending more than one instance of
OPTION_V4_ZEROTOUCH_REDIRECT?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Should we consider recommending AuthEnvelopedData throughout instead of
just EnvelopedData?

TLS and CMS are probably good enough about adding context in their
signatures (well, provided modern versions are used) that we don't get too
much heartburn about reusing the same key directly for both zerotouch
decryption and TLS client certificates, but it's generally the sort of
thing that we frown upon.

I a little bit wonder if we want references for TLS and/or HTTP client
authentication.  Section 2.5 of RFC 8040 might be enough (though it is of
course not citing TLS 1.3).

(Are there generic RESTCONF internationalization considerations?  I see
8040 say "just use UTF-8", but is more needed?)

Section 1.2

   Network Management System (NMS):  The acronym "NMS" is used
       throughout this document to refer to the deployment specific

nit: deployment-specific (with hyphen)

Section 2.1

Does RFC 8340 require a "ro" (or similar) to appear in the tree diagram?
(Both here and in Â§2.2.)

Section 3.2

Do we want to impose any ordering requirements on the certificate chain
(e.g., owner cert must come first, each cert SHOULD certify the one
immediately prior to it, etc.)?

Section 3.4

Thank you for including the motivating text about sign-then-encrypt.  I do
wonder if it's worth saying anything about why the well-publicised security
risks of mac-then-encrypt do not apply.  (The authors of
draft-campbell-sip-messaging-smime probably already have some text that
could be used, but it doesn't seem to be in the public view yet.)

Section 4.1

Mounting all filesystems found on removable devices can be a security risk,
with intentionally malformed filesystem images causing system compromise in
some cases.

Section 4.2

I agree with Adam about registering "zerotouch" (and the name is perhaps
overly generic?).

I'm also not sure I properly understand the "zt-info"/zt-* TXT records'
usage; would they need to be registered akin to
draft-moonesamy-dnsop-special-use-label-registry?

Section 5.3

This is the first time we talk about "serial number" as device identity;
maybe a forward-reference is in order?

Does the device have any reason to track whether the incoming artifact is
encrypted (whether at the CMS layer or the transport layer)?  I can't think
of one, but sometimes this is useful information in other settings.

   If the zero touch information artifact contains onboarding
   information, and trust-state is FALSE, the device MUST exit the
   recursive algorithm (as this is not allowed, see the figure above),
   returning to the bootstrapping sequence described in Section 5.2.
   Otherwise, the device MUST attempt to process the onboarding
   information as described in Section 5.6.  In either case, success or
   failure, the device MUST exit the recursive algorithm, returning to
   the bootstrapping sequence described in Section 5.2, the only
   difference being in how it responds to the "Able to bootstrap from
   any source?" conditional described in the figure in the section.

Does this "either case" refer to just the processing of onboarding
information, or the exit vs. attempt to process cases?  (I assume the
former, but perhaps some editorial work is in order.)

   If the zero touch information artifact is signed, and the device is
   able to validate the signed data using the algorithm described in
   Section 5.4, then the device MUST set trust-state to TRUE; otherwise,
   if the device is unable to validate the signed data, the device MUST
   set trust-state to FALSE.  Note, this is worded to cover the special
   case when signed data is returned even from a trusted bootstrap
   server.

Having read Section 5.4, I'm still unsure where the special handling for
this special case is described.

Section 5.5

   Processing redirect information is straightforward, the device
   sequentially steps through the list of provided bootstrap servers
   until it can find one it can bootstrap from.

nit: I think this is a comma splice.

Section 5.6

                                                Regardless the
   reporting-level indicated by the bootstrap server, the device MAY
   send progress reports beyond the mandatory ones specified for the
   given reporting level.

nit: "Regardless of"

   When the onboarding information is obtained from an untrusted
   bootstrap server, the device MUST NOT send any progress reports to
   the bootstrap server.

I'm not sure if I would want a parenthetical "(that is, the onboarding
information was authenticated at the CMS layer)", but I would think about
adding one.

   The device MUST parse the provided onboarding information document,
   to extract values used in subsequent steps.  Whether using a stream-
   based parser or not, if there is an error when parsing the onboarding

This line makes me consider the scenario where a stream-based parser is
used with a trusted bootstrap server and no CMS-layer signature.  At the
TLS layer, a truncation attack by the network is possible, and if
truncation is not detectable at the application layer, the device could end
up misconfigured with neither party aware (unless there's an additional
response or something that I'm forgetting about).  I think that for the XML
and JSON formats we know and love, truncation would make for a malformed
stream due to the outermost scope container, but please correct me if I'm
wrong.  There are probably some security considerations to mention w.r.t.
any future new encodings of this data model, though.

      *  Most steps are atomic.  For instance, when a commit fails, it
         is expected to have no impact on the configuration.  Similarly,
         if the error occurs when executing a script, the script will
         gracefully exit.

As a reader it's hard to tell if this is giving guidance to script authors
or consumers.

Section 6.2

"base64encodedvalue==" is pretty cute, though maybe we could add some
trailing numbers to provide different values for the different fields?

Section 6.3

The YANG module boilerplate is still on the RFC 2119 version of BCP 14 (not
RFC 8174).

Section 7.2

If we're going to say "and receives signed data in the response", maybe we
could actually give an example that shows the (base64'd) CMS structure that
corresponds to the signature?  Not necessarily the whole payload, but
enough to see the outer structure at least...

Section 7.3

The YANG module boilerplate is still on the RFC 2119 version of BCP 14 (not
RFC 8174).

             enum "boot-image-installed-rebooting" {
               description
                 "Indicates that the device successfully installed
                  a new boot image and is about to reboot.  After
                  sending this progress type, the device is not
                  expected to access the bootstrap server again.";

Is this just scoped to the current connection/session?
(As opposed to "bootstrap-complete", which probably is a global statement.)

   container trust-anchor-certs {
   [...]
               The CMS MUST contain only a single chain of
               certificates.  The device's end-entity certificate
               MUST only authenticate to last intermediate CA
               certificate listed in the chain.

I'm not sure whether "authenticate to" means that the CA cert directly
certifies or is the trust anchor.  Could we maybe use language like
"directly certifies the [next|previous]" certificate?

Also, the split of references of RFC 6187 for trust-anchor-certs but RFCs
5280 and 5652 for trust-anchor-cert seems unusual, since potentially all
three would be relevant for both nodes, if I understand correctly.

Section 9.1

At this point draft-ietf-ntp-using-nts-for-ntp exists, though I don't know
whether it's appropriate to be citing it yet.

Section 9.6

There is perhaps some room for discussion of the consequences of the device
telling the bootstrapping server whether the device thinks the connection
is trusted, in that it gives an attacker information about the target.
(Granted, it does not seem like much information, but it might be cleaner
to define the semantics of the node as being whether the client would like
the server to sign its responses at the application layer, which need not
have complete overlap with whether the client considers the server to be
trusted.

Section 9.8

Does recommending frequent private key refreshes actually help in
environments where revocation is unusable (i.e., by virtue of not having
reliable time)?  (If not, perhaps that caveat should be more explicit here,
even though it is mentioned in Section 9.1 already.)

Section 9.10

I would suggest also mentioning the (lack of) mitigations possible if the
operator does not trust all the pre-configured authorities designated by
the manufacturers.

Section 9.11

      revealing (e.g., network topology, firewall policies, etc.).  It
      is RECOMMENDED that operators encrypt the bootstrapping data when
      its contents are considered sensitive, even to the administrators
      of a bootstrap server.

I don't understand what is meant by "even to the administrators of a
bootstrap server"?

Section 9.12

nit: the last word is "revoked".

Section 9.13

   Implementations should be aware that signed bootstrapping data only
   protects the data from modification, the contents are still visible
   to others.  [...]

nit: this is a comma splice

                                                         This
   information should be considered sensitive and precautions should be
   taken to protect it (e.g., encrypt artifact with device public key).

nit: I think it's more conventional to "encrypt to" a public key than
"encrypt with" one.

Section C.3

We could perhaps recommend ecdsa-sha2-* keys instead of ssh-rsa keys.

   4.  Otherwise, if redirect information is found, the device iterates
       through the list of specified bootstrap servers, checking to see
       if it has bootstrapping data for the device.  [...]

The "it" is perhaps ambiguous; I would suggest "each server in turn".



From nobody Wed Dec  5 01:25:50 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1574130DE3 for <netconf@ietfa.amsl.com>; Wed,  5 Dec 2018 01:25:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sfa1saB6yjhz for <netconf@ietfa.amsl.com>; Wed,  5 Dec 2018 01:25:45 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C6F7126BED for <netconf@ietf.org>; Wed,  5 Dec 2018 01:25:45 -0800 (PST)
Received: from lhreml707-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 47A5C865B1D47; Wed,  5 Dec 2018 09:25:40 +0000 (GMT)
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by lhreml707-cah.china.huawei.com (10.201.108.48) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 5 Dec 2018 09:25:41 +0000
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Wed, 5 Dec 2018 09:25:41 +0000
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1591.10 via Frontend Transport; Wed, 5 Dec 2018 09:25:40 +0000
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.69]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Wed, 5 Dec 2018 17:25:37 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Andy Bierman <andy@yumaworks.com>, Netconf <netconf@ietf.org>
Thread-Topic: [Netconf] comments on draft-wu-netconf-restconf-factory-restore-03
Thread-Index: AQHUimld5kZN4e5FPUqSBuroEQ0zmKVv3jzw
Date: Wed, 5 Dec 2018 09:25:38 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B17C265@nkgeml513-mbs.china.huawei.com>
References: <CABCOCHRBwr0L=9rTH040hL5P3MFma3uvn_ZQyGZG+oPiyiZpdw@mail.gmail.com>
In-Reply-To: <CABCOCHRBwr0L=9rTH040hL5P3MFma3uvn_ZQyGZG+oPiyiZpdw@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA9B17C265nkgeml513mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ZjPzJbhNb-NUf6dVHezSIrifKI8>
Subject: Re: [Netconf] comments on draft-wu-netconf-restconf-factory-restore-03
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 09:25:48 -0000

--_000_B8F9A780D330094D99AF023C5877DABA9B17C265nkgeml513mbschi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

VGhhbmtzIEFuZHkuDQpUaGlzIGRyYWZ0IGhhcyBiZWVuIGFncmVlZCB0byBtb3ZlIHRvIG5ldG1v
ZCBiYXNlZCBvbiBkaXNjdXNzaW9uIGFuZCByZXBsYWNlZCB3aXRoDQpodHRwczovL3Rvb2xzLmll
dGYub3JnL2h0bWwvZHJhZnQtd3UtbmV0bW9kLWZhY3RvcnktZGVmYXVsdC0wMg0KUGxlYXNlIHNl
ZSBteSBjb21tZW50cyBpbmxpbmUgYmVsb3cuDQoNCuWPkeS7tuS6ujogTmV0Y29uZiBbbWFpbHRv
Om5ldGNvbmYtYm91bmNlc0BpZXRmLm9yZ10g5Luj6KGoIEFuZHkgQmllcm1hbg0K5Y+R6YCB5pe2
6Ze0OiAyMDE45bm0MTLmnIgz5pelIDI6MDMNCuaUtuS7tuS6ujogTmV0Y29uZg0K5Li76aKYOiBb
TmV0Y29uZl0gY29tbWVudHMgb24gZHJhZnQtd3UtbmV0Y29uZi1yZXN0Y29uZi1mYWN0b3J5LXJl
c3RvcmUtMDMNCg0KSGksDQoNCkkgaGF2ZSBjb21tZW50cyBhbmQgcXVlc3Rpb25zIG9uIHRoZSBm
dW5jdGlvbmFsIHJlcXVpcmVtZW50cyBhbmQNCnNjb3BlIG9mIHRoZSBwcm9ibGVtKHMpIHRvIGJl
IHNvbHZlZC4gU2NvcGUgc2VlbSB0byBiZToNCiAgIEcxKSByZXNldCBkZXZpY2UgdG8gZmFjdG9y
eSBjb25maWcNCiAgIEcyKSBzZXQgYW55IGRhdGFzdG9yZSB0byBjb250ZW50cyBvZiB0aGUgZmFj
dG9yeSBjb25maWcgd2l0aCA8Y29weS1jb25maWc+DQogICAgICAgICAgICBbUWluXTogYmVzaWRl
cyA8Y29weS1jb25maWc+LCB5b3UgYWxzbyBjYW4gdXNlIG5ldyBvcGVyYXRpb24gPHJlc2V0LWRh
dGFzdG9yZT4gdG8gc2V0IGl0IHRvIGNvbnRlbnRzIG9mIHRoZSBmYWN0b3J5IGNvbmZpZy4NCiAg
IEczKSByZXRyaWV2ZSBjb250ZW50cyBvZiBmYWN0b3J5LWNvbmZpZyB3aXRoIDxnZXQtZGF0YT4N
Cg0KUTEpIHdoYXQgaXMgdGhlIGZhY3RvcnkgZGF0YXN0b3JlPw0KDQpUaGUgY29uY2VwdCBvZiBh
IGZhY3RvcnkgZGVmYXVsdCBjb25maWcgaXMgdW5pdmVyc2FsIGJ1dCB0aGUgaW1wbGVtZW50YXRp
b24gaXMgbm90Lg0KVGhpcyBuZWVkcyB0byBiZSBwcmVjaXNlbHkgZGVmaW5lZCBpbiB0aGUgZHJh
ZnQuDQpbUWluXTogWWVzLCB0aGUgZGVmaW5pdGlvbiBoYXMgYmVlbiBwcm92aWRlZCBpbiBzZWN0
aW9uIDEuMS5JZiB0aGVyZSBpcyBhbnkgYW1iaWd1aXR5LCBwbGVhc2UgbGV0IHVzIGtub3cuDQoN
ClRoZXJlIGlzIGFjdHVhbGx5IGEgZmFjdG9yeS1zdGFydHVwICgtLT4gcnVubmluZykgYW5kIGZh
Y3RvcnktaW50ZW5kZWQuDQpCeSBkZWZhdWx0IHRoZSBmYWN0b3J5LXN0YXJ0dXAgaXMgbGlrZWx5
IGFuIGVtcHR5IGNvbmZpZyAoaS5lLiBqdXN0IHRoZSBZQU5HIGRlZmF1bHRzDQpzdXBwb3J0ZWQg
YnkgdGhlIHNlcnZlcikuICBUaGUgZmFjdG9yeS1pbnRlbmRlZCBpcyBpbXBsZW1lbnRhdGlvbi1z
cGVjaWZpYy4NCg0KU28gd2hhdCBpcyBzdGFuZGFyZGl6ZWQ/IGZhY3Rvcnktc3RhcnR1cCBvciBm
YWN0b3J5LWludGVuZGVkPyBib3RoPw0KDQpbUWluXTogZmFjdG9yeSBjb25maWcgY29udGVudCBj
YW4gYmUgY29udGVudCBvZiA8cnVubmluZz4sPHN0YXJ0dXA+LDxjYW5kaWRhdGU+DQpBcyBjbGFy
aWZpZWQgaW4gYXBwZW5kaXggQjoNCldoZW4gdGhlIGRldmljZSBmaXJzdCBib290cyB1cCwgdGhl
IGNvbnRlbnQgb2YgdGhlIDxzdGFydHVwPiBhbmQNCiAgIDxmYWN0b3J5LWRlZmF1bHQ+IHdpbGwg
YmUgaWRlbnRpY2FsLiAgVGhlIGNvbnRlbnQgb2YgPHN0YXJ0dXA+IGNhbiBiZQ0KICAgc3Vic2Vx
dWVudGx5IGNoYW5nZWQgYnkgdXNpbmcgPHN0YXJ0dXA+IGFzIGEgdGFyZ2V0IGluIGEgPGNvcHkt
DQogICBjb25maWc+IG9wZXJhdGlvbi4gIFRoZSA8ZmFjdG9yeS1kZWZhdWx0PiBpcyBhIHJlYWQt
b25seSBkYXRhc3RvcmUNCiAgIGFuZCBpdCBpcyB1c3VhbGx5IHN0YXRpYyBhcyBkZXNjcmliZWQg
aW4gZWFybGllciBzZWN0aW9ucy4NCg0KDQoNClEyKSBsZWFmLWxpc3Qgb2YgZGF0YXN0b3JlcyB0
byByZXNldA0KDQpTZXR0aW5nIHNwZWNpZmljIGRhdGFzdG9yZXMgdG8gZmFjdG9yeSBkZWZhdWx0
IGlzIGNvbXBsZXggYW5kIGRhbmdlcm91cy4NCkl0IGlzIHVubGlrZWx5IGEgc2VydmVyIHdpbGwg
c3VwcG9ydCBhbGwgcG9zc2libGUgY29tYmluYXRpb25zLg0KQSBzaW1wbGUgUlBDIHRvIHJldHVy
biB0aGUgZW50aXJlIHNlcnZlciB0byBmYWN0b3J5IGRlZmF1bHQgaXMgbXVjaCBlYXNpZXIgdG8g
dXNlDQphbmQgaW1wbGVtZW50LiBWZW5kb3JzIGNhbiBhZGQgaW5wdXQgcGFyYW1ldGVycyB0byBz
dXBwb3J0IHRoZWlyIHZhcmlhbnRzLg0KDQpbUWluXTogaW4gbW9zdCBjYXNlLCB3ZSBqdXN0IHJl
dHVybiBlbnRpcmUgc2VydmVyIHRvIGZhY3RvcnkgZGVmYXVsdCwgaG93ZXZlciBmb3IgZHluYW1p
YyBjb25maWcsIHdlIGJlbGlldmUgaW4gbW9zdCBjYXNlIGl0IHdpbGwgYmUgc2V0IHRvIGVtcHR5
IHdoaWNoIGlzIGRpZmZlcmVudCBmcm9tIG90aGVyIGRhdGFzdG9yZS4NCkluIGVhcmxpZXIgdmVy
c2lvbiwgd2UgY29uc2lkZXIgdG8gdXNlIGNob2ljZSBjYXNlLCBhbGxvd3MgZGVmYXVsdC1hbGxv
dy1hbGwgY2FzZSwgaWYgdGhpcyBhZGRyZXNzIHlvdXIgY29tbWVudCwgd2UgY2FuIGdvIHdpdGgg
dGhpcy4NCg0KUTMpIGZpbHRlcmVkIHJldHJpZXZhbCBvZiB0aGUgZmFjdG9yeSBzZXR0aW5ncw0K
DQpJZiBhIHJlYWwgZGF0YXN0b3JlIGlzIHVzZWQgYXMgcHJvcG9zZWQsIHRoZW4gaXMgc3VidHJl
ZSBhbmQgWFBhdGggZmlsdGVyaW5nIHJlcXVpcmVkPw0KSXQgc2VlbXMgYWxsIG9wZXJhdGlvbnMg
ZXhjZXB0IGVkaXQgaGF2ZSB0byBiZSBzdXBwb3J0ZWQgYnkgdGhlIHNlcnZlci4NCg0KW1Fpbl06
d2UgY2FuIGFkZCBzdWJ0cmVlIGFuZCB4cGF0aCBmaWx0ZXIgaWYgbW9yZSBmaW5lIGdyYW51bGFy
aXR5IG9wZXJhdGlvbiBpcyBuZWVkZWQgdG8gZGVhbCB3aXRoIHBvcnRpb24gY29uZmlnIG9mIG9u
ZSBkYXRhc3RvcmUuDQpBdCB0aGUgY3VycmVudCB2ZXJzaW9uLCA8cmVzZXQtZGF0YXN0b3JlPiBp
cyBkYXRhc3RvcmUgbGV2ZWwgb3BlcmF0aW9uLg0KDQpRNCkgd2h5IG5vIHJldHJpZXZhbCB3aXRo
b3V0IE5NREEsIGZhY3RvcnktZGVmYXVsdC1hcy1kYXRhc3RvcmUgZmVhdHVyZT8NCg0KW1Fpbl06
IHRhbGtpbmcgd2l0aCBCYWxhenMsIHdlIHRoaW5rIGluIHNvbWUgY2FzZXMsIDxyZXNldC1kYXRh
c3RvcmU+IG9wZXJhdGlvbiBjYW4gYmUgdXNlZCB3aXRob3V0IDxmYWN0b3J5PiBkYXRhc3RvcmUu
DQoNCkl0IHdvdWxkIGJlIHVzZWZ1bCB0byBrbm93IHdoYXQgd2lsbCBoYXBwZW4gaWYgPHJlc2V0
LWRhdGFzdG9yZT4gaXMgaW52b2tlZA0KYnkgcmV0cmlldmluZyB0aGUgY29udGVudHMgb2YgdGhl
IGZhY3RvcnkgY29uZmlnLiBUaGlzIGlzIG5vdCBwb3NzaWJsZSBpZg0KdGhlIGRhdGFzdG9yZSBm
ZWF0dXJlIGlzIG5vdCBzdXBwb3J0ZWQuIEkgc3VnZ2VzdCBhbm90aGVyIFJQQw0KDQogICBycGMg
Z2V0LWZhY3RvcnktZGVmYXVsdHMgew0KICAgICAgaWYtZmVhdHVyZSAibm90IGZhY3RvcnktZGVm
YXVsdC1hcy1kYXRhc3RvcmUiOw0KICAgICAgb3V0cHV0IHsNCiAgICAgICAgYW55ZGF0YSBkYXRh
Ow0KICAgICAgfQ0KICAgfQ0KW1Fpbl06IEdvb2QgaW5wdXQsIHdlIHdpbGwgaG93IHRvIGFkZCB0
aGlzLiBUaGFua3MuDQoNCkFuZHkNCg0K

--_000_B8F9A780D330094D99AF023C5877DABA9B17C265nkgeml513mbschi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA9B17C265nkgeml513mbschi_--


From nobody Wed Dec  5 01:36:08 2018
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 879D3130FBA for <netconf@ietfa.amsl.com>; Wed,  5 Dec 2018 01:36:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XxErdQzM7QI3 for <netconf@ietfa.amsl.com>; Wed,  5 Dec 2018 01:35:59 -0800 (PST)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83CAA130DF9 for <netconf@ietf.org>; Wed,  5 Dec 2018 01:35:59 -0800 (PST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 8A555FA7; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.217]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id etdxHshBpEXs; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 701B920043; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id ykVrnoX2fxt7; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
Received: from exchange.jacobs-university.de (sxchmb03.jacobs.jacobs-university.de [10.70.0.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id 0D3042003F; Wed,  5 Dec 2018 10:35:57 +0100 (CET)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1591.10; Wed, 5 Dec 2018 10:35:56 +0100
Received: by anna.localdomain (Postfix, from userid 501) id 43B8C300493A3B; Wed,  5 Dec 2018 10:35:55 +0100 (CET)
Date: Wed, 5 Dec 2018 10:35:55 +0100
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: Qin Wu <bill.wu@huawei.com>
CC: Andy Bierman <andy@yumaworks.com>, Netconf <netconf@ietf.org>
Message-ID: <20181205093555.f4qhytkuyq4bytpn@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: Qin Wu <bill.wu@huawei.com>, Andy Bierman <andy@yumaworks.com>, Netconf <netconf@ietf.org>
References: <CABCOCHRBwr0L=9rTH040hL5P3MFma3uvn_ZQyGZG+oPiyiZpdw@mail.gmail.com> <B8F9A780D330094D99AF023C5877DABA9B17C265@nkgeml513-mbs.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9B17C265@nkgeml513-mbs.china.huawei.com>
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB03.jacobs.jacobs-university.de (10.70.0.155) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/OSPyEGuDBsqv04kWb_kMzg-GIY8>
Subject: Re: [Netconf] comments on draft-wu-netconf-restconf-factory-restore-03
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 09:36:06 -0000

On Wed, Dec 05, 2018 at 09:25:38AM +0000, Qin Wu wrote:
> 
> Q2) leaf-list of datastores to reset
> 
> Setting specific datastores to factory default is complex and dangerous.
> It is unlikely a server will support all possible combinations.
> A simple RPC to return the entire server to factory default is much easier to use
> and implement. Vendors can add input parameters to support their variants.
> 
> [Qin]: in most case, we just return entire server to factory default, however for dynamic config, we believe in most case it will be set to empty which is different from other datastore.
> In earlier version, we consider to use choice case, allows default-allow-all case, if this address your comment, we can go with this.
>

I guess I am with Andy here. Let the device decide what it takes to
restart the factory default. If there is a dynamic datastore that
needs to be cleared, the device will do this. Why would a management
application need to know the internals of a reset to factory defaults
operation?

> Q4) why no retrieval without NMDA, factory-default-as-datastore feature?
> 
> [Qin]: talking with Balazs, we think in some cases, <reset-datastore> operation can be used without <factory> datastore.
> 
> It would be useful to know what will happen if <reset-datastore> is invoked
> by retrieving the contents of the factory config. This is not possible if
> the datastore feature is not supported. I suggest another RPC
> 
>    rpc get-factory-defaults {
>       if-feature "not factory-default-as-datastore";
>       output {
>         anydata data;
>       }
>    }

I am generally not a big an of get-* and set-*/edit-* operations that
replicate something for which we already have a solution in place.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Wed Dec  5 10:21:44 2018
Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B2E4C1276D0; Wed,  5 Dec 2018 10:21:37 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Alexey Melnikov <aamelnikov@fastmail.fm>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com>
Date: Wed, 05 Dec 2018 10:21:37 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/13Aw_xzJ4VG7HYjpBLEw8VayrAs>
Subject: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 18:21:38 -0000

Alexey Melnikov has entered the following ballot position for
draft-ietf-netconf-zerotouch-25: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thank you for a well written document, it was a pleasure to read.
I have a small list of issues that I would like to discuss before recommending
approval of this document:

In Section 5.3:

   If the zero touch information artifact contains redirect information,
   the device MUST, within limits of how many recursive loops the device
   allows, process the redirect information as described in Section 5.5.
   This is the recursion step, it will cause the device to reenter this
   algorithm, but this time the data source will definitely be a
   bootstrap server, as that is all redirect information is able to
   redirect a device to.

I think you need to specify a "max redirect" value in order to prevent
intentional or unintentional misconfigurations. Without such limit it is
trivial to introduce denial-of-service attack on naive device implementations.

2)
10.3.  The SMI Security for S/MIME CMS Content Type Registry

   IANA is kindly requested to add two entries in the "SMI Security for
   S/MIME CMS Content Type" registry (1.2.840.113549.1.9.16.1), with
   values as follows:

   Decimal  Description                             References
   -------  --------------------------------------  ----------
   TBD1      id-ct-zerotouchInformationXML          [RFCXXXX]
   TBD2      id-ct-zerotouchInformationJSON         [RFCXXXX]

   id-ct-zerotouchInformationXML indicates that the "zerotouch-
   information" is encoded using XML.  id-ct-zerotouchInformationJSON
   indicates that the "zerotouch-information" is encoded using JSON.

You define these values, but they are not used anywhere in the document.

It looks like you intended for this to be used in several places, for example:

3.1.  Zero Touch Information

   When the zero touch information artifact is unsigned, as it might be
   when communicated over trusted channels, the CMS structure's top-most
   content type MUST be one of the OIDs described in Section 10.3, or
   the OID id-data (1.2.840.113549.1.7.1), in which case the encoding
   (JSON, XML, etc.)  SHOULD be communicated externally.  In either

Did you intend to use the above OIDs here?

   case, the associated content is an octet string containing
   "zerotouch-information" data in the expected encoding.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

4.2.  DNS Server

   To use a DNS server as a source of bootstrapping data, a device MAY
   perform a multicast DNS [RFC6762] query searching for the service
   "_zerotouch._tcp.local.".  Alternatively the device MAY perform DNS-
   SD [RFC6763] via normal DNS operation, using the domain returned to
   it from the DHCP server; for example, searching for the service
   "_zerotouch._tcp.example.com".

I agree with Adam that "zerotouch" much be a registered as service name,
see
<https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml>

   Artifact to Resource Record Mapping:

      Zero Touch Information:  Mapped to a TXT record called "zt-info"
         containing the base64-encoding of the binary artifact described
         in Section 3.1.

      Owner Certificate:  Mapped to a TXT record called "zt-cert"
         containing the base64-encoding of the binary artifact described
         in Section 3.2.

      Ownership Voucher:  Mapped to a TXT record called "zt-voucher"
         containing the base64-encoding of the binary artifact described
         in Section 3.3.

So just to double check, these would be zt-info._zerotouch._tcp.example.com,
etc?

8.1.  DHCPv4 Zero Touch Option

      o bootstrap-server-list: A list of servers for the
         client to attempt contacting, in order to obtain
         further bootstrapping data, in the format shown
         in [common-field-encoding].

[common-field-encoding] in this and subsequent sections looks like a reference
to Section 8.3. Please fix before publication, as this looks like an undefined
reference.

8.3.  Common Field Encoding

   Both of the DHCPv4 and DHCPv6 options defined in this section encode
   a list of bootstrap server URIs.  The "URI" structure is an option
   that can contain multiple URIs (see [RFC7227], Section 5.7).

     bootstrap-server-list:

This is confusing, because I believe the following is a single entry in the
list, not the whole list syntax:

     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+
     |       uri-length              |          URI                  |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+

     o uri-length: 2 octets long, specifies the length of the URI data.

     o URI: URI of zerotouch bootstrap server, using the HTTPS URI
       scheme defined in Section 2.7.2 of RFC7230.  URI MUST be in
       form "https://<ip-address-or-hostname>[:<port>]".

So if I am correct above, please clarify this by changing
"bootstrap-server-list:" to "bootstrap-server-list is a list of 1 or more
items, each with the following syntax:" (Or something like this.)

Also, "URI" deserve to be a Normative Reference, as it defines the generic
syntax you are referring to.



From nobody Wed Dec  5 15:18:32 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 786CA128D0C; Wed,  5 Dec 2018 15:18:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level: 
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4szT8UgSTK1A; Wed,  5 Dec 2018 15:18:24 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97B3C130DC1; Wed,  5 Dec 2018 15:18:24 -0800 (PST)
Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB5NFB3W024089; Wed, 5 Dec 2018 15:18:23 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=2EU4g5lOPptpnRBZldnpDoWw1icZjVka5GhuczHljjk=; b=K5yCXXUYZz7YVKUiRjCbOPg1KY970E9fn2/0PRQVp0hAuoT/CTXyisI0nfP5SwcNC7FQ 0FeltMIw8BG1fZVeOOzBDPpjMbVqZzDW/dxSmUBfu2BfwTqwrMILgzjdPsOpZ7huH2S6 cio5BpA6ianXZzPG4Nq+StLXtxVP1dbgBs3UMmUG486M3/dD3adc0cvbpUNGpUlO8biK mCYNTfRwHMw66Ka1K1U4IW9jO/R+VNU9LflgXPjZuLXnXSDAQLmnMwc56jyKemjE3h/z jM/5R0XdA6cpqJXGTlFwgjcsbn9EA1yCo6O2b9vI8ROjbCMhxHnuCiXfKYZwQ3AgO35l JA== 
Received: from nam04-sn1-obe.outbound.protection.outlook.com (mail-sn1nam04lp2051.outbound.protection.outlook.com [104.47.44.51]) by mx0a-00273201.pphosted.com with ESMTP id 2p6m418e4n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 05 Dec 2018 15:18:23 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4009.namprd05.prod.outlook.com (20.176.71.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.8; Wed, 5 Dec 2018 23:18:20 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1404.020; Wed, 5 Dec 2018 23:18:20 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Adam Roach <adam@nostrum.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Adam Roach's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUiDEcEH8QQyyUj0ylL/W7FBpWgaVwfWmA
Date: Wed, 5 Dec 2018 23:18:20 +0000
Message-ID: <0E07D183-A23E-46D3-921B-6A6E7579F996@juniper.net>
References: <154352975614.26006.2976513665167128614.idtracker@ietfa.amsl.com>
In-Reply-To: <154352975614.26006.2976513665167128614.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4009; 6:ZAAE4nbYKqxP3gLPTlO0VCTmRl0zCjORrn79+HszwFqwCIR1ySJj2+66iWbpdQ+Yd9vu5trXrMjlp8wf+a3IvLEQh1dWCcaaA34dJTQUL9wXwycdl4Ax88ylVmj38e1WxtCtdxoixqdb+O4QMud4UkfBMKwVRWp4/HcWtDGfJHghfXPIhmRVEFokytJbHMt5GF7lJg2ZsQJYv6gWFLW/9UM2wneMFAxvnxe65IQq1I6MV8yaOGj8ZYBeXHbZe/3iRxd9vudIr6T4kp6Zm+dD1Y7SHZ1KrGSmcjMlH25N4hB0gRXrK2yxnP/xJ7lXry9+ds8ZXDVSWreMBDS5sWW3/b3Q0IAl4blqZtFvtoGn6nzBvHAAt9QfcBdc1aF0iq8CexvYOnMPmJZWV8kJtghzxE5FvUpnaiFEjSuqhgogxLj6aN+7+0EexjgkUcK5wvEycccQzPwY5H0TJxvLnJldoQ==; 5:8hpY+6WXIpD1Q9CaOuOyymYui/jLOlrhVUm8x45Jwnvkb8IvG6FS+HiNg142V/Fwg20GjSDuMjBx668gaf0xbQRiDOJ/bLWjPCWMyH/d6x+nba4pzs3vyqB+k/PDfP2Dd9jljr8wZYOmzdJayuVRTHMSgo6fcj+kdAesPfa7Vl0=; 7:hmsSbU6bDTOp0WfXO+X4AH9G2djY1dMNsmfDxUK6gE/wC5gtozp1OqBA5Emm8Qjp6Xl7N+R6B6bosD7mtGnMtSpy16yjd1mHeTlsCvBr/5dkmrDsg8M4caf9/gHURSaKdU8dln9pIq+hmR3PPMQYXA==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 8442e502-646c-4c6e-43d6-08d65b07f217
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4009; 
x-ms-traffictypediagnostic: DM6PR05MB4009:
x-microsoft-antispam-prvs: <DM6PR05MB40097166E4BDF0CC068D5F7FA5A80@DM6PR05MB4009.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231455)(999002)(944501520)(52105112)(10201501046)(3002001)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4009; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4009; 
x-forefront-prvs: 08770259B4
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(136003)(396003)(376002)(366004)(199004)(189003)(13464003)(54164003)(105586002)(106356001)(966005)(26005)(186003)(36756003)(256004)(478600001)(6486002)(6436002)(6116002)(316002)(4326008)(53936002)(6512007)(6306002)(6246003)(76176011)(14454004)(3846002)(102836004)(6506007)(53546011)(54906003)(5660300001)(305945005)(110136005)(7736002)(66066001)(58126008)(2906002)(99286004)(476003)(97736004)(486006)(82746002)(2616005)(68736007)(25786009)(8936002)(8676002)(229853002)(86362001)(575784001)(446003)(81156014)(81166006)(83716004)(33656002)(11346002)(71200400001)(71190400001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4009; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Sn6CHv/cGzhS7s8a9Qg++ogsETedH9tam//w8gNhT16hvQRaFuWYjUT0lysxjJHduXna2ST4o9WqdO2gG6NWYcyacMkTZKZ951hnhTbFdRHorkj9tYgRZnlCDJRQMFpAfWsfLNhu5sVwVrde2lrnD5P7qCf+lfhf2jxLAOLsy9kK8Vua25K/zw3DecA3N4t7VjPDUZA3kwyg5z5xI5IIq3Ev4iF+d+9Q2JvBxVK3OkYxaWoRQ/dD3tadxLV9znH1AS3p6usQRWBiCI0JkIO+bSRV6j5GlEkM/XVGP1q+0QGmWUGl97rb5SBaLTm1OnOCEuTZHg44Uzq4l2kHKPUuCfMuarlOcLuPQcHCl2O9jA8=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <BC333917F340E24982CBB24F5B630443@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 8442e502-646c-4c6e-43d6-08d65b07f217
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Dec 2018 23:18:20.3076 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4009
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-05_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812050204
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/RNcbaQT3_FIPBWZ987pKp7f6khs>
Subject: Re: [Netconf] Adam Roach's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Dec 2018 23:18:31 -0000
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From nobody Wed Dec  5 17:41:15 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0D90130F33; Wed,  5 Dec 2018 17:41:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level: 
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nu104wapOacv; Wed,  5 Dec 2018 17:41:02 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70A43130F23; Wed,  5 Dec 2018 17:41:02 -0800 (PST)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB61eYMX006359; Wed, 5 Dec 2018 17:41:01 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=oLaXyONhLHthTuptjMx/zPjbkBXGmidsR/if5jLyAJc=; b=sUKzUmLxofcGpJU1Ad4/7NHXxAjEouqaHEGBzw0v27zVA0pEMFPOAFqWNbLSHECtzXzO HTV3yQghHE5WZg32RzeuHFMlpzvBbEXfFqP2DvoIqBGB+PoE1ylKn90YknGloGzV4RN2 6j0IRkRadzI1FY2lS6jR0Vp9hCS2mHw3Hp+tu+n04ro8HJtRh33P2g6ILesBK6sFkLZy Jf/sK9ujITRBEG0tqFe0D88jXX0qDYnDis+mhXsIwNGMgySOszeH4XR2bvzQLCeAr76A tjqW7U4xIYi/CYKkMOX1NVB3ZQj4BxnE3WgreXQx74iYU6XTXMFd90iN2n62K5ipMQXo Iw== 
Received: from nam05-co1-obe.outbound.protection.outlook.com (mail-co1nam05lp2058.outbound.protection.outlook.com [104.47.48.58]) by mx0b-00273201.pphosted.com with ESMTP id 2p6svvg11g-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 05 Dec 2018 17:41:01 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4921.namprd05.prod.outlook.com (20.176.112.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.17; Thu, 6 Dec 2018 01:40:58 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1404.020; Thu, 6 Dec 2018 01:40:58 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: =?utf-8?B?TWlyamEgS8O8aGxld2luZA==?= <ietf@kuehlewind.net>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: =?utf-8?B?TWlyamEgS8O8aGxld2luZCdzIE5vIE9iamVjdGlvbiBvbiBkcmFmdC1pZXRm?= =?utf-8?Q?-netconf-zerotouch-25:_(with_COMMENT)?=
Thread-Index: AQHUiN1CjGA1OI6J5Uy6mtg8q/bNCqVwo+uA
Date: Thu, 6 Dec 2018 01:40:58 +0000
Message-ID: <B0AF8548-5434-4A25-8D61-D80F6CB57FF6@juniper.net>
References: <154360369395.27402.18143504350346119719.idtracker@ietfa.amsl.com>
In-Reply-To: <154360369395.27402.18143504350346119719.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4921; 6:+dC0r9+mItnzezR98rDioH6y0nelhdDCGlYVACEyp4uflDqvpoLbvWRBRSle51rP+fdOdR2/zwizetIpwDXkDapVNrSfDxL/1HuZPSJMRnVQp0nxOJmshj3Fsd+nyIUYM4biQqkP6YLLOcF6csjHNf6GU3bHP5xad2skw5tAuhBbLq9Bt61Pg4CmahzxVGkSFwM8+ZbfNhyaLiqQEZUHJYujHkTomUkHZ42IVL14+GHWuYfMYv8BV9o5DGbvFJuO5vYSK50X53fU1hn6+7lrxfyhQJEX5/oKgeLXmgHDYZ4mBz/v235ITAZJxqNRl2z0cb/updFNNwsifYT71ilZnBt7b1dfOujHUlBr+IkYXYOTOpyXZX4hgRNWK0OCXK0FnEP+/POh5I93WnF1tS7gtCram2lPl/W1D7cCSL+Io4QJdztswyOVC9/SKi1ELj1maDCyaXpqN8keCyvqhvlaLw==; 5:+WBaF4pT8yvJx37OIgLtkFK/MrxWZtuJ9Pe1R8gkXrsAHA4pB3YtIu1DB1HvRCkwXYoElK9zMFRMWiU6uiYl+YajQPBFJoW2RaFOXCBrvDXSV0hZS+jx6J1c1xqSNiBbtwb7Jor3BIWIb5usJITHaWqOS3O5D4DrNcNg96j8MAs=; 7:/3Js6n9ON0/PQ/SP6HnohXnG2pftEEn3xnBl84eDoD9s+g1TGt49muRNX8KeBH25Nmcn/a++T+I9DQsOuRr9RBjuwMdU8g0iAGIkZ6JRSU9vtVi1baxFxkjRWVb8zsUSqLvKQ/seenf6aRaHctJZ5w==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 029dc751-9ae8-448d-a8da-08d65b1bdf4b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4921; 
x-ms-traffictypediagnostic: DM6PR05MB4921:
x-microsoft-antispam-prvs: <DM6PR05MB4921BB71D70DB5FDD7C3B95EA5A90@DM6PR05MB4921.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3231455)(999002)(944501520)(52105112)(3002001)(10201501046)(6055026)(148016)(149066)(150057)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4921; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4921; 
x-forefront-prvs: 087894CD3C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(396003)(376002)(346002)(39860400002)(366004)(199004)(189003)(186003)(2906002)(110136005)(7736002)(6246003)(305945005)(53936002)(6512007)(446003)(14444005)(99286004)(6306002)(11346002)(83716004)(256004)(486006)(26005)(76176011)(6506007)(102836004)(575784001)(86362001)(2616005)(36756003)(6436002)(71190400001)(81156014)(229853002)(14454004)(106356001)(224303003)(224313004)(8936002)(81166006)(82746002)(71200400001)(316002)(966005)(5660300001)(3846002)(478600001)(6116002)(58126008)(68736007)(6486002)(4326008)(97736004)(105586002)(25786009)(66066001)(33656002)(476003)(54906003); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4921; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: gzm/AjfhwHCbcWHnLHvGcHNndJ19Zy17v/FcRftTdcAhTkHVsHM8RAwCIqgIIOPeSFSDtOMIuaa/+PzD0LEDSBPSK+X8Z7PIWWbmcq0iNCytS1etES6UYkeAsJ2cO7GDgjgylS5P/h6DFn51MUMeewA+H07NzSRhdNLeQcGQIRKzzv97KxIgCtREuIBcoPAVnxryLvx/Qb3C9CKO/zsRMw98AX9OnwzUhbTRbdYIM5je2lh76AErMJjLCUcvrSHlN/x581ydNAtwRg4ErIpS3366UHwf4sEeARLKv/4O9J+t7hZlL7cehQ+Tn/I2yqO1uPeubFfqfG40e3UfA+xr0rap/w+mNWNWjO/+G1tlgLw=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <41FFAB0E85CA7C4CB89FAA4BE4CFD08B@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 029dc751-9ae8-448d-a8da-08d65b1bdf4b
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Dec 2018 01:40:58.7088 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4921
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-06_01:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812060012
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/54lGSdHkV0XeiIcFddYiZPwPzH0>
Subject: Re: [Netconf]  =?utf-8?q?Mirja_K=C3=BChlewind=27s_No_Objection_on_dra?= =?utf-8?q?ft-ietf-netconf-zerotouch-25=3A_=28with_COMMENT=29?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 01:41:05 -0000
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From nobody Wed Dec  5 21:31:36 2018
Return-Path: <ben@nostrum.com>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E1B1F13102A; Wed,  5 Dec 2018 21:31:33 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154407429391.31910.328638998435122851.idtracker@ietfa.amsl.com>
Date: Wed, 05 Dec 2018 21:31:33 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/l59ZZi53J38Ag8jIy2wbKyS0Mo4>
Subject: [Netconf] Ben Campbell's No Objection on draft-ietf-netconf-zerotouch-25: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 05:31:34 -0000

Ben Campbell has entered the following ballot position for
draft-ietf-netconf-zerotouch-25: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

I support Adam's and Alexey's DISCUSS points.

Â§1.2: I have a bit of discomfort in how the manufacturer/owner business model
is encoded into this. In particular, is there any possibility of anonymous
owners? How about secondary markets (i.e. transfer of a device between owners)
without mediation by the manufacturer.)? But I see this is actually mentioned
in the security considerations, so I don't really expect a change.

Â§3.1, 4th paragraph: The first sentence is convoluted; please consider breaking
it into multiple simpler sentences.

- 6th paragraph: The first sentence is even more convoluted.

Â§5.6, 10th paragraph: I'm not sure how to interpret "MUST try". That doesn't
seem verifiable. -- first bullet under "implementation notes": is "roll out of"
the same things as "roll back"?

Â§9.8:
- 4th paragraph: Can the "best practices" be cited or described? Otherwise, the
normative "RECOMMENDED" seems pretty vague. (Or are the next few sentences
intended to define those practices?

-5th paragraph: Paragraph is hard to parse.



From nobody Wed Dec  5 21:51:28 2018
Return-Path: <suresh@kaloom.com>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 70CBE130DF2; Wed,  5 Dec 2018 21:51:26 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Suresh Krishnan <suresh@kaloom.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154407548645.31858.6036268091969542377.idtracker@ietfa.amsl.com>
Date: Wed, 05 Dec 2018 21:51:26 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/TaAt9tWXn8HHOGkOiHwCNXUoT9M>
Subject: [Netconf] Suresh Krishnan's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 05:51:26 -0000

Suresh Krishnan has entered the following ballot position for
draft-ietf-netconf-zerotouch-25: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

* Section 8.1

This should be easy to fix but this text about the cardinality of the option

"Servers MUST NOT send more than one instance of the
OPTION_V4_ZEROTOUCH_REDIRECT option."

is contradictory to the following recommendation to use RFC3396 for long URLs
*which will certainly result* in multiple options being sent. I would like
personally like this to be a qualified MUST NOT (e.g. MUST NOT except for the
long URL case) but I leave it up to the authors and the sponsoring AD to figure
out the best way forward.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

* Please update the DHCPv6 (RFC3315) references to correspond to RFC8415
(Section 18.2 mainly for the client behavior and Section 18.3 for the server
behavior) as it has been obsoleted.

* Thanks for using the DHCPv6 option guidelines properly for the option formats
and cardinality. Greatly appreciated.



From nobody Thu Dec  6 03:38:11 2018
Return-Path: <ianfarrer@gmx.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC181130DDB; Thu,  6 Dec 2018 03:38:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FKV-R8Rw7BYY; Thu,  6 Dec 2018 03:38:01 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1390D12D4EA; Thu,  6 Dec 2018 03:38:00 -0800 (PST)
Received: from [192.168.1.228] ([80.159.240.8]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0MT74k-1gx1WB0lJG-00S3j7; Thu, 06 Dec 2018 12:37:53 +0100
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.1 \(3445.101.1\))
From: ianfarrer@gmx.com
In-Reply-To: <154407548645.31858.6036268091969542377.idtracker@ietfa.amsl.com>
Date: Thu, 6 Dec 2018 12:37:51 +0100
Cc: The IESG <iesg@ietf.org>, netconf-chairs@ietf.org, draft-ietf-netconf-zerotouch@ietf.org, Bert Wijnen <bwijnen@bwijnen.net>, netconf@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <128D9A3F-6ADD-4049-B086-9066C584BFF7@gmx.com>
References: <154407548645.31858.6036268091969542377.idtracker@ietfa.amsl.com>
To: Suresh Krishnan <suresh@kaloom.com>
X-Mailer: Apple Mail (2.3445.101.1)
X-Provags-ID: V03:K1:ZAcE5Cxw7A6S37F0U5CbDGKEVKVrjFCK9yhwsCvJjaIRqgmlOgG J/q4A/BDbdsUYgU6zVP3pmfSp9MiVroCJV3i6bPWGZ+7mv1TXoHOgghkXt0SJY8azSsh0MT 6HI8b3qTWNXqaH6XLyvQSW6HtiNUAqSY9g4qpLU5djBmcHIuRs8BTinGi4jx7PvhCsW42aK MhWes85qyC7tixim0Pzow==
X-UI-Out-Filterresults: notjunk:1;V03:K0:LRpxFm62rXM=:X/0OvAUhIgxVihlizG0HJc JgpHfUzVRRDN0GIf8xpmFNS1Ny9TiKv7coaHIQWHsAP9l2gLQmXK0sQ3igocLfyVsIU7LYU/6 4CAQ7BCqA0C5aug7byfurXu58pLKL+xHUeUDk2RdeqYKb6TdGi/ozyvlomp3/XWETHevU1KOA jkE/JRmkR5ENuZ7jVZlH9NJFb8pcBEg1LeuZtqqEfmgxmVr+DvPIsQvJ1p/nfpApDiDW4/SmP /FNaw4vJZh/1BRoSMMbyTuw0nRHIzZN3t1N5Nikvj/96IcpWrASDn3qGiEwGpPMu28adywEN9 9Kmr0+TUCfmKYWHB1PcQEgUDSeU9p0nEjipo0p15/uUSsePdazggE11251w1qVBR82DhajhCJ N81t7mtW6bAjcZTFrUp451MdnNWKGj9qWVibYs2zgMPSXJH8AFz1FjkO1LdKlHQfUfZAG2vIk IphsJmJ4V7aojykOcSYwawx9ESLS6XVAWR3V0uuB8oi7kEsjtuv6/15bSxcmtnPhC2vMA0JXK 4JgpGvEnFgkq7GP9N/nf3jYpjO3h8xv0VeU3NaiqA6NlNjzLAM6HZH9U+Jz/AeMFBKasUvJML wEoSI+fw+G6sjOhzD6ntj3+tATnNBy995Rqzf/C4TbVdwBJMFoJzRwVC2J1E83cZ7Rr/ysY33 eINRUVfYNIAIfuEEn4zGa+9XeDtr4PPOuEZ3iccsXKnEKK3W2HXsgWl73kMTDeXxeWeq1LCwz x9UFtSwSC6mJ1NR4KXvjpcBqAisdqTydCdrQ/M03ATCaoNEWOH04V1VFsJz5gusEnuLiq5hhV sn4YlOCww2NeECJYqvJHDQMaR6uY0IWvv2O2zdObOc4ur87c3EWs11YpAIl8smDC9Jx7YR8ax XrnAK8xF/yteZ8Me8XnIWlaZqKQGdd8oUlBTsOe5i2G9x/ig7UeJy8TJbwCKvF
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/vsT8RxFz6dl3IEkcJk95Kn3rIL8>
Subject: Re: [Netconf] Suresh Krishnan's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 11:38:04 -0000

Hi Suresh,

Please see inline below.

Thanks,
Ian

> On 6. Dec 2018, at 06:51, Suresh Krishnan <suresh@kaloom.com> wrote:
>=20
> Suresh Krishnan has entered the following ballot position for
> draft-ietf-netconf-zerotouch-25: Discuss
>=20
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut =
this
> introductory paragraph, however.)
>=20
>=20
> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>=20
>=20
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/
>=20
>=20
>=20
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>=20
> * Section 8.1
>=20
> This should be easy to fix but this text about the cardinality of the =
option
>=20
> "Servers MUST NOT send more than one instance of the
> OPTION_V4_ZEROTOUCH_REDIRECT option."
>=20
> is contradictory to the following recommendation to use RFC3396 for =
long URLs
> *which will certainly result* in multiple options being sent. I would =
like
> personally like this to be a qualified MUST NOT (e.g. MUST NOT except =
for the
> long URL case) but I leave it up to the authors and the sponsoring AD =
to figure
> out the best way forward.
>=20

[if -Suggest that the following paragraph:

Servers MUST NOT send more than one instance of the
OPTION_V4_ZEROTOUCH_REDIRECT option.=20

Is replaced with this text:

---
The server=E2=80=99s DHCP message MUST contain only a single instance of =
the
OPTION_V4_ZEROTOUCH_REDIRECT=E2=80=99s 'bootstrap-server-list=E2=80=99
field. However, the list of URIs in this field may exceed the maximum =
allowed
length of a single DHCPv4 option (per [RFC3396]).

If the length of 'bootstrap-server-list=E2=80=99 is small enough to fit =
into a single instance
of OPTION_V4_ZEROTOUCH_REDIRECT,  the server MUST NOT send
more than one instance of this option.=20

If the length of the 'bootstrap-server-list=E2=80=99 field is too large =
to fit into a single
option, then OPTION_V4_ZEROTOUCH_REDIRECT MUST be split into
multiple instances of the option according to the process described in =
[RFC3396].
---
]

>=20
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
> * Please update the DHCPv6 (RFC3315) references to correspond to =
RFC8415
> (Section 18.2 mainly for the client behavior and Section 18.3 for the =
server
> behavior) as it has been obsoleted.

[if - Will update]

>=20
> * Thanks for using the DHCPv6 option guidelines properly for the =
option formats
> and cardinality. Greatly appreciated.
>=20
>=20
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf


From nobody Thu Dec  6 06:49:18 2018
Return-Path: <alissa@cooperw.in>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C175112DDA3; Thu,  6 Dec 2018 06:49:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=cAT1nqx7; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=KlHha9/b
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XlYBj_oZx1G0; Thu,  6 Dec 2018 06:48:59 -0800 (PST)
Received: from wout2-smtp.messagingengine.com (wout2-smtp.messagingengine.com [64.147.123.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E63B9126CB6; Thu,  6 Dec 2018 06:48:55 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.west.internal (Postfix) with ESMTP id EB0AECE8; Thu,  6 Dec 2018 09:48:54 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute7.internal (MEProxy); Thu, 06 Dec 2018 09:48:55 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h= content-type:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; s=fm1; bh=C X2cbJ0AmqfFeZ+D8bCFio/rGngOMdj3HyTBgWHv8Dg=; b=cAT1nqx7Gdqlc+PER B+w1Zk2Vf9MjoonoqS9sEVESDGWYO9vpPyxONomzUY5H79J1QQ0S8nqZsWPqn7P9 G7/YvFyd4MhnFqxnm+3GxRaw5qbyMN3NrR3cRGn2sBikUJvyHPoJWAH7MvM2yuPd m5XPRPepbOy7VGm8kM5hquzQJPufi5rHSCdtUBw71/B/00G+4cQVOPNe4PNYyW3V EgI79pSCxZBwuIKmzjABJ3pQ6rfiadaZokPj/OOZRU9ZSN5575eXBs6WOBi3jddp DRrLacbtWRndlVnSniFzzB4PkQHUki/p1Ejh5sdRKeE48vf6206nbHuUnJlHhrOj +fEPw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=CX2cbJ0AmqfFeZ+D8bCFio/rGngOMdj3HyTBgWHv8 Dg=; b=KlHha9/bmSw1aCwTcaJEUaK9CVze0ONX/fJ5247xjIZ88/CO1z7zZWRuD wvsC31HLUND6SSlls2T4xhMcaQrEAlERo/DfL0LD4jrJLSxG3WT9ed4K8qkIC1Dx /yUTLl8W83DTPRv/yikDJ2w/se3LxT9I27p6aJC5fgKAbQbziskejPIRtZoJYaRh KSqZXCpM3q4cdfY2Mb8P5PI1om7rjlg5xev7EqlZYEOS6L++bK9muxgRoU/2CztG zFXvlp8A0Ch5mk7ZtYfEnGS4ZEGhRS2Vte0/xnQ9uwlpQN9WF9+YM+T/FSEPIBP6 thDBpSxJsNQ4U0XwKOsTtMllRjTzw==
X-ME-Sender: <xms:1jYJXDHfC4I8_AJFgdKCQGo3gTy3kyWlC9ink1ftqhaHHhh_XGB5Zw>
X-ME-Proxy: <xmx:1jYJXNuw7uh8dVZTAflN9wqqTN1h10OEmZ0md1xRTpbgsuDKhsbeSw> <xmx:1jYJXHF_TfUrAsgUjtpdujf8GpzVL7LTb8IUEFDUO0MBH_kMdm706w> <xmx:1jYJXL6YPONPtfrEXixjHj0n1QxEwSwS10xegbobhEWageHenzWKig> <xmx:1jYJXIzH2t9FhDp4bikSooTdqCUX73q5J0-LcbC_7i4wzyU7Smp-0w> <xmx:1jYJXB0eMvCdZwQgkUkUic7L7PIQ33cq_VF9IRIBc4m4I3kKvKwFGQ> <xmx:1jYJXIz1a9rd9oA-kQKWbrGNc6gEbHt-cYXAeQ94Rp768ihKNEjPHQ>
Received: from rtp-alcoop-nitro5.cisco.com (unknown [173.38.117.89]) by mail.messagingengine.com (Postfix) with ESMTPA id C714E103BA; Thu,  6 Dec 2018 09:48:53 -0500 (EST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Alissa Cooper <alissa@cooperw.in>
In-Reply-To: <2CA21316-CC9F-4B12-887C-2BDD52B1E778@juniper.net>
Date: Thu, 6 Dec 2018 09:48:50 -0500
Cc: "gen-art@ietf.org" <gen-art@ietf.org>, "draft-ietf-netconf-zerotouch.all@ietf.org" <draft-ietf-netconf-zerotouch.all@ietf.org>,  "netconf@ietf.org" <netconf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <73C290A8-FF67-4AA8-95E0-890B61BE178A@cooperw.in>
References: <153967589866.9324.10694947169497875484@ietfa.amsl.com> <2CA21316-CC9F-4B12-887C-2BDD52B1E778@juniper.net>
To: Kent Watsen <kwatsen@juniper.net>, Roni Even <ron.even.tlv@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/u90OZ9IMlTDSxsGh6R7lipIGZIc>
Subject: Re: [Netconf] [Gen-art] Genart last call review of draft-ietf-netconf-zerotouch-25
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 14:49:11 -0000

Roni, thanks for your review. Kent, thanks for your response. I entered =
a No Objection ballot.

Alissa

> On Oct 16, 2018, at 12:38 PM, Kent Watsen <kwatsen@juniper.net> wrote:
>=20
> Fixed the editorial nit in my local copy.
>=20
> Thanks,
> Kent
>=20
>=20
>=20
> =EF=BB=BF-----Original Message-----
> From: Roni Even <ron.even.tlv@gmail.com>
> Date: Tuesday, October 16, 2018 at 3:45 AM
> To: "gen-art@ietf.org" <gen-art@ietf.org>
> Cc: "ietf@ietf.org" <ietf@ietf.org>, =
"draft-ietf-netconf-zerotouch.all@ietf.org" =
<draft-ietf-netconf-zerotouch.all@ietf.org>, "netconf@ietf.org" =
<netconf@ietf.org>
> Subject: Genart last call review of draft-ietf-netconf-zerotouch-25
> Resent-From: <alias-bounces@ietf.org>
> Resent-To: <kwatsen@juniper.net>, <mikael.abrahamsson@t-systems.se>, =
<ianfarrer@gmx.com>, Mahesh Jethanandani <mjethanandani@gmail.com>, =
<ibagdona@gmail.com>, <warren@kumari.net>, Bert Wijnen =
<bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, Mahesh =
Jethanandani <mjethanandani@gmail.com>
> Resent-Date: Tuesday, October 16, 2018 at 3:44 AM
>=20
> Reviewer: Roni Even
> Review result: Ready
>=20
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
>=20
> For more information, please see the FAQ at
>=20
> =
<https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__trac.ietf.org_trac=
_gen_wiki_GenArtfaq&d=3DDwICaQ&c=3DHAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcW=
zoCI&r=3D9zkP0xnJUvZGJ9EPoOH7Yhqn2gsBYaGTvjISlaJdcZo&m=3DPdaxmDUdiW18siLRP=
TLo7tmKXMfsmd3tE4ztf7CVoKQ&s=3D0k3qcYex2_izCxi-Xk3hBWPXJV-SnK5aLEDM6hcp484=
&e=3D>.
>=20
> Document: draft-ietf-netconf-zerotouch-??
> Reviewer: Roni Even
> Review Date: 2018-10-16
> IETF LC End Date: 2018-10-22
> IESG Telechat date: Not scheduled for a telechat
>=20
> Summary: The document is ready for publication as Standard Track RFC
>=20
> Major issues:
>=20
> Minor issues:
>=20
> Nits/editorial comments:=20
>=20
> 1. In the editorial note the change log is in appendix D and not A
>=20
>=20
>=20
>=20
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art


From nobody Thu Dec  6 07:08:46 2018
Return-Path: <Suresh@kaloom.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7326126DBF; Thu,  6 Dec 2018 07:08:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kaloom.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3cmq0ITlX4A4; Thu,  6 Dec 2018 07:08:33 -0800 (PST)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670093.outbound.protection.outlook.com [40.107.67.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A1F7127598; Thu,  6 Dec 2018 07:08:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaloom.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xC8Mg7uu3YCFruwhnpP1OOavAdjKwyd8lDQCfqw5jB0=; b=Z0gXMxUCzlps2ZEdtBW/nr5FgssoUO0/8L3ldEUhTSkAvkhdB9opvj7QchAuOOWf4GFpVh/trwec9TOrUeyIeHUJY2ux8p/rWL+DCj1NHFRxI4LrmX2npFa7q7zU8q3IaZeMkOY9DT2cZ/Q7h9J4Sbqhlr1skvuOEKo7fWSDkHc=
Received: from YTOPR0101MB1819.CANPRD01.PROD.OUTLOOK.COM (52.132.44.159) by YTOPR0101MB2234.CANPRD01.PROD.OUTLOOK.COM (52.132.49.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.19; Thu, 6 Dec 2018 15:08:30 +0000
Received: from YTOPR0101MB1819.CANPRD01.PROD.OUTLOOK.COM ([fe80::5166:4dc:8313:30d0]) by YTOPR0101MB1819.CANPRD01.PROD.OUTLOOK.COM ([fe80::5166:4dc:8313:30d0%5]) with mapi id 15.20.1382.023; Thu, 6 Dec 2018 15:08:30 +0000
From: Suresh Krishnan <Suresh@kaloom.com>
To: Ian Farrer <ianfarrer@gmx.com>
CC: The IESG <iesg@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, Bert Wijnen <bwijnen@bwijnen.net>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] Suresh Krishnan's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUjVgivfENKBoO50ifJIbnEFwFx6Vx0GcA
Date: Thu, 6 Dec 2018 15:08:30 +0000
Message-ID: <731DA7D0-A355-41C5-9331-55DAD09A501E@kaloom.com>
References: <154407548645.31858.6036268091969542377.idtracker@ietfa.amsl.com> <128D9A3F-6ADD-4049-B086-9066C584BFF7@gmx.com>
In-Reply-To: <128D9A3F-6ADD-4049-B086-9066C584BFF7@gmx.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Suresh@kaloom.com; 
x-originating-ip: [222.128.199.6]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; YTOPR0101MB2234; 6:vB8Y+Ev4ITpkdfJiU87kY4VS1X/X8fS8fN5WtPE0u78EibahAbqGkmwhG9TEeZtEdPd+ROOzJ/rIpOVoikIPuvZuBuAHeS++Dv+I62Gr6VGB+H5ap7vi3ZT9hyca9WoYvKP36/3pZ9/eORUMKodRBe19SqoL8+k0lkJBxGhXSSriyKfiDN9k4ORYxVR9n/kKJz7kMnreaH1gFk+amsxEZlBt0LsvTZ1wTSxSqgbVhK6xeH8EBDQyAOpcIcgMNp7NeI9Jblw0SYc/04YueHA/TcnDtke2nVoHszFJMSc5sNQEyhWxwZjKRFWSqOYIQJ1WQwCJFKKuRaRU26YDal3vJ6hOHI/XA9j2NWJBFWGLjveMcsoPo5A3GYefgeHgd9ObPZRjwI9ldMH6QVXqobAyT3Dj4mOutZZBGbWOV4g3vU4QWlJZj7oad9KoGU7/yUK6hto3dtyFwSK27I9z06YdJQ==; 5:g1zeEIMLuYRbxlws71Gzb2qngyi188goYC/wwBbW5IS4tJg/pRIN3gq3rGDzwCOX8B3NQ+GODtfr/BHMp9a6wYokI7Zw0Rdj1/YX9gzmz0iYxOZfnHsOVmaOhZ5tEQ/k1Ayk0fd0P91h3btSFfMe4Y321On5S3OFQGSx+Oe6PFI=; 7:fl5DnmvAVXGppo8Lo07SOzSBxinzFT2MkeIP/fv3IsVsn3uAjytpadut+zuj85NxXG4ooAo82ujmtOOo7N2k0jNYlKAEip3WtJJJETtQQt5Snj9B2tt8/rL7snBJPs6601GShMvr+FMF0+AP9wVy6Q==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 66fac28d-b443-4e1c-d95e-08d65b8caedc
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:YTOPR0101MB2234; 
x-ms-traffictypediagnostic: YTOPR0101MB2234:
x-microsoft-antispam-prvs: <YTOPR0101MB2234253681B8D08389B52732B4A90@YTOPR0101MB2234.CANPRD01.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(3231455)(999002)(944501520)(52105112)(10201501046)(148016)(149066)(150057)(6041310)(2016111802025)(20161123558120)(20161123564045)(20161123560045)(20161123562045)(6043046)(201708071742011)(7699051)(76991095); SRVR:YTOPR0101MB2234; BCL:0; PCL:0; RULEID:; SRVR:YTOPR0101MB2234; 
x-forefront-prvs: 087894CD3C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(136003)(366004)(376002)(39840400004)(346002)(199004)(189003)(51914003)(3846002)(26005)(36756003)(53546011)(99286004)(6506007)(33656002)(305945005)(6116002)(256004)(14444005)(8676002)(97736004)(81156014)(81166006)(102836004)(186003)(8936002)(7736002)(6306002)(76176011)(6486002)(66066001)(80792005)(82746002)(25786009)(6436002)(106356001)(6916009)(6512007)(83716004)(2906002)(71200400001)(71190400001)(486006)(5660300001)(11346002)(476003)(446003)(53936002)(105586002)(2616005)(14454004)(86362001)(6246003)(508600001)(68736007)(72206003)(229853002)(316002)(966005)(4326008)(54906003)(518174003); DIR:OUT; SFP:1102; SCL:1; SRVR:YTOPR0101MB2234; H:YTOPR0101MB1819.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: kaloom.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: aFuMamRPrX9M/d/7BiMImTctn0e8XyYJQknBiBxwe1MOqFzYUvhmO1YnCQ5QT3o2FmETOM5SlBSF3eIC6cgH354vGnLP64DkbUkk4k1tJUrpyYgz8EehLxy8BDIUgLSrqSBDGe3xGIh6eFnAPCmZKRIh53zodiVnyrDCx8SIHdu+kDxlJSpCBypUfpyJI/+vOYUT0RWPq3BwBn6t5uzGJ6V3mfcb2P0R9AaDqT1axG+PTIv1dz2s1tOzrtngTP7+d6FFkt1TT51kSG8gIIte5MEzmF0aF8CBIGkVRaiecmYQcvNe3UwU6FlAMQC1Tuk2zSFvlGM76d+R3yIkTJfDFAhi9b4grxn/fE7FT+11Up0=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <20822CD7667D634588D2A387690F3803@CANPRD01.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: kaloom.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 66fac28d-b443-4e1c-d95e-08d65b8caedc
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Dec 2018 15:08:30.5980 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 47d58e26-f796-48e8-ac40-1c365c204513
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YTOPR0101MB2234
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/fIKlInb1UruSI3f8EX8W1yJYS_M>
Subject: Re: [Netconf] Suresh Krishnan's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 15:08:39 -0000

SGkgSWFuLA0KICBUaGFua3MgZm9yIHRoZSBxdWljayByZXNwb25zZS4gVGhlc2UgY2hhbmdlcyB3
b3JrIGZvciBtZS4gSSB3aWxsIGNsZWFyIGFzIHNvb24gYXMgdGhlIG5ldyByZXYgaGl0cy4NCg0K
UmVnYXJkcw0KU3VyZXNoDQoNCj4gT24gRGVjIDYsIDIwMTgsIGF0IDY6MzcgQU0sIGlhbmZhcnJl
ckBnbXguY29tIHdyb3RlOg0KPiANCj4gSGkgU3VyZXNoLA0KPiANCj4gUGxlYXNlIHNlZSBpbmxp
bmUgYmVsb3cuDQo+IA0KPiBUaGFua3MsDQo+IElhbg0KPiANCj4+IE9uIDYuIERlYyAyMDE4LCBh
dCAwNjo1MSwgU3VyZXNoIEtyaXNobmFuIDxzdXJlc2hAa2Fsb29tLmNvbT4gd3JvdGU6DQo+PiAN
Cj4+IFN1cmVzaCBLcmlzaG5hbiBoYXMgZW50ZXJlZCB0aGUgZm9sbG93aW5nIGJhbGxvdCBwb3Np
dGlvbiBmb3INCj4+IGRyYWZ0LWlldGYtbmV0Y29uZi16ZXJvdG91Y2gtMjU6IERpc2N1c3MNCj4+
IA0KPj4gV2hlbiByZXNwb25kaW5nLCBwbGVhc2Uga2VlcCB0aGUgc3ViamVjdCBsaW5lIGludGFj
dCBhbmQgcmVwbHkgdG8gYWxsDQo+PiBlbWFpbCBhZGRyZXNzZXMgaW5jbHVkZWQgaW4gdGhlIFRv
IGFuZCBDQyBsaW5lcy4gKEZlZWwgZnJlZSB0byBjdXQgdGhpcw0KPj4gaW50cm9kdWN0b3J5IHBh
cmFncmFwaCwgaG93ZXZlci4pDQo+PiANCj4+IA0KPj4gUGxlYXNlIHJlZmVyIHRvIGh0dHBzOi8v
d3d3LmlldGYub3JnL2llc2cvc3RhdGVtZW50L2Rpc2N1c3MtY3JpdGVyaWEuaHRtbA0KPj4gZm9y
IG1vcmUgaW5mb3JtYXRpb24gYWJvdXQgSUVTRyBESVNDVVNTIGFuZCBDT01NRU5UIHBvc2l0aW9u
cy4NCj4+IA0KPj4gDQo+PiBUaGUgZG9jdW1lbnQsIGFsb25nIHdpdGggb3RoZXIgYmFsbG90IHBv
c2l0aW9ucywgY2FuIGJlIGZvdW5kIGhlcmU6DQo+PiBodHRwczovL2RhdGF0cmFja2VyLmlldGYu
b3JnL2RvYy9kcmFmdC1pZXRmLW5ldGNvbmYtemVyb3RvdWNoLw0KPj4gDQo+PiANCj4+IA0KPj4g
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLQ0KPj4gRElTQ1VTUzoNCj4+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4+IA0KPj4gKiBT
ZWN0aW9uIDguMQ0KPj4gDQo+PiBUaGlzIHNob3VsZCBiZSBlYXN5IHRvIGZpeCBidXQgdGhpcyB0
ZXh0IGFib3V0IHRoZSBjYXJkaW5hbGl0eSBvZiB0aGUgb3B0aW9uDQo+PiANCj4+ICJTZXJ2ZXJz
IE1VU1QgTk9UIHNlbmQgbW9yZSB0aGFuIG9uZSBpbnN0YW5jZSBvZiB0aGUNCj4+IE9QVElPTl9W
NF9aRVJPVE9VQ0hfUkVESVJFQ1Qgb3B0aW9uLiINCj4+IA0KPj4gaXMgY29udHJhZGljdG9yeSB0
byB0aGUgZm9sbG93aW5nIHJlY29tbWVuZGF0aW9uIHRvIHVzZSBSRkMzMzk2IGZvciBsb25nIFVS
THMNCj4+ICp3aGljaCB3aWxsIGNlcnRhaW5seSByZXN1bHQqIGluIG11bHRpcGxlIG9wdGlvbnMg
YmVpbmcgc2VudC4gSSB3b3VsZCBsaWtlDQo+PiBwZXJzb25hbGx5IGxpa2UgdGhpcyB0byBiZSBh
IHF1YWxpZmllZCBNVVNUIE5PVCAoZS5nLiBNVVNUIE5PVCBleGNlcHQgZm9yIHRoZQ0KPj4gbG9u
ZyBVUkwgY2FzZSkgYnV0IEkgbGVhdmUgaXQgdXAgdG8gdGhlIGF1dGhvcnMgYW5kIHRoZSBzcG9u
c29yaW5nIEFEIHRvIGZpZ3VyZQ0KPj4gb3V0IHRoZSBiZXN0IHdheSBmb3J3YXJkLg0KPj4gDQo+
IA0KPiBbaWYgLVN1Z2dlc3QgdGhhdCB0aGUgZm9sbG93aW5nIHBhcmFncmFwaDoNCj4gDQo+IFNl
cnZlcnMgTVVTVCBOT1Qgc2VuZCBtb3JlIHRoYW4gb25lIGluc3RhbmNlIG9mIHRoZQ0KPiBPUFRJ
T05fVjRfWkVST1RPVUNIX1JFRElSRUNUIG9wdGlvbi4gDQo+IA0KPiBJcyByZXBsYWNlZCB3aXRo
IHRoaXMgdGV4dDoNCj4gDQo+IC0tLQ0KPiBUaGUgc2VydmVy4oCZcyBESENQIG1lc3NhZ2UgTVVT
VCBjb250YWluIG9ubHkgYSBzaW5nbGUgaW5zdGFuY2Ugb2YgdGhlDQo+IE9QVElPTl9WNF9aRVJP
VE9VQ0hfUkVESVJFQ1TigJlzICdib290c3RyYXAtc2VydmVyLWxpc3TigJkNCj4gZmllbGQuIEhv
d2V2ZXIsIHRoZSBsaXN0IG9mIFVSSXMgaW4gdGhpcyBmaWVsZCBtYXkgZXhjZWVkIHRoZSBtYXhp
bXVtIGFsbG93ZWQNCj4gbGVuZ3RoIG9mIGEgc2luZ2xlIERIQ1B2NCBvcHRpb24gKHBlciBbUkZD
MzM5Nl0pLg0KPiANCj4gSWYgdGhlIGxlbmd0aCBvZiAnYm9vdHN0cmFwLXNlcnZlci1saXN04oCZ
IGlzIHNtYWxsIGVub3VnaCB0byBmaXQgaW50byBhIHNpbmdsZSBpbnN0YW5jZQ0KPiBvZiBPUFRJ
T05fVjRfWkVST1RPVUNIX1JFRElSRUNULCAgdGhlIHNlcnZlciBNVVNUIE5PVCBzZW5kDQo+IG1v
cmUgdGhhbiBvbmUgaW5zdGFuY2Ugb2YgdGhpcyBvcHRpb24uIA0KPiANCj4gSWYgdGhlIGxlbmd0
aCBvZiB0aGUgJ2Jvb3RzdHJhcC1zZXJ2ZXItbGlzdOKAmSBmaWVsZCBpcyB0b28gbGFyZ2UgdG8g
Zml0IGludG8gYSBzaW5nbGUNCj4gb3B0aW9uLCB0aGVuIE9QVElPTl9WNF9aRVJPVE9VQ0hfUkVE
SVJFQ1QgTVVTVCBiZSBzcGxpdCBpbnRvDQo+IG11bHRpcGxlIGluc3RhbmNlcyBvZiB0aGUgb3B0
aW9uIGFjY29yZGluZyB0byB0aGUgcHJvY2VzcyBkZXNjcmliZWQgaW4gW1JGQzMzOTZdLg0KPiAt
LS0NCj4gXQ0KPiANCj4+IA0KPj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPj4gQ09NTUVOVDoNCj4+IC0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0NCj4+IA0KPj4gKiBQbGVhc2UgdXBkYXRlIHRoZSBESENQdjYgKFJGQzMzMTUpIHJl
ZmVyZW5jZXMgdG8gY29ycmVzcG9uZCB0byBSRkM4NDE1DQo+PiAoU2VjdGlvbiAxOC4yIG1haW5s
eSBmb3IgdGhlIGNsaWVudCBiZWhhdmlvciBhbmQgU2VjdGlvbiAxOC4zIGZvciB0aGUgc2VydmVy
DQo+PiBiZWhhdmlvcikgYXMgaXQgaGFzIGJlZW4gb2Jzb2xldGVkLg0KPiANCj4gW2lmIC0gV2ls
bCB1cGRhdGVdDQo+IA0KPj4gDQo+PiAqIFRoYW5rcyBmb3IgdXNpbmcgdGhlIERIQ1B2NiBvcHRp
b24gZ3VpZGVsaW5lcyBwcm9wZXJseSBmb3IgdGhlIG9wdGlvbiBmb3JtYXRzDQo+PiBhbmQgY2Fy
ZGluYWxpdHkuIEdyZWF0bHkgYXBwcmVjaWF0ZWQuDQo+PiANCj4+IA0KPj4gX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+IE5ldGNvbmYgbWFpbGluZyBs
aXN0DQo+PiBOZXRjb25mQGlldGYub3JnDQo+PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFu
L2xpc3RpbmZvL25ldGNvbmYNCj4gDQoNCg==


From nobody Thu Dec  6 07:49:56 2018
Return-Path: <ietf@kuehlewind.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AE06130DC6; Thu,  6 Dec 2018 07:49:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nnMJ1TAhbMy5; Thu,  6 Dec 2018 07:49:51 -0800 (PST)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71227130DFA; Thu,  6 Dec 2018 07:49:51 -0800 (PST)
Received: from ict-networks-2001-067c-10ec-5785-8000-0000-0000-0430.fwd-v6.ethz.ch ([2001:67c:10ec:5785:8000::430]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1gUvuO-0004Wp-CM; Thu, 06 Dec 2018 16:49:48 +0100
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <B0AF8548-5434-4A25-8D61-D80F6CB57FF6@juniper.net>
Date: Thu, 6 Dec 2018 16:49:46 +0100
Cc: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>,  "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <9964AC41-9B1E-4348-94C8-C9CED80D9147@kuehlewind.net>
References: <154360369395.27402.18143504350346119719.idtracker@ietfa.amsl.com> <B0AF8548-5434-4A25-8D61-D80F6CB57FF6@juniper.net>
To: Kent Watsen <kwatsen@juniper.net>
X-Mailer: Apple Mail (2.3445.9.1)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1544111391;f26890c2;
X-HE-SMSGID: 1gUvuO-0004Wp-CM
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/1NqK4QxUGhoPMjzRjckEP9T2hPg>
Subject: Re: [Netconf]  =?utf-8?q?Mirja_K=C3=BChlewind=27s_No_Objection_on_dra?= =?utf-8?q?ft-ietf-netconf-zerotouch-25=3A_=28with_COMMENT=29?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 15:49:54 -0000

Thanks! That helps!


> Am 06.12.2018 um 02:40 schrieb Kent Watsen <kwatsen@juniper.net>:
>=20
> Hi Mirja,
>=20
> Thanks for your review!
> Please see below for responses.
>=20
> Kent // principle author
>=20
>=20
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
>> Thanks for this well-written doc.
>>=20
>> One quick question which wasn't fully clear to me from the text
>> in the doc: If onboarding fails at some point, is the device
>> supposed to iterate over another bootstrapping source or stop
>> completely?
>=20
> The device is to never stop trying to bootstrap, even in case of
> a failed attempt.  The hope is that that the device's failed
> attempts will be noticed and rectified by an administrator of
> the operator's orchestrator/NMS system.
>=20
> Checking the text to ensure this intent is conveyed, we find in
> Section 5.3:
>=20
>   Otherwise, the device MUST attempt to process the onboarding
>   information as described in Section 5.6.  In either case, success or
>   failure, the device MUST exit the recursive algorithm, returning to
>   the bootstrapping sequence described in Section 5.2, the only
>   difference being in how it responds to the "Able to bootstrap from
>   any source?" conditional described in the figure in the section.
>=20
> So, in your case, it is a "failure" and thus the answer to the
> conditional is "No".  However, to your point, the current s5.2=20
> text says "Loop and/or wait for manual provisioning", which=20
> isn't quite right.  I have fixed this in the Github commit=20
> link provided below.
>=20
> Continuing checking the text, we also find in Section 5.6:
>=20
>   If the device encounters an error at any step, it MUST stop
>   processing the onboarding information and return to the =
bootstrapping
>   sequence described in Section 5.2.  In the context of a recursive
>   algorithm, the device MUST return to the enclosing loop, not back to
>   the very beginning.
>=20
> Which I think is pretty good as is, though it might help to tack
> onto the end of the last sentence ", thus allowing the logic to
> attempt all possible bootstrapping options before starting over."
> Thoughts?
>=20
>=20
>=20
>> One minor comment:
>> Maybe spell out TPM and provide a reference.
>=20
> Fixed all three instances of "TPM".
>=20
>=20
>=20
> Here is the Github commit for the above changes, as well as a
> minor/unrelated RFC4408-reference issue reported by Adam:
>=20
> =
https://github.com/netconf-wg/zero-touch/commit/0e86ec25f0f83c49dc1ec37e2b=
9f20bdec874a6f
>=20
> Thoughts?
>=20
> Kent
>=20
>=20
>=20
>=20


From nobody Thu Dec  6 08:40:43 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A9F8130E81; Thu,  6 Dec 2018 08:40:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.16
X-Spam-Level: 
X-Spam-Status: No, score=-4.16 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QKrGtWRXqnuA; Thu,  6 Dec 2018 08:40:30 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED964130E74; Thu,  6 Dec 2018 08:40:29 -0800 (PST)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB6GdNTC002830; Thu, 6 Dec 2018 08:40:29 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=FIglMgokA6kn85UncfQDkOLtPhKt85Ke6RCaLaW5caQ=; b=jpwmzKa0JfJ1YFXv6CYzneX7GLxMDKWvt9kBP6Vaii2FpBU4bNmtjZEwq/DsvFJIr7pM E2PDgvdsR+lapS3BG842e9ter/3+Gh2Ws5Cl4RA4NTHpY4V4r61e1BNGnq5Ch49g7VZN Wgrj4nQLr4zxZnf/aeDpuJWvXmCyhsfP5ztZpg67JDC9RoQCRGMLQUG5aItutWj3Itsh weV7OWkLXKsV8IGrG3Ep9/WUiPZBy6PZECVKjIL40A+vNcvrgSs/XguMH4yVgCVyAE0W 0ZK8S5MUYZsALerI3yfH3yruNpolQPi6XSfsO4k4ungD+yel0nJFQIJ97XlCXbbxk6Y5 VQ== 
Received: from nam05-by2-obe.outbound.protection.outlook.com (mail-by2nam05lp2051.outbound.protection.outlook.com [104.47.50.51]) by mx0a-00273201.pphosted.com with ESMTP id 2p72fxgkr8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 06 Dec 2018 08:40:29 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4588.namprd05.prod.outlook.com (20.176.79.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.11; Thu, 6 Dec 2018 16:40:26 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1404.020; Thu, 6 Dec 2018 16:40:26 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: =?utf-8?B?TWlyamEgS8O8aGxld2luZCdzIE5vIE9iamVjdGlvbiBvbiBkcmFmdC1pZXRm?= =?utf-8?Q?-netconf-zerotouch-25:_(with_COMMENT)?=
Thread-Index: AQHUiN1CjGA1OI6J5Uy6mtg8q/bNCqVwo+uAgAFA+gD//7pVgA==
Date: Thu, 6 Dec 2018 16:40:25 +0000
Message-ID: <A2E1042D-7543-424A-8E4F-AC7AD6732A1F@juniper.net>
References: <154360369395.27402.18143504350346119719.idtracker@ietfa.amsl.com> <B0AF8548-5434-4A25-8D61-D80F6CB57FF6@juniper.net> <9964AC41-9B1E-4348-94C8-C9CED80D9147@kuehlewind.net>
In-Reply-To: <9964AC41-9B1E-4348-94C8-C9CED80D9147@kuehlewind.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4588; 6:4ms+alUCQf6nYA1rWr9IX1TekVoS5Z2kEWeNI1Rbx+w/6a4gEGwYl7orsxUEvAsL5+brpEWLWrBOfQ0XXELANRsPoGxz6FmZEvDxdc8hbXnVTc8gTSS1yhIgrI3TleNkTa7BZY9ane9XUV3el7WAB0O0LzxA9U10mDsqckG4KufEnI24nAl7pTBMK7mFBetfWjjx/cZw+f5Unph/rtmYJu0qE5uxwM0noBD/qBN2hOHxk6BZlG+XkTnIYw8zFs0kimfKVozTWokUww4WPJEhO3eWqsFmaIlf7j/8hrOfCikGZXZXwz94Xc47x/6sfC/cQ6Sy6CaY5KYSUatKo4k7GPNu+PEC039/qiwNfA2r6gJrbRP/wbLZ4ZTwBIKZ/dMiZY6nTQ7k4w3XK0/kn2mxWhNxiftOFPjQnvTLW+Sb/B8//ZPoBoSGeBDtD308IOSIxUfebc/uX5mzuMKNnLb/ug==; 5:qKeRkEplQRg6vbB7EI+UmmFXaP4ZY/rgJZUu0mV4VGJ0THKXn6GnE2hjfcTvWF5tWi2nPgK1HXjlH8HLlq2YVJxLEJx0sxkunwUGKWdrNAdypXNVScAx0ZmwRZ9m0jNqd6CAvsYprUND8TjyMtEgCW08sDBVbnlhjRHRhScLEN4=; 7:75i2U+QqVbtdPl7T7do1COtnJ2zx6B/G0A56iIFINyHzy4ZnpBnI5TaCegpPEaqvw+1XR3ZQJ0GyPSxO5Sj2MWDvqIPJAMDanA5JGaXRMg/cYlVvc/+SDVGMSJbKPNCMbwLBr1Uh+lj1llunbe/B+Q==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: cd47cafd-c64d-445c-4bb1-08d65b99864c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4588; 
x-ms-traffictypediagnostic: DM6PR05MB4588:
x-microsoft-antispam-prvs: <DM6PR05MB458821889ABEE7C32C19DCEAA5A90@DM6PR05MB4588.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3231455)(999002)(944501520)(52105112)(93006095)(93001095)(3002001)(6055026)(148016)(149066)(150057)(6041310)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4588; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4588; 
x-forefront-prvs: 087894CD3C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(346002)(366004)(39860400002)(396003)(376002)(13464003)(199004)(189003)(256004)(36756003)(14444005)(66066001)(5660300001)(6246003)(6306002)(58126008)(966005)(4326008)(99286004)(54906003)(486006)(186003)(6116002)(25786009)(102836004)(316002)(6436002)(26005)(3846002)(6512007)(53936002)(2906002)(106356001)(105586002)(8936002)(6916009)(575784001)(76176011)(83716004)(82746002)(11346002)(86362001)(6506007)(81156014)(33656002)(478600001)(71200400001)(561944003)(81166006)(53546011)(2616005)(446003)(224313004)(71190400001)(97736004)(224303003)(476003)(229853002)(68736007)(66574009)(7736002)(6486002)(14454004)(305945005); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4588; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: b1T1R+cudXA1hZgZ3NtJlAV2+aIZ2vkhJxAeoFeVFWta3yHxRR8X0lbFzWIxZwoX/KlS9NRRhZehdl3uru6zRY1AQaqDA/oDM6/TR8x9///k0PmozN+9m0TLChzLi3j2S3th6hWUJIYQprxgi7f5puv/IWGtSlhH4SDDYi5KYWsyarF6C4ujjc+/VxvaTzfM07dp6tuFKOuAwnRUKK2mA4EySupcpfBScz03R2U4q0Y20anqyCvTdP6CndEyncSN07qVEdbcdE8e6QG3ct6+DGVF+40O7qQa7LoBuvjIxjNSfACpRmsywZLZgjqtbaL55qQWKeTr3B/mVWwROVsBj5qqb/h5O9ItuSBl38Anof0=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <6F700B5A7DBC23479AB134F9A926DFBE@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: cd47cafd-c64d-445c-4bb1-08d65b99864c
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Dec 2018 16:40:26.0149 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4588
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-06_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812060142
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/sHrxU_KwF8FT7Nyc2M-_M1GywdM>
Subject: Re: [Netconf]  =?utf-8?q?Mirja_K=C3=BChlewind=27s_No_Objection_on_dra?= =?utf-8?q?ft-ietf-netconf-zerotouch-25=3A_=28with_COMMENT=29?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 16:40:34 -0000
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==


From nobody Thu Dec  6 09:25:03 2018
Return-Path: <ietf@kuehlewind.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75037130E81; Thu,  6 Dec 2018 09:25:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X7f86UzklBnc; Thu,  6 Dec 2018 09:24:57 -0800 (PST)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E8BC128CF3; Thu,  6 Dec 2018 09:24:57 -0800 (PST)
Received: from [2001:67c:10ec:5785:8000::430] (helo=ict-networks-2001-067c-10ec-5785-8000-0000-0000-0430.fwd-v6.ethz.ch); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1gUxOQ-0002db-A7; Thu, 06 Dec 2018 18:24:54 +0100
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <A2E1042D-7543-424A-8E4F-AC7AD6732A1F@juniper.net>
Date: Thu, 6 Dec 2018 18:24:52 +0100
Cc: "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, The IESG <iesg@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <D0364247-B75F-49F3-8DA9-24AD7F007CB2@kuehlewind.net>
References: <154360369395.27402.18143504350346119719.idtracker@ietfa.amsl.com> <B0AF8548-5434-4A25-8D61-D80F6CB57FF6@juniper.net> <9964AC41-9B1E-4348-94C8-C9CED80D9147@kuehlewind.net> <A2E1042D-7543-424A-8E4F-AC7AD6732A1F@juniper.net>
To: Kent Watsen <kwatsen@juniper.net>
X-Mailer: Apple Mail (2.3445.9.1)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1544117097;92c00fcb;
X-HE-SMSGID: 1gUxOQ-0002db-A7
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/jDSHP-t_wZWqfJbvbK_xqd4M960>
Subject: Re: [Netconf]  =?utf-8?q?Mirja_K=C3=BChlewind=27s_No_Objection_on_dra?= =?utf-8?q?ft-ietf-netconf-zerotouch-25=3A_=28with_COMMENT=29?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 17:25:01 -0000

Hi Kent,

sorry I didn=E2=80=99t read this as a question. However, looking at this =
again, I actually think the text is pretty clear as it is and I must =
have overlooked this on my first read. So I guess no further action =
needed. Thanks for engaging!

Mirja



> Am 06.12.2018 um 17:40 schrieb Kent Watsen <kwatsen@juniper.net>:
>=20
>=20
> Hi Mirja,
>=20
> I assume you're happy with the Github commit, but what about the =
[uncommitted] proposal to add something like ", thus ensuring all =
possible bootstrapping options are attempted before starting over." to =
the end of the text in Section 5.6 discussed below?
>=20
> Kent
>=20
>=20
>=20
> =EF=BB=BF-----Original Message-----
> From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
> Date: Thursday, December 6, 2018 at 10:49 AM
> To: Kent Watsen <kwatsen@juniper.net>
> Cc: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" =
<draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" =
<netconf-chairs@ietf.org>, NETCONF Working Group <netconf@ietf.org>
> Subject: Re: Mirja K=C3=BChlewind's No Objection on =
draft-ietf-netconf-zerotouch-25: (with COMMENT)
>=20
> Thanks! That helps!
>=20
>=20
>> Am 06.12.2018 um 02:40 schrieb Kent Watsen <kwatsen@juniper.net>:
>>=20
>> Hi Mirja,
>>=20
>> Thanks for your review!
>> Please see below for responses.
>>=20
>> Kent // principle author
>>=20
>>=20
>> =
----------------------------------------------------------------------
>> COMMENT:
>> =
----------------------------------------------------------------------
>>=20
>>> Thanks for this well-written doc.
>>>=20
>>> One quick question which wasn't fully clear to me from the text
>>> in the doc: If onboarding fails at some point, is the device
>>> supposed to iterate over another bootstrapping source or stop
>>> completely?
>>=20
>> The device is to never stop trying to bootstrap, even in case of
>> a failed attempt.  The hope is that that the device's failed
>> attempts will be noticed and rectified by an administrator of
>> the operator's orchestrator/NMS system.
>>=20
>> Checking the text to ensure this intent is conveyed, we find in
>> Section 5.3:
>>=20
>>  Otherwise, the device MUST attempt to process the onboarding
>>  information as described in Section 5.6.  In either case, success or
>>  failure, the device MUST exit the recursive algorithm, returning to
>>  the bootstrapping sequence described in Section 5.2, the only
>>  difference being in how it responds to the "Able to bootstrap from
>>  any source?" conditional described in the figure in the section.
>>=20
>> So, in your case, it is a "failure" and thus the answer to the
>> conditional is "No".  However, to your point, the current s5.2=20
>> text says "Loop and/or wait for manual provisioning", which=20
>> isn't quite right.  I have fixed this in the Github commit=20
>> link provided below.
>>=20
>> Continuing checking the text, we also find in Section 5.6:
>>=20
>>  If the device encounters an error at any step, it MUST stop
>>  processing the onboarding information and return to the =
bootstrapping
>>  sequence described in Section 5.2.  In the context of a recursive
>>  algorithm, the device MUST return to the enclosing loop, not back to
>>  the very beginning.
>>=20
>> Which I think is pretty good as is, though it might help to tack
>> onto the end of the last sentence ", thus allowing the logic to
>> attempt all possible bootstrapping options before starting over."
>> Thoughts?
>>=20
>>=20
>>=20
>>> One minor comment:
>>> Maybe spell out TPM and provide a reference.
>>=20
>> Fixed all three instances of "TPM".
>>=20
>>=20
>>=20
>> Here is the Github commit for the above changes, as well as a
>> minor/unrelated RFC4408-reference issue reported by Adam:
>>=20
>> =
https://urldefense.proofpoint.com/v2/url?u=3Dhttps-3A__github.com_netconf-=
2Dwg_zero-2Dtouch_commit_0e86ec25f0f83c49dc1ec37e2b9f20bdec874a6f&d=3DDwIF=
Ag&c=3DHAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=3D9zkP0xnJUvZGJ9EPoOH=
7Yhqn2gsBYaGTvjISlaJdcZo&m=3DtdPa_tMXTHo9_nEeMuGHsRyflARVGiqV5uz_oxwxZcg&s=
=3DIUawZTPKc9rN7G2W3eQO0S-BxaBUz8M1jWwj1GaprCI&e=3D
>>=20
>> Thoughts?
>>=20
>> Kent
>>=20
>>=20
>>=20
>>=20
>=20
>=20


From nobody Fri Dec  7 06:36:17 2018
Return-Path: <ianfarrer@gmx.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48510128CF2; Fri,  7 Dec 2018 06:36:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mX0eDbsA-fz0; Fri,  7 Dec 2018 06:36:03 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F17D1252B7; Fri,  7 Dec 2018 06:36:03 -0800 (PST)
Received: from [192.168.1.228] ([80.159.240.8]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0LcWSI-1hDifd38uE-00jrjs; Fri, 07 Dec 2018 15:35:55 +0100
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.1 \(3445.101.1\))
From: ianfarrer@gmx.com
In-Reply-To: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com>
Date: Fri, 7 Dec 2018 15:35:53 +0100
Cc: The IESG <iesg@ietf.org>, netconf-chairs@ietf.org, draft-ietf-netconf-zerotouch@ietf.org, Bert Wijnen <bwijnen@bwijnen.net>, netconf@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <959B684C-27AF-49FA-93F0-5ED675EC0D66@gmx.com>
References: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com>
To: Benjamin Kaduk <kaduk@mit.edu>
X-Mailer: Apple Mail (2.3445.101.1)
X-Provags-ID: V03:K1:jYMPq4ObG/0FqjOBvBYXUxPVB3MK3mtxtaM5rqfw8mNfr3wRVn3 qTeebSBmbFL8XaIlku6oqZsl1kMnbZ50WZuoXQtlXpntCUZ6mI0fpA+zYb51e+MW7fFyiyE sfEGKupvobEwxe7SVVMVh+bYQedMAxG8UPlFw5GJJwWo2Y5EuwBcn8zBfC6eJeMo/vgJpEO 3umQSN4Ss+D+9N8JMorfQ==
X-UI-Out-Filterresults: notjunk:1;V03:K0:QDdQNOlj9iI=:nHxAvaW9VWaoMoEXKy3jcu 474TUI/WjWgoCMvJ/nnVaoC8GGkJ22N9D9IxyG+lpUd4mGdM3ShZz2xondGZh6HyM4eXnNXTX esS8QuyYObh9atXvjGAcIWlAfUBuPu2qyWWFq6AAjjFicpNgjvcyRObRP+DDAzJMo8+PMl+y3 C2pcDyv46Pip+EOVt9hj5G0qTY65GJF87z+Z//SmxR8TOlpxRn47tyycUTqvBLeB4YjZNlM3t AljXPkwwRpRPGCvMgkvi6erYdw28MjqTZs5oVmcdMJGuNQsfPY3ADwljCB13H4oRUZlm8bXmD 7OYHH/H/wVKHQSXGvLfhU+0O2wb3uouY4IvHPUynfligqpladJOJUzcLZ+SlDqqZiBzhWSXyX mIOwB7ON/vvjHSakGU67F2nWBFMgPaS9el7Mbfwujh6yErHsUlZBxCL/XbY76HruzD6iS2w5b Ls+VGLAe68a7WzihUK/2KXl2yThHKVGXgQU6fQLIPVYLv+0C9cJXWMDxFBs9Z4ONhMktSt54q lKnr07tvf0Z3t1lo17BrVBU1uBuIho4adXWAJ63Pb4U8l794tfD7N06enBixP2QHH0Lyx4E3i EfyWBNGARxtCl8n5PRKmyDSwb+It7yR19QzNgcPlrPzYD3rerCPw4lp/X//FHhS4jXBDT+nuw vp4pqv9REinzAOkYE07TnEsU0t8NlkhWyTeUwM5pl5q1YETgx5Kbr9E15keIWf7FFUaKzx9K0 KHrHQ6IheQdYnIsGUzn9EecvsmlI8Jx9stvwOMa4OIT2X6IT5cgpHQH1rvy96ogtNun44sDSq yhntpgjPMC4VZtKZfoFMXzfQRkpkyE6qzzFgT+c8ktqToVc9Hkomt+1KpaTPMQ7EBzAUQlmXo dBGfGf9xs/uUWMTCkRgMnZYB5k2OyVWXL1h8nhddmejLyRJ17jsPCeifbEl+ki
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/NiVv4Av1L9hSqEq8YAR9VDJgD9Y>
Subject: Re: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Dec 2018 14:36:07 -0000

Hi Ben,

Thanks for the comments. Please see below, specifically regarding your
point on the DHCP section (8.1).

Thanks,
Ian

> On 4. Dec 2018, at 07:28, Benjamin Kaduk <kaduk@mit.edu> wrote:
>=20
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-netconf-zerotouch-25: Discuss
>=20
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut =
this
> introductory paragraph, however.)
>=20
>=20
> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>=20
>=20
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/
>=20
>=20
>=20
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>=20
> First off, thanks for this clear and considered document and design; =
it
> really lays out the scenario of applicability and the functionality =
quite
> well.  I just have a couple lingering places that we might want to =
nail
> down a little bit tighter...
>=20
> (1) SSH key formats
>=20
> The module in Section 7.3 says:
>=20
>           leaf-list ssh-host-key {
>             type binary;
>             description
>               "The binary public key data for this SSH key, as
>                specified by RFC 4253, Section 6.6, i.e.:
>=20
>                  string    certificate or public key format
>                            identifier
>                  byte[n]   key/certificate data.";
>             reference
>               "RFC 4253: The Secure Shell (SSH) Transport Layer
>                          Protocol";
>=20
> but RFC 4523 Section 6.6 says:
>=20
>   The key type MUST always be explicitly known (from algorithm
>   negotiation or some other source).  It is not normally included in
>   the key blob.
>=20
>   Certificates and public keys are encoded as follows:
>=20
>      string    certificate or public key format identifier
>      byte[n]   key/certificate data
>=20
> How is the key type known for the SZTP usage?
>=20
> (2) Privilege escalation by design
>=20
> There's text in Section 2.1 (and, really, throughout) that indicates =
that a
> device being boostrap should allow a trusted bootstrap server to =
behave as
> (i.e., supply) a trust anchor for verifying a different service.  In =
some
> sense this is elevating an EE cert to a CA cert, and I had hoped to =
see
> some discussion of this escalation in the security considerations.  =
(Same
> for the owner cert, though there's a stronger argument that the owner
> should be considered fully privileged here.)
>=20
> (3) Nonce length
>=20
> Section 7.3 describes the nonce leaf:
>=20
>         leaf nonce {
>           type binary {
>             length "8..32";
>=20
> There is probably some discussion to be had about the minimum nonce =
length
> (not necessarily in the document itself).  Do you have a pointer handy =
to
> previous disucsions or do we need to have it now?
> (I do see that this is just following RFC 8366, so hopefully this is =
an
> easy question.)
>=20
> (4) OPTION_V4_ZEROTOUCH_REDIRECT repeated instances
>=20
> (In Section 8.1.)
>=20
> I think I may just be misunderstanding things here, but aren't
>=20
>   As the list of URIs may exceed the maximum allowed length of a =
single
>   DHCPv4 option (255 octets), the client MUST implement [RFC3396],
>   allowing the URI list to be split across a number of
>   OPTION_V4_ZEROTOUCH_REDIRECT option instances.
>=20
> and
>=20
>   The DHCPv4 server MAY include a single instance of Option
>   OPTION_V4_ZEROTOUCH_REDIRECT in DHCP messages it sends.  Servers =
MUST
>   NOT send more than one instance of the OPTION_V4_ZEROTOUCH_REDIRECT
>   option.
>=20
> in conflict about sending more than one instance of
> OPTION_V4_ZEROTOUCH_REDIRECT?
>=20


[if - Yes, the current text is not consistent between client and server. =
I propose
replacing the server paragraph with the following:

          The server=E2=80=99s DHCP message MUST contain only a single =
instance of the
          OPTION_V4_ZEROTOUCH_REDIRECT=E2=80=99s =
'bootstrap-server-list=E2=80=99
          field. However, the list of URIs in this field may exceed the =
maximum
          allowed length of a single DHCPv4 option (per [RFC3396]).

          If the length of 'bootstrap-server-list=E2=80=99 is small =
enough to fit into
          a single instance of OPTION_V4_ZEROTOUCH_REDIRECT,  the server =
MUST NOT
          send more than one instance of this option.

          If the length of the 'bootstrap-server-list=E2=80=99 field is =
too large to
          fit into a single option, then OPTION_V4_ZEROTOUCH_REDIRECT =
MUST be
          split into multiple instances of the option according to the =
process
          described in [RFC3396].
]


> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>=20
> Should we consider recommending AuthEnvelopedData throughout instead =
of
> just EnvelopedData?
>=20
> TLS and CMS are probably good enough about adding context in their
> signatures (well, provided modern versions are used) that we don't get =
too
> much heartburn about reusing the same key directly for both zerotouch
> decryption and TLS client certificates, but it's generally the sort of
> thing that we frown upon.
>=20
> I a little bit wonder if we want references for TLS and/or HTTP client
> authentication.  Section 2.5 of RFC 8040 might be enough (though it is =
of
> course not citing TLS 1.3).
>=20
> (Are there generic RESTCONF internationalization considerations?  I =
see
> 8040 say "just use UTF-8", but is more needed?)
>=20
> Section 1.2
>=20
>   Network Management System (NMS):  The acronym "NMS" is used
>       throughout this document to refer to the deployment specific
>=20
> nit: deployment-specific (with hyphen)
>=20
> Section 2.1
>=20
> Does RFC 8340 require a "ro" (or similar) to appear in the tree =
diagram?
> (Both here and in =C2=A72.2.)
>=20
> Section 3.2
>=20
> Do we want to impose any ordering requirements on the certificate =
chain
> (e.g., owner cert must come first, each cert SHOULD certify the one
> immediately prior to it, etc.)?
>=20
> Section 3.4
>=20
> Thank you for including the motivating text about sign-then-encrypt.  =
I do
> wonder if it's worth saying anything about why the well-publicised =
security
> risks of mac-then-encrypt do not apply.  (The authors of
> draft-campbell-sip-messaging-smime probably already have some text =
that
> could be used, but it doesn't seem to be in the public view yet.)
>=20
> Section 4.1
>=20
> Mounting all filesystems found on removable devices can be a security =
risk,
> with intentionally malformed filesystem images causing system =
compromise in
> some cases.
>=20
> Section 4.2
>=20
> I agree with Adam about registering "zerotouch" (and the name is =
perhaps
> overly generic?).
>=20
> I'm also not sure I properly understand the "zt-info"/zt-* TXT =
records'
> usage; would they need to be registered akin to
> draft-moonesamy-dnsop-special-use-label-registry?
>=20
> Section 5.3
>=20
> This is the first time we talk about "serial number" as device =
identity;
> maybe a forward-reference is in order?
>=20
> Does the device have any reason to track whether the incoming artifact =
is
> encrypted (whether at the CMS layer or the transport layer)?  I can't =
think
> of one, but sometimes this is useful information in other settings.
>=20
>   If the zero touch information artifact contains onboarding
>   information, and trust-state is FALSE, the device MUST exit the
>   recursive algorithm (as this is not allowed, see the figure above),
>   returning to the bootstrapping sequence described in Section 5.2.
>   Otherwise, the device MUST attempt to process the onboarding
>   information as described in Section 5.6.  In either case, success or
>   failure, the device MUST exit the recursive algorithm, returning to
>   the bootstrapping sequence described in Section 5.2, the only
>   difference being in how it responds to the "Able to bootstrap from
>   any source?" conditional described in the figure in the section.
>=20
> Does this "either case" refer to just the processing of onboarding
> information, or the exit vs. attempt to process cases?  (I assume the
> former, but perhaps some editorial work is in order.)
>=20
>   If the zero touch information artifact is signed, and the device is
>   able to validate the signed data using the algorithm described in
>   Section 5.4, then the device MUST set trust-state to TRUE; =
otherwise,
>   if the device is unable to validate the signed data, the device MUST
>   set trust-state to FALSE.  Note, this is worded to cover the special
>   case when signed data is returned even from a trusted bootstrap
>   server.
>=20
> Having read Section 5.4, I'm still unsure where the special handling =
for
> this special case is described.
>=20
> Section 5.5
>=20
>   Processing redirect information is straightforward, the device
>   sequentially steps through the list of provided bootstrap servers
>   until it can find one it can bootstrap from.
>=20
> nit: I think this is a comma splice.
>=20
> Section 5.6
>=20
>                                                Regardless the
>   reporting-level indicated by the bootstrap server, the device MAY
>   send progress reports beyond the mandatory ones specified for the
>   given reporting level.
>=20
> nit: "Regardless of"
>=20
>   When the onboarding information is obtained from an untrusted
>   bootstrap server, the device MUST NOT send any progress reports to
>   the bootstrap server.
>=20
> I'm not sure if I would want a parenthetical "(that is, the onboarding
> information was authenticated at the CMS layer)", but I would think =
about
> adding one.
>=20
>   The device MUST parse the provided onboarding information document,
>   to extract values used in subsequent steps.  Whether using a stream-
>   based parser or not, if there is an error when parsing the =
onboarding
>=20
> This line makes me consider the scenario where a stream-based parser =
is
> used with a trusted bootstrap server and no CMS-layer signature.  At =
the
> TLS layer, a truncation attack by the network is possible, and if
> truncation is not detectable at the application layer, the device =
could end
> up misconfigured with neither party aware (unless there's an =
additional
> response or something that I'm forgetting about).  I think that for =
the XML
> and JSON formats we know and love, truncation would make for a =
malformed
> stream due to the outermost scope container, but please correct me if =
I'm
> wrong.  There are probably some security considerations to mention =
w.r.t.
> any future new encodings of this data model, though.
>=20
>      *  Most steps are atomic.  For instance, when a commit fails, it
>         is expected to have no impact on the configuration.  =
Similarly,
>         if the error occurs when executing a script, the script will
>         gracefully exit.
>=20
> As a reader it's hard to tell if this is giving guidance to script =
authors
> or consumers.
>=20
> Section 6.2
>=20
> "base64encodedvalue=3D=3D" is pretty cute, though maybe we could add =
some
> trailing numbers to provide different values for the different fields?
>=20
> Section 6.3
>=20
> The YANG module boilerplate is still on the RFC 2119 version of BCP 14 =
(not
> RFC 8174).
>=20
> Section 7.2
>=20
> If we're going to say "and receives signed data in the response", =
maybe we
> could actually give an example that shows the (base64'd) CMS structure =
that
> corresponds to the signature?  Not necessarily the whole payload, but
> enough to see the outer structure at least...
>=20
> Section 7.3
>=20
> The YANG module boilerplate is still on the RFC 2119 version of BCP 14 =
(not
> RFC 8174).
>=20
>             enum "boot-image-installed-rebooting" {
>               description
>                 "Indicates that the device successfully installed
>                  a new boot image and is about to reboot.  After
>                  sending this progress type, the device is not
>                  expected to access the bootstrap server again.";
>=20
> Is this just scoped to the current connection/session?
> (As opposed to "bootstrap-complete", which probably is a global =
statement.)
>=20
>   container trust-anchor-certs {
>   [...]
>               The CMS MUST contain only a single chain of
>               certificates.  The device's end-entity certificate
>               MUST only authenticate to last intermediate CA
>               certificate listed in the chain.
>=20
> I'm not sure whether "authenticate to" means that the CA cert directly
> certifies or is the trust anchor.  Could we maybe use language like
> "directly certifies the [next|previous]" certificate?
>=20
> Also, the split of references of RFC 6187 for trust-anchor-certs but =
RFCs
> 5280 and 5652 for trust-anchor-cert seems unusual, since potentially =
all
> three would be relevant for both nodes, if I understand correctly.
>=20
> Section 9.1
>=20
> At this point draft-ietf-ntp-using-nts-for-ntp exists, though I don't =
know
> whether it's appropriate to be citing it yet.
>=20
> Section 9.6
>=20
> There is perhaps some room for discussion of the consequences of the =
device
> telling the bootstrapping server whether the device thinks the =
connection
> is trusted, in that it gives an attacker information about the target.
> (Granted, it does not seem like much information, but it might be =
cleaner
> to define the semantics of the node as being whether the client would =
like
> the server to sign its responses at the application layer, which need =
not
> have complete overlap with whether the client considers the server to =
be
> trusted.
>=20
> Section 9.8
>=20
> Does recommending frequent private key refreshes actually help in
> environments where revocation is unusable (i.e., by virtue of not =
having
> reliable time)?  (If not, perhaps that caveat should be more explicit =
here,
> even though it is mentioned in Section 9.1 already.)
>=20
> Section 9.10
>=20
> I would suggest also mentioning the (lack of) mitigations possible if =
the
> operator does not trust all the pre-configured authorities designated =
by
> the manufacturers.
>=20
> Section 9.11
>=20
>      revealing (e.g., network topology, firewall policies, etc.).  It
>      is RECOMMENDED that operators encrypt the bootstrapping data when
>      its contents are considered sensitive, even to the administrators
>      of a bootstrap server.
>=20
> I don't understand what is meant by "even to the administrators of a
> bootstrap server"?
>=20
> Section 9.12
>=20
> nit: the last word is "revoked".
>=20
> Section 9.13
>=20
>   Implementations should be aware that signed bootstrapping data only
>   protects the data from modification, the contents are still visible
>   to others.  [...]
>=20
> nit: this is a comma splice
>=20
>                                                         This
>   information should be considered sensitive and precautions should be
>   taken to protect it (e.g., encrypt artifact with device public key).
>=20
> nit: I think it's more conventional to "encrypt to" a public key than
> "encrypt with" one.
>=20
> Section C.3
>=20
> We could perhaps recommend ecdsa-sha2-* keys instead of ssh-rsa keys.
>=20
>   4.  Otherwise, if redirect information is found, the device iterates
>       through the list of specified bootstrap servers, checking to see
>       if it has bootstrapping data for the device.  [...]
>=20
> The "it" is perhaps ambiguous; I would suggest "each server in turn".
>=20
>=20
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf


From nobody Fri Dec  7 10:03:52 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 167A3130EA2 for <netconf@ietfa.amsl.com>; Fri,  7 Dec 2018 10:03:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.161
X-Spam-Level: 
X-Spam-Status: No, score=-2.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ijZOAxn690mu for <netconf@ietfa.amsl.com>; Fri,  7 Dec 2018 10:03:48 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 006301277D2 for <netconf@ietf.org>; Fri,  7 Dec 2018 10:03:47 -0800 (PST)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB7HwtIB008317; Fri, 7 Dec 2018 10:03:47 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=ZnXW/W6DMi2M0Gqp59jRB/tUzX7g7VfkSlGot7auUFY=; b=V6K7kB4KdKjqGQL10MW+h6Yvucp73/UwTR0LxQpHZ7EeDRrDH1HfbCN8t1WKS5g8IHIT RxrZtCSj9LyNeTUbLJz1eDQ0O6mxraIOYidSeU03/kpDOif6SrYNji28Ar9SzO0VgfqT YNL3VhYPHVxX541+DNjty1uo4kNJE6skg5n45CO1itGoKtsanNiRCvj2Hluq4GbrIX1L PHQhl2kNfdU5LzbsqVeAS/8Z99iRWAdFG1TvaJWfV/PnwZfzd8kOI385V2q5MswAwIq9 dr7GCs91Xxy9uuzzhllvK3+/OSPw9KR98PFFba42DBk1b8Edw2/VDI8s9KRgufbS2oeE gQ== 
Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2052.outbound.protection.outlook.com [104.47.36.52]) by mx0a-00273201.pphosted.com with ESMTP id 2p7vsw03ur-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 07 Dec 2018 10:03:46 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4603.namprd05.prod.outlook.com (20.176.109.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.8; Fri, 7 Dec 2018 18:03:44 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1404.021; Fri, 7 Dec 2018 18:03:44 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: "Dhanapal, Ramkumar (Nokia - IN/Chennai)" <ramkumar.dhanapal@nokia.com>
CC: "Carey, Timothy (Nokia - US)" <timothy.carey@nokia.com>, "Beauville, Yves (Nokia - BE/Antwerp)" <yves.beauville@nokia.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Comments on draft-ietf-netconf-keystore-07
Thread-Index: AdSNTY3WYTbcD2eSQECPpWnErs7VugA37n6A
Date: Fri, 7 Dec 2018 18:03:44 +0000
Message-ID: <22659F26-AF4C-46AB-BC03-359E1D0C5E89@juniper.net>
References: <DB7PR07MB49535839F84D99D318D4D921F8A90@DB7PR07MB4953.eurprd07.prod.outlook.com>
In-Reply-To: <DB7PR07MB49535839F84D99D318D4D921F8A90@DB7PR07MB4953.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4603; 6:Wf+6JEhn5T4ER4frGGzITtkFSxIXd2RcMH7zUFo9tKMerqPffkmt/DhBIOBL+abywNF2mTxldFLkgOjQdqrO7mPWmVFYEI19LSsw9qvCXOtyZiTDW33UK8QKAO/KbWD77deSU9aBBAe2Ec8FfPh3otXqTEsdCSdJ6NqwSbj+UdtyRziY8xixXEKEGKhYYJI+2rqgkWNa/SO51NJeTQAVVzvOsh7LfwLYDB/JzQ8uWXrO5rm2/NpqlxCh+1z8/MAqgslptLUfevLymXYRQfSsVSJqoDHixD9W68P8rV7lIQruvpuQiYeJzxeSXjQUYGRcYC5QJ2AmG2LREg3ODs7yMjxV1Z3MS6sEz7YgxiPOvGFsnc6cZTzDL4S+626ACm+fwTnB2dlm928X72KYCbzZ/FmxtaNZSvA6cXZFYM8mvB7DJ8LWYfId1DswwdbKGO7Q5yx2bsWEIyjIYEWwyBYi5A==; 5:tyEDmMBZymQb7Fu5WO+N8SXTZOW2d+IDJjkkNtWVkZnZRl6AobtzLj4tskUBE45bjKrsoATwgXQzakIgpkPHdLOgh6P/qeTfor6uKEZe4Q4Qq08wo92R6guUa0JagOE8NTB4Tuk6XiByjCaDLQfHrps5qsO2DvDIpAvoV4M81bk=; 7:eKSFMlNwhb+K/VCn4Rga1xk8Kfkn/JZJuRX521AGnazmuGV5S6rMeQ326AdQFY3aN6u/WzauZ4ezt7HpeumDHpZTWuyirq6r31oL6oIE461s9FP4GqMd0EUAVcQBShkHxc1iyS8aqsJ04+ECJTREjw==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: a98669bc-7860-44bf-b4b6-08d65c6e53ed
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4603; 
x-ms-traffictypediagnostic: DM6PR05MB4603:
x-microsoft-antispam-prvs: <DM6PR05MB46036460AC18E244936F6B6AA5AA0@DM6PR05MB4603.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231455)(999002)(944501520)(52105112)(93006095)(93001095)(3002001)(10201501046)(6055026)(148016)(149066)(150057)(6041310)(20161123564045)(20161123560045)(20161123558120)(20161123562045)(201703131423095)(201703031522075)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4603; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4603; 
x-forefront-prvs: 0879599414
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(376002)(346002)(366004)(396003)(136003)(199004)(189003)(14454004)(575784001)(99286004)(86362001)(106356001)(76176011)(105586002)(6506007)(53546011)(186003)(14444005)(256004)(102836004)(26005)(316002)(58126008)(11346002)(446003)(54906003)(3846002)(296002)(476003)(6246003)(33656002)(486006)(2616005)(6512007)(54896002)(6306002)(6116002)(790700001)(82746002)(236005)(25786009)(53936002)(2906002)(68736007)(7736002)(6436002)(5660300001)(36756003)(6486002)(6916009)(9326002)(71200400001)(229853002)(4326008)(8676002)(66066001)(8936002)(97736004)(71190400001)(81166006)(966005)(81156014)(83716004)(478600001)(606006); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4603; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: SmrP8tgg+M40Rv67m5sjCEH+xB2xm1YQx8vxklRbHkldHhzKoCWKTEwyjyiMQ+H0/ydsP6tl4T+Z7g5sLHOwQqQlXUDEMM3Z3jaMUE1Bymwt7NMrIbVVvjvEXkqjDSYymWgZOi0gWXFPFe970vV/7YXR7opl6i4Hq1CzEOFf484NyDVGnuwcr8m1hMAdqhAeyzGcZiLxmPhFNvtEFeHxYEr2728VQFYBlPhEYy435zzKT8qLFWkzdPN0xSVcHHsASC/nIlIsGGVyYD1Y3Bzc62xl8WtNNAM8qXZ9Jc1OmBGWDdse8cXJK1pK9H564+zsx/yvlyyH+QjtecEuul4b581wbRvrxLy3o/6r1oZs7I4=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_22659F26AF4C46ABBC03359E1D0C5E89junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: a98669bc-7860-44bf-b4b6-08d65c6e53ed
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Dec 2018 18:03:44.2967 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4603
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-07_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812070145
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Hg2-As6TwAl8o77t8gfAO95G2K0>
Subject: Re: [Netconf] Comments on draft-ietf-netconf-keystore-07
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Dec 2018 18:03:51 -0000

--_000_22659F26AF4C46ABBC03359E1D0C5E89junipernet_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_22659F26AF4C46ABBC03359E1D0C5E89junipernet_
Content-Type: text/html; charset="utf-8"
Content-ID: <5DA1D7E15E3F754B9A175EF967080C5C@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
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==

--_000_22659F26AF4C46ABBC03359E1D0C5E89junipernet_--


From nobody Fri Dec  7 18:46:24 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAD18131088; Fri,  7 Dec 2018 18:46:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.16
X-Spam-Level: 
X-Spam-Status: No, score=-4.16 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S0YGF4h8fU2l; Fri,  7 Dec 2018 18:46:17 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17BC0131072; Fri,  7 Dec 2018 18:46:17 -0800 (PST)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB82jFv2020448; Fri, 7 Dec 2018 18:46:16 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=56mC0hVP9+oo8w0x0ozTet184RlNEC+7oqe8bEziJ00=; b=mVL1Ze8KVeGJFvForGz9uneOEy8aw7lVtsnMFIR/fDCPm1dsKVI5RVs685le7Aa7uouM LBeRManq3ab4X3rwr/h+iSd/HC9/EUZ+dy33bZp2l8phkCW7cVp5U6RjWTU+vh0Ppa54 +WJ7XBZn9wE6AVsI8o/9xwXlV1d+IiELty6HKeUTqWT2gJpWTUBRlXk5rEb3EoRsYlQ/ At1MEtex8DUzJzi0z9gxBUkrxChsNNiXp1g8Mi+UXf8KCGXY9kYBwO3juUMuIR/inxkh 1zLwKFkFfOn/TPzBRCHRlmXxuuB/UMBCNiOJHPG7WidTngrSARBQnhoNIANXmowAQWNq cg== 
Received: from nam02-bl2-obe.outbound.protection.outlook.com (mail-bl2nam02lp2057.outbound.protection.outlook.com [104.47.38.57]) by mx0a-00273201.pphosted.com with ESMTP id 2p81wpg9db-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 07 Dec 2018 18:46:15 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4124.namprd05.prod.outlook.com (20.176.72.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.8; Sat, 8 Dec 2018 02:46:11 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.010; Sat, 8 Dec 2018 02:46:11 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUi5qky69pAtgeuk6GIUpsNSYi7qVz1VIA
Date: Sat, 8 Dec 2018 02:46:11 +0000
Message-ID: <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net>
References: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com>
In-Reply-To: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4124; 6:CoReXSerTbcwN4aC2S3v2V4lJ8lxOT9axb1szS+iiP2yypsBrPdoHVYxGhn9cslRzljPB91SMcnPa+8VqwK4kh+C5AltGvJsLHdeA2S/UWgKNE3gL11EFE96JjNGTQsyL8EaSh8Vo0842WwfSv6mma4aD+X0A2zrPv6sasHsBGrADxfeE1xQ51c5YQg7HgAbxcd8Aos9peqZFTKVWDbJOpAZ8ILUERmOqntwrPjjNjfjvtWmQpchAVP1ZMkQqe3Dy7cLmoevFGz59KwNzGRhaQbGZUKKaQWYpbawCmdOH1JW03oY+WGweDFSIpxXHJPxgOblTXmfmhFYUjHkKnE2Oak4nclKGeCjeyN7mFMU3jRAZ+/e5GCyvsDW8bUne/nlv8LKGVHXHCsG8EBu2YEvIsVJdjH+i10eYh/LdME9NxULznoLHu1J2GqkQOpSRLny2K09JVcgzgIHTJMozy9qaQ==; 5:0Fne7C/yFvBc7zpfUcP0E6ZcIzg+TjhBFnlz1XzSxQAOsQJ2PCP0DxpD3eptBvjiTSbBoAokFtsx4paOkbcQAReVQF16euRdoMFnIkoS6e4tM8Z/7wYOz5V/Oe2gIhQvcSxkMDniWXwKILOsz+txB49ZiZ14dLXTE/hLFspk4bM=; 7:BPAG4b208qc9SAVOh7ow0cZXgbyct/nNXh7+azgIIxWWPXS8pdXYteHmRKJxx9XsEYQw1V3XTqdTNZ8dl+NKZ6zBsEw0v+wThWhyuv8VOxJcMv3zO+uUljNtIAfXp3rvxsvsDppOI2TSMOpKAC+C6w==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b411f0e5-ba82-4443-4810-08d65cb75044
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4124; 
x-ms-traffictypediagnostic: DM6PR05MB4124:
x-microsoft-antispam-prvs: <DM6PR05MB41240192083E278976CC31CBA5AB0@DM6PR05MB4124.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3231455)(999002)(944501520)(4982022)(52105112)(93006095)(93001095)(3002001)(10201501046)(6055026)(148016)(149066)(150057)(6041310)(20161123564045)(20161123560045)(20161123558120)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4124; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4124; 
x-forefront-prvs: 0880FB6EC1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(366004)(396003)(376002)(136003)(346002)(199004)(189003)(40224003)(51444003)(36756003)(14444005)(256004)(8676002)(6486002)(66066001)(966005)(82746002)(486006)(6436002)(102836004)(86362001)(446003)(476003)(2616005)(11346002)(5660300001)(2906002)(478600001)(33656002)(6506007)(81156014)(76176011)(3846002)(6116002)(14454004)(81166006)(229853002)(8936002)(99286004)(7736002)(6246003)(345774005)(53936002)(2171002)(106356001)(58126008)(305945005)(25786009)(53946003)(6306002)(54906003)(105586002)(26005)(68736007)(110136005)(97736004)(71200400001)(186003)(71190400001)(316002)(6512007)(4326008)(4744004)(83716004)(559001)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4124; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 2diGnNjIU6HLWVmC9Uc/sqKI0UN8PeaOJ8dAZXZT8OWZSfQ7tGmDXecv9klVY1Xwfchp9e7f8XdxEwZ1/aXOn869NGTgt4CHi1kEjnoionhw5hWtg+FH/lAxuyBiZ6ovajNCVTadyW2JrhantNljsniTuwQ9jrNey6j4g4TV1f+E3YdTbpzFSB+yucp8CudmTauDXQ+69o8l26bciHkXnmqig6Y93OuKrUOCQkpmK7HsAhDYwyo7M5OlXfO9yfoUgp922Gr7g8+5iA6T9HlqkAKAvrL8pt9+iHMMgqYMaEe4m9J/jpzQxOhtWCZV/2hXcB/RJmiIDG1y/sOpPE9DtN80JhmUVzxzfJwpZAe2QeI=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <51FF099A913F004899113F4AA259FE74@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: b411f0e5-ba82-4443-4810-08d65cb75044
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Dec 2018 02:46:11.3675 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4124
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-08_01:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812080023
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/19dsWCAijlk-4TWZPpKaZoeYzF8>
Subject: Re: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Dec 2018 02:46:22 -0000
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=


From nobody Mon Dec 10 13:34:41 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2315A130F41; Mon, 10 Dec 2018 13:34:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level: 
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kwCYmUU5_mSx; Mon, 10 Dec 2018 13:34:38 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 212FD131224; Mon, 10 Dec 2018 13:34:38 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBALXjl4016754; Mon, 10 Dec 2018 13:34:37 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=VxTK5hAw+4tWvQjJ+Sp2fZethoC66Caws/Am/tFNmVw=; b=EZRKFeKzSxEhBTWRKlL+iGKUAQyfDUQ8KDmoY3NSDmBS0s95NaACLpeU899zwrwpKskx hh5Hf4abYzZHTcc4GPXe+VeCDG2emGqbgJyretfxxXqlMuEdb0Mrvfpim3l5Hw0I8q0t QAdY/jjcuDLPjhqmCPAf1XQ0rcc5kq2UpuJFUCgOw6KmpRo/z2hESUJZQ3h89xpqh1Hi Ual8Hh5kLcpZ8eRaJLHZYjINjfFnWL2ZQ5DV6K4edeijqHflQXSVmC9E3bqfQDJLkLsU 3fQNE4hpdlg0+O3ZtPZhvsW9Tl6O5OTsIiFLd724Om6Jf7RXYkr8SF4ca/W/Uj8BfA/q Gw== 
Received: from nam01-by2-obe.outbound.protection.outlook.com (mail-by2nam01lp2053.outbound.protection.outlook.com [104.47.34.53]) by mx0b-00273201.pphosted.com with ESMTP id 2p9swtgqvr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 10 Dec 2018 13:34:37 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB6332.namprd05.prod.outlook.com (20.178.224.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.9; Mon, 10 Dec 2018 21:34:35 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.016; Mon, 10 Dec 2018 21:34:35 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUi5qky69pAtgeuk6GIUpsNSYi7qVz1VIAgARf7wA=
Date: Mon, 10 Dec 2018 21:34:34 +0000
Message-ID: <CFE18196-AC39-4BF7-94A9-98AA6ADCAEAB@juniper.net>
References: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com> <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net>
In-Reply-To: <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB6332; 6:KsDdHYWsbABOkdPJxwqvNpglTmRp9xQT7jnIh0OuREO7cnEkNxkpMpuebO9rVosI5YBCF7OPR6cl5+l7GaoNSXopHpu6M4fxKdEOgYsJ/lN6DBjzpm45ze9JXuXLs3VqoxL22MC7EpquGjtrbV2sypm/SimLO1i5dfZWM3KqsWK7BEujhisbmKMt8LjhUq/2z2njLUlBJQ6lYJlB4KEBQFKyV3p4QlFZVrJdvAIvfPK3H/EsM7Pldfigu7ffItN5vbWm3To8NLZHMBqHrkZ704Iq74fdm3pN0laSQzgB4GbR1Dl8/UwQ9jffw2z7eBWEglljSgOeDMsHHrGau+ThGolWvvMLTTBbsMm7oVopREbzl+DspWygOwlmn2BMd1aQX4aX3sv4iriZfcO/67iQ32tQ+9Q4lNlZZCRTBx1a9veXmEpXhIaAgYz6iXMGs7U/jaHzxnZVvctoVChE5EV2Bg==; 5:o8m1HlWUJNQTgKbgHJwkuqCCyNv1qtPssY2+/fS3kDBsj/oWqod+NMb2YGnl75kWOQpsZlZyocG/vlWZQmseJLSzM0Dh2A+UQScnqFdkXqRpIrOVpGSny7B9aY1jCV+NAs0zMQg3px1FM2yev9ZUhl38zBIcNrKgPMmaVVRQpeY=; 7:LirehB/NhYLRbTVp5WvM7Q0VQ01e9hyyMsCn7A/EjlXa03IdbPN8YQ8yXh9oSvFxCPMKfO8vBie6a4q6HJW/NKD0WlOhd8/o60+8XqAi1hHjnY6wYuJaK/n2cTiAHnE4uHMPMISU4Du4rFXoCz0n8w==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: cf3371bd-ae84-4a0b-e896-08d65ee7479e
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB6332; 
x-ms-traffictypediagnostic: DM6PR05MB6332:
x-microsoft-antispam-prvs: <DM6PR05MB6332D3C00180FF8D3AE8601EA5A50@DM6PR05MB6332.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230017)(999002)(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231472)(944501520)(52105112)(10201501046)(3002001)(6055026)(148016)(149066)(150057)(6041310)(20161123562045)(20161123564045)(20161123560045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB6332; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB6332; 
x-forefront-prvs: 08828D20BC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(366004)(396003)(39860400002)(136003)(199004)(189003)(6506007)(26005)(66066001)(2906002)(76176011)(83716004)(102836004)(54906003)(71190400001)(11346002)(110136005)(6246003)(82746002)(446003)(2171002)(14454004)(71200400001)(186003)(36756003)(6436002)(305945005)(99286004)(6116002)(7736002)(3846002)(68736007)(256004)(6486002)(5660300001)(8936002)(316002)(478600001)(6512007)(8676002)(86362001)(53936002)(97736004)(81156014)(476003)(486006)(81166006)(58126008)(2616005)(33656002)(105586002)(106356001)(229853002)(25786009)(4326008); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB6332; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 64WgHEnXDFXg65zRgs8n6hJ6QAv3C+HLMwMApqNTOKe/aiGaq0SNezQgw6lKWPsah2cCfPOryAxCj7aFm7nXZ2a6WpbZMzOfEwurL00x141qwAUs5VRI/w4XioJAVqLI0Re1tYbaoCxTRxmjTuDMhy/u3V7HTS4ifIjj78ntRbRQJohboL6djYtzNaQXCt99ewPSCyMDW8gqP1kqF1h39iMBL9xlbQDRC65TA6YWulZyGNvpLEZv49b+pXl4h6fS+HAzUgMasJkASy5ot09xbfiXoXUQLJHDd6SHFSnNmGOBrz3MTiwOPW+gTk+ke6RA
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <66617E8461FEAC449895F4658BBE48B4@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: cf3371bd-ae84-4a0b-e896-08d65ee7479e
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Dec 2018 21:34:35.0676 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB6332
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-10_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=833 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812100192
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/p56tMPxd_exMSVlwkh2u1FcBR_g>
Subject: Re: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Dec 2018 21:34:40 -0000
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From nobody Mon Dec 10 15:04:14 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEE0F1312F7; Mon, 10 Dec 2018 15:04:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.16
X-Spam-Level: 
X-Spam-Status: No, score=-4.16 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gzcKmc4yiPkI; Mon, 10 Dec 2018 15:04:02 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D05E91312F9; Mon, 10 Dec 2018 15:04:00 -0800 (PST)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBAMxEWp006161; Mon, 10 Dec 2018 15:03:57 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=qyLuN2Uenm2bKpHVvsFHLBYyTXd12W3xOiu8WhW+raI=; b=XAQr35R+cl+/AohHA7x1SR3AyVBbnYsDXXevvAAfxC8Tta9WFeA6UR8F9hJqXmp/fhw3 QMssSDwwkTNuNLwg0kqMvhlblOLpt5QI14HBNoiffmqMPjfMNzb0S5E1SQ8Vs0hmCRwT VPeojfhvy9VKrk6sccCTL/N69vu+3vbyYoF00I4zzURdVUlQFE3D5/xSGa87dPRlFd+u udKGD6p5pXdzDMn/zpZbdT99PL+HQlLLa8KN95mn8Ekn7WDiVFoRNVZOoQIRcp3sXIMD Np+tBqPOQiIcpUuPezXcwTTdBKpAa/DVhbKwIiLvBMbqfYfW0tCswa3IPe40vLy0nEaZ FA== 
Received: from nam01-bn3-obe.outbound.protection.outlook.com (mail-bn3nam01lp2058.outbound.protection.outlook.com [104.47.33.58]) by mx0b-00273201.pphosted.com with ESMTP id 2p9ukagmj3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 10 Dec 2018 15:03:57 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB5371.namprd05.prod.outlook.com (20.176.120.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.8; Mon, 10 Dec 2018 23:03:50 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.016; Mon, 10 Dec 2018 23:03:50 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Alexey Melnikov <aamelnikov@fastmail.fm>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUjMdfcgz3uvchk06pPxfK6ViltaV4S9WA
Date: Mon, 10 Dec 2018 23:03:49 +0000
Message-ID: <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net>
References: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com>
In-Reply-To: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB5371; 6:gpFIqWCL/an47Vd9+sRA/q1TVvg0Z+Px59O7J5Tf8lITDeyeKGzn2RzeSs3hsmaXD1CuhcOruTW9hRSvsHM68ym+OXvj9LMPp182bdkP5Bhi28X9nVwTm8pNsmQ4UBdSvRTw1OVDH6bMMm7dHIQ7AYNS37hYR+sUTQZbUJnrmXZdBnkEpQGp6CFcA+1M7kgikPzJLv5/VFunZXO4IH8bmoTysTXbxn9s5fBW/YFehsrAwEV2RBiNBies7B3oi9Kb6H7yBnt3MSy0Tj2uEncMQI8O+WZi+xNSBrrBsKySIEWThXzgTz88uV/+sh/ILrKvfCpyEvW3mZ2zGOC6ZL2q2KuzYsFjnpDqlX1jjl87Dd+R2XPQqhoMMkG6azLNkHzbSpTZatzG2bEXwg0hkk3FwUo+ECizk4NppmfltpmrWMdsf5qYkn7mZ/xohn36Zsf/lkOdC5gD4VgfRJq1bWKZNQ==; 5:oBwKDOcM0q56a+4dPuJDIKfznbS2Irr4pvrrusHYW2U1WTzJaZf5fuazUByA3lVfx6FXdRGsy1KuEXk070bhCMbDfzqSH1qW5nGVFnnOI6fhgxYjpjKkZ8cZjhMt4nWhDThDSUwPYpyt+SavenwV7fmJPpHLgJe5aUp+7BGgo84=; 7:XPdofCyKl92AFY9MF8TDlhbY9KLIDgUZ5AzV2p5Z2s/zwGApSgNp4enSQx4w3Ae7KryRERnOK70YgHsa1NMSupSt4PEHuwN9IvrW3U3cBYhYGqZeRCqfFAsQCko0rxZjVJpwe8gSWVdscw4HV7UUUw==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 35a9da67-baba-4f4b-cd27-08d65ef3bf64
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB5371; 
x-ms-traffictypediagnostic: DM6PR05MB5371:
x-microsoft-antispam-prvs: <DM6PR05MB537173F239E7DBD804B294DBA5A50@DM6PR05MB5371.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230017)(999002)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231472)(944501520)(52105112)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB5371; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB5371; 
x-forefront-prvs: 08828D20BC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(136003)(39860400002)(366004)(346002)(376002)(199004)(189003)(3846002)(6116002)(8936002)(33656002)(36756003)(446003)(86362001)(575784001)(8676002)(71190400001)(71200400001)(486006)(81156014)(81166006)(2616005)(11346002)(476003)(83716004)(99286004)(229853002)(66066001)(105586002)(102836004)(106356001)(26005)(186003)(76176011)(6506007)(82746002)(110136005)(54906003)(58126008)(316002)(5660300001)(6486002)(7736002)(2906002)(305945005)(6436002)(345774005)(6246003)(6306002)(6512007)(68736007)(966005)(14444005)(14454004)(256004)(53936002)(97736004)(478600001)(25786009)(4326008); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB5371; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: piyNhEa0+F/Lsicukzp1yu0ZWuXOfHOpFFL8V10MB9R/FT8bxVWdVWnX7ortGeiA5rqEumxBQT9s/3jul1eFWmbaAaaPbEIXFy4Ir2k1n3pgnkO2ULZ4FsJ05R+ri/FbZNvnDkJcZetB2D/hV41AUck/sQtJ61TdW0FJhiEWdw/yMH0wnoZMy+Q/zMxDsGKE93dDktNNATU3EMfNz5esnL3fZFtQdrvXIs3QBP9ZLUYZyjOARNaaV8gohqL8ioaRPnY4Vmzu6Pxsd18WnwnysGAgl1d0ZLcT6UpDCdQpTwlcKGAsQCBiw1znkwIvjpvo
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <EDA74B2DA5D3D4499BC1ADC51C7250AB@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 35a9da67-baba-4f4b-cd27-08d65ef3bf64
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Dec 2018 23:03:49.9461 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB5371
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-10_08:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812100206
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/BgQqONbckunohhaOSftVogwu80E>
Subject: Re: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Dec 2018 23:04:06 -0000
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From nobody Mon Dec 10 17:27:33 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 80D5F128D68; Mon, 10 Dec 2018 17:27:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level: 
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S2yYLXUihE09; Mon, 10 Dec 2018 17:27:29 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 795BC126CB6; Mon, 10 Dec 2018 17:27:29 -0800 (PST)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBB1NmUn025043; Mon, 10 Dec 2018 17:27:28 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=nPaIHzfGauEmKDlJRxuILQHWYk8tYM3dG9zjTZ6WNqY=; b=VhPBQgXZPRoNgPV2E15+BKdzDAwnUZGkiOA0I33h6LRLByaqNMKa/qlpL3C7a99y4eXh FWFk07Bx6YpgpGrO+Oj2a/Q2xX1se+xc1/wC4bR3YLRMckZ8PnpS8go0dwlEweuCJFyF SMxL7Bt5BeoeatmD7mxUVM0p8vfS4gWHtWHEpGsVGb0JOCq72zVsr8ylmXMI3BLnhgjc zX8fHhKatwVF35xwxVLfHgp2KR8BIm1CNcNLx4fTw+U1+/T0I3Ug4bnHl46fIcoFdf4b kDmb3pMGnLfoEP7TEk3Xxm7jeiRo8Ww6QbJN56LzbvaL9iCANIwXk88SDjGjjqd5knSj dw== 
Received: from nam05-co1-obe.outbound.protection.outlook.com (mail-co1nam05lp2059.outbound.protection.outlook.com [104.47.48.59]) by mx0a-00273201.pphosted.com with ESMTP id 2p9nrmsgev-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Mon, 10 Dec 2018 17:27:28 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4619.namprd05.prod.outlook.com (20.176.109.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.12; Tue, 11 Dec 2018 01:27:26 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.016; Tue, 11 Dec 2018 01:26:33 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Ben Campbell <ben@nostrum.com>, The IESG <iesg@ietf.org>
CC: "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] Ben Campbell's No Objection on draft-ietf-netconf-zerotouch-25: (with COMMENT)
Thread-Index: AQHUjST3SSYN/oShh02tzZPXCtM1H6V4cvwA
Date: Tue, 11 Dec 2018 01:26:33 +0000
Message-ID: <66441828-DECA-4575-9C14-A7D3E65553F4@juniper.net>
References: <154407429391.31910.328638998435122851.idtracker@ietfa.amsl.com>
In-Reply-To: <154407429391.31910.328638998435122851.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4619; 6:57lgVJh6Ep0oTvUYut9NJBMX0xGYXaoU+54Kl02dL6ghVlMgJqpJyjIeFFOa2CvR+0bT2PxzHFSw2IQo2MYLNo70frrjfdDZ89W/ME2Gtw8dLxwuy1qXcv2OFry0IuFD2c1RJBa9TwwknKQQo4jr0bX5igGwUF8NEjJ7kjRwXRM+Ax4u7Sx2HH7zEcyF/A/MoQgly3YSTnR+GXpi2lts+dvV9vFldhUajPzqb0Uem2GtWDMsNZHYbvYQA0LclTzJCrEU5ikTQS7gYXkMmf+MfKcKoIN2OJ7LOFy9/SalK7WX9utBP1HFvDIOuw/tggdIN0luy7FTasXlEMGitbWlRYG7a74IBj4JsIWfjH8ae8xeS3YNjEv5KHWgVNQ8KvDXY/CS50YPhQV/7r3Yt/WwEkHiixZR/xhP273GX7sP9GlheAoM2jZzTBjcCZyqiw8DnaraPIkE7RxwPHy8vMM+gA==; 5:xI56CmHeJJiQjAqFKO3IxaljCUnD8XML52pcne0HM6vApspNQ/MKvElLEx2BpB5ngXyw7kPae7M6WMh/AOkkzmBy2Qhvq7BMEfSAL9oKQ1y4Ru//eQfpkqg8KgyF7WP4zQOAdN02PBSU7jKN7d+rmChPFFc8anenCvCLrDb58ko=; 7:dou3V4zD89otsUulf3tpwc8En1emgLxIAIvnEdsf6cJViqDAWbf/bqTIKGbaYSx0nH5cE5wKhf3Q/sXsvj0VgaSSb7/joT+RJ77wdUmVXDR9SGaghmbQ+Us7ZQd0fLZTj8itQz0MfNI0/gXNOUCg6A==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: c7ad618d-fd19-47f4-66ea-08d65f07afc2
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4619; 
x-ms-traffictypediagnostic: DM6PR05MB4619:
x-microsoft-antispam-prvs: <DM6PR05MB4619B87370E534222F543312A5A60@DM6PR05MB4619.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230017)(999002)(6040522)(2401047)(5005006)(8121501046)(3002001)(93006095)(93001095)(3231472)(944501520)(52105112)(10201501046)(6055026)(148016)(149066)(150057)(6041310)(20161123562045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4619; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4619; 
x-forefront-prvs: 08831F51DC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(376002)(346002)(136003)(39860400002)(366004)(189003)(199004)(486006)(6436002)(316002)(71200400001)(14454004)(71190400001)(58126008)(229853002)(7736002)(5660300001)(476003)(2616005)(256004)(14444005)(6246003)(6506007)(8936002)(110136005)(6486002)(6116002)(3846002)(54906003)(86362001)(97736004)(2906002)(83716004)(53936002)(6512007)(25786009)(36756003)(478600001)(4326008)(82746002)(33656002)(66066001)(99286004)(68736007)(76176011)(106356001)(102836004)(11346002)(446003)(305945005)(8676002)(105586002)(81156014)(186003)(26005)(81166006); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4619; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: ML+WjNAs1hPlUK4OSoRa+qjEWWgHMzmCJyFVDhsSriveRXXnVnx1JISO/SN23MwErsf2+zij2tElmxzWpPW43QPHr2clhj11EC4HWay4ZzH+rww0CzfK1QWvOV0O7/iwQ1YGWJHHqtHzu270O93NsTcVEogtepic/asFpn66+Wut5Zoh3Y7gRYCCCKR7c7Ed3RI5302/M71ezEEQ12wYqYjNvMlTEqxgcVrUqjkIqdCy9KSauStEr5NVO/RTciZW9vHQu4FOHm1HGAJMsVyU5SGmnhMqz9hDLSS4pTVg2Gl6evA5FvP+rWtSYqbU2lwU
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <CC029408C399AF47BA485369D40FCE70@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: c7ad618d-fd19-47f4-66ea-08d65f07afc2
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Dec 2018 01:26:33.6145 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4619
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-11_01:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812110012
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/oN8XVscXXdbohGW488PYoxMYKIg>
Subject: Re: [Netconf] Ben Campbell's No Objection on draft-ietf-netconf-zerotouch-25: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Dec 2018 01:27:31 -0000

SGkgQmVuLA0KDQpUaGFua3MgZm9yIHlvdXIgcmV2aWV3IQ0KU2VlIGJlbG93IGZvciByZXNwb25z
ZXMuDQoNCktlbnQgLy8gY29hdXRob3INCg0KDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gQ09NTUVOVDoN
Cj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLQ0KPg0KPiBJIHN1cHBvcnQgQWRhbSdzIGFuZCBBbGV4ZXkncyBESVND
VVNTIHBvaW50cy4NCg0KSSd2ZSByZXNwb25kZWQgdG8gdGhlbSBib3RoIHNlcGFyYXRlbHkuDQoN
Cg0KPiDCpzEuMjogSSBoYXZlIGEgYml0IG9mIGRpc2NvbWZvcnQgaW4gaG93IHRoZSBtYW51ZmFj
dHVyZXIvb3duZXIgYnVzaW5lc3MgbW9kZWwNCj4gaXMgZW5jb2RlZCBpbnRvIHRoaXMuIEluIHBh
cnRpY3VsYXIsIGlzIHRoZXJlIGFueSBwb3NzaWJpbGl0eSBvZiBhbm9ueW1vdXMNCj4gb3duZXJz
PyBIb3cgYWJvdXQgc2Vjb25kYXJ5IG1hcmtldHMgKGkuZS4gdHJhbnNmZXIgb2YgYSBkZXZpY2Ug
YmV0d2VlbiBvd25lcnMpDQo+IHdpdGhvdXQgbWVkaWF0aW9uIGJ5IHRoZSBtYW51ZmFjdHVyZXIu
KT8gQnV0IEkgc2VlIHRoaXMgaXMgYWN0dWFsbHkgbWVudGlvbmVkDQo+IGluIHRoZSBzZWN1cml0
eSBjb25zaWRlcmF0aW9ucywgc28gSSBkb24ndCByZWFsbHkgZXhwZWN0IGEgY2hhbmdlLg0KDQpG
aXJzdCwgSSBkb24ndCBiZWxpZXZlIHRoZSBkcmFmdCBldmVyIHNheXMgdGhhdCB0aGVyZSBpcyBz
dWNoIGFuIGludGVncmF0aW9uLg0KVGhlIGRyYWZ0IGRvZXMgc2F5IHRoYXQgZGV2aWNlcyBtdXN0
IGJlIG1hbnVmYWN0dXJlZCB3aXRoIHNvbWUgZGVmYXVsdCB0cnVzdA0KYW5jaG9ycywgYnV0IHRo
ZSB0cnVzdCBhbmNob3JzIGNvdWxkIGJlIGRlbGVnYXRlZCB0byAzcmQtcGFydGllcy4gIFNpbWls
YXJseSwNCnRoZSBkcmFmdCBuZXZlciBzdGF0ZXMgaG93IHRoZSwgZS5nLCAzcmQgcGFydGllcyBj
b21lIHRvIGJlIGtub3cgKndobyogaXMgdGhlDQpyaWdodGZ1bCBvd25lciBvZiBhIGRldmljZS4g
IA0KDQpUaGF0IHNhaWQsIEkgYmVsaWV2ZSB0aGUgZG9jdW1lbnQgZG9lcyBpbXBseSB0aGlzIGFz
IGEgcG9zc2liaWxpdHksIGFzIGl0IGlzDQpieSBmYXIgdGhlIGVhc2llc3QgdG8gaW1wbGVtZW50
LCBhdCBsZWFzdCBpbml0aWFsbHksIGZvciB0aGUgbWFudWZhY3R1cmVyIHRvDQp0aGVtc2VsdmVz
IHN0YW5kLXVwIGFuIGluc3RhbmNlIG9mIGEgdHJ1c3RlZCBib290c3RyYXAgc2VydmVyIGFuZC9v
ciBhIHRydXN0ZWQNCm93bmVyc2hpcC12b3VjaGVyIGlzc3Vpbmcgc2VydmljZSBhbmQsIG9mIGNv
dXJzZSwgaW50ZWdyYXRlIGJvdGggdGhlc2UgaW50bw0Kc29tZSBiYWNrZW5kIHNhbGVzIGNoYW5u
ZWwgZGF0YWJhc2UuICANCg0KUmVnYXJkaW5nIHRyYW5zZmVyIG9mIG93bmVyc2hpcCwgdGhlIG1h
bnVmYWN0dXJlciBtYXkgaW1wbGVtZW50IHNvbWUgbWVjaGFuaXNtDQpvdXRzaWRlIHRoZSBzY29w
ZSBvZiB0aGlzIGRvY3VtZW50IHRvIGZhY2lsaXRhdGUgYSB0cmFuc2Zlci4gIFBlcmhhcHMgaXQg
Y291bGQNCmJlIG1lZGlhdGVkIGJ5IGEgc2FsZXMgcmVwcmVzZW50YXRpdmUgaW4gdGhlIGZpZWxk
LCBvciBwZXJoYXBzIHZpYSBzb21lIGFjdGlvbg0KcGVyZm9ybWVkIGJ5IHRoZSBwcmV2aW91cyBv
d25lciwgb3IgcGVyaGFwcyAoYXNzdW1pbmcgdGhlIG1hbnVmYWN0dXJlciBrZXlzIA0KIm93bmVy
c2hpcCIgb2ZmIHN1cHBvcnQgY29udHJhY3RzKSBieSB0aGUgcHJldmlvdXMgb3duZXIgZmlyc3Qg
Y2FuY2VsbGluZyANCnRoZWlyIHN1cHBvcnQgY29udHJhY3QgZm9sbG93ZWQgYnkgdGhlIHN1Y2Nl
c3NvciBvd25lciBpbml0aWF0aW5nIGEgbmV3IA0Kc3VwcG9ydCBjb250cmFjdC4NCg0KUmVnYXJk
aW5nIGFub255bWl0eSwgaXQgaXMgdW5uZWNlc3NhcnkgZm9yIHRoZSBtYW51ZmFjdHVyZXIsIG9y
IHRydXN0ZWQNCmRlbGVnYXRlcywgdG8ga25vdyB0aGUgYWN0dWFsIGlkZW50aXR5IG9mIHRoZSBy
aWdodGZ1bCBvd25lcjsgdGhleSBvbmx5DQpuZWVkIHRvIGVuc3VyZSB0aGF0IHRoZSByaWdodGZ1
bCBvd25lciBjYW4gY2xhaW0gb3duZXJzaGlwIHVuYW1iaWd1b3VzbHkuDQpUaGlua2luZyBvdXQg
bG91ZCBoZXJlLCBwZXJoYXBzLCBhdCB0aGUgdGltZSBvZiBzYWxlLCB0aGUgb3duZXIgaXMgDQpw
cm92aWRlZCBhIHNvbWUgcmFuZG9tIGNyZWRlbnRpYWxzIHRoYXQgdGhleSBjYW4gdXNlIHdoZW4g
aW50ZXJhY3RpbmcNCndpdGggdGhlIG1hbnVmYWN0dXJlciBvciBpdHMgZGVsZWdhdGVzIC0gcHJl
c3VtYWJseSwgb25seSB0aGUgcHVyY2hhc2VyDQooYW5kIG1hbnVmYWN0dXJlciBvciBkZWxlZ2F0
ZSkgd291bGQga25vdyB0aGUgY3JlZGVudGlhbHMgZm9yIHRoZSBkZXZpY2UuDQoNCk9mIGNvdXJz
ZSwgYSBsb3Qgb2YgdGhpcyBoYXMgdG8gZG8gd2l0aCB0aGUgY2xhc3Mgb2YgZGV2aWNlIChlbnRl
cnByaXNlDQp2ZXJzdXMgY29uc3VtZXIpIGFuZCBob3cgcGFyYW5vaWQgdGhlIHNlY3VyaXR5IGRp
YWwgaXMgc2V0LiAgVGhlIGRyYWZ0DQpkZWZpbmVzIGp1c3QgdGhlIGJpdHMtb24tdGhlLXdpcmUg
cGFydCBvZiB0aGUgc29sdXRpb24sIGxlYXZpbmcgaXQgdG8NCnRoZSB2ZW5kb3JzIHRvIGRldGVy
bWluZSB3aGF0IGJhY2tlbmQgcGFydHMgbWFrZXMgc2Vuc2UgZm9yIHRoZWlyIG1hcmtldHMuDQoN
Cg0KDQo+IMKnMy4xLCA0dGggcGFyYWdyYXBoOiBUaGUgZmlyc3Qgc2VudGVuY2UgaXMgY29udm9s
dXRlZDsgcGxlYXNlIGNvbnNpZGVyDQo+IGJyZWFraW5nIGl0IGludG8gbXVsdGlwbGUgc2ltcGxl
ciBzZW50ZW5jZXMuDQo+DQo+ICAtIDZ0aCBwYXJhZ3JhcGg6IFRoZSBmaXJzdCBzZW50ZW5jZSBp
cyBldmVuIG1vcmUgY29udm9sdXRlZC4NCg0KT2theSwgSSBicm9rZSB0aGUgc2VudGVuY2UgdXAg
YSBiaXQgKGluIG15IGxvY2FsIGNvcHkpLiAgSSBhbHNvIGRpZCB0aGUNCnNhbWUgdG8gdGhlIHNp
bWlsYXIgc2VudGVuY2VzIGluIMKnMy4zLg0KDQoNCg0KPiDCpzUuNiwgMTB0aCBwYXJhZ3JhcGg6
IEknbSBub3Qgc3VyZSBob3cgdG8gaW50ZXJwcmV0ICJNVVNUIHRyeSIuIFRoYXQgZG9lc24ndA0K
PiBzZWVtIHZlcmlmaWFibGUuIA0KDQpJJ20gb3BlbiB0byB3b3JkaW5nIHN1Z2dlc3Rpb25zLCBi
dXQgd2hhdCBpcyB0cnlpbmcgdG8gYmUgY29udmV5ZWQgaXMgbW9yZQ0KdGhhbiBhIFNIT1VMRCwg
YW5kIHlldCBub3QgcXVpdGUgYSBNVVNULCBpbiB0aGUgc2Vuc2UgdGhhdCBpZiwgZm9yIGFueSBy
ZWFzb24sDQp0aGUgZGV2aWNlIGlzIHVuYWJsZSB0byBkZWxpdmVyIHRoZSBwcm9ncmVzcyByZXBv
cnQgKGUuZy4sIHJlbW90ZSBzZXJ2ZXIgZG93biksDQppdCBpcyBva2F5IGZvciB0aGUgZGV2aWNl
IHRvIHByb2NlZWQuICBJIGRvbid0IGtub3csIG1heWJlICJTSE9VTEQiIGNvbnZleXMNCnRoaXMg
anVzdCByaWdodCwgdGhvdWdodHM/DQoNCg0KDQo+IC0tIGZpcnN0IGJ1bGxldCB1bmRlciAiaW1w
bGVtZW50YXRpb24gbm90ZXMiOiBpcyAicm9sbCBvdXQgb2YiDQo+IHRoZSBzYW1lIHRoaW5ncyBh
cyAicm9sbCBiYWNrIj8NCg0KWWVzLCByZXBsYWNlZCAoaW4gbXkgbG9jYWwgY29weSkuDQoNCg0K
DQo+IMKnOS44Og0KPiAtIDR0aCBwYXJhZ3JhcGg6IENhbiB0aGUgImJlc3QgcHJhY3RpY2VzIiBi
ZSBjaXRlZCBvciBkZXNjcmliZWQ/IE90aGVyd2lzZSwgdGhlDQo+IG5vcm1hdGl2ZSAiUkVDT01N
RU5ERUQiIHNlZW1zIHByZXR0eSB2YWd1ZS4gKE9yIGFyZSB0aGUgbmV4dCBmZXcgc2VudGVuY2Vz
DQo+IGludGVuZGVkIHRvIGRlZmluZSB0aG9zZSBwcmFjdGljZXM/DQoNCkknbSB1bmF3YXJlIG9m
IGFueSBncmVhdCByZWZlcmVuY2VzLiAgUkZDIDUyODAsIMKnOCwgNXRoIHBhcmFncmFwaCB0b3Vj
aGVzIG9uIA0KaXQsIGJ1dCBub3QgdG8gYW55IGdyZWF0IGFmZmVjdC4gIEkgYWRkZWQgYSAiRm9y
IGV4YW1wbGUsIiAoaW4gbXkgbG9jYWwgY29weSkgDQp0byBjbGFyaWZ5IHRoYXQgdGhlIGZvbGxv
d2luZyBzZW50ZW5jZXMgcHJvdmlkZSBzb21lIHN1Z2dlc3Rpb25zLg0KDQoNCg0KPiAtNXRoIHBh
cmFncmFwaDogUGFyYWdyYXBoIGlzIGhhcmQgdG8gcGFyc2UuDQoNCkFncmVlZC4gU2ltcGxpZmll
ZC4NCg0KDQpUaGFua3MgYWdhaW4hDQpLZW50IA0KDQo=


From nobody Tue Dec 11 07:52:38 2018
Return-Path: <ianfarrer@gmx.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA311130DEC; Tue, 11 Dec 2018 07:52:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wHM1w1KOblfa; Tue, 11 Dec 2018 07:52:35 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3696B130DE9; Tue, 11 Dec 2018 07:52:35 -0800 (PST)
Received: from [192.168.1.228] ([80.159.240.8]) by mail.gmx.com (mrgmx101 [212.227.17.174]) with ESMTPSA (Nemesis) id 0LtVLE-1hV4D52y4C-010qDz; Tue, 11 Dec 2018 16:52:23 +0100
From: ianfarrer@gmx.com
Message-Id: <7DCF274C-963E-417B-8B0B-9024F42D200B@gmx.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_09E1A562-2E41-411C-A375-0FEC6FD5177E"
Mime-Version: 1.0 (Mac OS X Mail 12.1 \(3445.101.1\))
Date: Tue, 11 Dec 2018 16:52:22 +0100
In-Reply-To: <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>,  "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, Kent Watsen <kwatsen@juniper.net>
To: Alexey Melnikov <aamelnikov@fastmail.fm>
References: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com> <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net>
X-Mailer: Apple Mail (2.3445.101.1)
X-Provags-ID: V03:K1:B+0I1FqoUIFnmF64EqSplEK6jy+rR0kygwEcneKzGDMYZ+O/Hab y/qc3ayN1RRZKtyiQaZJ23ljkqmM9mtRx8/YDX5JsMY0Vb0dS3UuCqOk47w++hvVMF+xDSf 2UVavTQmObkJCBhOMg7Dqw7SWp+5Pub3trny1CtqbwVz11y05DaXj01y+pE2eRUr4k8VtA/ bsb0Fq/Edfhvb+1kSK2kg==
X-UI-Out-Filterresults: notjunk:1;V03:K0:pYr3hfFD0u8=:8JGy3VKIZQ/BLH5/AYJxrT /GfdMaTW698o35BnV3HxGKWitqB4bRudw6nvj0APB2/YZtLVQ8LHcVkkMiD3NcH38mLozhF+5 FB54cq638s6iA7sd1KDEuHYccI5aJZKTKe6X1eLXo3nuVGDtHkvQHTzoJLA+oSyp2F03oUuVO RgjkHN3iVFP6/9QewmpABmV/FjoViEYmxlFC9iipGloNWKAV4OnzSPDnUHCePOECRuixTawiE 78R9wkUgeGw2ONaxT7h9yFbCU+ZrCfluOiEX2IjuA4oSquZmCqEtEemi8Jj0xb97kUcvzaWZx /2bYTi/TlseItbkEABkVVneJBoydTItq3OZYe5TFWL9s4leulxQ2nc9hdjmm+lYzde3FEgSPC BguQM1hcUHK2fJ3N6VGZXm/IClS+FlKu5+rxxsJj+Z5ZVyFxuqjl5m2t4kBUKLlIpnOmwF82f 5aWCnQ205hLzsWXvzsccEtcHpy+kifH2+YKBJsYEJidMjiCuvfZ48Q5BdS5aVC/elcZEyQKwp i3EivajmNxzf6oGanK6NuiWCJlnVCH6XwBl+uZ7BfNPKKFHLNbQxbWTZ4zJuE6LlkhkIYxieg XLayNokDACCu8EHy3ty+ENlRAKBisaZONYsJ3SFKpSMpxJi9ChkC6knlxlD3oIzvGEntAoj+A CZwIhs4d23aKYT0AEYOJ2ntvTx/A6lOxeeTjgdLqxiz8X9C9Z4PmTFSWP5NSh2ZraApFP1Htf eY84B4zJDf3lub1AVhbPNhBT5iGiZnti9aCTAEq97PJM+C6EAPdrLU5klCuKqcEOA61EGCcUv hJUUHa2J4+Od5WbyvWbPSmYs1nUjwcLIYCLGmS/JFfgFeKbK7gBIOa9iAkQOC0jIueyvC8pjN gOj9iMyafm5fL/QC2pYYgqJqVWJZdN6beQIFH4lsEWNjBregR7dK0ibQbt9kt8
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/7PiKHMWw9fwKLVdx8rFWyiBhD7g>
Subject: Re: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Dec 2018 15:52:38 -0000

--Apple-Mail=_09E1A562-2E41-411C-A375-0FEC6FD5177E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Alexey,

Thanks for the review. Please see my response for you comment on the =
Common Field Encoding below.

Thanks,
Ian

>=20
>=20
>> 8.3.  Common Field Encoding
>>=20
>>  Both of the DHCPv4 and DHCPv6 options defined in this section encode
>>  a list of bootstrap server URIs.  The "URI" structure is an option
>>  that can contain multiple URIs (see [RFC7227], Section 5.7).
>>=20
>>    bootstrap-server-list:
>>=20
>> This is confusing, because I believe the following is a single entry
>> in the list, not the whole list syntax:
>>=20
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+
>>    |       uri-length              |          URI                  |
>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+
>>=20
>>    o uri-length: 2 octets long, specifies the length of the URI data.
>>=20
>>    o URI: URI of zerotouch bootstrap server, using the HTTPS URI
>>      scheme defined in Section 2.7.2 of RFC7230.  URI MUST be in
>>      form "https://<ip-address-or-hostname>[:<port>]".
>>=20
>> So if I am correct above, please clarify this by changing
>> "bootstrap-server-list:" to "bootstrap-server-list is a list of 1 or =
more
>> items, each with the following syntax:" (Or something like this.)
>>=20
>> Also, "URI" deserve to be a Normative Reference, as it defines the
>> generic syntax you are referring to.
>=20

[if  Propose removing the =E2=80=98bootstrap-server-list:=E2=80=99 line =
and extending
the intro paragraph to read:

 "Both of the DHCPv4 and DHCPv6 options defined in this section encode
 a list of bootstrap server URIs.  The "URI" structure is an option
 that can contain multiple URIs (see [RFC7227], Section 5.7). Each URI
 entry in the bootstrap-server-list is structured as follows:=E2=80=9D

Also, I=E2=80=99ve added RFC7230 to the normative references.]


--Apple-Mail=_09E1A562-2E41-411C-A375-0FEC6FD5177E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Alexey,<div class=3D""><br class=3D""></div><div class=3D"">Thanks for =
the review. Please see my response for you comment on the Common Field =
Encoding below.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks,</div><div class=3D"">Ian</div><div class=3D""><br =
class=3D""><div><blockquote type=3D"cite" class=3D""><div class=3D""><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" =
class=3D""><blockquote type=3D"cite" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D"">8.3. =
&nbsp;Common Field Encoding<br class=3D""><br class=3D"">&nbsp;Both of =
the DHCPv4 and DHCPv6 options defined in this section encode<br =
class=3D"">&nbsp;a list of bootstrap server URIs. &nbsp;The "URI" =
structure is an option<br class=3D"">&nbsp;that can contain multiple =
URIs (see [RFC7227], Section 5.7).<br class=3D""><br =
class=3D"">&nbsp;&nbsp;&nbsp;bootstrap-server-list:<br class=3D""><br =
class=3D"">This is confusing, because I believe the following is a =
single entry<br class=3D"">in the list, not the whole list syntax:<br =
class=3D""><br =
class=3D"">&nbsp;&nbsp;&nbsp;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-+-...-+-+-+-+-+-+-+<br class=3D"">&nbsp;&nbsp;&nbsp;| =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;uri-length =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;URI =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;|<br =
class=3D"">&nbsp;&nbsp;&nbsp;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+=
-+-...-+-+-+-+-+-+-+<br class=3D""><br class=3D"">&nbsp;&nbsp;&nbsp;o =
uri-length: 2 octets long, specifies the length of the URI data.<br =
class=3D""><br class=3D"">&nbsp;&nbsp;&nbsp;o URI: URI of zerotouch =
bootstrap server, using the HTTPS URI<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;scheme defined in Section 2.7.2 =
of RFC7230. &nbsp;URI MUST be in<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;form =
"https://&lt;ip-address-or-hostname&gt;[:&lt;port&gt;]".<br class=3D""><br=
 class=3D"">So if I am correct above, please clarify this by changing<br =
class=3D"">"bootstrap-server-list:" to "bootstrap-server-list is a list =
of 1 or more<br class=3D"">items, each with the following syntax:" (Or =
something like this.)<br class=3D""><br class=3D"">Also, "URI" deserve =
to be a Normative Reference, as it defines the<br class=3D"">generic =
syntax you are referring to.<br class=3D""></blockquote><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" =
class=3D""></div></blockquote><br class=3D""></div><div>[if =
&nbsp;Propose removing the =E2=80=98bootstrap-server-list:=E2=80=99 line =
and extending</div><div>the intro paragraph to read:</div><br =
class=3D"">&nbsp;"Both of the DHCPv4 and DHCPv6 options defined in this =
section encode<br class=3D"">&nbsp;a list of bootstrap server URIs. =
&nbsp;The "URI" structure is an option<br class=3D""><div>&nbsp;that can =
contain multiple URIs (see [RFC7227], Section 5.7). Each =
URI</div><div>&nbsp;entry in the bootstrap-server-list is structured as =
follows:=E2=80=9D</div><div><br class=3D""></div><div>Also, I=E2=80=99ve =
added RFC7230 to the normative references.]</div><div><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_09E1A562-2E41-411C-A375-0FEC6FD5177E--


From nobody Tue Dec 11 08:45:51 2018
Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 130EE130E6C; Tue, 11 Dec 2018 08:45:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmail.fm header.b=uT7BmN/h; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=HP25Z/MX
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJ0l0z9F26Sl; Tue, 11 Dec 2018 08:45:47 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F587130E68; Tue, 11 Dec 2018 08:45:47 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 6000621F4F; Tue, 11 Dec 2018 11:45:46 -0500 (EST)
Received: from web5 ([10.202.2.215]) by compute7.internal (MEProxy); Tue, 11 Dec 2018 11:45:46 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.fm; h= message-id:from:to:cc:mime-version:content-transfer-encoding :content-type:date:references:subject:in-reply-to; s=fm1; bh=7qI H45ya3PV0noGOwCtFQ64/u/+8R+hOlkc/fhaR4qU=; b=uT7BmN/hROfeD7+wOEe PT0xp49YJgtdqrU/RkZZZtLtYkLxLSYfGJ/5ekyg6/fh31MR9dMCjFRy3+ErORrf 9o0qAg2oXg8oknzZt9qDkjNteFGZcQsVd0Tk0B/L98Grfq675CsbAtIkb+pBMaoF hbjx8kVcZhxN+t7ukZsBgLMjcoL+xry1jhHWzCrlzjS1xDWPYVK/JHTUrVzbDtoj To5cBJPBEBnFF0ckBy7NRDurfEVMQOWZYsdFyrMTFTasKNcjsmM+YTcRVhmgzm4Y 4LuOo6fmKY+9XNuxzO32EQ7MFQWJVu8hYV6Fsexc8tXk54jDY2QszHIMGwiu2l4Y e0w==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=7qIH45ya3PV0noGOwCtFQ64/u/+8R+hOlkc/fhaR4 qU=; b=HP25Z/MXKQUU59PHOFcWlYxaMKpZwdJokgGxX1nJ42IVH3oNyftp/OEDq T+qGYQkRNc44pgYT2BBi5K8Kq42HKKaoXLH7NNRA4F9bYMB/rtJ8YlP7o7LAn4YY Fom+7U55R1PDW/4sycZU/B1+vfOzZKwMqiEmF0Dl+1bdbVQZhg8ilvXuFk/UaLjW c/gJyqwl2mS0Avq6ODESZ+rOHO4wuUNbIatRVZ8vfMC/4U/eITfz1bMK0MOSNvhi MFIzkCUksldCF4wxjCX8MD43PPmfxSRURzepEy7sfoNYMJMpIriIKwws+sfhlscu iRMbUFgEBpxg74HFj4m6HNqQ6LyJg==
X-ME-Sender: <xms:uekPXMav6ucJ63A2AQ-SlDyGf_QfF8C672mJy2DRwHSw8lF5N4KRTA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedtkedrudegjedgleefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfquhhtnecuuegrihhlohhuthemucef tddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefkhffvggfgtg foffhfufgjsehtjeertdertdejnecuhfhrohhmpeetlhgvgigvhicuofgvlhhnihhkohhv uceorggrmhgvlhhnihhkohhvsehfrghsthhmrghilhdrfhhmqeenucffohhmrghinhepih hpqdgruggurhgvshhsqdhorhdqhhhoshhtnhgrmhgvphhorhhtrdhsohdpghhithhhuhgs rdgtohhmpdhivghtfhdrohhrghdpphhrohhtohhnmhgrihhlrdgthhdpvgigrghmphhlvg drtghomhdpihgrnhgrrdhorhhgpdhgrggsrdgtohhmnecurfgrrhgrmhepmhgrihhlfhhr ohhmpegrrghmvghlnhhikhhovhesfhgrshhtmhgrihhlrdhfmhenucevlhhushhtvghruf hiiigvpedt
X-ME-Proxy: <xmx:uekPXP7Th2Pddg-lMWp0LceQCmIJu7YXUy3C3MoITdHAIRnnInv1xQ> <xmx:uekPXPySb5FfFOy7YT4pQ-E30T95HEN1KeBUuNVf5vanp51pmvENfQ> <xmx:uekPXApJRgTnQjxHgDy4M_Dxj90dy3w8I_o6qiS66wmBfDK6K8Zk4w> <xmx:uekPXB1Tw8h5hdlxoY38_33oPIScPKZaY4UIojL4-Y7cUuXwtMzydg> <xmx:uekPXJDvyvjU1_dgqwMuP_tCdQANeLQ5xRTTy7sanjXbsfhQVQ5pCA> <xmx:uukPXChWaZ2kORRb3jGg4SkGFCjyp3FHleG4yLMvSi527Z9Urvz30g>
Received: by mailuser.nyi.internal (Postfix, from userid 99) id 9FF739E149; Tue, 11 Dec 2018 11:45:45 -0500 (EST)
Message-Id: <1544546745.239011.1606019152.63663D44@webmail.messagingengine.com>
From: Alexey Melnikov <aamelnikov@fastmail.fm>
To: Kent Watsen <kwatsen@juniper.net>, The IESG <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, netconf-chairs@ietf.org, netconf@ietf.org
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="utf-8"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-2f590f9a
Date: Tue, 11 Dec 2018 16:45:45 +0000
References: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com> <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net>
In-Reply-To: <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/shT8ywUuQYSCmVqneu6Sd5PwW3c>
Subject: Re: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Dec 2018 16:45:50 -0000

Hi Kent,

On Mon, Dec 10, 2018, at 11:03 PM, Kent Watsen wrote:
> Hi Alexey,
> 
> Thanks for your review!
> See below for responses.
> 
> 
> Kent // coauthor
> 
> 
> 
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Thank you for a well written document, it was a pleasure to read.
> > I have a small list of issues that I would like to discuss before
> > recommending approval of this document:
> >
> >
> > In Section 5.3:
> >
> >   If the zero touch information artifact contains redirect information,
> >   the device MUST, within limits of how many recursive loops the device
> >   allows, process the redirect information as described in Section 5.5.
> >   This is the recursion step, it will cause the device to reenter this
> >   algorithm, but this time the data source will definitely be a
> >   bootstrap server, as that is all redirect information is able to
> >   redirect a device to.
> >
> > I think you need to specify a "max redirect" value in order to
> > prevent intentional or unintentional misconfigurations. Without
> > such limit it is trivial to introduce denial-of-service attack
> > on naive device implementations.
> 
> There is a Security Consideration on this very point, where is says:
> 
>    Implementations SHOULD limit the maximum number of recursive
>    redirects allowed; no more than a half dozen seems reasonable.

I think this is weaker than I would like. I also didn't read the second part (half dozen) as normative. So my suggestion is below.

> Here's direct link:
>   https://tools.ietf.org/html/draft-ietf-netconf-zerotouch-25#section-9.9
> 
> Is this now acceptable as is?  If not, would it be suffice to 
> add a reference the Security Consideration?  If not, then, yes,
> a max-redirect value could be defined, but it would have to be 
> somewhat high (25?) so that the standard doesn't prematurely
> limit some unforeseen use.  Please advise.

I think I prefer something like this:

    Implementations MUST limit the maximum number of recursive
    redirects allowed; the maximum number of recursive
    redirects allowed SHOULD be 25.

And adding a reference to the Security Considerations.

I.e., I think imposing a limit should be a MUST with the value 25 recommended.

> > 2)
> > 10.3.  The SMI Security for S/MIME CMS Content Type Registry
> >
> >   IANA is kindly requested to add two entries in the "SMI Security for
> >   S/MIME CMS Content Type" registry (1.2.840.113549.1.9.16.1), with
> >   values as follows:
> >
> >   Decimal  Description                             References
> >   -------  --------------------------------------  ----------
> >   TBD1      id-ct-zerotouchInformationXML          [RFCXXXX]
> >   TBD2      id-ct-zerotouchInformationJSON         [RFCXXXX]
> >
> >   id-ct-zerotouchInformationXML indicates that the "zerotouch-
> >   information" is encoded using XML.  id-ct-zerotouchInformationJSON
> >   indicates that the "zerotouch-information" is encoded using JSON.
> >
> > You define these values, but they are not used anywhere in the document.
> 
> Aye, you're right!  At least, they're not referenced by name, which
> complicates searching for them...  (see my next response for more)
> 
> 
> 
> > It looks like you intended for this to be used in several places,
> > for example:
> >
> > 3.1.  Zero Touch Information
> >
> >   When the zero touch information artifact is unsigned, as it might be
> >   when communicated over trusted channels, the CMS structure's top-most
> >   content type MUST be one of the OIDs described in Section 10.3, or
> >   the OID id-data (1.2.840.113549.1.7.1), in which case the encoding
> >   (JSON, XML, etc.)  SHOULD be communicated externally.  In either
> >   case, the associated content is an octet string containing
> >   "zerotouch-information" data in the expected encoding.
> >
> > Did you intend to use the above OIDs here?
> 
> Yes, exactly, and also in two other places in Section 3.1.  In
> all three instances, we could either:
> 
>   OLD:
>     ...one of the OIDs described in Section 10.3,
> 
>   NEW1:
>     ...one of the OIDs described in Section 10.3 (i.e., 
>     id-ct-zerotouchInformationXML or id-ct-zerotouchInformationJSON),
> 
> or
> 
>   NEW2:
>     ...one of the OIDs described in Section 10.3 (i.e., 
>     1.2.840.113549.1.9.16.1.TBD1 or 1.2.840.113549.1.9.16.1.TBD2),
> 
> Do you have a preference?

I think NEW1 is clearer.

> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > 4.2.  DNS Server
> >
> >   To use a DNS server as a source of bootstrapping data, a device MAY
> >   perform a multicast DNS [RFC6762] query searching for the service
> >   "_zerotouch._tcp.local.".  Alternatively the device MAY perform DNS-
> >   SD [RFC6763] via normal DNS operation, using the domain returned to
> >   it from the DHCP server; for example, searching for the service
> >   "_zerotouch._tcp.example.com".
> >
> > I agree with Adam that "zerotouch" much be a registered as service 
> > name, see https://www.iana.org/assignments/service-names-port-numbers\ /service-names-port-numbers.xhtml.
> 
> Agreed, and I responded to Adam previously as follows:
> 
>   ===start===
>   You are quite right.  Here is the Github commit to add an IANA 
> registration
>   for the "zerotouch" service:  
> https://github.com/netconf-wg/zero-touch/commit/6280763339a3e91b9efb21703b26a6bdbf05349b.

This looks reasonable. (Note, saying that this is an extension of HTTPS in a note doesn't help. I think it would be better to say "this protocol uses HTTPS as a substrate". The current text would make people wonder why you need to register a new service name.)
 
>   Please let me know if you suggest any further changes.  
>   ===stop===
> 
> And likewise, Alexey, please also let me know if you suggest any 
> further changes.  
> 
> 
> 
> 
> >   Artifact to Resource Record Mapping:
> >
> >      Zero Touch Information:  Mapped to a TXT record called "zt-info"
> >        containing the base64-encoding of the binary artifact described
> >         in Section 3.1.
> >
> >      Owner Certificate:  Mapped to a TXT record called "zt-cert"
> >         containing the base64-encoding of the binary artifact described
> >         in Section 3.2.
> >
> >      Ownership Voucher:  Mapped to a TXT record called "zt-voucher"
> >         containing the base64-encoding of the binary artifact described
> >         in Section 3.3.
> >
> > So just to double check, these would be zt-info._zerotouch._tcp.example.com,
> > etc?
> 
> I'm not a DNS expert, but my understanding is that lookup would be on, 
> e.g., _zerotouch._tcp.example.com and that the TXT records would be 
> returned as follows:
> 
> _zerotouch._tcp.example.com.  3600  IN  TXT  "zt_info=base64encodedvalue=="
> _zerotouch._tcp.example.com.  3600  IN  TXT  "zt_cert=base64encodedvalue=="
> _zerotouch._tcp.example.com.  3600  IN  TXT  "zt_voucher=base64encodedvalue=="

This is not what your text is saying. I also don't think that your description is correct. "TXT record called X" is not something defined. You need to define TXT record which can contain attribute=value syntax and allowed attributes are one of 3 you define.

> For instance ['\' added for readability]:
> 
>   # dig txt gab.com
>   <snip/>
>   ;; ANSWER SECTION:
>   gab.com.		300	IN	TXT	"v=spf1 include:_spf.protonmail.ch mx ~all"
>   gab.com.		300	IN	TXT	"ca3-56e3739f7f644cdaaa0e7edc903cf648"
>   gab.com.		300	IN	TXT	"protonmail-verification=\
>                                   96ca5019e36fc3a6dc5c4399efabe68792e55cc7"
>   <snip/>
> 
> Do you feel that an example in the document is warranted?

Definitely you should add some examples. 

> > 8.1.  DHCPv4 Zero Touch Option
> >
> >      o bootstrap-server-list: A list of servers for the
> >         client to attempt contacting, in order to obtain
> >         further bootstrapping data, in the format shown
> >         in [common-field-encoding].
> >
> > [common-field-encoding] in this and subsequent sections looks like a
> > reference to Section 8.3. Please fix before publication, as this looks
> > like an undefined reference.
> 
> Good grief, fixed (in both locations)!
> 
>   s/[common-field-encoding]/Section 8.3/
> 
> 
> 
> > 8.3.  Common Field Encoding
> >
> >   Both of the DHCPv4 and DHCPv6 options defined in this section encode
> >   a list of bootstrap server URIs.  The "URI" structure is an option
> >   that can contain multiple URIs (see [RFC7227], Section 5.7).
> >
> >     bootstrap-server-list:
> >
> > This is confusing, because I believe the following is a single entry
> > in the list, not the whole list syntax:
> >
> >     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+
> >     |       uri-length              |          URI                  |
> >     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+
> >
> >     o uri-length: 2 octets long, specifies the length of the URI data.
> >
> >     o URI: URI of zerotouch bootstrap server, using the HTTPS URI
> >       scheme defined in Section 2.7.2 of RFC7230.  URI MUST be in
> >       form "https://<ip-address-or-hostname>[:<port>]".
> >
> > So if I am correct above, please clarify this by changing
> > "bootstrap-server-list:" to "bootstrap-server-list is a list of 1 or more
> > items, each with the following syntax:" (Or something like this.)
> >
> > Also, "URI" deserve to be a Normative Reference, as it defines the
> > generic syntax you are referring to.
> 
> 
> I have ask my coauthor, Ian, to respond to this comment.

Ok.

Best Regards,
Alexey


From nobody Tue Dec 11 08:46:48 2018
Return-Path: <aamelnikov@fastmail.fm>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A45AC130E6C; Tue, 11 Dec 2018 08:46:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=fastmail.fm header.b=Omcz82lF; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=ZhEEA7W5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gkaIYNzV_i1J; Tue, 11 Dec 2018 08:46:44 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 612AF130E68; Tue, 11 Dec 2018 08:46:44 -0800 (PST)
Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 3408F220E0; Tue, 11 Dec 2018 11:46:43 -0500 (EST)
Received: from web5 ([10.202.2.215]) by compute7.internal (MEProxy); Tue, 11 Dec 2018 11:46:43 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.fm; h= message-id:from:to:cc:mime-version:content-transfer-encoding :content-type:subject:date:references:in-reply-to; s=fm1; bh=B4U QI2eA9DMj2tWMGtvsRRkB6F9grVho/jMvu+Hu8lQ=; b=Omcz82lF6S6T57Y6p4R s0QMIj04F/o097bi88IhYgIAdWJtWkIaA3wn1hqKKs8ecSUiWrzC/oR5vT/c0OI+ W6tO+lVKBt12Ws3XBrIhKNszivEheW8ojefIYVzW+o5ZgDqpm8TX3FvaGeQsnPmQ Od94n5l5pWBhy9qquWy5xODCjvOGoJI/vmpe07tDz7bqg3e0HLiz/y7L+W6Ao2+h igJl5n5u8NSghl46BGWC1lARLR7cSqzwosnxsMPi9frRl/XF8rRz72gyXVmFkuSf c0sF6F+FPmXJkRbIWq6Hb7xoay9EfbJkZ6ZwA9CAOeCk8dOCMgby0p5bGLvNO2Fa T3Q==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=B4UQI2eA9DMj2tWMGtvsRRkB6F9grVho/jMvu+Hu8 lQ=; b=ZhEEA7W5Zlu+38NoN43EnsWWzJ7Qwy2Cf45PEzcC4tj0AqgcC4ZLB8opI 5i0JKdVmHBM9xEJN9JA6h4CP+yhZo1yeDclSvHlMP+itKjeDK3410GxOSOKH5yXH +rCLHHiEiL0gh1PbLNuzugmLYlbBWNm4BnaOg5a3RVdiUaVvVki26rEwR7Y47mBn lVTe6IbxRT04lxHDzJ0EeVuM+MCHCTyQOdF9DBQUUdVHqktYXYHwVIO3y2ogbQKO HZoTyS9XY+84Fp0PFAt4xPJF2kXDyILJelhxbNHs/0it8iKTKMWp6rZ86IksWavB zT+QYWT0FY7K67A941ru9Lf3DAPLw==
X-ME-Sender: <xms:8ukPXBSPk3C3MUB84U2RVn5JNj7y2SGdeAF_qgUvzoLu7Xk6iSSjhQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedtkedrudegjedgleefucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfquhhtnecuuegrihhlohhuthemucef tddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefkhffvggfgtg fouffffhgjsegrjeerreertdejnecuhfhrohhmpeetlhgvgigvhicuofgvlhhnihhkohhv uceorggrmhgvlhhnihhkohhvsehfrghsthhmrghilhdrfhhmqeenucffohhmrghinhepih hpqdgruggurhgvshhsqdhorhdqhhhoshhtnhgrmhgvphhorhhtrdhsohenucfrrghrrghm pehmrghilhhfrhhomheprggrmhgvlhhnihhkohhvsehfrghsthhmrghilhdrfhhmnecuve hluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:8-kPXB4LQyXCCCJWfbXc_g5ddSscGR3aA2V_gpHk5b1c2SUYZwpAHw> <xmx:8-kPXH0t90YYATUAoj54APDETHrwIOExnAbbQmClQgaH4nsKM-WhtA> <xmx:8-kPXKaX8DxHUlKrz4q0NqO3X_Lq6C0OrMcgB3yga7x2iNa2Px-SEg> <xmx:8-kPXHBoTLf9eJkS-44H6F741V_2Cj8s4ZeSRtOQppzylxMwhaQaFw> <xmx:8-kPXE8Pb8qCcviH_bdv2vkMJxd-aisJihHgjAhewhWwyikUvuwSJg> <xmx:8-kPXEKZ-cLxAkjvTQDWex7bTRUjq_1OOxoZLlT3H4fIUeisF9p7lQ>
Received: by mailuser.nyi.internal (Postfix, from userid 99) id DA6C99E149; Tue, 11 Dec 2018 11:46:42 -0500 (EST)
Message-Id: <1544546802.239696.1606036288.59EED88B@webmail.messagingengine.com>
From: Alexey Melnikov <aamelnikov@fastmail.fm>
To: ianfarrer@gmx.com
Cc: The IESG <iesg@ietf.org>, draft-ietf-netconf-zerotouch@ietf.org, netconf-chairs@ietf.org, netconf@ietf.org, Kent Watsen <kwatsen@juniper.net>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: multipart/alternative; boundary="_----------=_15445468022396960"
X-Mailer: MessagingEngine.com Webmail Interface - ajax-2f590f9a
Date: Tue, 11 Dec 2018 16:46:42 +0000
References: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com> <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net> <7DCF274C-963E-417B-8B0B-9024F42D200B@gmx.com>
In-Reply-To: <7DCF274C-963E-417B-8B0B-9024F42D200B@gmx.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/AcwmFzT5uWr4HII_s4cx2ZAF9sU>
Subject: Re: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Dec 2018 16:46:46 -0000

This is a multi-part message in MIME format.

--_----------=_15445468022396960
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="utf-8"

Hi Ian,

On Tue, Dec 11, 2018, at 3:52 PM, ianfarrer@gmx.com wrote:
> Hi Alexey,
>=20
> Thanks for the review. Please see my response for you comment on the
> Common Field Encoding below.>=20
> Thanks,
> Ian
>=20
>>=20
>>=20
>>> 8.3.  Common Field Encoding
>>>=20
>>>  Both of the DHCPv4 and DHCPv6 options defined in this section
>>>  encode>>>  a list of bootstrap server URIs.  The "URI" structure is an=
 option>>>  that can contain multiple URIs (see [RFC7227], Section 5.7).
>>>=20
>>>    bootstrap-server-list:
>>>=20
>>> This is confusing, because I believe the following is a single entry>>>=
 in the list, not the whole list syntax:
>>>=20
>>>    +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+>>>=
    |       uri-length              |          URI                  |>>>   =
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-+-+-+-+-+-+-+>>>=20
>>>    o uri-length: 2 octets long, specifies the length of the URI
>>>    data.>>>=20
>>>    o URI: URI of zerotouch bootstrap server, using the HTTPS URI
>>>      scheme defined in Section 2.7.2 of RFC7230.  URI MUST be in
>>>      form "https://<ip-address-or-hostname>[:<port>]".
>>>=20
>>> So if I am correct above, please clarify this by changing
>>> "bootstrap-server-list:" to "bootstrap-server-list is a list of 1
>>> or more>>> items, each with the following syntax:" (Or something like t=
his.)
>>>=20
>>> Also, "URI" deserve to be a Normative Reference, as it defines the
>>> generic syntax you are referring to.
>>=20
>=20
> [if  Propose removing the =E2=80=98bootstrap-server-list:=E2=80=99 line a=
nd extending> the intro paragraph to read:
>=20
>  "Both of the DHCPv4 and DHCPv6 options defined in this section encode>  =
a list of bootstrap server URIs.  The "URI" structure is an option
>  that can contain multiple URIs (see [RFC7227], Section 5.7). Each URI>  =
entry in the bootstrap-server-list is structured as follows:=E2=80=9D
>=20
> Also, I=E2=80=99ve added RFC7230 to the normative references.]
>=20
Yes, this looks good to me.

Thank you,
Alexey

--_----------=_15445468022396960
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="utf-8"

<!DOCTYPE html>
<html>
<head>
<title></title>
<style type=3D"text/css">p.MsoNormal,p.MsoNoSpacing{margin:0}</style>
</head>
<body><div>Hi Ian,<br></div>
<div><br></div>
<div>On Tue, Dec 11, 2018, at 3:52 PM, <a href=3D"mailto:ianfarrer@gmx.com"=
>ianfarrer@gmx.com</a> wrote:<br></div>
<blockquote type=3D"cite"><div>Hi Alexey,<br></div>
<div><br></div>
<div>Thanks for the review. Please see my response for you comment on the C=
ommon Field Encoding below.<br></div>
<div><br></div>
<div>Thanks,<br></div>
<div>Ian<br></div>
<div><div><br></div>
<div><blockquote type=3D"cite"><div><div><br></div>
<div><br></div>
<blockquote type=3D"cite" style=3D"font-family:Helvetica;font-size:12px;fon=
t-style:normal;font-variant-caps:normal;font-weight:normal;letter-spacing:n=
ormal;text-align:start;text-indent:0px;text-transform:none;white-space:norm=
al;word-spacing:0px;text-size-adjust:auto;-webkit-text-stroke-width:0px;tex=
t-decoration-line:none;text-decoration-style:initial;text-decoration-color:=
initial;"><div>8.3. &nbsp;Common Field Encoding<br></div>
<div><br></div>
<div>&nbsp;Both of the DHCPv4 and DHCPv6 options defined in this section en=
code<br></div>
<div>&nbsp;a list of bootstrap server URIs. &nbsp;The "URI" structure is an=
 option<br></div>
<div>&nbsp;that can contain multiple URIs (see [RFC7227], Section 5.7).<br>=
</div>
<div><br></div>
<div>&nbsp;&nbsp;&nbsp;bootstrap-server-list:<br></div>
<div><br></div>
<div>This is confusing, because I believe the following is a single entry<b=
r></div>
<div>in the list, not the whole list syntax:<br></div>
<div><br></div>
<div>&nbsp;&nbsp;&nbsp;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-=
+-+-+-+-+-+-+<br></div>
<div>&nbsp;&nbsp;&nbsp;| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;uri-length &nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
| &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;URI &nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;|<br></div>
<div>&nbsp;&nbsp;&nbsp;+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-...-=
+-+-+-+-+-+-+<br></div>
<div><br></div>
<div>&nbsp;&nbsp;&nbsp;o uri-length: 2 octets long, specifies the length of=
 the URI data.<br></div>
<div><br></div>
<div>&nbsp;&nbsp;&nbsp;o URI: URI of zerotouch bootstrap server, using the =
HTTPS URI<br></div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;scheme defined in Section 2.7.2 of RFC72=
30. &nbsp;URI MUST be in<br></div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;form "https://&lt;ip-address-or-hostname=
&gt;[:&lt;port&gt;]".<br></div>
<div><br></div>
<div>So if I am correct above, please clarify this by changing<br></div>
<div>"bootstrap-server-list:" to "bootstrap-server-list is a list of 1 or m=
ore<br></div>
<div>items, each with the following syntax:" (Or something like this.)<br><=
/div>
<div><br></div>
<div>Also, "URI" deserve to be a Normative Reference, as it defines the<br>=
</div>
<div>generic syntax you are referring to.<br></div>
</blockquote><div><br></div>
</div>
</blockquote><div><br></div>
</div>
<div>[if &nbsp;Propose removing the =E2=80=98bootstrap-server-list:=E2=80=
=99 line and extending<br></div>
<div>the intro paragraph to read:<br></div>
<div><br></div>
<div>&nbsp;"Both of the DHCPv4 and DHCPv6 options defined in this section e=
ncode<br></div>
<div>&nbsp;a list of bootstrap server URIs. &nbsp;The "URI" structure is an=
 option<br></div>
<div>&nbsp;that can contain multiple URIs (see [RFC7227], Section 5.7). Eac=
h URI<br></div>
<div>&nbsp;entry in the bootstrap-server-list is structured as follows:=E2=
=80=9D<br></div>
<div><br></div>
<div>Also, I=E2=80=99ve added RFC7230 to the normative references.]<br></di=
v>
<div><br></div>
</div>
</blockquote><div>Yes, this looks good to me.<br></div>
<div><br></div>
<div>Thank you,<br></div>
<div>Alexey</div>
</body>
</html>

--_----------=_15445468022396960--


From nobody Thu Dec 13 05:44:22 2018
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 822111271FF for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 05:44:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Level: 
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YjdgrBbwWA3B for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 05:44:17 -0800 (PST)
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70155126DBF for <netconf@ietf.org>; Thu, 13 Dec 2018 05:44:15 -0800 (PST)
Received: from mail.sit.fraunhofer.de (mail.sit.fraunhofer.de [141.12.84.171]) by mailext.sit.fraunhofer.de (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id wBDDiA3D016300 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 13 Dec 2018 14:44:12 +0100
Received: from [192.168.16.50] (134.102.43.163) by mail.sit.fraunhofer.de (141.12.84.171) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 13 Dec 2018 14:44:05 +0100
To: <netconf@ietf.org>
References: <154025088656.13688.15105519432052086428@ietfa.amsl.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
CC: Ignas Bagdonas <ibagdona@gmail.com>
Message-ID: <0aebf4fc-6027-272e-5801-0e3169928dc0@sit.fraunhofer.de>
Date: Thu, 13 Dec 2018 14:44:04 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <154025088656.13688.15105519432052086428@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [134.102.43.163]
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/CoAODFidMzW36wZiuwr1PrVLz_Y>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-yang-push-20.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Dec 2018 13:44:21 -0000

Hello all,

this work seems to have stopped to a grinding halt, again. IoT 
Directorate hat on, I would like to know the reasons, as they seem to be 
quite unfathomable to me, personally.

I would like to see a status report from the chairs why the 
"push-drafts" were not pushed forward. I would also like to see a 
summary of open items wrt to the WG state (to pick an 
example:ietf-netconf-yang-push was updated Okt 26th and the WG state is: 
WG Consensus: Waiting for Write-Up (wg milestone: Sep 2018 - WGLC for 
YANG Push).

Is there still a gap between consensus and write-up?

Taking into account the sheer amount of discussion, review and (I am a 
bit saddened that I think I have to highlight that again) urgency, I am 
very surprised that I am having such a hard time assessing the current 
state based on the list and github.

Please excuse me, if I am missing something very obvious here. I have to 
admit, I am growing more and more concerned about the relevance of 
contributions wrt YANG Telemetry created here in the last years.

Please clarify.

Viele GrÃ¼ÃŸe,

Henk

On 10/23/18 1:28 AM, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Network Configuration WG of the IETF.
> 
>          Title           : Subscription to YANG Datastores
>          Authors         : Alexander Clemm
>                            Eric Voit
>                            Alberto Gonzalez Prieto
>                            Ambika Prasad Tripathy
>                            Einar Nilsen-Nygaard
>                            Andy Bierman
>                            Balazs Lengyel
> 	Filename        : draft-ietf-netconf-yang-push-20.txt
> 	Pages           : 57
> 	Date            : 2018-10-22
> 
> Abstract:
>     Via the mechanism described in this document, subscriber applications
>     may request a continuous, customized stream of updates from a YANG
>     datastore.  Providing such visibility into updates enables new
>     capabilities based on the remote mirroring and monitoring of
>     configuration and operational state.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-yang-push/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netconf-yang-push-20
> https://datatracker.ietf.org/doc/html/draft-ietf-netconf-yang-push-20
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-yang-push-20
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf
> 


From nobody Thu Dec 13 10:30:50 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68924130E12 for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 10:30:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level: 
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iqubkclYHFv1 for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 10:30:46 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A49E8130E0F for <netconf@ietf.org>; Thu, 13 Dec 2018 10:30:46 -0800 (PST)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBDITVYY029494; Thu, 13 Dec 2018 10:30:43 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=vP6xEWhTdK7+kKLrx3CUCmGopW+vqDIbdiauPUkMcTA=; b=nKDpNWvHpMj7n8UcIGi60V1Uf+tsYBpU9EWvSlVa3wGtP6ETp8D35lxyvc8LXZ1EYQWp y8mF5l+Yu0aVzNLKV7EeoVQHEj8codL3Cf5VthN0wIFUDPyBUZvs1Q5hm+1q+/+M/cnp CyouBYuymY2lfu3nufBRaCR3K3JCgqO35AlsBO+Vkf5K7lQ5vuLykfot0Jypa16peqLM aH6nnexLRFk4z8Sru5dfrSJ5E1UFuk1hGFht4N3syNQKKMQ3SHUE8hqKf2vpAYLwI4Cj gEkQdpXe54AtAUM1oOX8xj8UlGwha2mBPG8ysMbdEg/NWiWvByyhy7ZpkEZulxvsfNjK kw== 
Received: from nam05-dm3-obe.outbound.protection.outlook.com (mail-dm3nam05lp2051.outbound.protection.outlook.com [104.47.49.51]) by mx0b-00273201.pphosted.com with ESMTP id 2pbqtp0n8s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 13 Dec 2018 10:30:43 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB5899.namprd05.prod.outlook.com (20.178.26.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.12; Thu, 13 Dec 2018 18:30:39 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.016; Thu, 13 Dec 2018 18:30:39 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "netconf@ietf.org" <netconf@ietf.org>
CC: Ignas Bagdonas <ibagdona@gmail.com>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-yang-push-20.txt
Thread-Index: AQHUal7o65nyG2LQQkWARgc0SMgi8qV8/xQA///8QYA=
Date: Thu, 13 Dec 2018 18:30:39 +0000
Message-ID: <471AD9D8-C374-464B-A921-24EC96400999@juniper.net>
References: <154025088656.13688.15105519432052086428@ietfa.amsl.com> <0aebf4fc-6027-272e-5801-0e3169928dc0@sit.fraunhofer.de>
In-Reply-To: <0aebf4fc-6027-272e-5801-0e3169928dc0@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.13]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB5899; 6:lIts5jy8i1/K7ZLRPkySN01Xy95DD6RmY6tTIntGiTqk0dIqJvurMuZfvAY2ECyeMLU5DI2b01MXqoqfB7SeOBb5/WRpuPtTZwDSp1b2JZcZfPIYH25JIB0cfQj8OBlOZXNJR3YcjZGdj3J+8Y3s7J7E4cEOfzzXtk5jU+9O2smSkJMKr72Afdp3qLOcgMYXtghFplrMxaMIh6x/xNEaCH5fLzmoKmh0dL1J5YfyPFayNoE30YswEcNrj1mhuAObFXMSF/amirTrJRc8LWth1/XDoyLQA76QdrEC5dv68HBxpr2sxnmK5S56FSSWZ1kgpYsSZORIZUfRRZUvXo2XUH8v2RjKDCAWVx67jFzHNMwTefKowbX9aMp5hLZtCxpw8wWaALM1If2XEOHDsftC1bE78Uf96Oui1N78n7tMQvHosMXzk4c0hACKSVnSN+RUYO9mFlTL76kl3gtKjj3/0g==; 5:cG7Ji4UNBJrm/YcnYOfDW0gY5N3PgNWqTDSz1Cvh2x44trL/5n5zASBCjUC/HD+WPKnwCr6xSkkCIZ0cgm++FMvl1x80Gvu4XE+iX/gHV7btWhCqq0nrs+XeF2nsi0VMuNVEF79NuBgIfKmjVdCG/9W1njFoxZIUWAWSfjJoI1I=; 7:uoDEmDmTaF9EX6GsTxz32fv46B2BwGLYCqg4SSDqf9254fluiyRlOhdp0YcyVkENZ7gYLmIuLD6vfvwAYrwrx+OEfAQIZofelcn0Tf0tfFFPFv9f3/892TOLootA19uec0hq3Ftm5IblHyux5ya9VQ==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 00bb0820-95b8-40ed-94ea-08d66129155a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB5899; 
x-ms-traffictypediagnostic: DM6PR05MB5899:
x-microsoft-antispam-prvs: <DM6PR05MB5899FC4D9A92FCB479279813A5A00@DM6PR05MB5899.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(3231475)(944501520)(52105112)(6055026)(148016)(149066)(150057)(6041310)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB5899; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB5899; 
x-forefront-prvs: 088552DE73
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(39860400002)(136003)(366004)(396003)(199004)(189003)(13464003)(53754006)(186003)(575784001)(2616005)(26005)(71200400001)(11346002)(76176011)(476003)(7736002)(478600001)(6506007)(53546011)(86362001)(97736004)(81166006)(14454004)(8936002)(8676002)(4001150100001)(25786009)(81156014)(102836004)(486006)(14444005)(110136005)(316002)(446003)(66066001)(256004)(6436002)(6486002)(68736007)(83716004)(71190400001)(229853002)(966005)(99286004)(58126008)(36756003)(66574011)(82746002)(33656002)(5660300001)(6116002)(2906002)(3846002)(2501003)(39060400002)(106356001)(4326008)(6246003)(53936002)(305945005)(6512007)(6306002)(105586002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB5899; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 9tPn41XwFUAkOXUkj50NIz8Ma2B4Ab5ZxNgDaQYSiRWhil+lX0wjXC4QJdyJLhpqtgpH5Dz78GGq5i1OXWJN77GksMkvemDj6OKqEWshUilb10c+ap230Bfo4b0fNZ1siLeoKForqa/9swWoDjA1B62VjTG6yfZ6B07LBRUKUxbbhOpmkD3xWPDZAhtClXEssY6VE9mf1f3YDIiDezTGGxJTdZe3922TQ7QJAFCHgCozffObIRJg81GG0VlLz9anm8iGoPYNhEYN17rAtGmxfsxqIgOK/AqjhmIz9bw95UqfPI82Qq1dtzWyp9R4qL9F
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <CBD7E6BEB61DC74C9A67D64BCA449CF6@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 00bb0820-95b8-40ed-94ea-08d66129155a
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Dec 2018 18:30:39.8034 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB5899
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-13_03:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812130158
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/B_u_KUYxk9Vuzf_KwWUiJ5C-5uU>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-yang-push-20.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Dec 2018 18:30:49 -0000
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=


From nobody Thu Dec 13 13:55:16 2018
Return-Path: <evoit@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97A45130EA8 for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 13:55:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.961
X-Spam-Level: 
X-Spam-Status: No, score=-15.961 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bp85aKrH6lGY for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 13:55:11 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5F21130DEB for <netconf@ietf.org>; Thu, 13 Dec 2018 13:55:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10162; q=dns/txt; s=iport; t=1544738111; x=1545947711; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=PXRDLMfiJCECc7BpqMoxDScZRFp6A3QFfF1mLQ3z84g=; b=bVsL6277AlFAQmbvegQB/q9qSUMccro7W+tLkhmGDYmRPIOi8F418rVo rZRMdZlIZJy5Xwjv5SAMOXK+1BWXMyTuUQa+O/dW5gWT9PXXAjt/ligYa arzm3CEwoitHmi6OAP7et61AyAYXL/0D3sv7NpCHTYTJ+8pGavBBAH4TB s=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AGAABM1BJc/5NdJa1jGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUQQBAQEBAQsBggNmgQInCoNyiBmMEoINg0WFTo5BFIF?= =?us-ascii?q?mCwEBGA+Df0YCF4JsIjQJDQEDAQECAQECbRwMhTwBAQEBAgEBASEROgsFBwQ?= =?us-ascii?q?CAQYCDgMDAQIBAgIJCBUCAgIfBgsVCAgCBAENBQiDGoFoAw0ID4xom1CBL4g?= =?us-ascii?q?BDYIcgQuLMReBQD+BEYMSgldHAQECAReBAoEEgkWCVwKgYS4JAocLhxyDKCC?= =?us-ascii?q?BXE2ET4pSiS6EdoERiW0CERSBJx84gVZwFRohgmwJgh4Xg0qFFIU/QTEBAYp?= =?us-ascii?q?5K4EBgR8BAQ?=
X-IronPort-AV: E=Sophos;i="5.56,349,1539648000"; d="scan'208";a="495400405"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 13 Dec 2018 21:55:10 +0000
Received: from XCH-RTP-014.cisco.com (xch-rtp-014.cisco.com [64.101.220.154]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id wBDLt9ZB003147 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 13 Dec 2018 21:55:10 GMT
Received: from xch-rtp-013.cisco.com (64.101.220.153) by XCH-RTP-014.cisco.com (64.101.220.154) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 13 Dec 2018 16:55:09 -0500
Received: from xch-rtp-013.cisco.com ([64.101.220.153]) by XCH-RTP-013.cisco.com ([64.101.220.153]) with mapi id 15.00.1395.000; Thu, 13 Dec 2018 16:55:08 -0500
From: "Eric Voit (evoit)" <evoit@cisco.com>
To: Kent Watsen <kwatsen@juniper.net>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "netconf@ietf.org" <netconf@ietf.org>
CC: Ignas Bagdonas <ibagdona@gmail.com>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-yang-push-20.txt
Thread-Index: AQHUal7ovxzydEqunE6iSKi8mRe5c6V8/xQA///8QYCAAIWI8A==
Date: Thu, 13 Dec 2018 21:55:08 +0000
Message-ID: <5c26d37058e5422cb630d9467ebe25e5@XCH-RTP-013.cisco.com>
References: <154025088656.13688.15105519432052086428@ietfa.amsl.com> <0aebf4fc-6027-272e-5801-0e3169928dc0@sit.fraunhofer.de> <471AD9D8-C374-464B-A921-24EC96400999@juniper.net>
In-Reply-To: <471AD9D8-C374-464B-A921-24EC96400999@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.56.234]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.154, xch-rtp-014.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/XErQjg1b95yYpc0YwaW3ja16Lew>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-yang-push-20.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Dec 2018 21:55:15 -0000
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From nobody Thu Dec 13 18:44:17 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EC55130F72; Thu, 13 Dec 2018 18:44:16 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <154475545649.32023.13892961839761712704@ietfa.amsl.com>
Date: Thu, 13 Dec 2018 18:44:16 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/lcQASiJDQeWRKXqbMQrs3uIVxJg>
Subject: [Netconf] I-D Action: draft-ietf-netconf-restconf-notif-11.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 02:44:16 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Dynamic subscription to YANG Events and Datastores over RESTCONF
        Authors         : Eric Voit
                          Reshad Rahman
                          Einar Nilsen-Nygaard
                          Alexander Clemm
                          Andy Bierman
	Filename        : draft-ietf-netconf-restconf-notif-11.txt
	Pages           : 25
	Date            : 2018-12-13

Abstract:
   This document provides a RESTCONF binding to the dynamic subscription
   capability of both subscribed notifications and YANG-Push.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-restconf-notif/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-restconf-notif-11
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-restconf-notif-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-restconf-notif-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Dec 13 23:40:56 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 419031310C2 for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 23:40:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bq9roMlBsYSL for <netconf@ietfa.amsl.com>; Thu, 13 Dec 2018 23:40:53 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 39E27130DC4 for <netconf@ietf.org>; Thu, 13 Dec 2018 23:40:53 -0800 (PST)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id 9F0D01AE0309 for <netconf@ietf.org>; Fri, 14 Dec 2018 08:40:50 +0100 (CET)
Date: Fri, 14 Dec 2018 08:40:50 +0100 (CET)
Message-Id: <20181214.084050.280161788949186202.mbj@tail-f.com>
To: netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <154475545649.32023.13892961839761712704@ietfa.amsl.com>
References: <154475545649.32023.13892961839761712704@ietfa.amsl.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/oa-ZNaKjC0P8pC1yTz9_flOqXng>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-restconf-notif-11.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 07:40:55 -0000

Hi,

The diff to -10 shows no changes, except for the date and changelog (!)

https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-restconf-notif-11


/martin



internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Network Configuration WG of the IETF.
> 
>         Title           : Dynamic subscription to YANG Events and Datastores over RESTCONF
>         Authors         : Eric Voit
>                           Reshad Rahman
>                           Einar Nilsen-Nygaard
>                           Alexander Clemm
>                           Andy Bierman
> 	Filename        : draft-ietf-netconf-restconf-notif-11.txt
> 	Pages           : 25
> 	Date            : 2018-12-13
> 
> Abstract:
>    This document provides a RESTCONF binding to the dynamic subscription
>    capability of both subscribed notifications and YANG-Push.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-restconf-notif/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netconf-restconf-notif-11
> https://datatracker.ietf.org/doc/html/draft-ietf-netconf-restconf-notif-11
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-restconf-notif-11
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf
> 


From nobody Fri Dec 14 04:15:11 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B7B3130FE5 for <netconf@ietfa.amsl.com>; Fri, 14 Dec 2018 04:15:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.16
X-Spam-Level: 
X-Spam-Status: No, score=-4.16 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RiQQprA-a8H3 for <netconf@ietfa.amsl.com>; Fri, 14 Dec 2018 04:15:07 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E5E612875B for <netconf@ietf.org>; Fri, 14 Dec 2018 04:15:07 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBECEW2r016170; Fri, 14 Dec 2018 04:15:05 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=haaWNE0g3cwM+ChbCWqW0hcB7jE4fk6uCFTXeZwzM9k=; b=Hs6xrbSqI0LFoGqpLNGVC28BwG0uhrtHg92foDOgKy6TcKJsIxLcwNLf2Q2JbsfvRZsj 3pN5aBQpSfCuEJZCAKUZ+kMu5A0bTPyCKZGbg2SyYxKEJfc1/QKHfVMzrUxVrlnG8ToR Y9j/QgHkV5mGSIUUpb9sW7aZOFT93/2kVzthxgDCamwfQgh6kdzYuT/Aw0oh7lu5Rnx1 zS9uPUMB22brftktYMdNSNVZWL8OxvXdsAry/yxtGZyOsUkg0VPw/lG60x1105d7d3xb JhXkSQjJfl0dDHev07JMBILIqDE/7S9R3N0LPzIE1reGfKg5VCmBBunBpoFh1gUkApy8 Ng== 
Received: from nam05-co1-obe.outbound.protection.outlook.com (mail-co1nam05lp2051.outbound.protection.outlook.com [104.47.48.51]) by mx0b-00273201.pphosted.com with ESMTP id 2pcbhg82jb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Fri, 14 Dec 2018 04:15:05 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB4748.namprd05.prod.outlook.com (20.176.109.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.14; Fri, 14 Dec 2018 12:15:02 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1425.021; Fri, 14 Dec 2018 12:15:02 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-restconf-notif-11.txt
Thread-Index: AQHUk1bvDfukWhf/p0WKyYXtAN04+aV92f0AgABMnMs=
Date: Fri, 14 Dec 2018 12:15:02 +0000
Message-ID: <27E63464-7743-4BD7-9BE0-2960DBBFA431@juniper.net>
References: <154475545649.32023.13892961839761712704@ietfa.amsl.com>, <20181214.084050.280161788949186202.mbj@tail-f.com>
In-Reply-To: <20181214.084050.280161788949186202.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [96.231.191.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB4748; 6:SM+rDNiaMig6Wr0eNsqEWk54Ym7e9zZ1gUJGd9E7RwrnBAJq+baRCl3majPl6e8msk8cYaZazf1mvjAMHZHLGtJSmnVxryXV1VTF1yYdNm28/YrDYpkfFxyUKRpndIWCmBmLTG1/qHo8HkAOljnenKOKRxL8fVxF82ppScQ0W8Dal0JzsrOnQt+3wmmzI3RYSALvy61paFewqIXw57di1mu/vggNUTwsB1Sp6K7HOVCu6GahD5ogy07rpbIRFyFKA8lZrkbYgw3yeMqapRkB9LGvkYRgc2KPKD//DY1YmjDyzmSa2PH/XZoeeswAZGNb8byGyP7ieTWtSiNu9dns1SEmS3gkFyj3F2ZRk0h0pNtlkNqyN4OANhPmxgJwi7sbqJ2WnmTirMH64wQ2l+Nm1vu805VLBPgungwvaqvucaf+7+ePFSGyHDHuUdpG2po4zaYDT6hZYu+5oPwM5b0HqQ==; 5:nG4xob9gCJj0bHAnNxLJ20s/r0JnEEH4YajTmEpt900K139aoih9t/czmP210RTsyPY3V9elNd7ARM488BaGY5kV+5e6rKQc1FFHBLdq/5cjJLa4NsiAWgQC6CKLT6vTw+TgTe2Ny2eJfsp25fUXGSY4T+NBwHV4vOxfT50/+Zs=; 7:pfxRWnqFLpPdC0+uZt5IUOmXu1GCa1+y0J2W9a+/wAuHhbYHmKg+uNzg7NHk9l9dCqajtsTvn+4u67WhubAZWFpxnHb62NsejqZaArJJqzIWNT3cCmjDK6ztX9Bmr+Up9tAzfwjLW8kN1uYjQPC4FQ==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 2d2b829b-5d8d-4239-651d-08d661bdc673
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB4748; 
x-ms-traffictypediagnostic: DM6PR05MB4748:
x-microsoft-antispam-prvs: <DM6PR05MB4748EE7771C75A2A9353822CA5A10@DM6PR05MB4748.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(6040522)(2401047)(5005006)(8121501046)(3002001)(10201501046)(3231475)(944501520)(52105112)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB4748; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB4748; 
x-forefront-prvs: 08864C38AC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(136003)(396003)(366004)(346002)(39860400002)(199004)(189003)(54534003)(86362001)(53546011)(229853002)(6436002)(106356001)(81156014)(6506007)(36756003)(7736002)(6486002)(5660300001)(478600001)(82746002)(2906002)(4326008)(6246003)(68736007)(6916009)(8676002)(105586002)(25786009)(966005)(256004)(71190400001)(83716004)(71200400001)(66574011)(575784001)(99286004)(3846002)(2616005)(305945005)(446003)(486006)(6512007)(76176011)(6306002)(11346002)(53936002)(476003)(26005)(4001150100001)(186003)(8936002)(316002)(6116002)(81166006)(33656002)(14454004)(97736004)(66066001)(102836004); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB4748; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: n2X9xTEBjh1wfveprgnamjzYIkwbQo1379qIc7QyjgJ1A7iDe7tQkq4Nhhu2MgbKs62UsulDuNKTJ3HeOFtLvJxeNczOGejjX0shT799uFyLpUIzfJPepwE7wr5CUUgfffavTf/3OKUeXE780KyNZTEFXLOkGVpjr8CU4mgRa6DEIPc/BsY4gWseTgS+8uG7gq1/9faniOIFIB32OkfpKu9PaY6ndUpIy8uIhsDpVtygoTcKQrCeJr/FJqMXfHM5/cUajhwCrx/4G2t8JHnus7tdrz09AQ52zIjj8suIgpXzQJ67fCxZvpHaJew8h9ey
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d2b829b-5d8d-4239-651d-08d661bdc673
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Dec 2018 12:15:02.4547 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB4748
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-14_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812140110
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/HsAxuL6mXVt1GthNCECmGvOPHV0>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-restconf-notif-11.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 12:15:10 -0000
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From nobody Fri Dec 14 09:53:05 2018
Return-Path: <jason.sterne@nokia.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94821130E37; Fri, 14 Dec 2018 09:53:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.36
X-Spam-Level: 
X-Spam-Status: No, score=-3.36 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7Lsjk4Gcyoff; Fri, 14 Dec 2018 09:52:59 -0800 (PST)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150093.outbound.protection.outlook.com [40.107.15.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C92B130DF9; Fri, 14 Dec 2018 09:52:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kQUgBmDRq0B7fMldeCv55dpy3Xem/NV1g3oA/AtRvws=; b=I3ZIBVcbVY1o0PQaQB8NRadrgZbunhCXsqd7VhsWBulJSC7STb41oNYRmmIIyuCsCL4sFqZup50Ke5ehvblH+BzgBWs6AF6qJ8XvvlgcmmN9t/c8c70kntSAzQWzfRxKUOE+uvH2KJT1/aRuVByWC5Cs9L0V51jQrOqe8eX2xnw=
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com (52.134.28.141) by VI1PR07MB5424.eurprd07.prod.outlook.com (20.178.15.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1425.9; Fri, 14 Dec 2018 17:52:56 +0000
Received: from VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::85f6:118d:d689:232a]) by VI1PR07MB3981.eurprd07.prod.outlook.com ([fe80::85f6:118d:d689:232a%2]) with mapi id 15.20.1446.010; Fri, 14 Dec 2018 17:52:56 +0000
From: "Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com>
To: "netmod@ietf.org" <netmod@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: magic leaf 'type' in IETF interfaces
Thread-Index: AdST1E2jOdI/metmQeWzMudzc2MYTQ==
Date: Fri, 14 Dec 2018 17:52:56 +0000
Message-ID: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [135.245.20.13]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB5424; 6:pU6jHCQ02h6ov+J65oElREhY83Qt8qKopgY5SAKPPQ/uzCmJiXONyGPH5XMRO41fIU3gY3YyF0l6gkIOBbp10EoNU7Qu+aP6I0GAnK0SBAoT56aFUpOWIPxfKPxk2Maer3XEsTtjmhpqCzQXFwzvhJoUOJRQasRIZvJIUlqaHRYLn/rpu7WNlfm6r88aTBZvxSpUGrmnmIO8fLMh+qKtkLPTEvwSBBFNM7so2mOBAV5gsNduH82Oqplcc1QBagUyVgewJ5qbPml2HsoidSPyW4DviLQR7w3e95oKLyhzHn5RqEKmoqugqu1r7aPaxy5AdsWPiGBHuY3yTqNq0x6w+IBzzY5aQQiKMKLfCoBX4l0RrmTDYCzpoKUnc9LBwBkZF1erFd+IM1KkazDkiDjXeEYIH196fMaBvjwL+S3r8JoGqOVE4udRy+lvwkfsf+ZLRvUyTIVAqUn/hu88FkUhPQ==; 5:jW7nvVIf/LeGMImEy1lZRln0HNhs0+YLitfLKzKDTT24yg0pot1C9SEJz+7tCswu4rtB1UwbB4iWHZXobLiJyztqBzT68dvoHbh48DsYFWu4+RDc/O32BOW9FgYp43KhEirdbFdfsaT7gmARsHa/ObbOY0C0NKJDFbdjDlMlbe0=; 7:T4eYHW1nno5Mk6Z+HcJbTqaNN8meMci530raECvS40M05+gQvy5Na3HnMRzT2JgFxs+em0Lom+Si8HFXqmfDO7ImqoQyYy8ZQiBSsG4kIGuk+JSuvHvL9zNtmdkBALrGDZuVg0eaG8oeun0Pg/lS6A==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: a8ce0273-7651-477a-5553-08d661ecfa7e
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:VI1PR07MB5424; 
x-ms-traffictypediagnostic: VI1PR07MB5424:
x-microsoft-antispam-prvs: <VI1PR07MB5424767D73C0DE796CCF71029BA10@VI1PR07MB5424.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(11241501185)(806100)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3231475)(944501520)(52105112)(10201501046)(3002001)(6055026)(148016)(149066)(150057)(6041310)(20161123562045)(20161123558120)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(201708071742011)(7699051)(76991095); SRVR:VI1PR07MB5424; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB5424; 
x-forefront-prvs: 08864C38AC
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(396003)(39860400002)(346002)(366004)(376002)(53754006)(199004)(189003)(476003)(450100002)(14454004)(316002)(486006)(6306002)(55016002)(97736004)(66066001)(9686003)(110136005)(54896002)(25786009)(2501003)(14444005)(106356001)(478600001)(81166006)(6116002)(81156014)(6346003)(86362001)(26005)(71200400001)(3846002)(8936002)(71190400001)(8676002)(6436002)(68736007)(256004)(53936002)(105586002)(5660300001)(6506007)(2906002)(99286004)(186003)(102836004)(790700001)(7736002)(7696005)(33656002)(74316002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB5424; H:VI1PR07MB3981.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jason.sterne@nokia.com; 
x-microsoft-antispam-message-info: p5o3iVr2n97z32gTnKlZ/ObKEAgTFf+JZVizcnIFeFtr0/HMv6cgKMpcQIIA28eEWNUc0HJ0JSBiQeYMHWs4OQ5+bJSEAUOCt1LxSF8YAydggjUrBmgldf7X2Rvr8BWkirnA5OmUlyjqSCqQa/22aT6TZiXbrwkk7M7AOsRRcXU4/TvsvSA5d3UHdCUntnozedHfJpX5ZhOyJFMLTvr9jKrDZIqniS3k3+ztQpUmvKBB9GYrDmrkoXHtRqN8vaUCsh9PvoPZEsayTqlgVF23JI7CDFnhxUxVqe2mdEJvJ2/gJU1gSGjiWF3lvr+6qTfx
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB39818BD20967B36B8F24DBA69BA10VI1PR07MB3981eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a8ce0273-7651-477a-5553-08d661ecfa7e
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Dec 2018 17:52:56.1950 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5424
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Hcb5LrHwPvtVzoBSFG5HPXKdxUw>
Subject: [Netconf] magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Dec 2018 17:53:03 -0000

--_000_VI1PR07MB39818BD20967B36B8F24DBA69BA10VI1PR07MB3981eurp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

Cross posting because I'm not sure whether this is more of interest to NETC=
ONF clients or a general YANG & datastore question.

In IETF Interfaces there is a leaf 'type'. Here is a snippet of the model:

      leaf type {
        type identityref {
          base interface-type;
        }
        mandatory true;
        description
          "The type of the interface.

           When an interface entry is created, a server MAY
           initialize the type leaf with a valid value

This says that although the leaf is mandatory, a NETCONF client creating a =
new interface does not have to specify/provide that leaf. That strikes me a=
s the first unusual point.

Secondly -> this also means that a NETCONF client may send a config with el=
ements X, Y, and Z, but then later read back the config to see X, Y, Z and =
T  (e.g. type). But they never configured the type leaf.

Shouldn't most clients generally assume that what they write, they read bac=
k (unless there are 'choice' or 'when' statements involved of course, but t=
hat are part of the YANG and any auto-clearing behavior from those would be=
 expected)?

Or does 'anything go' / 'market decides' when it comes to behavior like thi=
s explained in 'description' statements?

Is it just fine that some NETCONF servers auto-magically create some (extra=
) data nodes inside a list entry that a client created? (would like to see =
opinions from multiple people on this - especially client developers).

I would think that each and every magic creation/deletion/changes done by a=
 server (i.e. that aren't part of the YANG, except perhaps part of a human-=
readable (non-machine parsable) 'description' statement) would require some=
 special handling code on the client (or app above the client) side.

I can imagine several alternatives to the way it was modelled above:
1) NMDA approach: make the leaf optional. If the operator doesn't set that =
leaf, then reading the conventional datastores doesn't return that leaf. Bu=
t reading the operational DS could return the actual system selected value.
2) separate config & state leafs for 'type':  make the leaf optional. If th=
e operator doesn't set that leaf, then reading the conventional datastores =
doesn't return that leaf. But have another state leaf called 'oper-type'.

I'm not proposing to re-open the IETF Interface model. Just using it to ask=
 questions about server created config data and explore alternatives.

Jason

--_000_VI1PR07MB39818BD20967B36B8F24DBA69BA10VI1PR07MB3981eurp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-CA" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi all,<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Cross posting because I'm not s=
ure whether this is more of interest to NETCONF clients or a general YANG &=
amp; datastore question.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In IETF Interfaces there is a l=
eaf 'type'. Here is a snippet of the model:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
leaf type {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; type identityref {<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; base interface-type;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; }<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; mandatory true;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp; description<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; &quot;The type of the interface.<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; When an interface entry is created, a server =
MAY<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp; initialize the type leaf with a valid value<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This says that although the lea=
f is mandatory, a NETCONF client creating a new interface does not have to =
specify/provide that leaf. That strikes me as the first unusual point.<o:p>=
</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Secondly -&gt; this also means =
that a NETCONF client may send a config with elements X, Y, and Z, but then=
 later read back the config to see X, Y, Z and T&nbsp; (e.g. type). But the=
y never configured the type leaf.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Shouldn't most clients generall=
y assume that what they write, they read back (unless there are 'choice' or=
 'when' statements involved of course, but that are part of the YANG and an=
y auto-clearing behavior from those
 would be expected)?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Or does 'anything go' / 'market=
 decides' when it comes to behavior like this explained in 'description' st=
atements?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Is it just fine that some NETCO=
NF servers auto-magically create some (extra) data nodes inside a list entr=
y that a client created? (would like to see opinions from multiple people o=
n this - especially client developers).<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I would think that each and eve=
ry magic creation/deletion/changes done by a server (i.e. that aren't part =
of the YANG, except perhaps part of a human-readable (non-machine parsable)=
 'description' statement) would require
 some special handling code on the client (or app above the client) side.<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I can imagine several alternati=
ves to the way it was modelled above:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">1) NMDA approach: make the leaf=
 optional. If the operator doesn't set that leaf, then reading the conventi=
onal datastores doesn't return that leaf. But reading the operational DS co=
uld return the actual system selected
 value.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">2) separate config &amp; state =
leafs for 'type':&nbsp; make the leaf optional. If the operator doesn't set=
 that leaf, then reading the conventional datastores doesn't return that le=
af. But have another state leaf called 'oper-type'.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I'm not proposing to re-open th=
e IETF Interface model. Just using it to ask questions about server created=
 config data and explore alternatives.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Jason<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_VI1PR07MB39818BD20967B36B8F24DBA69BA10VI1PR07MB3981eurp_--


From nobody Mon Dec 17 00:15:17 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D028F128CE4; Mon, 17 Dec 2018 00:15:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1SKYOnq6LX6H; Mon, 17 Dec 2018 00:15:08 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 27369128BCC; Mon, 17 Dec 2018 00:15:08 -0800 (PST)
Received: from localhost (unknown [173.38.220.45]) by mail.tail-f.com (Postfix) with ESMTPSA id B1FF21AE0397; Mon, 17 Dec 2018 09:15:06 +0100 (CET)
Date: Mon, 17 Dec 2018 09:15:05 +0100 (CET)
Message-Id: <20181217.091505.218628572185200621.mbj@tail-f.com>
To: jason.sterne@nokia.com
Cc: netmod@ietf.org, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/bbpP3GkVQ9HlJO644cTIiSM8C8Q>
Subject: Re: [Netconf] magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Dec 2018 08:15:10 -0000

Hi,

"Sterne, Jason (Nokia - CA/Ottawa)" <jason.sterne@nokia.com> wrote:
> Hi all,
> 
> Cross posting because I'm not sure whether this is more of interest to
> NETCONF clients or a general YANG & datastore question.
> 
> In IETF Interfaces there is a leaf 'type'. Here is a snippet of the
> model:
> 
>       leaf type {
>         type identityref {
>           base interface-type;
>         }
>         mandatory true;
>         description
>           "The type of the interface.
> 
>            When an interface entry is created, a server MAY
>            initialize the type leaf with a valid value
> 
> This says that although the leaf is mandatory, a NETCONF client
> creating a new interface does not have to specify/provide that
> leaf. That strikes me as the first unusual point.

Yes, unusual, but "safe" in the sense that a client that doesn't have
code for this special case will just see the "mandatory true" and
provide a value for the type as well.

> Secondly -> this also means that a NETCONF client may send a config
> with elements X, Y, and Z, but then later read back the config to see
> X, Y, Z and T (e.g. type). But they never configured the type leaf.

Right, but again this only happens for clients that know this special
rule.

> Shouldn't most clients generally assume that what they write, they
> read back (unless there are 'choice' or 'when' statements involved of
> course, but that are part of the YANG and any auto-clearing behavior
> from those would be expected)?
> 
> Or does 'anything go' / 'market decides' when it comes to behavior
> like this explained in 'description' statements?
> 
> Is it just fine that some NETCONF servers auto-magically create some
> (extra) data nodes inside a list entry that a client created? (would
> like to see opinions from multiple people on this - especially client
> developers).

In general, my reply is "no, that is not fine".

The reason for this unusual design is that most existing systems code
type-info into the name of an interface ("ethX", "ge-X/Y/Z",
"GigabitEthernet-X/Y" etc), and having to provide the type in the name
and in a special leaf would just be redundant and error prone.  The
thinking at the time was that the interface model that we designed had
to adapt to how existing systems behave.

> I would think that each and every magic creation/deletion/changes done
> by a server (i.e. that aren't part of the YANG, except perhaps part of
> a human-readable (non-machine parsable) 'description' statement) would
> require some special handling code on the client (or app above the
> client) side.

Yes.  But as long as this special handling is optional in the client I
think it is ok.

> I can imagine several alternatives to the way it was modelled above:
> 1) NMDA approach: make the leaf optional. If the operator doesn't set
> that leaf, then reading the conventional datastores doesn't return
> that leaf. But reading the operational DS could return the actual
> system selected value.
>
> 2) separate config & state leafs for 'type': make the leaf
> optional. If the operator doesn't set that leaf, then reading the
> conventional datastores doesn't return that leaf. But have another
> state leaf called 'oper-type'.

Both these cases assume that the type can be derived from the name.

> I'm not proposing to re-open the IETF Interface model. Just using it
> to ask questions about server created config data and explore
> alternatives.

The rule of thumb is to avoid server created config as much as
possible.


/martin


From nobody Mon Dec 17 01:06:17 2018
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEF85130E6D for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 01:06:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.058
X-Spam-Level: 
X-Spam-Status: No, score=-4.058 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.723, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com header.b=bPsQBFCk; dkim=pass (1024-bit key) header.d=ericsson.com header.b=RoCwl6T+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AGoFpUSCGUPj for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 01:06:03 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79C12128CE4 for <netconf@ietf.org>; Mon, 17 Dec 2018 01:06:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple;  q=dns/txt; i=@ericsson.com; t=1545037560; x=1547629560; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=BIJoJrwfmNge57lMx1ibO6KY5q4WxAwFAWDgpqYr5Jg=; b=bPsQBFCkt8UAR+xeCcqF9x1QL7va63yQkSuB756rWClIqhv2SjKDHo0gsg2/ilwi Fzcspn+Jr7ugm+9EBu+pQETY2BkOyCYNPAjdMOrNyaigHPUUbbTPN6ZVZ/StmmjU k0EDAoKkouYnrmQ60nlh63YSuWBEnhpBhFA74X8lZvQ=;
X-AuditID: c1b4fb25-da1ff70000005ff7-56-5c1766f85a64
Received: from ESESBMB505.ericsson.se (Unknown_Domain [153.88.183.118]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id F5.C0.24567.8F6671C5; Mon, 17 Dec 2018 10:06:00 +0100 (CET)
Received: from ESESBMB505.ericsson.se (153.88.183.172) by ESESBMB505.ericsson.se (153.88.183.172) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Mon, 17 Dec 2018 10:06:00 +0100
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (153.88.183.157) by ESESBMB505.ericsson.se (153.88.183.172) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3 via Frontend Transport; Mon, 17 Dec 2018 10:06:00 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MpIzUzKYaTXUl9h6pIrM7hvvfznm4kicMWU6y3lnfoE=; b=RoCwl6T+VKxHobYsHq7j48ybJrA9bZfb114inyJREaADv1ygu0B5lHwuewgC2iFrWxRb65D0/l2eKblRkuOfAezvaDxUSxswFXeBRCUMc73ZunvN8mbvrgdGWX7gHsIFt4j1Vo9WeH6WFn0FeeEx22Fw5DZoJ6oJgvoaWn7eLLU=
Received: from VI1PR07MB5568.eurprd07.prod.outlook.com (20.178.80.94) by VI1PR07MB5726.eurprd07.prod.outlook.com (20.178.121.88) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1446.9; Mon, 17 Dec 2018 09:05:59 +0000
Received: from VI1PR07MB5568.eurprd07.prod.outlook.com ([fe80::e4b9:de8d:5325:e729]) by VI1PR07MB5568.eurprd07.prod.outlook.com ([fe80::e4b9:de8d:5325:e729%5]) with mapi id 15.20.1446.015; Mon, 17 Dec 2018 09:05:59 +0000
From: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>
To: Martin Bjorklund <mbj@tail-f.com>, "jason.sterne@nokia.com" <jason.sterne@nokia.com>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] [Netconf] magic leaf 'type' in IETF interfaces
Thread-Index: AdST1E2jOdI/metmQeWzMudzc2MYTQCDE/6AAAHFl4A=
Date: Mon, 17 Dec 2018 09:05:59 +0000
Message-ID: <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com>
In-Reply-To: <20181217.091505.218628572185200621.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [89.135.192.225]
user-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.3
x-clientproxiedby: HE1PR0502CA0020.eurprd05.prod.outlook.com (2603:10a6:3:e3::30) To VI1PR07MB5568.eurprd07.prod.outlook.com (2603:10a6:803:c1::30)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB5726; 6:FJU3hQbXZp/katRt+vpLcFTFHrgZRP0i7smxyoJ/kDJiNqIMNThFcGEhunoTNSAl/+nkxDw8tyuIBGmoDxa4oweNZlL//BDOslVPcMyZvCAfwbTDs0SzD2EXa8EBu86+IoePg7vJL31alD8ZTZtLZ+s87RyfQXBGbz1jh92L9UDPPrkgt9Kquj8kXiXoZoLbXbpmaM9QbvH0guA0l/Y/6Nzoag2RlbfpwneGbc9P6FTCn4sOEJlj8Ayb0jlrTM2+MafLpHlfpWmumyaWhHH/gYortzqu9gfCzjaR5x5BzUUVNiRdNZPdZWZFq8mvfvJnRtogHVXbhK2Gh8lNPMVyrmXrkUg/ZQxGfUuv7i60QUFokkcMzWIaQgC/ZfEaWaCt3kgMAW9vlm0QpAiYcCITnf5Sh6SlJ40SeN2pzfi6Q7WpeGPWultko8YCWSpShd1HSFOil0CBx9ZH+jq8FUNwKw==; 5:RM5abbuyRVIhFUfmKSdOTMgm898SHAtXdpfWXMfpXtH6giyj56g2sS1UIPaJZqfwI8n79ALWuWlKZolFA89Z4L0t2TZZhwn1LXQbeksKYPj8VmRIUfQs2ArK/Z9FCVm7lXtV7jzkbdF0siR60K1GTKtPyKf3ktPSEEdxpMnQpQY=; 7:WTWskPriQb25dcszReZs+Q85rwmtpLHWjlCp5Y3cc7oBtzeotOmscWj8eAN/3IE0S7QvmY4/n42eqVo5cWPP+F6iIa+ABlBUJnEyF+bkAouhKw6FsvqUtmTW6R+iKhV5wP5dMmE9pDvXQvcfQjf0og==
x-ms-office365-filtering-correlation-id: a4bb469e-e4bf-4735-9869-08d663fedc66
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7153060)(49563074)(7193020); SRVR:VI1PR07MB5726; 
x-ms-traffictypediagnostic: VI1PR07MB5726:
x-microsoft-antispam-prvs: <VI1PR07MB5726598EB35A40A818CCB5A1F0BC0@VI1PR07MB5726.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(102415395)(6040522)(2401047)(5005006)(8121501046)(3231475)(944501520)(4983020)(52105112)(93006095)(93001095)(10201501046)(3002001)(148016)(149066)(150057)(6041310)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:VI1PR07MB5726; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB5726; 
x-forefront-prvs: 08897B549D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(346002)(376002)(136003)(366004)(39860400002)(189003)(199004)(102836004)(8936002)(81166006)(54896002)(386003)(6506007)(6512007)(186003)(8676002)(26005)(81156014)(64126003)(236005)(71200400001)(71190400001)(65826007)(6486002)(99286004)(99936001)(53936002)(5660300001)(52116002)(76176011)(2906002)(25786009)(66066001)(65806001)(6436002)(7736002)(68736007)(65956001)(476003)(2616005)(11346002)(486006)(446003)(256004)(14444005)(36756003)(54906003)(86362001)(85182001)(3846002)(2501003)(6116002)(85202003)(106356001)(110136005)(14454004)(105586002)(58126008)(316002)(31696002)(31686004)(4326008)(478600001)(97736004)(6246003)(229853002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB5726; H:VI1PR07MB5568.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 0yQfBMFp2nWsDSCfviSnjYKuZynBxulXcFwt4Zr2GCJViD/p2dTXYsDyldp59E1wZY8HM7syWuCa9SmHkzz9XuY/CH+KV5sIYqESdIa7Cjbk6bkeWFcHs5HHiEc3h24pWEQrQyRB8+ZvS0h0x2VrsiPiDuiPyRAJ1zpxkmVn5R/xiOt8h4bcsWSHTeRM6/7P/agFMw+M6GIkTKXAblZ82PZ/NVreaWtC9lxk+Puo8Rl1eYRYHKZCr34LUas4TCwjsdTAnhColTwrXXt4PdfD+QUg7KXuhy1sNHRe1O/vI3si1ZvI1ikLUPlhiqy3j1fI
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="------------ms060507050409070400090809"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: a4bb469e-e4bf-4735-9869-08d663fedc66
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Dec 2018 09:05:59.3300 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5726
X-OriginatorOrg: ericsson.com
X-Brightmail-Tracker: H4sIAAAAAAAAA2WSa0hTYRjHe3fOzuahwXFN92D0wYP6YZU1u7gyzMrIAq2gIGRpK082XZvt qGRfXEp4GdLFJBVJpTEyh5cVJZaY4qUrpaHVTFNnoqldIe/Wttcg6Nvvef///3OBV0xIx4V+ Yq0+lTPqNTqWosmSYw/S18+clqs32mwhKvvNJkJlNo+KVEX2PqGqvOuiMIKMslhmBVH9jm5B VP3cLfIQEUvvSOB02nTOuCH8BH3mSY+TTPkWdv5ydyVlQo2h+chLDMxmyB26K8pHtFjKtCFo fPyDxMUvBO2lUwgXFgG8q832KCRzhYDsxbblzFUBFI72E7gYRvC7zEK5O1NMJOR8aRa4WcbE QtVkK+lmgomBbtNboZtXuTzTTXYCe/ZC4cKka57Yxduho2OP+5lkAuH2hwpPVMLshK8v6oR4 1jUE483zyC14MRFQPT/hMSHGF6af2QR4lhwcI+UCfKkMhrqeU5h9YNy5JMTMQvFnh4d9mONQ lJflOQaYGwgGc2pFuGkcPBrIXQ6vg5dvRxDmNdBdbkY40EtBVcPgctdocIzdJrHgcK36MY/E ggKmsloI95nAJMPAovYKUpb+syzmPAR2W0ip52pveFoyQpa6EgQTBNZL7P/2tWCtnCAwh0Hx XAuF2R+um4dEmLfARPt3hHkTWGsWqQpE30E+PMefPJsYsimYM2pP8bxBH6znUu3I9ela7s0H NqA3k7taESNG7ErJgTi5WirUpPMZZ1tRgKvPcF31a+RH6g16jpVJCrb5qqWSBE3GBc5oiDem 6Ti+Fa0Wk6xcsiD1VkuZRE0ql8xxKZzxryoQe/mZEKV4MZYUP5k8lJEpPedMCdEfNtBWRVRv JiFiD+pmjoTTs9YwzrnE9Q3u3ncw7Nt+mX/o0c445U96w7MeHpRbV/TIYsIVhnp4WKarMZuK zBpa1RcRpFP3Kc3T1b+S899P2dWmzQHFQnNawKdODTyILEgKvpDDxkV3nX51nyX5MxqlgjDy mj9MnCA9fAMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ATYDpUNvWjJJrrdKQubWS9EqeBI>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Dec 2018 09:06:17 -0000

--------------ms060507050409070400090809
Content-Type: text/html; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DUTF=
-8">
  </head>
  <body text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p>Hello,</p>
    <p>While I agree with Martin, in our systems we have a number of
      places, where the system does create configuration in running, due
      to</p>
    <ul>
      <li>different levels of automation and autonomous algorithms
        kick-in</li>
      <li>the created config needs to be possible to be further modified
        by the operator</li>
      <li>the created config needs to be referenced from operator
        created config</li>
      <li>the created config is not always ephemeral, it might need to
        be part of backup/restore</li>
    </ul>
    <p>regards Balazs<br>
    </p>
    <div class=3D"moz-cite-prefix">On 2018. 12. 17. 9:15, Martin Bjorklun=
d
      wrote:<br>
    </div>
    <blockquote type=3D"cite"
      cite=3D"mid:20181217.091505.218628572185200621.mbj@tail-f.com">
      <pre class=3D"moz-quote-pre" wrap=3D"">The rule of thumb is to avoi=
d server created config as much as
possible.


/martin
</pre>
    </blockquote>
    <pre class=3D"moz-signature" cols=3D"72">--=20
Balazs Lengyel                       Ericsson Hungary Ltd.
Senior Specialist
Mobile: +36-70-330-7909              email: <a class=3D"moz-txt-link-abbr=
eviated" href=3D"mailto:Balazs.Lengyel@ericsson.com">Balazs.Lengyel@erics=
son.com</a>=20
</pre>
  </body>
</html>


--------------ms060507050409070400090809
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms060507050409070400090809--


From nobody Mon Dec 17 08:40:28 2018
Return-Path: <jonathan@hansfords.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24AFF130EC2 for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 08:40:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.99
X-Spam-Level: 
X-Spam-Status: No, score=-1.99 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=hansfords.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzTmrjaJDu5B for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 08:40:23 -0800 (PST)
Received: from mail.myfast.site (mail.myfast.site [109.203.117.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DD92128CB7 for <netconf@ietf.org>; Mon, 17 Dec 2018 08:40:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=hansfords.net; s=default; h=Content-Type:Mime-Version:Reply-To:Message-Id: Date:Subject:To:From:Sender:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=6FEICGBpYF5X0vOr+FEEPDMgnxDtaPwPu5UcIjYKvRE=; b=13Fdt/aiZvcKN8wrPvejbQZKbw IcAI7/c3eNwYVfkWE3Zvu4bIkN9dml3SixYCv8PdYrgZj8xq0ulb/78DAwUH6rDlDVoFpiXKGEg2v utUPixvxLClp6WpQwv4Af11kVJZ+Icw1AppRFCRzCT2J1IyiOoBcNGlZFCwELIhyIsDTojFnWQpWL b6uh8H+IHmoLXFuYpla0EW3Y/hRig1N2PutQfatjJm/EOMnb0dyfWNrZzh6YB55xKH2YdeuZdV+oc ExIhJZVL+qWeRS66viXgYeXYID66/V6DGVGrcCLRkUXBH6Od38/4Ojt5dcWDA071zp2tnpUlTWgOQ adJXrE1Q==;
Received: from [51.52.247.166] (port=51879 helo=[172.16.1.65]) by mail.myfast.site with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.91) (envelope-from <jonathan@hansfords.net>) id 1gYvwK-00BdSh-Ae; Mon, 17 Dec 2018 16:40:20 +0000
From: "Jonathan Hansford" <jonathan@hansfords.net>
To: "netconf@ietf.org" <netconf@ietf.org>
Date: Mon, 17 Dec 2018 16:40:18 +0000
Message-Id: <em6adf925f-5933-4fdb-849b-d54aed61e01d@morpheus>
Reply-To: "Jonathan Hansford" <jonathan@hansfords.net>
User-Agent: eM_Client/7.2.34062.0
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="------=_MB8A7855E6-6A89-47C3-A9DC-0F86BDA66715"
X-Antivirus: Avast (VPS 181217-4, 17/12/2018), Outbound message
X-Antivirus-Status: Clean
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - mail.myfast.site
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - hansfords.net
X-Get-Message-Sender-Via: mail.myfast.site: authenticated_id: jonathan@hansfords.net
X-Authenticated-Sender: mail.myfast.site: jonathan@hansfords.net
X-Source: 
X-Source-Args: 
X-Source-Dir: 
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/VUzIuwuBKW1bFElQNbukahGu5EM>
Subject: [Netconf] delete-config on candidate
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Dec 2018 16:40:26 -0000

--------=_MB8A7855E6-6A89-47C3-A9DC-0F86BDA66715
Content-Type: text/plain; format=flowed; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

In 2009-2010 the question was asked whether the <delete-config> 
operation was allowed on the candidate configuration datastore. In May 
2010 it was stated "The <delete-config> definition need not list all 
disallowed options. But the section on :candidate does not like (sic) 
<delete-config> as a modified operation.  This means delete-config is 
not allowed." (See Re: [Netconf] delete-config on candidate? 
<https://mailarchive.ietf.org/arch/msg/netconf/k-ioZ8Ev3vc27ky4dHH-cQtTEnY>=
)

The implication is that, unless something is explicitly stated as being 
allowed (in this case in RFC 4741 and, presumably, by extension RFC 
6241), it is not allowed.

I have just checked RFC 6241 and, on that basis, come to the following 
conclusions:
<copy-config> : <running>, <candidate>, <startup> and <url> are allowed 
as sources and targets<delete-config> : <startup> and <url> are allowed 
as targets; <running> is explicitly excluded; <candidate> is implicitly 
excluded<edit-config> : <running> and <candidate> are allowed as 
targets; <startup> and <url> are implicitly excluded, though <url> can 
be the config<get-config> : <candidate> and <startup> are allowed as 
sources; <running> is used in examples and therefore I assume this 
constitutes an implicit inclusion; <url> is implicitly excluded<lock> 
and <unlock> : <running>, <candidate> and <startup> are allowed as 
targets; <url> is implicitly excluded<validate> : <candidate>, <startup> 
and <url> are allowed as sources; <running> is implicitly excluded
So, in summary:
<running> is not a valid target for <delete-config> or a valid source 
for <validate>; it is probably a valid source for 
<get-config><candidate> is not a valid target for 
<delete-config><startup> is not a valid target for <edit-config><url> is 
not a valid target for <edit-config> (though it can be the config), 
<lock> or <unlock>, or a valid source for <get-config>
Is that the general understanding of which operations can be used on 
which datastores?

Thanks,

Jonathan

---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus

--------=_MB8A7855E6-6A89-47C3-A9DC-0F86BDA66715
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><style>#xe0516223b71f4a818462a014b97b1ddb{
	font-family:'Segoe UI';
	font-size:12pt;
}</style>

<style id=3D"css_styles">
blockquote.cite { margin-left: 5px; margin-right: 0px; padding-left: 10px; =
padding-right:0px; border-left: 1px solid #cccccc }
blockquote.cite2 {margin-left: 5px; margin-right: 0px; padding-left: 10px; =
padding-right:0px; border-left: 1px solid #cccccc; margin-top: 3px; padding=
-top: 0px; }
a img { border: 0px; }
li[style=3D'text-align: center;'], li[style=3D'text-align: right;'] {  list=
-style-position: inside;}
body { font-family: Segoe UI; font-size: 12pt;   }
</style>
</head>
<body>Hi,<div><br /></div><div>In 2009-2010 the question was asked whether =
the &lt;delete-config&gt; operation was allowed on the candidate configurat=
ion datastore. In May 2010 it was stated "The &lt;delete-config&gt; definit=
ion need not list all disallowed options.=C2=A0But the section on :candidat=
e does not like (sic) &lt;delete-config&gt; as a=C2=A0modified operation.=
=C2=A0 This means delete-config is not allowed." (See=C2=A0<a href=3D"https=
://mailarchive.ietf.org/arch/msg/netconf/k-ioZ8Ev3vc27ky4dHH-cQtTEnY">Re: [=
Netconf] delete-config on candidate?</a>)</div><div><br /></div><div>The im=
plication is that, unless something is explicitly stated as being allowed (=
in this case in RFC 4741 and, presumably, by extension RFC 6241), it is not=
 allowed.=C2=A0</div><div><br /></div><div>I have just checked RFC 6241 and=
, on that basis, come to the following conclusions:</div><div><ul style=3D"=
list-style-type: disc;"><li>&lt;copy-config&gt; : &lt;running&gt;, &lt;cand=
idate&gt;, &lt;startup&gt; and &lt;url&gt; are allowed as sources and targe=
ts</li><li>&lt;delete-config&gt; : &lt;startup&gt; and &lt;url&gt; are allo=
wed as targets; &lt;running&gt; is explicitly excluded; &lt;candidate&gt; i=
s implicitly excluded</li><li>&lt;edit-config&gt; : &lt;running&gt; and &lt=
;candidate&gt; are allowed as targets; &lt;startup&gt; and &lt;url&gt; are =
implicitly excluded, though &lt;url&gt; can be the config</li><li>&lt;get-c=
onfig&gt; : &lt;candidate&gt; and &lt;startup&gt; are allowed as sources; &=
lt;running&gt; is used in examples and therefore I assume this constitutes =
an implicit inclusion; &lt;url&gt; is implicitly excluded</li><li>&lt;lock&=
gt; and &lt;unlock&gt; : &lt;running&gt;, &lt;candidate&gt; and &lt;startup=
&gt; are allowed as targets; &lt;url&gt; is implicitly excluded</li><li>&lt=
;validate&gt; : &lt;candidate&gt;, &lt;startup&gt; and &lt;url&gt; are allo=
wed as sources; &lt;running&gt; is implicitly excluded</li></ul><div>So, in=
 summary:</div></div><div><ul style=3D"list-style-type: disc;"><li>&lt;runn=
ing&gt; is not a valid target for &lt;delete-config&gt; or a valid source f=
or &lt;validate&gt;; it is probably a valid source for &lt;get-config&gt;</=
li><li>&lt;candidate&gt; is not a valid target for &lt;delete-config&gt;</l=
i><li>&lt;startup&gt; is not a valid target for &lt;edit-config&gt;</li><li=
>&lt;url&gt; is not a valid target for &lt;edit-config&gt; (though it can b=
e the config), &lt;lock&gt; or &lt;unlock&gt;, or a valid source for &lt;ge=
t-config&gt;</li></ul><div>Is that the general understanding of which opera=
tions can be used on which datastores?</div></div><div><br /></div><div>Tha=
nks,</div><div><br /></div><div>Jonathan</div><div id=3D"DAB4FAD8-2DD7-40BB=
-A1B8-4E2AA1F9FDF2"><br />
<table style=3D"border-top: 1px solid #D3D4DE;">
	<tr>
        <td style=3D"width: 55px; padding-top: 13px;"><a href=3D"https://ww=
w.avast.com/sig-email?utm_medium=3Demail&utm_source=3Dlink&utm_campaign=3Ds=
ig-email&utm_content=3Demailclient" target=3D"_blank"><img src=3D"https://i=
pmcdn.avast.com/images/icons/icon-envelope-tick-round-orange-animated-no-re=
peat-v1.gif" alt=3D"" width=3D"46" height=3D"29" style=3D"width: 46px; heig=
ht: 29px;" /></a></td>
		<td style=3D"width: 470px; padding-top: 12px; color: #41424e; font-size: =
13px; font-family: Arial, Helvetica, sans-serif; line-height: 18px;">Virus-=
free. <a href=3D"https://www.avast.com/sig-email?utm_medium=3Demail&utm_sou=
rce=3Dlink&utm_campaign=3Dsig-email&utm_content=3Demailclient" target=3D"_b=
lank" style=3D"color: #4453ea;">www.avast.com</a>
		</td>
	</tr>
</table><a href=3D"#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width=3D"1" heigh=
t=3D"1"> </a></div></body></html>
--------=_MB8A7855E6-6A89-47C3-A9DC-0F86BDA66715--


From nobody Mon Dec 17 09:05:45 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FF07126DBF for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 09:05:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5PkIeYt1Nz2M for <netconf@ietfa.amsl.com>; Mon, 17 Dec 2018 09:05:41 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 9B659130EC6 for <netconf@ietf.org>; Mon, 17 Dec 2018 09:05:41 -0800 (PST)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id 873521AE0397; Mon, 17 Dec 2018 18:05:40 +0100 (CET)
Date: Mon, 17 Dec 2018 18:05:40 +0100 (CET)
Message-Id: <20181217.180540.1115262004271853034.mbj@tail-f.com>
To: jonathan@hansfords.net
Cc: netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <em6adf925f-5933-4fdb-849b-d54aed61e01d@morpheus>
References: <em6adf925f-5933-4fdb-849b-d54aed61e01d@morpheus>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/4Q-s6CZ7LcAKFHGwCzfCfeohnkQ>
Subject: Re: [Netconf] delete-config on candidate
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Dec 2018 17:05:43 -0000

Hi,

"Jonathan Hansford" <jonathan@hansfords.net> wrote:
> Hi,
> 
> In 2009-2010 the question was asked whether the <delete-config>
> operation was allowed on the candidate configuration datastore. In May
> 2010 it was stated "The <delete-config> definition need not list all
> disallowed options. But the section on :candidate does not like (sic)
> <delete-config> as a modified operation.  This means delete-config is
> not allowed." (See Re: [Netconf] delete-config on candidate?
> <https://mailarchive.ietf.org/arch/msg/netconf/k-ioZ8Ev3vc27ky4dHH-cQtTEnY>)
> 
> The implication is that, unless something is explicitly stated as
> being allowed (in this case in RFC 4741 and, presumably, by extension
> RFC 6241), it is not allowed.

Well, the quoted email was from the time when we worked on 4741bis,
aka 6241.

> I have just checked RFC 6241 and, on that basis, come to the following
> conclusions:
> <copy-config> : <running>, <candidate>, <startup> and <url> are
> allowed as sources and targets
>
> <delete-config> : <startup> and <url>
> are allowed as targets; <running> is explicitly excluded; <candidate>
> is implicitly excluded
>
> <edit-config> : <running> and <candidate> are
> allowed as targets; <startup> and <url> are implicitly excluded,
> though <url> can be the config
>
> <get-config> : <candidate> and <startup>
> are allowed as sources; <running> is used in examples and therefore I
> assume this constitutes an implicit inclusion; <url> is implicitly
> excluded
>
> <lock> and <unlock> : <running>, <candidate> and <startup> are
> allowed as targets; <url> is implicitly excluded
>
> <validate> :
> <candidate>, <startup> and <url> are allowed as sources; <running> is
> implicitly excluded
>
> So, in summary:
> <running> is not a valid target for <delete-config> or a valid source
> for <validate>; it is probably a valid source for
> <get-config><candidate> is not a valid target for
> <delete-config><startup> is not a valid target for <edit-config><url>
> is not a valid target for <edit-config> (though it can be the config),
> <lock> or <unlock>, or a valid source for <get-config>
> Is that the general understanding of which operations can be used on
> which datastores?

No; check the YANG module in RFC 6241 and you will see for example:

    rpc get-config {
      ...
      input {
        container source {
          description
            "Particular configuration to retrieve.";

          choice config-source {
            mandatory true;
            description
              "The configuration to retrieve.";
            leaf candidate {
              ...
            }
            leaf running {
              ...
            }


so it is clear that 'running' can be used in get-config.  Similar for
the others in your list.


/martin



From nobody Tue Dec 18 00:50:54 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 885561310DC for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 00:50:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xegWeJvufuEN for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 00:50:50 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB6FC13107D for <netconf@ietf.org>; Tue, 18 Dec 2018 00:50:49 -0800 (PST)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 5FEB4FC9F0BDE for <netconf@ietf.org>; Tue, 18 Dec 2018 08:50:45 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 18 Dec 2018 08:50:46 +0000
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.172]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Tue, 18 Dec 2018 16:50:42 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "rfc-editor@rfc-editor.org" <rfc-editor@rfc-editor.org>, "andy@yumaworks.com" <andy@yumaworks.com>, "kwatsen@juniper.net" <kwatsen@juniper.net>, "ibagdona@gmail.com" <ibagdona@gmail.com>, "warren@kumari.net" <warren@kumari.net>, "mjethanandani@gmail.com" <mjethanandani@gmail.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC8040 (5565)
Thread-Index: AQHUis0fOWI85JR8KUeCGWx7iiB8pKVsL8uAgACRE7D//34CAIAYBpnw
Date: Tue, 18 Dec 2018 08:50:42 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B1B0305@nkgeml513-mbx.china.huawei.com>
References: <20181203055737.B72D1B8122E@rfc-editor.org> <20181203.095409.224403340529984673.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com>
In-Reply-To: <20181203.104808.838283353261944785.mbj@tail-f.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LMVi7C_aNvyETBXoOHz5EEDX6vQ>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 08:50:52 -0000
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From nobody Tue Dec 18 03:47:03 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DF9C13111C for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 03:47:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OZkHbc7J7_1w for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 03:46:59 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id BB016130EC0 for <netconf@ietf.org>; Tue, 18 Dec 2018 03:46:58 -0800 (PST)
Received: from localhost (unknown [173.38.220.45]) by mail.tail-f.com (Postfix) with ESMTPSA id 0B9691B03C92; Tue, 18 Dec 2018 12:46:53 +0100 (CET)
Date: Tue, 18 Dec 2018 12:46:53 +0100 (CET)
Message-Id: <20181218.124653.2050609264975088634.mbj@tail-f.com>
To: bill.wu@huawei.com
Cc: rfc-editor@rfc-editor.org, andy@yumaworks.com, kwatsen@juniper.net, ibagdona@gmail.com, warren@kumari.net, mjethanandani@gmail.com, netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABA9B1B0305@nkgeml513-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABA9B177661@nkgeml513-mbs.china.huawei.com> <20181203.104808.838283353261944785.mbj@tail-f.com> <B8F9A780D330094D99AF023C5877DABA9B1B0305@nkgeml513-mbx.china.huawei.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ZoNbuJyOAaKTNYgDmj9y33z1WQY>
Subject: Re: [Netconf] [Technical Errata Reported] RFC8040 (5565)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 11:47:02 -0000

UWluIFd1IDxiaWxsLnd1QGh1YXdlaS5jb20+IHdyb3RlOg0KPiAtLS0tLemCruS7tuWOn+S7ti0t
LS0tDQo+IOWPkeS7tuS6ujogTWFydGluIEJqb3JrbHVuZCBbbWFpbHRvOm1iakB0YWlsLWYuY29t
XSANCj4g5Y+R6YCB5pe26Ze0OiAyMDE45bm0MTLmnIgz5pelIDE3OjQ4DQo+IOaUtuS7tuS6ujog
UWluIFd1DQo+IOaKhOmAgTogcmZjLWVkaXRvckByZmMtZWRpdG9yLm9yZzsgYW5keUB5dW1hd29y
a3MuY29tOyBrd2F0c2VuQGp1bmlwZXIubmV0OyBpYmFnZG9uYUBnbWFpbC5jb207IHdhcnJlbkBr
dW1hcmkubmV0OyBtamV0aGFuYW5kYW5pQGdtYWlsLmNvbTsgbmV0Y29uZkBpZXRmLm9yZw0KPiDk
uLvpopg6IFJlOiBbVGVjaG5pY2FsIEVycmF0YSBSZXBvcnRlZF0gUkZDODA0MCAoNTU2NSkNCj4g
DQo+IFFpbiBXdSA8YmlsbC53dUBodWF3ZWkuY29tPiB3cm90ZToNCj4gPiBTZWUgZGF0YS1taXNz
aW5nIGRlZmluaXRpb24gaW4gUkZDNjI0MToNCj4gPiAiDQo+ID4gICAgZXJyb3ItdGFnOiAgICAg
IGRhdGEtbWlzc2luZw0KPiA+ICAgIGVycm9yLXR5cGU6ICAgICBhcHBsaWNhdGlvbg0KPiA+ICAg
IGVycm9yLXNldmVyaXR5OiBlcnJvcg0KPiA+ICAgIGVycm9yLWluZm86ICAgICBub25lDQo+ID4g
ICAgRGVzY3JpcHRpb246ICAgIFJlcXVlc3QgY291bGQgbm90IGJlIGNvbXBsZXRlZCBiZWNhdXNl
IHRoZSByZWxldmFudA0KPiA+ICAgICAgICAgICAgICAgICAgICBkYXRhIG1vZGVsIGNvbnRlbnQg
ZG9lcyBub3QgZXhpc3QuICBGb3IgZXhhbXBsZSwNCj4gPiAgICAgICAgICAgICAgICAgICAgYSAi
ZGVsZXRlIiBvcGVyYXRpb24gd2FzIGF0dGVtcHRlZCBvbg0KPiA+ICAgICAgICAgICAgICAgICAg
ICBkYXRhIHRoYXQgZG9lcyBub3QgZXhpc3QuDQo+ID4gDQo+ID4gIg0KPiA+IEFuZCBzdGF0dXMg
Y29kZSA0MDkgZGVmaW5pdGlvbiBpbiBSRkM3MjMxICINCj4gPiA2LjUuOC4gIDQwOSBDb25mbGlj
dA0KPiA+IA0KPiA+ICAgIFRoZSA0MDkgKENvbmZsaWN0KSBzdGF0dXMgY29kZSBpbmRpY2F0ZXMg
dGhhdCB0aGUgcmVxdWVzdCBjb3VsZCBub3QNCj4gPiAgICBiZSBjb21wbGV0ZWQgZHVlIHRvIGEg
Y29uZmxpY3Qgd2l0aCB0aGUgY3VycmVudCBzdGF0ZSBvZiB0aGUgdGFyZ2V0DQo+ID4gICAgcmVz
b3VyY2UuICBUaGlzIGNvZGUgaXMgdXNlZCBpbiBzaXR1YXRpb25zIHdoZXJlIHRoZSB1c2VyIG1p
Z2h0IGJlDQo+ID4gICAgYWJsZSB0byByZXNvbHZlIHRoZSBjb25mbGljdCBhbmQgcmVzdWJtaXQg
dGhlIHJlcXVlc3QuICBUaGUgc2VydmVyDQo+ID4gICAgU0hPVUxEIGdlbmVyYXRlIGEgcGF5bG9h
ZCB0aGF0IGluY2x1ZGVzIGVub3VnaCBpbmZvcm1hdGlvbiBmb3IgYSB1c2VyDQo+ID4gICAgdG8g
cmVjb2duaXplIHRoZSBzb3VyY2Ugb2YgdGhlIGNvbmZsaWN0Lg0KPiA+IA0KPiA+IDYuNS40LiAg
NDA0IE5vdCBGb3VuZA0KPiA+IA0KPiA+ICAgIFRoZSA0MDQgKE5vdCBGb3VuZCkgc3RhdHVzIGNv
ZGUgaW5kaWNhdGVzIHRoYXQgdGhlIG9yaWdpbiBzZXJ2ZXIgZGlkDQo+ID4gICAgbm90IGZpbmQg
YSBjdXJyZW50IHJlcHJlc2VudGF0aW9uIGZvciB0aGUgdGFyZ2V0IHJlc291cmNlIG9yIGlzIG5v
dA0KPiA+ICAgIHdpbGxpbmcgdG8gZGlzY2xvc2UgdGhhdCBvbmUgZXhpc3RzLiAgQSA0MDQgc3Rh
dHVzIGNvZGUgZG9lcyBub3QNCj4gPiAgICBpbmRpY2F0ZSB3aGV0aGVyIHRoaXMgbGFjayBvZiBy
ZXByZXNlbnRhdGlvbiBpcyB0ZW1wb3Jhcnkgb3INCj4gPiAgICBwZXJtYW5lbnQ7IHRoZSA0MTAg
KEdvbmUpIHN0YXR1cyBjb2RlIGlzIHByZWZlcnJlZCBvdmVyIDQwNCBpZiB0aGUNCj4gPiAgICBv
cmlnaW4gc2VydmVyIGtub3dzLCBwcmVzdW1hYmx5IHRocm91Z2ggc29tZSBjb25maWd1cmFibGUg
bWVhbnMsIHRoYXQNCj4gPiAgICB0aGUgY29uZGl0aW9uIGlzIGxpa2VseSB0byBiZSBwZXJtYW5l
bnQuDQo+ID4gDQo+ID4gIg0KPiA+IFdoaWNoIG1ha2UgbWUgZmVlbCBkYXRhIG1pc3NpbmcgaXMg
bW9yZSByZWxhdGVkIHRvIDQwNCBpbnN0ZWFkIG9mIDQwOS4gV3Jvbmc/DQo+IA0KPiA0MDQgbWVh
bnMgdGhhdCAqdGhlIHJlcXVlc3RlZCByZXNvdXJjZSogZG9lc24ndCBleGlzdC4NCj4gDQo+IFRo
ZSBleGFtcGxlICJkZWxldGUiIG9wZXJhdGlvbiBpbiA2MjQxIHJlZmVycyB0byBhbiBlZGl0LWNv
bmZpZyB3aXRoIG9wZXJhdGlvbiAiZGVsZXRlIi4gIFRoZSBjb3JyZXNwb25kaW5nIFJFU1RDT05G
IG9wZXJhdGlvbiBpcyAiZGVsZXRlIg0KPiB3aXRoaW4gYSBZQU5HIFBBVENILiAgSW4gdGhpcyBj
YXNlLCB0aGUgcmVxdWVzdGVkIHJlc291cmNlIGV4aXN0cywgc28gYSA0MDQgd291bGQgbm90IGJl
IGNvcnJlY3QuDQo+IA0KPiBTbyB0aGVyZSBhcmUgY2VydGFpbmx5IGNhc2VzIHdoZXJlICJkYXRh
LW1pc3NpbmciIGRvZXMgbm90IG1lYW4gNDA0Lg0KPiANCj4gQnV0IEkgZ3Vlc3MgdGhlcmUgYXJl
IGFsc28gY2FzZXMgd2hlcmUgImRhdGEtbWlzc2luZyIgd2lsbCBhY3R1YWxseSBjb3JyZXNwb25k
IHRvIGEgNDA0LiAgRm9yIGV4YW1wbGUgYW4gZWRpdC1jb25maWcgdGhhdCBqdXN0IHRyaWVzIHRv
IGRlbGV0ZSBhIG5vbi1leGlzdGluZyBub2RlIHdpbGwgYmUgYSAiZGF0YS1taXNzaW5nIiwgYW5k
IGlmIHRoZSBjb3JyZXNwb25kaW5nIFJFU1RDT05GIHJlcXVlc3QgaXMgYSBERUxFVEUgb24gdGhl
IHJlc291cmNlLCBpdCB3aWxsIGJlDQo+IDQwNCAtIGJ1dCBpZiB0aGUgY29ycmVzcG9uZGluZyBS
RVNUQ09ORiByZXF1ZXN0IGlzIGEgWUFORyBQQVRDSCB3aXRoIGEgImRlbGV0ZSIgZWRpdCwgaXQg
d2lsbCBiZSA0MDkuDQo+IA0KPiANCj4gU28sIG1heWJlIHRoZSBwcm9wZXIgZml4IGlzDQo+IA0K
PiAgICAgICAgICAgICAgICB8IGRhdGEtbWlzc2luZyAgICAgICAgICAgIHwgNDA0LCA0MDkgICAg
ICAgICAgIHwNCj4gDQo+IFtRaW5dOiBUZW5kIHRvIGFncmVlLCBidXQgWUFORyBwYXRjaCBzdXBw
b3J0aW5nIHRoZSBhYmlsaXR5IHRvIGRlbGV0ZSBjaGlsZCByZXNvdXJjZXMgZGVmaW5lZCBpbiBS
RkM4MDcyIGFsc28gc3VwcG9ydCByZXR1cm4gNDA0LA0KPiBTZWUgc2VjdGlvbiAyLjIgb2YgUkZD
ODA3MjoNCj4gIg0KPiAgICBJZiB0aGUgZWRpdCBkb2VzIG5vdCBpZGVudGlmeQ0KPiAgICBhbnkg
ZXhpc3RpbmcgcmVzb3VyY2UgaW5zdGFuY2UgYW5kIHRoZSBvcGVyYXRpb24gZm9yIHRoZSBlZGl0
IGlzIG5vdA0KPiAgICAiY3JlYXRlIiwgdGhlbiB0aGUgcmVxdWVzdCBNVVNUIE5PVCBiZSBwcm9j
ZXNzZWQgYW5kIGEgIjQwNCBOb3QNCj4gICAgRm91bmQiIGVycm9yIHJlc3BvbnNlIE1VU1QgYmUg
c2VudCBieSB0aGUgc2VydmVyLiANCj4gIg0KDQpUaGlzIHNlZW1zIHRvIGJlIGFuIGVycm9yLiAg
UkZDIDU3ODkgKEhUVFAgUEFUQ0gpIGhhcyB0aGlzOg0KDQogICBDb25mbGljdGluZyBzdGF0ZTog
IENhbiBiZSBzcGVjaWZpZWQgd2l0aCBhIDQwOSAoQ29uZmxpY3QpIHN0YXR1cw0KICAgICAgY29k
ZSB3aGVuIHRoZSByZXF1ZXN0IGNhbm5vdCBiZSBhcHBsaWVkIGdpdmVuIHRoZSBzdGF0ZSBvZiB0
aGUNCiAgICAgIHJlc291cmNlLiAgRm9yIGV4YW1wbGUsIGlmIHRoZSBjbGllbnQgYXR0ZW1wdGVk
IHRvIGFwcGx5IGENCiAgICAgIHN0cnVjdHVyYWwgbW9kaWZpY2F0aW9uIGFuZCB0aGUgc3RydWN0
dXJlcyBhc3N1bWVkIHRvIGV4aXN0IGRpZA0KICAgICAgbm90IGV4aXN0ICh3aXRoIFhNTCwgYSBw
YXRjaCBtaWdodCBzcGVjaWZ5IGNoYW5naW5nIGVsZW1lbnQgJ2ZvbycNCiAgICAgIHRvIGVsZW1l
bnQgJ2JhcicgYnV0IGVsZW1lbnQgJ2ZvbycgbWlnaHQgbm90IGV4aXN0KS4NCg0KDQovbWFydGlu
DQoNCg0KDQo+IA0KPiAvbWFydGluDQo+IA0KPiANCj4gDQo+ID4gDQo+ID4gLVFpbg0KPiA+IC0t
LS0t6YKu5Lu25Y6f5Lu2LS0tLS0NCj4gPiDlj5Hku7bkuro6IE1hcnRpbiBCam9ya2x1bmQgW21h
aWx0bzptYmpAdGFpbC1mLmNvbV0NCj4gPiDlj5HpgIHml7bpl7Q6IDIwMTjlubQxMuaciDPml6Ug
MTY6NTQNCj4gPiDmlLbku7bkuro6IHJmYy1lZGl0b3JAcmZjLWVkaXRvci5vcmcNCj4gPiDmioTp
gIE6IGFuZHlAeXVtYXdvcmtzLmNvbTsga3dhdHNlbkBqdW5pcGVyLm5ldDsgaWJhZ2RvbmFAZ21h
aWwuY29tOyANCj4gPiB3YXJyZW5Aa3VtYXJpLm5ldDsgbWpldGhhbmFuZGFuaUBnbWFpbC5jb207
IFFpbiBXdTsgbmV0Y29uZkBpZXRmLm9yZw0KPiA+IOS4u+mimDogUmU6IFtUZWNobmljYWwgRXJy
YXRhIFJlcG9ydGVkXSBSRkM4MDQwICg1NTY1KQ0KPiA+IA0KPiA+IEhpLA0KPiA+IA0KPiA+IEkg
ZG9uJ3QgdGhpbmsgdGhpcyBlcnJhdGEgc2hvdWxkIGJlIGFjY2VwdGVkLiAgNDA0IG1lYW5zIHRo
YXQgdGhlIHJlcXVlc3RlZCByZXNvdXJjZSBkb2Vzbid0IGV4aXN0LCBidXQgImRhdGEtbWlzc2lu
ZyIgY2FuIGJlIHJldHVybmVkIGUuZy4gaWYgeW91IHRyeSB0byBwYXRjaCBhbiBleGlzdGluZyBy
ZXNvdXJjZSBvZiB0eXBlIGxlYWZyZWYgdG8gcG9pbnQgdG8gYSBub24tZXhpc3RpbmcgbGVhZi4N
Cj4gPiANCj4gPiANCj4gPiAvbWFydGluDQo+ID4gDQo+ID4gDQo+ID4gUkZDIEVycmF0YSBTeXN0
ZW0gPHJmYy1lZGl0b3JAcmZjLWVkaXRvci5vcmc+IHdyb3RlOg0KPiA+ID4gVGhlIGZvbGxvd2lu
ZyBlcnJhdGEgcmVwb3J0IGhhcyBiZWVuIHN1Ym1pdHRlZCBmb3IgUkZDODA0MCwgDQo+ID4gPiAi
UkVTVENPTkYgUHJvdG9jb2wiLg0KPiA+ID4gDQo+ID4gPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLQ0KPiA+ID4gWW91IG1heSByZXZpZXcgdGhlIHJlcG9ydCBiZWxvdyBh
bmQgYXQ6DQo+ID4gPiBodHRwOi8vd3d3LnJmYy1lZGl0b3Iub3JnL2VycmF0YS9laWQ1NTY1DQo+
ID4gPiANCj4gPiA+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4g
PiBUeXBlOiBUZWNobmljYWwNCj4gPiA+IFJlcG9ydGVkIGJ5OiBRaW4gV3UgPGJpbGwud3VAaHVh
d2VpLmNvbT4NCj4gPiA+IA0KPiA+ID4gU2VjdGlvbjogNw0KPiA+ID4gDQo+ID4gPiBPcmlnaW5h
bCBUZXh0DQo+ID4gPiAtLS0tLS0tLS0tLS0tDQo+ID4gPiAgICAgICAgICAgICAgICstLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0tLS0tLS0tLS0tLS0tLSsNCj4gPiA+ICAgICAgICAgICAg
ICAgfCBlcnJvci10YWcgICAgICAgICAgICAgICB8IHN0YXR1cyBjb2RlICAgICAgfA0KPiA+ID4g
ICAgICAgICAgICAgICArLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSstLS0tLS0tLS0tLS0tLS0t
LS0rDQo+ID4gPiAgICAgICAgICAgICAgIHwgaW4tdXNlICAgICAgICAgICAgICAgICAgfCA0MDkg
ICAgICAgICAgICAgIHwNCj4gPiA+ICAgICAgICAgICAgICAgfCBsb2NrLWRlbmllZCAgICAgICAg
ICAgICB8IDQwOSAgICAgICAgICAgICAgfA0KPiA+ID4gICAgICAgICAgICAgICB8IHJlc291cmNl
LWRlbmllZCAgICAgICAgIHwgNDA5ICAgICAgICAgICAgICB8DQo+ID4gPiAgICAgICAgICAgICAg
IHwgZGF0YS1leGlzdHMgICAgICAgICAgICAgfCA0MDkgICAgICAgICAgICAgIHwNCj4gPiA+ICAg
ICAgICAgICAgICAgfCBkYXRhLW1pc3NpbmcgICAgICAgICAgICB8IDQwOSAgICAgICAgICAgICAg
fA0KPiA+ID4gDQo+ID4gPiANCj4gPiA+IENvcnJlY3RlZCBUZXh0DQo+ID4gPiAtLS0tLS0tLS0t
LS0tLQ0KPiA+ID4gICAgICAgICAgICAgICArLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLSstLS0t
LS0tLS0tLS0tLS0tLS0rDQo+ID4gPiAgICAgICAgICAgICAgIHwgZXJyb3ItdGFnICAgICAgICAg
ICAgICAgfCBzdGF0dXMgY29kZSAgICAgIHwNCj4gPiA+ICAgICAgICAgICAgICAgKy0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0rLS0tLS0tLS0tLS0tLS0tLS0tKw0KPiA+ID4gICAgICAgICAgICAg
ICB8IGluLXVzZSAgICAgICAgICAgICAgICAgIHwgNDA5ICAgICAgICAgICAgICB8DQo+ID4gPiAg
ICAgICAgICAgICAgIHwgbG9jay1kZW5pZWQgICAgICAgICAgICAgfCA0MDkgICAgICAgICAgICAg
IHwNCj4gPiA+ICAgICAgICAgICAgICAgfCByZXNvdXJjZS1kZW5pZWQgICAgICAgICB8IDQwOSAg
ICAgICAgICAgICAgfA0KPiA+ID4gICAgICAgICAgICAgICB8IGRhdGEtZXhpc3RzICAgICAgICAg
ICAgIHwgNDA5ICAgICAgICAgICAgICB8DQo+ID4gPiAgICAgICAgICAgICAgIHwgZGF0YS1taXNz
aW5nICAgICAgICAgICAgfCA0MDQgICAgICAgICAgICAgIHwNCj4gPiA+IA0KPiA+ID4gDQo+ID4g
PiBOb3Rlcw0KPiA+ID4gLS0tLS0NCj4gPiA+IFRoZSA8ZXJyb3ItdGFnPiBkYXRhIG1pc3Npbmcg
c2hvdWxkIGJlIG1hcHBlZCB0byBzdGF0dXMgY29kZSAnNDA0JyBpbnN0ZWFkIG9mICc0MDknIHRv
IGdldCBjb25zaXN0ZW50IHdpdGggdGhlIGRlZmludGlvbiBvZiBkYXRhLW1pc3NpbmcgaW4gUkZD
NjI0MS4NCj4gPiA+IA0KPiA+ID4gSW5zdHJ1Y3Rpb25zOg0KPiA+ID4gLS0tLS0tLS0tLS0tLQ0K
PiA+ID4gVGhpcyBlcnJhdHVtIGlzIGN1cnJlbnRseSBwb3N0ZWQgYXMgIlJlcG9ydGVkIi4gSWYg
bmVjZXNzYXJ5LCBwbGVhc2UgDQo+ID4gPiB1c2UgIlJlcGx5IEFsbCIgdG8gZGlzY3VzcyB3aGV0
aGVyIGl0IHNob3VsZCBiZSB2ZXJpZmllZCBvciByZWplY3RlZC4NCj4gPiA+IFdoZW4gYSBkZWNp
c2lvbiBpcyByZWFjaGVkLCB0aGUgdmVyaWZ5aW5nIHBhcnR5IGNhbiBsb2cgaW4gdG8gY2hhbmdl
IA0KPiA+ID4gdGhlIHN0YXR1cyBhbmQgZWRpdCB0aGUgcmVwb3J0LCBpZiBuZWNlc3NhcnkuDQo+
ID4gPiANCj4gPiA+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4g
PiBSRkM4MDQwIChkcmFmdC1pZXRmLW5ldGNvbmYtcmVzdGNvbmYtMTgpDQo+ID4gPiAtLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiA+ID4gVGl0bGUgICAgICAgICAgICAg
ICA6IFJFU1RDT05GIFByb3RvY29sDQo+ID4gPiBQdWJsaWNhdGlvbiBEYXRlICAgIDogSmFudWFy
eSAyMDE3DQo+ID4gPiBBdXRob3IocykgICAgICAgICAgIDogQS4gQmllcm1hbiwgTS4gQmpvcmts
dW5kLCBLLiBXYXRzZW4NCj4gPiA+IENhdGVnb3J5ICAgICAgICAgICAgOiBQUk9QT1NFRCBTVEFO
REFSRA0KPiA+ID4gU291cmNlICAgICAgICAgICAgICA6IE5ldHdvcmsgQ29uZmlndXJhdGlvbg0K
PiA+ID4gQXJlYSAgICAgICAgICAgICAgICA6IE9wZXJhdGlvbnMgYW5kIE1hbmFnZW1lbnQNCj4g
PiA+IFN0cmVhbSAgICAgICAgICAgICAgOiBJRVRGDQo+ID4gPiBWZXJpZnlpbmcgUGFydHkgICAg
IDogSUVTRw0KPiA+ID4gDQo=


From nobody Tue Dec 18 05:37:00 2018
Return-Path: <janl@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6E966124BE5; Tue, 18 Dec 2018 05:36:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WxoohyhdOmOo; Tue, 18 Dec 2018 05:36:49 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id AD4021200B3; Tue, 18 Dec 2018 05:36:49 -0800 (PST)
Received: from [10.147.40.113] (unknown [173.38.220.45]) by mail.tail-f.com (Postfix) with ESMTPSA id 284EB1B03C8A; Tue, 18 Dec 2018 14:36:47 +0100 (CET)
From: Jan Lindblad <janl@tail-f.com>
Message-Id: <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_78C8BFD7-5283-42AA-BB1B-CB25D5BA2C9C"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Tue, 18 Dec 2018 14:36:44 +0100
In-Reply-To: <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com>
Cc: Martin Bjorklund <mbj@tail-f.com>, "jason.sterne@nokia.com" <jason.sterne@nokia.com>, "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
To: =?utf-8?Q?Bal=C3=A1zs_Lengyel?= <balazs.lengyel@ericsson.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/pMfAxDxZBk8MzNqA18W4cQ16ixM>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 13:36:52 -0000

--Apple-Mail=_78C8BFD7-5283-42AA-BB1B-CB25D5BA2C9C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi,
> While I agree with Martin, in our systems we have a number of places, =
where the system does create configuration in running, due to
>=20
> different levels of automation and autonomous algorithms kick-in
> the created config needs to be possible to be further modified by the =
operator
> the created config needs to be referenced from operator created config
> the created config is not always ephemeral, it might need to be part =
of backup/restore
This is only a sampling from "the list of excuses". I have heard many =
more. The road to hell is paved with good intentions, however. If we =
want to build automation based on sound theory, clearly separating the =
orders from managers from a system's own operational view is key, IMO. =
Reliability, security, accountability are growing in importance, and =
they all play in this direction.

We may not need to standardize rules to outlaw the above; the market =
will take care of that. What we need to ensure is that it is possible to =
be standards compliant without having to implement design excuses like =
these.

Best Regards,
/jan


--Apple-Mail=_78C8BFD7-5283-42AA-BB1B-CB25D5BA2C9C
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">Hi,<div class=""><div><blockquote type="cite" class=""><div class=""><div text="#000000" bgcolor="#FFFFFF" class=""><p class="">While I agree with Martin, in our systems we have a number of
      places, where the system does create configuration in running, due
      to</p>
    <ul class="">
      <li class="">different levels of automation and autonomous algorithms
        kick-in</li>
      <li class="">the created config needs to be possible to be further modified
        by the operator</li>
      <li class="">the created config needs to be referenced from operator
        created config</li>
      <li class="">the created config is not always ephemeral, it might need to
        be part of backup/restore</li></ul></div></div></blockquote><div>This is only a sampling from "the list of excuses". I have heard many more. The road to hell is paved with good intentions, however. If we want to build automation based on sound theory, clearly separating the orders from managers from a system's own operational view is key, IMO. Reliability, security, accountability are growing in importance, and they all play in this direction.</div><div><br class=""></div><div>We may not need to standardize rules to outlaw the above; the market will take care of that. What we need to ensure is that it is possible to be standards compliant without having to implement design excuses like these.</div><div><br class=""></div><div>Best Regards,</div><div>/jan</div><div><br class=""></div></div></div></body></html>
--Apple-Mail=_78C8BFD7-5283-42AA-BB1B-CB25D5BA2C9C--


From nobody Tue Dec 18 08:18:41 2018
Return-Path: <session-request@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B6A68130EE3; Tue, 18 Dec 2018 08:18:38 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: ibagdona@gmail.com, mjethanandani@gmail.com, netconf-chairs@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154514991867.5162.16575080866588778443.idtracker@ietfa.amsl.com>
Date: Tue, 18 Dec 2018 08:18:38 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/N8nM5WVJBSs5uXmQNuDKDgeQUU0>
Subject: [Netconf] netconf - New Meeting Session Request for IETF 104
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 16:18:39 -0000

A new meeting session request has just been submitted by Mahesh Jethanandani, a Chair of the netconf working group.


---------------------------------------------------------
Working Group Name: Network Configuration
Area Name: Operations and Management Area
Session Requester: Mahesh Jethanandani

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 75
Conflicts to Avoid: 
 First Priority: opsawg opsarea netmod anima
 Second Priority: bfd rtgwg babel tsvwg
 Third Priority: sacm saag


People who must be present:
  Mahesh Jethanandani
  Kent Watsen
  Ignas Bagdonas

Resources Requested:

Special Requests:
  Please schedule session Mon-Thur. (netmod, opsarea, opsawg, and anima are conflict for the OPS AD).
---------------------------------------------------------


From nobody Tue Dec 18 09:24:44 2018
Return-Path: <lhotka@nic.cz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CA68131164; Tue, 18 Dec 2018 09:24:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id goDM6MOpin0c; Tue, 18 Dec 2018 09:24:33 -0800 (PST)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id 47076130EB8; Tue, 18 Dec 2018 09:24:33 -0800 (PST)
Received: by trail.lhotka.name (Postfix, from userid 109) id A9858182015F; Tue, 18 Dec 2018 18:32:44 +0100 (CET)
Received: from localhost (unknown [172.29.2.111]) by trail.lhotka.name (Postfix) with ESMTPSA id 6AAB21820053; Tue, 18 Dec 2018 18:32:41 +0100 (CET)
From: Ladislav Lhotka <lhotka@nic.cz>
To: Jan Lindblad <janl@tail-f.com>, =?utf-8?Q?Bal=C3=A1zs?= Lengyel <balazs.lengyel@ericsson.com>
Cc: "netconf\@ietf.org" <netconf@ietf.org>, "netmod\@ietf.org" <netmod@ietf.org>
In-Reply-To: <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
Mail-Followup-To: Jan Lindblad <janl@tail-f.com>, =?utf-8?Q?Bal=C3=A1zs?= Lengyel <balazs.lengyel@ericsson.com>, "netconf\@ietf.org" <netconf@ietf.org>, "netmod\@ietf.org" <netmod@ietf.org>
Date: Tue, 18 Dec 2018 18:24:28 +0100
Message-ID: <8736quu4s3.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Yms4YQsz5HN7nuysSjgaUQY0myk>
Subject: Re: [Netconf] [netmod]    magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 17:24:36 -0000

Jan Lindblad <janl@tail-f.com> writes:

> Hi,
>> While I agree with Martin, in our systems we have a number of places, where the system does create configuration in running, due to
>> 
>> different levels of automation and autonomous algorithms kick-in
>> the created config needs to be possible to be further modified by the operator
>> the created config needs to be referenced from operator created config
>> the created config is not always ephemeral, it might need to be part of backup/restore
> This is only a sampling from "the list of excuses". I have heard many more. The road to hell is paved with good intentions, however. If we want to build automation based on sound theory, clearly separating the orders from managers from a system's own operational view is key, IMO. Reliability, security, accountability are growing in importance, and they all play in this direction.
>
> We may not need to standardize rules to outlaw the above; the market
> will take care of that. What we need to ensure is that it is possible
> to be standards compliant without having to implement design excuses
> like these.

I agree. Now that we have NMDA, things like this shouldn't be necessary.

Lada

>
> Best Regards,
> /jan
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Tue Dec 18 09:59:25 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C82E131193; Tue, 18 Dec 2018 09:59:23 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <154515596361.5411.7153657725124836233@ietfa.amsl.com>
Date: Tue, 18 Dec 2018 09:59:23 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LIPkZRzDW6OMLW4Zq95JZFE2Fys>
Subject: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 17:59:23 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Subscription to YANG Event Notifications
        Authors         : Eric Voit
                          Alexander Clemm
                          Alberto Gonzalez Prieto
                          Einar Nilsen-Nygaard
                          Ambika Prasad Tripathy
	Filename        : draft-ietf-netconf-subscribed-notifications-19.txt
	Pages           : 78
	Date            : 2018-12-18

Abstract:
   This document defines a YANG data model and associated mechanisms
   enabling subscriber-specific subscriptions to a publisher's event
   streams.  Applying these elements allows a subscriber to request for
   and receive a continuous, custom feed of publisher generated
   information.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notifications/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notifications-19
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-notifications-19

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-subscribed-notifications-19


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Dec 18 10:14:53 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 064D8131199 for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 10:14:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CO0KKV6fjXuj for <netconf@ietfa.amsl.com>; Tue, 18 Dec 2018 10:14:50 -0800 (PST)
Received: from mail-lj1-x229.google.com (mail-lj1-x229.google.com [IPv6:2a00:1450:4864:20::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1CC2131192 for <netconf@ietf.org>; Tue, 18 Dec 2018 10:14:49 -0800 (PST)
Received: by mail-lj1-x229.google.com with SMTP id q2-v6so3907669lji.10 for <netconf@ietf.org>; Tue, 18 Dec 2018 10:14:49 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=qu5cjoPouQ9Yjc0F2YWLg9buenT433nBKSHe4MCisKM=; b=TxP8AeBfMbSYmrdSgDqK5mcBP/2tyCakdgTmLihWyiZ9mJ//H7CHXa9oCKHzu9U30k /kGOBYXqKZgCfPO3DyFmI7lTKDiFksmX/Cw4z+UrbkeBfs5e1VZ5F5ov5EblZ5C5N+kQ NY7JCvguHG7d0wCjerXYbLeOHsPMN0MtPDLyJiU5VcBPa8TxNja2ASRHTyX/bIhAkvtc vdNgzylNbKWdEDynEzbARkDNWCaE9grk8/KbNaMh16dvSfOBXAORdDaDanwMjWxKkZ+H ic4o4yl9OGtBv3++26YgGurnhlcFFCFV7JX5J30TRV16/YE8klWL/8Pmnt1CD4340Pfz KfQg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=qu5cjoPouQ9Yjc0F2YWLg9buenT433nBKSHe4MCisKM=; b=PQkxcIBz3P5Qp/ixqFNIYav39NZiv2qEm6Q3HPGtkr0UTApTz6e0DHE1tcc1GSGoO2 8pBG748ZuC9oeYdmT9F+/Bfn3EtlsyZk5wd5QE+YQOvinJ68CwhIwlPuXwRT4yE+6Zsu 1dRzEcELBNVwDUuk22BNXPjGSf6dUsLIxbq4e7uFcABnBAbApnqbNPsgnkbJ9TA0loBS UVpJuebHzC0MSftUMZK0AxqWU1VPkokkCEBzMrjVFoJdZNc5JdR767x2Bk6YAXmH7e1L R9NVkDGo6tbfq34o/zSxAYRhOdvI31VKIr2tit8MBX/AvUapucDlrFX/nOXD+dGO5uma 4jTQ==
X-Gm-Message-State: AA+aEWbfR1Axx+Zaz/tPf4dp5m15dYsO/37QrrzCszpKTt4RMIMvepfC 6xZI3R7iY4UuvfOVU9hu4XyQzV3nE5DM2tF4zTWtN7sAzPk=
X-Google-Smtp-Source: AFSGD/WasPhXkiOBIFVCPPcOjj+tashzGiJuAs8PP6pk6X7h3JL5Zux+iz7cT8T5TP25Xp+1S8sGLfWWahJjRJUh3c4=
X-Received: by 2002:a2e:e02:: with SMTP id 2-v6mr9266886ljo.10.1545156887654;  Tue, 18 Dec 2018 10:14:47 -0800 (PST)
MIME-Version: 1.0
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
In-Reply-To: <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Tue, 18 Dec 2018 10:14:36 -0800
Message-ID: <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com>
To: Jan Lindblad <janl@tail-f.com>
Cc: =?UTF-8?Q?Bal=C3=A1zs_Lengyel?= <balazs.lengyel@ericsson.com>,  "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000694c19057d4fdf47"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/yFWJvkMewD5yK9dkddoX9gxybUM>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 18:14:52 -0000

--000000000000694c19057d4fdf47
Content-Type: text/plain; charset="UTF-8"

On Tue, Dec 18, 2018 at 5:37 AM Jan Lindblad <janl@tail-f.com> wrote:

> Hi,
>
> While I agree with Martin, in our systems we have a number of places,
> where the system does create configuration in running, due to
>
>    - different levels of automation and autonomous algorithms kick-in
>    - the created config needs to be possible to be further modified by
>    the operator
>    - the created config needs to be referenced from operator created
>    config
>    - the created config is not always ephemeral, it might need to be part
>    of backup/restore
>
> This is only a sampling from "the list of excuses". I have heard many
> more. The road to hell is paved with good intentions, however. If we want
> to build automation based on sound theory, clearly separating the orders
> from managers from a system's own operational view is key, IMO.
> Reliability, security, accountability are growing in importance, and they
> all play in this direction.
>
> We may not need to standardize rules to outlaw the above; the market will
> take care of that. What we need to ensure is that it is possible to be
> standards compliant without having to implement design excuses like these.
>
>
NMDA has a lot of room for proprietary mechanisms for converting <running>
to <intended>.
Many times the features desired by engineers exceed the capabilities of
YANG, such as
a dynamic default leaf.  YANG allows a simple constant, and no business
logic to pick the default.
This is a very valid use of "server auto-magic".

Maybe a future version of YANG can improve the client visibility into this
"auto-magic"


Best Regards,
> /jan
>

Andy


>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
>

--000000000000694c19057d4fdf47
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr">On Tue, Dec 18, 2018 at 5:37 AM Jan Lindblad &lt;<a href=
=3D"mailto:janl@tail-f.com" target=3D"_blank">janl@tail-f.com</a>&gt; wrote=
:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.=
8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div>Hi,<div><=
div><blockquote type=3D"cite"><div><div bgcolor=3D"#FFFFFF"><p>While I agre=
e with Martin, in our systems we have a number of
      places, where the system does create configuration in running, due
      to</p>
    <ul>
      <li>different levels of automation and autonomous algorithms
        kick-in</li>
      <li>the created config needs to be possible to be further modified
        by the operator</li>
      <li>the created config needs to be referenced from operator
        created config</li>
      <li>the created config is not always ephemeral, it might need to
        be part of backup/restore</li></ul></div></div></blockquote><div>Th=
is is only a sampling from &quot;the list of excuses&quot;. I have heard ma=
ny more. The road to hell is paved with good intentions, however. If we wan=
t to build automation based on sound theory, clearly separating the orders =
from managers from a system&#39;s own operational view is key, IMO. Reliabi=
lity, security, accountability are growing in importance, and they all play=
 in this direction.</div><div><br></div><div>We may not need to standardize=
 rules to outlaw the above; the market will take care of that. What we need=
 to ensure is that it is possible to be standards compliant without having =
to implement design excuses like these.</div><div><br></div></div></div></d=
iv></blockquote><div><br></div><div>NMDA has a lot of room for proprietary =
mechanisms for converting &lt;running&gt; to &lt;intended&gt;.</div><div>Ma=
ny times the features desired by engineers exceed the capabilities of YANG,=
 such as</div><div>a dynamic default leaf.=C2=A0 YANG allows a simple const=
ant, and no business logic to pick the default.</div><div>This is a very va=
lid use of &quot;server auto-magic&quot;.</div><div><br></div><div>Maybe a =
future version of YANG can improve the client visibility into this &quot;au=
to-magic&quot;</div><div><br></div><div><br></div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex"><div><div><div><div></div><div>Best Regards,</div>=
<div>/jan</div></div></div></div></blockquote><div><br></div><div>Andy</div=
><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><d=
iv><div><div><br></div></div></div></div>__________________________________=
_____________<br>
netmod mailing list<br>
<a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</a><br=
>
<a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"noreferrer"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
</blockquote></div></div>

--000000000000694c19057d4fdf47--


From nobody Tue Dec 18 10:51:58 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FD3F1200B3; Tue, 18 Dec 2018 10:51:51 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <154515911140.5178.7464570064107914684@ietfa.amsl.com>
Date: Tue, 18 Dec 2018 10:51:51 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/GsTubOec5ungz7PfLv0kE3Ut_Jw>
Subject: [Netconf] I-D Action: draft-ietf-netconf-netconf-event-notifications-15.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Dec 2018 18:51:52 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Dynamic subscription to YANG Events and Datastores over NETCONF
        Authors         : Eric Voit
                          Alexander Clemm
                          Alberto Gonzalez Prieto
                          Einar Nilsen-Nygaard
                          Ambika Prasad Tripathy
	Filename        : draft-ietf-netconf-netconf-event-notifications-15.txt
	Pages           : 18
	Date            : 2018-12-18

Abstract:
   This document provides a NETCONF binding to the dynamic subscription
   capability of both subscribed notifications and YANG push.

   RFC Editor note: please replace the four references to pre-RFC
   normative drafts with the actual assigned RFC numbers.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-netconf-event-notifications/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-netconf-event-notifications-15
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-netconf-event-notifications-15

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-netconf-event-notifications-15


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Dec 19 01:30:59 2018
Return-Path: <janl@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83BDE130DEF; Wed, 19 Dec 2018 01:30:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g1b14W7fzPFF; Wed, 19 Dec 2018 01:30:50 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 5EB69130DC8; Wed, 19 Dec 2018 01:30:50 -0800 (PST)
Received: from [10.147.40.143] (unknown [173.38.220.39]) by mail.tail-f.com (Postfix) with ESMTPSA id CE4911AE0446; Wed, 19 Dec 2018 10:30:47 +0100 (CET)
From: Jan Lindblad <janl@tail-f.com>
Message-Id: <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_0AFC8023-444A-4AA3-AF3F-93CB26C61F8A"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Wed, 19 Dec 2018 10:30:46 +0100
In-Reply-To: <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com>
Cc: =?utf-8?Q?Bal=C3=A1zs_Lengyel?= <balazs.lengyel@ericsson.com>, "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
To: Andy Bierman <andy@yumaworks.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/VMrDxYUFDt9FSN9KlonmCVRo1T0>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 09:30:53 -0000

--Apple-Mail=_0AFC8023-444A-4AA3-AF3F-93CB26C61F8A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi,
>> While I agree with Martin, in our systems we have a number of places, =
where the system does create configuration in running, due to
>>=20
>> different levels of automation and autonomous algorithms kick-in
>> the created config needs to be possible to be further modified by the =
operator
>> the created config needs to be referenced from operator created =
config
>> the created config is not always ephemeral, it might need to be part =
of backup/restore
> This is only a sampling from "the list of excuses". I have heard many =
more. The road to hell is paved with good intentions, however. If we =
want to build automation based on sound theory, clearly separating the =
orders from managers from a system's own operational view is key, IMO. =
Reliability, security, accountability are growing in importance, and =
they all play in this direction.
>=20
> We may not need to standardize rules to outlaw the above; the market =
will take care of that. What we need to ensure is that it is possible to =
be standards compliant without having to implement design excuses like =
these.
>=20
>=20
> NMDA has a lot of room for proprietary mechanisms for converting =
<running> to <intended>.
> Many times the features desired by engineers exceed the capabilities =
of YANG, such as
> a dynamic default leaf.  YANG allows a simple constant, and no =
business logic to pick the default.
> This is a very valid use of "server auto-magic".
>=20
> Maybe a future version of YANG can improve the client visibility into =
this "auto-magic"

As you say, this is not uncommon. I usually recommend to leave out any =
default statement, and write in the description what happens if this =
leaf isn't set. The operator can then override the default by giving a =
value.=20

While some more advanced features for default values may be of some =
utility, the simplicity of YANG is also important. We don't want to make =
the YANG models -- the interface contracts -- the new place for all =
business logic.

/jan


--Apple-Mail=_0AFC8023-444A-4AA3-AF3F-93CB26C61F8A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Hi,<div class=3D""><div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"gmail_quote" =
style=3D"caret-color: rgb(0, 0, 0); font-family: TimesNewRomanPSMT; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><blockquote class=3D"gmail_quote" style=3D"margin: 0px 0px 0px =
0.8ex; border-left-width: 1px; border-left-style: solid; =
border-left-color: rgb(204, 204, 204); padding-left: 1ex;"><div =
class=3D""><div class=3D""><div class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div bgcolor=3D"#FFFFFF" class=3D""><p =
class=3D"">While I agree with Martin, in our systems we have a number of =
places, where the system does create configuration in running, due =
to</p><ul class=3D""><li class=3D"">different levels of automation and =
autonomous algorithms kick-in</li><li class=3D"">the created config =
needs to be possible to be further modified by the operator</li><li =
class=3D"">the created config needs to be referenced from operator =
created config</li><li class=3D"">the created config is not always =
ephemeral, it might need to be part of =
backup/restore</li></ul></div></div></blockquote><div class=3D"">This is =
only a sampling from "the list of excuses". I have heard many more. The =
road to hell is paved with good intentions, however. If we want to build =
automation based on sound theory, clearly separating the orders from =
managers from a system's own operational view is key, IMO. Reliability, =
security, accountability are growing in importance, and they all play in =
this direction.</div><div class=3D""><br class=3D""></div><div =
class=3D"">We may not need to standardize rules to outlaw the above; the =
market will take care of that. What we need to ensure is that it is =
possible to be standards compliant without having to implement design =
excuses like these.</div><div class=3D""><br =
class=3D""></div></div></div></div></blockquote><div class=3D""><br =
class=3D""></div><div class=3D"">NMDA has a lot of room for proprietary =
mechanisms for converting &lt;running&gt; to &lt;intended&gt;.</div><div =
class=3D"">Many times the features desired by engineers exceed the =
capabilities of YANG, such as</div><div class=3D"">a dynamic default =
leaf.&nbsp; YANG allows a simple constant, and no business logic to pick =
the default.</div><div class=3D"">This is a very valid use of "server =
auto-magic".</div><div class=3D""><br class=3D""></div><div =
class=3D"">Maybe a future version of YANG can improve the client =
visibility into this "auto-magic"</div></div></div></blockquote><div><br =
class=3D""></div><div>As you say, this is not uncommon. I usually =
recommend to leave out any default statement, and write in the =
description what happens if this leaf isn't set. The operator can then =
override the default by giving a value.&nbsp;</div><div><br =
class=3D""></div><div>While some more advanced features for default =
values may be of some utility, the simplicity of YANG is also important. =
We don't want to make the YANG models -- the interface contracts -- the =
new place for all business logic.</div><div><br =
class=3D""></div><div>/jan</div><div><br =
class=3D""></div></div></div></body></html>=

--Apple-Mail=_0AFC8023-444A-4AA3-AF3F-93CB26C61F8A--


From nobody Wed Dec 19 05:52:12 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31CF3130E19 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 05:52:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TzX2PI9FaD6m for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 05:52:06 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id C9D3112870E for <netconf@ietf.org>; Wed, 19 Dec 2018 05:52:05 -0800 (PST)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id B43391AE0446 for <netconf@ietf.org>; Wed, 19 Dec 2018 14:52:02 +0100 (CET)
Date: Wed, 19 Dec 2018 14:52:02 +0100 (CET)
Message-Id: <20181219.145202.1027346732573212384.mbj@tail-f.com>
To: netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <154515596361.5411.7153657725124836233@ietfa.amsl.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/AWQLza2a0pKWuDHBurPNtQ3KHTc>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 13:52:10 -0000

Hi,

The YANG module in this draft doesn't compile.  The new text for the
XPath context contains double quote characters.  I suggest you change
them to single quotes.


/martin


internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Network Configuration WG of the IETF.
> 
>         Title           : Subscription to YANG Event Notifications
>         Authors         : Eric Voit
>                           Alexander Clemm
>                           Alberto Gonzalez Prieto
>                           Einar Nilsen-Nygaard
>                           Ambika Prasad Tripathy
> 	Filename        : draft-ietf-netconf-subscribed-notifications-19.txt
> 	Pages           : 78
> 	Date            : 2018-12-18
> 
> Abstract:
>    This document defines a YANG data model and associated mechanisms
>    enabling subscriber-specific subscriptions to a publisher's event
>    streams.  Applying these elements allows a subscriber to request for
>    and receive a continuous, custom feed of publisher generated
>    information.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notifications/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notifications-19
> https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-notifications-19
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-subscribed-notifications-19
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf
> 


From nobody Wed Dec 19 06:16:25 2018
Return-Path: <lhotka@nic.cz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1812212867A; Wed, 19 Dec 2018 06:16:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGmtvwF9FbIB; Wed, 19 Dec 2018 06:16:14 -0800 (PST)
Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id 5C0631200B3; Wed, 19 Dec 2018 06:16:14 -0800 (PST)
Received: by trail.lhotka.name (Postfix, from userid 109) id 53BB3182015D; Wed, 19 Dec 2018 15:25:06 +0100 (CET)
Received: from localhost (unknown [195.113.220.121]) by trail.lhotka.name (Postfix) with ESMTPSA id 36C8D182015B; Wed, 19 Dec 2018 15:25:04 +0100 (CET)
From: Ladislav Lhotka <lhotka@nic.cz>
To: Jan Lindblad <janl@tail-f.com>, Andy Bierman <andy@yumaworks.com>
Cc: "netconf\@ietf.org" <netconf@ietf.org>, "netmod\@ietf.org" <netmod@ietf.org>
In-Reply-To: <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com> <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com>
Mail-Followup-To: Jan Lindblad <janl@tail-f.com>, Andy Bierman <andy@yumaworks.com>, "netconf\@ietf.org" <netconf@ietf.org>, "netmod\@ietf.org" <netmod@ietf.org>
Date: Wed, 19 Dec 2018 15:16:10 +0100
Message-ID: <875zvpeh5h.fsf@nic.cz>
MIME-Version: 1.0
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/tPhWEgnoN8Fpx5GKFSVDHTRF1kw>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 14:16:17 -0000

Jan Lindblad <janl@tail-f.com> writes:

> Hi,
>>> While I agree with Martin, in our systems we have a number of places, where the system does create configuration in running, due to
>>> 
>>> different levels of automation and autonomous algorithms kick-in
>>> the created config needs to be possible to be further modified by the operator
>>> the created config needs to be referenced from operator created config
>>> the created config is not always ephemeral, it might need to be part of backup/restore
>> This is only a sampling from "the list of excuses". I have heard many more. The road to hell is paved with good intentions, however. If we want to build automation based on sound theory, clearly separating the orders from managers from a system's own operational view is key, IMO. Reliability, security, accountability are growing in importance, and they all play in this direction.
>> 
>> We may not need to standardize rules to outlaw the above; the market will take care of that. What we need to ensure is that it is possible to be standards compliant without having to implement design excuses like these.
>> 
>> 
>> NMDA has a lot of room for proprietary mechanisms for converting <running> to <intended>.
>> Many times the features desired by engineers exceed the capabilities of YANG, such as
>> a dynamic default leaf.  YANG allows a simple constant, and no business logic to pick the default.
>> This is a very valid use of "server auto-magic".
>> 
>> Maybe a future version of YANG can improve the client visibility into this "auto-magic"
>
> As you say, this is not uncommon. I usually recommend to leave out any
> default statement, and write in the description what happens if this
> leaf isn't set. The operator can then override the default by giving a
> value.

Anyway, this is not a case where the server writes something on its own
to a configuration datastore.

>
> While some more advanced features for default values may be of some
> utility, the simplicity of YANG is also important. We don't want to
> make the YANG models -- the interface contracts -- the new place for
> all business logic.

Absolutely.

Lada

>
> /jan
>
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod

-- 
Ladislav Lhotka
Head, CZ.NIC Labs
PGP Key ID: 0xB8F92B08A9F76C67


From nobody Wed Dec 19 09:03:11 2018
Return-Path: <evoit@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20634130E66 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 09:03:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.491
X-Spam-Level: 
X-Spam-Status: No, score=-14.491 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0N4swTvIxFOC for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 09:03:07 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76F53130E54 for <netconf@ietf.org>; Wed, 19 Dec 2018 09:03:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=19376; q=dns/txt; s=iport; t=1545238986; x=1546448586; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=omTnQlX1ja+X7rri8R+Q/6sYkUQGsicGuuf8zlOWZVM=; b=UJxeKFayym+Ybk2IfDgXy3cDSkoGyA1vGKsgMhldH7tJUg44CTKiXe72 I+pc/3DsfVDWBoFn3aM2yfGJd5fHbUeV4IfH6+cfkugql56ApyVpcrqFy A0YqPHqTbiKTj9zEuxZz4rfiF7gULNV+/VfxaC3J0Ld4efzOMJjqZDRvo M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ADAAC2eBpc/49dJa1kGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUQQBAQEBAQsBgQ1NKWaBAicKjAyLfIINl12BewsBARg?= =?us-ascii?q?BDIQBRgKCayI0CQ0BAwEBAgEBAm0cDIU8AQEBAQIBAQErQQkCBQcEAgEIDgM?= =?us-ascii?q?EAQEOGgcnCxQJCAIEDgUIgk9MgR1cCA+pU4RBQIUvjD8XgUA/hCODHgEBAgE?= =?us-ascii?q?BFoIFhSECiUmFd5F0CQKHDopKIIFeTYRSilyOQYsaAhEUgScfOIFWcBUaIYJ?= =?us-ascii?q?sCYV/hRSFP0ExjBwrgQGBHwEB?=
X-IronPort-AV: E=Sophos;i="5.56,373,1539648000";  d="scan'208,217";a="497303417"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Dec 2018 17:03:05 +0000
Received: from XCH-RTP-012.cisco.com (xch-rtp-012.cisco.com [64.101.220.152]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id wBJH34pb003507 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 19 Dec 2018 17:03:05 GMT
Received: from xch-rtp-013.cisco.com (64.101.220.153) by XCH-RTP-012.cisco.com (64.101.220.152) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 19 Dec 2018 12:03:04 -0500
Received: from xch-rtp-013.cisco.com ([64.101.220.153]) by XCH-RTP-013.cisco.com ([64.101.220.153]) with mapi id 15.00.1395.000; Wed, 19 Dec 2018 12:03:04 -0500
From: "Eric Voit (evoit)" <evoit@cisco.com>
To: Martin Bjorklund <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
Thread-Index: AQHUl6ITOAUHIVLokEag0HAs+7Dz76WGSNXw
Date: Wed, 19 Dec 2018 17:03:03 +0000
Message-ID: <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com>
In-Reply-To: <20181219.145202.1027346732573212384.mbj@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.56.234]
Content-Type: multipart/alternative; boundary="_000_91e0bc7bee2e4b56bc968565fa43d78cXCHRTP013ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.152, xch-rtp-012.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/odaHfbZDIpIgO2uuDZPGSXHA6jc>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 17:03:09 -0000

--_000_91e0bc7bee2e4b56bc968565fa43d78cXCHRTP013ciscocom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks Martin,



I have the version addressing the double quotes here:

https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-sub=
scribed-notifications-20.xml



Before I upload this -20, I want to see if you have concerns with the Pyang=
 Validation issue shown below.   Reshad mentioned that other users have see=
n it.  Is this something which should stop me from posting?



Eric



----------------------------------
ietf-subscribed-notifications@2018-12-19.yang
Pyang Validation
Traceback (most recent call last):
pyang", line 444, in <module>
    run()
pyang", line 219, in run
    repos =3D pyang.FileRepository(path, no_path_recurse=3Do.no_path_recurs=
e)
__init__.py", line 408, in __init__
    location =3D pip.locations.distutils_scheme('pyang')
AttributeError: 'module' object has no attribute 'locations'
Pyang Output
No warnings or errors



> -----Original Message-----

> From: Netconf <netconf-bounces@ietf.org> On Behalf Of Martin Bjorklund

> Sent: Wednesday, December 19, 2018 8:52 AM

> To: netconf@ietf.org

> Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifica=
tions-

> 19.txt

>

> Hi,

>

> The YANG module in this draft doesn't compile.  The new text for the XPat=
h

> context contains double quote characters.  I suggest you change them to s=
ingle

> quotes.

>

>

> /martin

>

>

> internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> wrote:

> >

> > A New Internet-Draft is available from the on-line Internet-Drafts dire=
ctories.

> > This draft is a work item of the Network Configuration WG of the IETF.

> >

> >         Title           : Subscription to YANG Event Notifications

> >         Authors         : Eric Voit

> >                           Alexander Clemm

> >                           Alberto Gonzalez Prieto

> >                           Einar Nilsen-Nygaard

> >                           Ambika Prasad Tripathy

> >         Filename        : draft-ietf-netconf-subscribed-notifications-1=
9.txt

> >         Pages           : 78

> >         Date            : 2018-12-18

> >

> > Abstract:

> >    This document defines a YANG data model and associated mechanisms

> >    enabling subscriber-specific subscriptions to a publisher's event

> >    streams.  Applying these elements allows a subscriber to request for

> >    and receive a continuous, custom feed of publisher generated

> >    information.

> >

> >

> > The IETF datatracker status page for this draft is:

> > https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notific

> > ations/

> >

> > There are also htmlized versions available at:

> > https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notification

> > s-19

> > https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-no

> > tifications-19

> >

> > A diff from the previous version is available at:

> > https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netconf-subscribed-notif=
i

> > cations-19

> >

> >

> > Please note that it may take a couple of minutes from the time of

> > submission until the htmlized version and diff are available at tools.i=
etf.org.

> >

> > Internet-Drafts are also available by anonymous FTP at:

> > ftp://ftp.ietf.org/internet-drafts/

> >

> > _______________________________________________

> > Netconf mailing list

> > Netconf@ietf.org<mailto:Netconf@ietf.org>

> > https://www.ietf.org/mailman/listinfo/netconf

> >

>

> _______________________________________________

> Netconf mailing list

> Netconf@ietf.org<mailto:Netconf@ietf.org>

> https://www.ietf.org/mailman/listinfo/netconf

--_000_91e0bc7bee2e4b56bc968565fa43d78cXCHRTP013ciscocom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Menlo;}
@font-face
	{font-family:"Helvetica Neue";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
h2
	{mso-style-priority:9;
	mso-style-link:"Heading 2 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:18.0pt;
	font-family:"Calibri",sans-serif;}
h3
	{mso-style-priority:9;
	mso-style-link:"Heading 3 Char";
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:13.5pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
	{mso-style-priority:99;
	mso-style-link:"Plain Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
span.PlainTextChar
	{mso-style-name:"Plain Text Char";
	mso-style-priority:99;
	mso-style-link:"Plain Text";
	font-family:"Calibri",sans-serif;}
span.Heading2Char
	{mso-style-name:"Heading 2 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 2";
	font-family:"Calibri",sans-serif;
	font-weight:bold;}
span.Heading3Char
	{mso-style-name:"Heading 3 Char";
	mso-style-priority:9;
	mso-style-link:"Heading 3";
	font-family:"Calibri",sans-serif;
	font-weight:bold;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 129.75pt 1.0in 129.7pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoPlainText">Thanks Martin,<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">I have the version addressing the double quotes h=
ere:<o:p></o:p></p>
<p class=3D"MsoPlainText"><a href=3D"https://github.com/netconf-wg/rfc5277b=
is/blob/master/draft-ietf-netconf-subscribed-notifications-20.xml">https://=
github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-subscribed-=
notifications-20.xml</a><o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Before I upload this -20, I want to see if you ha=
ve concerns with the Pyang Validation issue shown below.&nbsp;&nbsp; Reshad=
 mentioned that other users have seen it.&nbsp; Is this something which sho=
uld stop me from posting?<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">Eric<o:p></o:p></p>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">----------------------------------<o:p></o:p></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:15.0pt;margin-right:0in;=
margin-bottom:7.5pt;margin-left:0in;background:white">
<span style=3D"font-size:22.5pt;font-family:&quot;Helvetica Neue&quot;;colo=
r:#333333">ietf-subscribed-notifications@2018-12-19.yang<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:15.0pt;margin-right:0in;=
margin-bottom:7.5pt;margin-left:0in;background:white">
<span style=3D"font-size:18.0pt;font-family:&quot;Helvetica Neue&quot;;colo=
r:#333333">Pyang Validation<o:p></o:p></span></p>
<div style=3D"mso-element:para-border-div;border:solid #CCCCCC 1.0pt;paddin=
g:7.0pt 7.0pt 7.0pt 7.0pt;background:whitesmoke">
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">Traceback =
(most recent call last):<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">pyang&quot=
;, line 444, in &lt;module&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">&nbsp;&nbs=
p;&nbsp; run()<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">pyang&quot=
;, line 219, in run<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">&nbsp;&nbs=
p;&nbsp; repos =3D pyang.FileRepository(path, no_path_recurse=3Do.no_path_r=
ecurse)<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">__init__.p=
y&quot;, line 408, in __init__<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">&nbsp;&nbs=
p;&nbsp; location =3D pip.locations.distutils_scheme('pyang')<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">AttributeE=
rror: 'module' object has no attribute 'locations'<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:15.0pt;margin-right:0in;=
margin-bottom:7.5pt;margin-left:0in;background:white">
<span style=3D"font-size:18.0pt;font-family:&quot;Helvetica Neue&quot;;colo=
r:#333333">Pyang Output<o:p></o:p></span></p>
<div style=3D"mso-element:para-border-div;border:solid #CCCCCC 1.0pt;paddin=
g:7.0pt 7.0pt 7.0pt 7.0pt;background:whitesmoke">
<p class=3D"MsoNormal" style=3D"margin-bottom:7.5pt;background:whitesmoke;w=
ord-break:break-all;border:none;padding:0in">
<span style=3D"font-size:10.0pt;font-family:Menlo;color:#333333">No warning=
s or errors<o:p></o:p></span></p>
</div>
<p class=3D"MsoPlainText"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoPlainText">&gt; -----Original Message-----</p>
<p class=3D"MsoPlainText">&gt; From: Netconf &lt;netconf-bounces@ietf.org&g=
t; On Behalf Of Martin Bjorklund</p>
<p class=3D"MsoPlainText">&gt; Sent: Wednesday, December 19, 2018 8:52 AM</=
p>
<p class=3D"MsoPlainText">&gt; To: netconf@ietf.org</p>
<p class=3D"MsoPlainText">&gt; Subject: Re: [Netconf] I-D Action: draft-iet=
f-netconf-subscribed-notifications-</p>
<p class=3D"MsoPlainText">&gt; 19.txt</p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; Hi,</p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; The YANG module in this draft doesn't compil=
e.&nbsp; The new text for the XPath</p>
<p class=3D"MsoPlainText">&gt; context contains double quote characters.&nb=
sp; I suggest you change them to single</p>
<p class=3D"MsoPlainText">&gt; quotes.</p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; /martin</p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; <a href=3D"mailto:internet-drafts@ietf.org">=
<span style=3D"color:windowtext;text-decoration:none">internet-drafts@ietf.=
org</span></a> wrote:</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; A New Internet-Draft is available from =
the on-line Internet-Drafts directories.</p>
<p class=3D"MsoPlainText">&gt; &gt; This draft is a work item of the Networ=
k Configuration WG of the IETF.</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; Title&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
: Subscription to YANG Event Notifications</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; Authors&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Eric Voi=
t</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Alexander Clemm</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Alberto Gonzalez Prieto</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Einar Nilsen-Nygaard</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Ambika Prasad Tripathy</p>
<p class=3D"MsoPlainText">&gt; &gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; Filename&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : draft-ietf-netconf=
-subscribed-notifications-19.txt</p>
<p class=3D"MsoPlainText">&gt; &gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; Pages&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 78<=
/p>
<p class=3D"MsoPlainText">&gt; &gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp; Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
: 2018-12-18</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; Abstract:</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp; This document defines=
 a YANG data model and associated mechanisms</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp; enabling subscriber-s=
pecific subscriptions to a publisher's event</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp; streams.&nbsp; Applyi=
ng these elements allows a subscriber to request for</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp; and receive a continu=
ous, custom feed of publisher generated</p>
<p class=3D"MsoPlainText">&gt; &gt;&nbsp;&nbsp;&nbsp; information.</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; The IETF datatracker status page for th=
is draft is:</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"https://datatracker.ietf.org=
/doc/draft-ietf-netconf-subscribed-notific">
<span style=3D"color:windowtext;text-decoration:none">https://datatracker.i=
etf.org/doc/draft-ietf-netconf-subscribed-notific</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt; ations/</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; There are also htmlized versions availa=
ble at:</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"https://tools.ietf.org/html/=
draft-ietf-netconf-subscribed-notification">
<span style=3D"color:windowtext;text-decoration:none">https://tools.ietf.or=
g/html/draft-ietf-netconf-subscribed-notification</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt; s-19</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"https://datatracker.ietf.org=
/doc/html/draft-ietf-netconf-subscribed-no">
<span style=3D"color:windowtext;text-decoration:none">https://datatracker.i=
etf.org/doc/html/draft-ietf-netconf-subscribed-no</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt; tifications-19</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; A diff from the previous version is ava=
ilable at:</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"https://www.ietf.org/rfcdiff=
?url2=3Ddraft-ietf-netconf-subscribed-notifi">
<span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/=
rfcdiff?url2=3Ddraft-ietf-netconf-subscribed-notifi</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt; cations-19</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; Please note that it may take a couple o=
f minutes from the time of</p>
<p class=3D"MsoPlainText">&gt; &gt; submission until the htmlized version a=
nd diff are available at tools.ietf.org.</p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; Internet-Drafts are also available by a=
nonymous FTP at:</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"ftp://ftp.ietf.org/internet-=
drafts/"><span style=3D"color:windowtext;text-decoration:none">ftp://ftp.ie=
tf.org/internet-drafts/</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; &gt; _______________________________________=
________</p>
<p class=3D"MsoPlainText">&gt; &gt; Netconf mailing list</p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"mailto:Netconf@ietf.org"><sp=
an style=3D"color:windowtext;text-decoration:none">Netconf@ietf.org</span><=
/a></p>
<p class=3D"MsoPlainText">&gt; &gt; <a href=3D"https://www.ietf.org/mailman=
/listinfo/netconf">
<span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/=
mailman/listinfo/netconf</span></a></p>
<p class=3D"MsoPlainText">&gt; &gt;</p>
<p class=3D"MsoPlainText">&gt; </p>
<p class=3D"MsoPlainText">&gt; ____________________________________________=
___</p>
<p class=3D"MsoPlainText">&gt; Netconf mailing list</p>
<p class=3D"MsoPlainText">&gt; <a href=3D"mailto:Netconf@ietf.org"><span st=
yle=3D"color:windowtext;text-decoration:none">Netconf@ietf.org</span></a></=
p>
<p class=3D"MsoPlainText">&gt; <a href=3D"https://www.ietf.org/mailman/list=
info/netconf">
<span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/=
mailman/listinfo/netconf</span></a></p>
</div>
</body>
</html>

--_000_91e0bc7bee2e4b56bc968565fa43d78cXCHRTP013ciscocom_--


From nobody Wed Dec 19 10:46:47 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4031F130EBB for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 10:46:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 988Gc5wkL5WO for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 10:46:43 -0800 (PST)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF046130EBA for <netconf@ietf.org>; Wed, 19 Dec 2018 10:46:42 -0800 (PST)
Received: by mail-lj1-x236.google.com with SMTP id q2-v6so7176902lji.10 for <netconf@ietf.org>; Wed, 19 Dec 2018 10:46:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=XPB8xIbAOgKImY7DsUU9U0/1nQUI0FWFHmZc+36soos=; b=igjxdSf3Y2uWj06m507+OPGlYgjmrWZyDzNzF6X6VWEhJ8LgqcB1pX4vHaCKbFOoP/ cJg0jZRNB7UyNI+B0lJog+iE5iSvNet5ehndmU92ShXg54G5mBDl8SNgPXCfnhXaMP9I OKFE4JDduMcZE6NbFr9vqdgFLCwdPfVHGdqUCQhZxkxygBrM2bob1Kvai5dtL1doJXa6 wwLUr59kBF+cpTSN+RWufsb+DsAvAf5MVuGMFo+QL0DehTSntfatGDyvwYXbE/i28rg9 stq+OrM6cmKGuLTgTvvKIJBctvjTsQcHOXg0SA+XNesNSTKKadVWpkAmYyOOekq3UfFl yoSw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=XPB8xIbAOgKImY7DsUU9U0/1nQUI0FWFHmZc+36soos=; b=Qdrdw3M2CPUZJywfO9ngWGy9hbLEWkdg17DkVdUDqoZ/rK9z0QGfOpQ6yxXtWzxiUa CMoLKMnlf/OmhDWb2qn1iDVhzUiLxzdg9QOV39WTl1KBbtdFHIQkDT37WdfRaHDQf7TU UstrDDxzT+Nc5AaZRZLqjGa8trxsAbKoPvDlFy8iJNb92IUziMuuoF6flu7wi98NQEVP dhEVchdVXpLKHi4Yd1ViSZVfVTpqwZpLGaVbYWzqCUUdxOchKXNezE1Tw8Y6IpFwkq1s tuP4FNBvVfACTOKfOVNHgu1PoFabhbCoQPIdCKsn5dDZyqwOHiWujww2qgTccmfOuu2e uvaw==
X-Gm-Message-State: AA+aEWYK2Md7D+9Zmq4tWzt5wlyx6cz80+Fd+TfWRznAxYdOEdXExM6D q+oTSjODWeE3ie3gqnSTXmP14nAAfOW6k5aQba/h0A==
X-Google-Smtp-Source: AFSGD/UY+U4ETEVEL+nmSn0urGiypQVUbmveDjvs5ZC3yXcTeUTmTnNNNdKddnOXFfXsSHJzFOWkjvkpHKY3siqRWDo=
X-Received: by 2002:a2e:9603:: with SMTP id v3-v6mr11361630ljh.15.1545245200812;  Wed, 19 Dec 2018 10:46:40 -0800 (PST)
MIME-Version: 1.0
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com> <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com> <875zvpeh5h.fsf@nic.cz>
In-Reply-To: <875zvpeh5h.fsf@nic.cz>
From: Andy Bierman <andy@yumaworks.com>
Date: Wed, 19 Dec 2018 10:46:29 -0800
Message-ID: <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com>
To: Jan Lindblad <janl@tail-f.com>, Andy Bierman <andy@yumaworks.com>,  "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004931b4057d646fa5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/JpX4EPtMLnY4vrbzGgxgCoJUcsA>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 18:46:46 -0000

--0000000000004931b4057d646fa5
Content-Type: text/plain; charset="UTF-8"

On Wed, Dec 19, 2018 at 6:16 AM Ladislav Lhotka <lhotka@nic.cz> wrote:

> Jan Lindblad <janl@tail-f.com> writes:
>
> > Hi,
> >>> While I agree with Martin, in our systems we have a number of places,
> where the system does create configuration in running, due to
> >>>
> >>> different levels of automation and autonomous algorithms kick-in
> >>> the created config needs to be possible to be further modified by the
> operator
> >>> the created config needs to be referenced from operator created config
> >>> the created config is not always ephemeral, it might need to be part
> of backup/restore
> >> This is only a sampling from "the list of excuses". I have heard many
> more. The road to hell is paved with good intentions, however. If we want
> to build automation based on sound theory, clearly separating the orders
> from managers from a system's own operational view is key, IMO.
> Reliability, security, accountability are growing in importance, and they
> all play in this direction.
> >>
> >> We may not need to standardize rules to outlaw the above; the market
> will take care of that. What we need to ensure is that it is possible to be
> standards compliant without having to implement design excuses like these.
> >>
> >>
> >> NMDA has a lot of room for proprietary mechanisms for converting
> <running> to <intended>.
> >> Many times the features desired by engineers exceed the capabilities of
> YANG, such as
> >> a dynamic default leaf.  YANG allows a simple constant, and no business
> logic to pick the default.
> >> This is a very valid use of "server auto-magic".
> >>
> >> Maybe a future version of YANG can improve the client visibility into
> this "auto-magic"
> >
> > As you say, this is not uncommon. I usually recommend to leave out any
> > default statement, and write in the description what happens if this
> > leaf isn't set. The operator can then override the default by giving a
> > value.
>
> Anyway, this is not a case where the server writes something on its own
> to a configuration datastore.
>


I don't think it is a problem if NMDA or non-NMDA servers write to
<running>.
Just part of the complexity that is baked in -- NMDA does nothing to help
the client know
why <running> is different than <intended> anyway.


>
> >
> > While some more advanced features for default values may be of some
> > utility, the simplicity of YANG is also important. We don't want to
> > make the YANG models -- the interface contracts -- the new place for
> > all business logic.
>
> Absolutely.
>
>
I am not proposing YANG needs a new default-stmt. There is a
description-stmt
and vendors can add their own extensions to flag auto-magic data nodes.


> Lada
>
> >
> > /jan
>


Andy


> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
>
> --
> Ladislav Lhotka
> Head, CZ.NIC Labs
> PGP Key ID: 0xB8F92B08A9F76C67
>

--0000000000004931b4057d646fa5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr">On Wed, Dec 19, 2018 at 6:16 AM Ladislav Lhotka &lt;<a hre=
f=3D"mailto:lhotka@nic.cz">lhotka@nic.cz</a>&gt; wrote:<br></div><blockquot=
e class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px s=
olid rgb(204,204,204);padding-left:1ex">Jan Lindblad &lt;<a href=3D"mailto:=
janl@tail-f.com" target=3D"_blank">janl@tail-f.com</a>&gt; writes:<br>
<br>
&gt; Hi,<br>
&gt;&gt;&gt; While I agree with Martin, in our systems we have a number of =
places, where the system does create configuration in running, due to<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; different levels of automation and autonomous algorithms kick-=
in<br>
&gt;&gt;&gt; the created config needs to be possible to be further modified=
 by the operator<br>
&gt;&gt;&gt; the created config needs to be referenced from operator create=
d config<br>
&gt;&gt;&gt; the created config is not always ephemeral, it might need to b=
e part of backup/restore<br>
&gt;&gt; This is only a sampling from &quot;the list of excuses&quot;. I ha=
ve heard many more. The road to hell is paved with good intentions, however=
. If we want to build automation based on sound theory, clearly separating =
the orders from managers from a system&#39;s own operational view is key, I=
MO. Reliability, security, accountability are growing in importance, and th=
ey all play in this direction.<br>
&gt;&gt; <br>
&gt;&gt; We may not need to standardize rules to outlaw the above; the mark=
et will take care of that. What we need to ensure is that it is possible to=
 be standards compliant without having to implement design excuses like the=
se.<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt; NMDA has a lot of room for proprietary mechanisms for converting &=
lt;running&gt; to &lt;intended&gt;.<br>
&gt;&gt; Many times the features desired by engineers exceed the capabiliti=
es of YANG, such as<br>
&gt;&gt; a dynamic default leaf.=C2=A0 YANG allows a simple constant, and n=
o business logic to pick the default.<br>
&gt;&gt; This is a very valid use of &quot;server auto-magic&quot;.<br>
&gt;&gt; <br>
&gt;&gt; Maybe a future version of YANG can improve the client visibility i=
nto this &quot;auto-magic&quot;<br>
&gt;<br>
&gt; As you say, this is not uncommon. I usually recommend to leave out any=
<br>
&gt; default statement, and write in the description what happens if this<b=
r>
&gt; leaf isn&#39;t set. The operator can then override the default by givi=
ng a<br>
&gt; value.<br>
<br>
Anyway, this is not a case where the server writes something on its own<br>
to a configuration datastore.<br></blockquote><div><br></div><div><br></div=
><div>I don&#39;t think it is a problem if NMDA or non-NMDA servers write t=
o &lt;running&gt;.</div><div>Just part of the complexity that is baked in -=
- NMDA does nothing to help the client know</div><div>why &lt;running&gt; i=
s different than &lt;intended&gt; anyway.</div><div>=C2=A0</div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px so=
lid rgb(204,204,204);padding-left:1ex">
<br>
&gt;<br>
&gt; While some more advanced features for default values may be of some<br=
>
&gt; utility, the simplicity of YANG is also important. We don&#39;t want t=
o<br>
&gt; make the YANG models -- the interface contracts -- the new place for<b=
r>
&gt; all business logic.<br>
<br>
Absolutely.<br>
<br></blockquote><div><br></div><div>I am not proposing YANG needs a new de=
fault-stmt. There is a description-stmt</div><div>and vendors can add their=
 own extensions to flag auto-magic data nodes.</div><div>=C2=A0</div><block=
quote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1=
px solid rgb(204,204,204);padding-left:1ex">
Lada<br>
<br>
&gt;<br>
&gt; /jan<br></blockquote><div><br></div><div><br></div><div>Andy</div><div=
>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt;<br>
&gt; _______________________________________________<br>
&gt; netmod mailing list<br>
&gt; <a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</=
a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/netmod</a><br=
>
<br>
-- <br>
Ladislav Lhotka<br>
Head, CZ.NIC Labs<br>
PGP Key ID: 0xB8F92B08A9F76C67<br>
</blockquote></div></div>

--0000000000004931b4057d646fa5--


From nobody Wed Dec 19 11:37:19 2018
Return-Path: <calle@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4832A130EBF for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 11:37:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ed-a1B4zMinT for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 11:37:15 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8C5011200B3 for <netconf@ietf.org>; Wed, 19 Dec 2018 11:37:15 -0800 (PST)
Received: from ams-camoberg-nitro7.cisco.com (unknown [173.38.220.46]) by mail.tail-f.com (Postfix) with ESMTPSA id A439A1AE0446; Wed, 19 Dec 2018 20:37:12 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Carl Moberg <calle@tail-f.com>
In-Reply-To: <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com>
Date: Wed, 19 Dec 2018 20:37:10 +0100
Cc: =?utf-8?Q?Martin_Bj=C3=B6rklund?= <mbj@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <E8390EE7-F2D4-4196-9956-B37DBBBC6C88@tail-f.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com>
To: "Eric Voit (evoit)" <evoit@cisco.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/02WyClpOnq2xhKh1O3r6GoWWdGM>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 19:37:19 -0000

Eric,

 No, it=E2=80=99s a bug on my side. Working to fix now. Apologies.


> On Dec 19, 2018, at 6:03 PM, Eric Voit (evoit) <evoit@cisco.com> =
wrote:
>=20
> Thanks Martin,
> =20
> I have the version addressing the double quotes here:
> =
https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-su=
bscribed-notifications-20.xml
> =20
> Before I upload this -20, I want to see if you have concerns with the =
Pyang Validation issue shown below.   Reshad mentioned that other users =
have seen it.  Is this something which should stop me from posting?
> =20
> Eric
> =20
> ----------------------------------
> ietf-subscribed-notifications@2018-12-19.yang
>=20
> Pyang Validation
>=20
> Traceback (most recent call last):
>=20
> pyang", line 444, in <module>
>=20
>     run()
>=20
> pyang", line 219, in run
>=20
>     repos =3D pyang.FileRepository(path, =
no_path_recurse=3Do.no_path_recurse)
>=20
> __init__.py", line 408, in __init__
>=20
>     location =3D pip.locations.distutils_scheme('pyang')
>=20
> AttributeError: 'module' object has no attribute 'locations'
>=20
> Pyang Output
>=20
> No warnings or errors
>=20
> =20
> > -----Original Message-----
> > From: Netconf <netconf-bounces@ietf.org> On Behalf Of Martin =
Bjorklund
> > Sent: Wednesday, December 19, 2018 8:52 AM
> > To: netconf@ietf.org
> > Subject: Re: [Netconf] I-D Action: =
draft-ietf-netconf-subscribed-notifications-
> > 19.txt
> >
> > Hi,
> >
> > The YANG module in this draft doesn't compile.  The new text for the =
XPath
> > context contains double quote characters.  I suggest you change them =
to single
> > quotes.
> >
> >
> > /martin
> >
> >
> > internet-drafts@ietf.org wrote:
> > >
> > > A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> > > This draft is a work item of the Network Configuration WG of the =
IETF.
> > >
> > >         Title           : Subscription to YANG Event Notifications
> > >         Authors         : Eric Voit
> > >                           Alexander Clemm
> > >                           Alberto Gonzalez Prieto
> > >                           Einar Nilsen-Nygaard
> > >                           Ambika Prasad Tripathy
> > >         Filename        : =
draft-ietf-netconf-subscribed-notifications-19.txt
> > >         Pages           : 78
> > >         Date            : 2018-12-18
> > >
> > > Abstract:
> > >    This document defines a YANG data model and associated =
mechanisms
> > >    enabling subscriber-specific subscriptions to a publisher's =
event
> > >    streams.  Applying these elements allows a subscriber to =
request for
> > >    and receive a continuous, custom feed of publisher generated
> > >    information.
> > >
> > >
> > > The IETF datatracker status page for this draft is:
> > > =
https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notific
> > > ations/
> > >
> > > There are also htmlized versions available at:
> > > =
https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notification
> > > s-19
> > > =
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-no
> > > tifications-19
> > >
> > > A diff from the previous version is available at:
> > > =
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netconf-subscribed-notifi
> > > cations-19
> > >
> > >
> > > Please note that it may take a couple of minutes from the time of
> > > submission until the htmlized version and diff are available at =
tools.ietf.org.
> > >
> > > Internet-Drafts are also available by anonymous FTP at:
> > > ftp://ftp.ietf.org/internet-drafts/
> > >
> > > _______________________________________________
> > > Netconf mailing list
> > > Netconf@ietf.org
> > > https://www.ietf.org/mailman/listinfo/netconf
> > >
> >
> > _______________________________________________
> > Netconf mailing list
> > Netconf@ietf.org
> > https://www.ietf.org/mailman/listinfo/netconf
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf


From nobody Wed Dec 19 11:40:33 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EF921200B3 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 11:40:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T1vOfAp05R92 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 11:40:28 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 469DC130EBF for <netconf@ietf.org>; Wed, 19 Dec 2018 11:40:28 -0800 (PST)
Received: from localhost (h-4-215.A165.priv.bahnhof.se [158.174.4.215]) by mail.tail-f.com (Postfix) with ESMTPSA id 7832C1AE0446; Wed, 19 Dec 2018 20:40:27 +0100 (CET)
Date: Wed, 19 Dec 2018 20:40:27 +0100 (CET)
Message-Id: <20181219.204027.1134533539828819405.mbj@tail-f.com>
To: evoit@cisco.com
Cc: netconf@ietf.org
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com>
X-Mailer: Mew version 6.7 on Emacs 25.2 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/N12R4UiehCek6z3WhKMxPpVjYWE>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 19:40:32 -0000

"Eric Voit (evoit)" <evoit@cisco.com> wrote:
> Thanks Martin,
> 
> 
> 
> I have the version addressing the double quotes here:
> 
> https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-subscribed-notifications-20.xml
> 
> 
> 
> Before I upload this -20, I want to see if you have concerns with the Pyang Validation issue shown below.   Reshad mentioned that other users have seen it.  Is this something which should stop me from posting?
>

You get this error b/c you are running an old version of pyang that
isn't compatible with the (newer) version of pip on your system.  I
suggest you upgrade pyang.

 
/martin



> 
> 
> Eric
> 
> 
> 
> ----------------------------------
> ietf-subscribed-notifications@2018-12-19.yang
> Pyang Validation
> Traceback (most recent call last):
> pyang", line 444, in <module>
>     run()
> pyang", line 219, in run
>     repos = pyang.FileRepository(path, no_path_recurse=o.no_path_recurse)
> __init__.py", line 408, in __init__
>     location = pip.locations.distutils_scheme('pyang')
> AttributeError: 'module' object has no attribute 'locations'
> Pyang Output
> No warnings or errors
> 
> 
> 
> > -----Original Message-----
> 
> > From: Netconf <netconf-bounces@ietf.org> On Behalf Of Martin Bjorklund
> 
> > Sent: Wednesday, December 19, 2018 8:52 AM
> 
> > To: netconf@ietf.org
> 
> > Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-
> 
> > 19.txt
> 
> >
> 
> > Hi,
> 
> >
> 
> > The YANG module in this draft doesn't compile.  The new text for the XPath
> 
> > context contains double quote characters.  I suggest you change them to single
> 
> > quotes.
> 
> >
> 
> >
> 
> > /martin
> 
> >
> 
> >
> 
> > internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> wrote:
> 
> > >
> 
> > > A New Internet-Draft is available from the on-line Internet-Drafts directories.
> 
> > > This draft is a work item of the Network Configuration WG of the IETF.
> 
> > >
> 
> > >         Title           : Subscription to YANG Event Notifications
> 
> > >         Authors         : Eric Voit
> 
> > >                           Alexander Clemm
> 
> > >                           Alberto Gonzalez Prieto
> 
> > >                           Einar Nilsen-Nygaard
> 
> > >                           Ambika Prasad Tripathy
> 
> > >         Filename        : draft-ietf-netconf-subscribed-notifications-19.txt
> 
> > >         Pages           : 78
> 
> > >         Date            : 2018-12-18
> 
> > >
> 
> > > Abstract:
> 
> > >    This document defines a YANG data model and associated mechanisms
> 
> > >    enabling subscriber-specific subscriptions to a publisher's event
> 
> > >    streams.  Applying these elements allows a subscriber to request for
> 
> > >    and receive a continuous, custom feed of publisher generated
> 
> > >    information.
> 
> > >
> 
> > >
> 
> > > The IETF datatracker status page for this draft is:
> 
> > > https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notific
> 
> > > ations/
> 
> > >
> 
> > > There are also htmlized versions available at:
> 
> > > https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notification
> 
> > > s-19
> 
> > > https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-no
> 
> > > tifications-19
> 
> > >
> 
> > > A diff from the previous version is available at:
> 
> > > https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-subscribed-notifi
> 
> > > cations-19
> 
> > >
> 
> > >
> 
> > > Please note that it may take a couple of minutes from the time of
> 
> > > submission until the htmlized version and diff are available at tools.ietf.org.
> 
> > >
> 
> > > Internet-Drafts are also available by anonymous FTP at:
> 
> > > ftp://ftp.ietf.org/internet-drafts/
> 
> > >
> 
> > > _______________________________________________
> 
> > > Netconf mailing list
> 
> > > Netconf@ietf.org<mailto:Netconf@ietf.org>
> 
> > > https://www.ietf.org/mailman/listinfo/netconf
> 
> > >
> 
> >
> 
> > _______________________________________________
> 
> > Netconf mailing list
> 
> > Netconf@ietf.org<mailto:Netconf@ietf.org>
> 
> > https://www.ietf.org/mailman/listinfo/netconf


From nobody Wed Dec 19 13:00:00 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 59677130E86; Wed, 19 Dec 2018 12:59:58 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.2
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <154525319831.1880.17677342200777508450@ietfa.amsl.com>
Date: Wed, 19 Dec 2018 12:59:58 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/NDP-79101n8da5y1tND1YZBCQYM>
Subject: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-20.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 20:59:59 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Subscription to YANG Event Notifications
        Authors         : Eric Voit
                          Alexander Clemm
                          Alberto Gonzalez Prieto
                          Einar Nilsen-Nygaard
                          Ambika Prasad Tripathy
	Filename        : draft-ietf-netconf-subscribed-notifications-20.txt
	Pages           : 78
	Date            : 2018-12-19

Abstract:
   This document defines a YANG data model and associated mechanisms
   enabling subscriber-specific subscriptions to a publisher's event
   streams.  Applying these elements allows a subscriber to request for
   and receive a continuous, custom feed of publisher generated
   information.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-subscribed-notifications/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-subscribed-notifications-20
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-subscribed-notifications-20

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-subscribed-notifications-20


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Dec 19 13:27:14 2018
Return-Path: <rrahman@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 82221130ED8 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 13:27:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.566
X-Spam-Level: 
X-Spam-Status: No, score=-14.566 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lpf0jsQsOEJH for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 13:27:10 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B0DDD130E86 for <netconf@ietf.org>; Wed, 19 Dec 2018 13:27:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3548; q=dns/txt; s=iport; t=1545254829; x=1546464429; h=from:to:subject:date:message-id:content-id: content-transfer-encoding:mime-version; bh=ILKCIskttBDV3AQSPen3pwKcsnTbxYC1+d9t4segpNo=; b=cQHB0bnlpVXNJRPD2dD/Kym5Oquqbu2dhqIemwO8BAbYuM/7SSBBJPNP CfW7MMqKAimg+Tkampes62lVgccwHI/V7p6MCip0DR0Y1poPh4hdvKIoP 4shXf5NMO/BRzgM7uZ2f4/ohytIsastUZLJQXmbOBDJwlHkZoZlOCVXE1 I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ANAADPthpc/4cNJK1kGwEBAQEDAQE?= =?us-ascii?q?BBwMBAQGBUQYBAQELAYFaKWaBAicKg3OIGaVmgXsLAQEYDQeDekYZglQiNAk?= =?us-ascii?q?NAQMBAQIBAQJtHAELhUQBIRE6CRQBIgIJHQIEJQsVEgQTgldLAYIBD6gIgS+?= =?us-ascii?q?ELQEDAg5AhTCBC4s0F4FAP4E4H4IXg1MBAQIBARaBNyeCcTGCJgKhNAkChw6?= =?us-ascii?q?KUhiBXk2EUopciUiEeYsaAhEUgScfOIFWcBUaISoBgkEJgkeDOIUUhT9ygSi?= =?us-ascii?q?MIAGBHgEB?=
X-IronPort-AV: E=Sophos;i="5.56,374,1539648000"; d="scan'208";a="215126370"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Dec 2018 21:27:08 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id wBJLR808003916 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL) for <netconf@ietf.org>; Wed, 19 Dec 2018 21:27:08 GMT
Received: from xch-rcd-005.cisco.com (173.37.102.15) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 19 Dec 2018 15:27:07 -0600
Received: from xch-rcd-005.cisco.com ([173.37.102.15]) by XCH-RCD-005.cisco.com ([173.37.102.15]) with mapi id 15.00.1395.000; Wed, 19 Dec 2018 15:27:07 -0600
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: yanglint version used by datatracker (WAS draft-ietf-netconf-subscribed-notifications-20.txt)
Thread-Index: AQHUl+GYZJYttCzWok66UYwCmjZGiQ==
Date: Wed, 19 Dec 2018 21:27:07 +0000
Message-ID: <1183CB53-3D84-4E9F-93BD-EE86436D94A5@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [161.44.212.167]
Content-Type: text/plain; charset="utf-8"
Content-ID: <AE548DFDCA9CAF488DD694D340A83A62@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.15, xch-aln-005.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/bolytO3umO-hhL0BbsUr97bjtyk>
Subject: [Netconf] yanglint version used by datatracker (WAS draft-ietf-netconf-subscribed-notifications-20.txt)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 21:27:12 -0000
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From nobody Wed Dec 19 15:37:24 2018
Return-Path: <calle@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA5FB130E86 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:37:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iXg0BlHAHzk8 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:37:21 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id E6C4C12D4F0 for <netconf@ietf.org>; Wed, 19 Dec 2018 15:37:20 -0800 (PST)
Received: from ams-camoberg-nitro7.cisco.com (unknown [173.38.220.46]) by mail.tail-f.com (Postfix) with ESMTPSA id 5A69A1AE0446; Thu, 20 Dec 2018 00:37:16 +0100 (CET)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Carl Moberg <calle@tail-f.com>
In-Reply-To: <20181219.204027.1134533539828819405.mbj@tail-f.com>
Date: Thu, 20 Dec 2018 00:37:15 +0100
Cc: evoit@cisco.com, netconf@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com> <20181219.204027.1134533539828819405.mbj@tail-f.com>
To: =?utf-8?Q?Martin_Bj=C3=B6rklund?= <mbj@tail-f.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/3IgBCLWmVWpYVS9Np7oKT8g_qtU>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 23:37:23 -0000

> On Dec 19, 2018, at 8:40 PM, Martin Bjorklund <mbj@tail-f.com> wrote:
>=20
> "Eric Voit (evoit)" <evoit@cisco.com> wrote:
>> Thanks Martin,
>>=20
>>=20
>>=20
>> I have the version addressing the double quotes here:
>>=20
>> =
https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-su=
bscribed-notifications-20.xml
>>=20
>>=20
>>=20
>> Before I upload this -20, I want to see if you have concerns with the =
Pyang Validation issue shown below.   Reshad mentioned that other users =
have seen it.  Is this something which should stop me from posting?
>>=20
>=20
> You get this error b/c you are running an old version of pyang that
> isn't compatible with the (newer) version of pip on your system.  I
> suggest you upgrade pyang.
>=20

 Yup, thanks. Upgraded and yangvalidator.org now works (better).


From nobody Wed Dec 19 15:46:12 2018
Return-Path: <rrahman@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A408130E86 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:46:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.566
X-Spam-Level: 
X-Spam-Status: No, score=-14.566 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TX08SaWuy68o for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:46:09 -0800 (PST)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B690212D4F0 for <netconf@ietf.org>; Wed, 19 Dec 2018 15:46:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2464; q=dns/txt; s=iport; t=1545263168; x=1546472768; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=YS9uhWfMQjnaCbZXbv+nhT+ztyT40WChx4gb7pGvDd4=; b=k4mCPP+KiRB3B15k1bG0JnOGYKRCTkW4b8fHznH0YBeK/WerAQ4kX4A1 5QuUSFcbydFJsB1HYiNjZiu+bIvpgsa1FooH7MnIAJtoK5yiwjZUL6oOz xB6Gl0VjJsN24GMtLr+RVHkrqcLPO2e2CpNwhH7CdzmhT3gPhyIyJCJgA g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAADN1xpc/5hdJa1kGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUgMBAQEBAQsBggNmgQInCoNzliKXXYF7CwEBGA0Hg3p?= =?us-ascii?q?GAheCVCI1CA0BAwEBAgEBAm0cDIU8AQEBAwEBASEROgkCEAIBCA4KAgImAgI?= =?us-ascii?q?CJQsVEAIEAQ0FgyIBgXkID6gAgS+FQIRvgQuLNBeBQD+BOB+CTIMeAQGBVA0?= =?us-ascii?q?XgnExgiYCiT85hy+QDQkChw6KUhiCK48uiUiEeYsaAhEUgScgATaBVnAVOyo?= =?us-ascii?q?BgkEJhX+FFIU/coEoinQrgQEBgR4BAQ?=
X-IronPort-AV: E=Sophos;i="5.56,374,1539648000"; d="scan'208";a="215040330"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Dec 2018 23:46:07 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id wBJNk787022089 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 19 Dec 2018 23:46:07 GMT
Received: from xch-rcd-005.cisco.com (173.37.102.15) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 19 Dec 2018 17:46:06 -0600
Received: from xch-rcd-005.cisco.com ([173.37.102.15]) by XCH-RCD-005.cisco.com ([173.37.102.15]) with mapi id 15.00.1395.000; Wed, 19 Dec 2018 17:46:06 -0600
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: Carl Moberg <calle@tail-f.com>, =?utf-8?B?TWFydGluIEJqw7Zya2x1bmQ=?= <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
Thread-Index: AQHUlvtyiIAPgkY8IUe2KPTAUo4ZuKWGeqcAgAA1X4CAACv6gIAAQimA//+uqAA=
Date: Wed, 19 Dec 2018 23:46:06 +0000
Message-ID: <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com> <20181219.204027.1134533539828819405.mbj@tail-f.com> <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com>
In-Reply-To: <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [161.44.212.167]
Content-Type: text/plain; charset="utf-8"
Content-ID: <7BCBAD5689B9BC4D91B4E379F15ABE6C@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/I33fFxD4GWSQ7mh4jsA_dU43YlI>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 23:46:11 -0000
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From nobody Wed Dec 19 15:57:17 2018
Return-Path: <calle@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E896F129AB8 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:57:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id usVyoxo9XCjX for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 15:57:13 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id D890F1200D7 for <netconf@ietf.org>; Wed, 19 Dec 2018 15:57:12 -0800 (PST)
Received: from ams-camoberg-nitro7.cisco.com (unknown [173.38.220.46]) by mail.tail-f.com (Postfix) with ESMTPSA id 00BCB1AE0446; Thu, 20 Dec 2018 00:57:11 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Carl Moberg <calle@tail-f.com>
In-Reply-To: <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com>
Date: Thu, 20 Dec 2018 00:57:10 +0100
Cc: =?utf-8?Q?Martin_Bj=C3=B6rklund?= <mbj@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <B6F8FE35-B713-4EB1-9E9A-88873126908D@tail-f.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com> <20181219.204027.1134533539828819405.mbj@tail-f.com> <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com> <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com>
To: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/qtrlVG7m4j9yV8o3idhD7kHLwfU>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Dec 2018 23:57:15 -0000

Reshad,

 Yes, so the YANG modules in the draft tries to import the =
'ietf-yang-schema-mount=E2=80=99 and 'ietf-network-instance' YANG =
modules which are not available in the repo in the validator. The reason =
why we don=E2=80=99t keep them in the repo is that the specification =
that defines those modules (draft-ietf-netmod-schema-mount, and =
draft-ietf-rtgwg-ni-model respectively) are not published yet and we =
only keep published YANG modules.

 The easiest way forward is probably to extract the YANG modules from =
your draft (perhaps using the https://github.com/xym-tool/xym tool), zip =
up your module with the imported modules and validate them using the =
=E2=80=9CUpload multiple YANG files or a zip archive=E2=80=9D option.

 I am considering storing draft-level YANG files (they are many and =
broken :-) in the validator repo as well. Maybe time to revisit that.

> On Dec 20, 2018, at 12:46 AM, Reshad Rahman (rrahman) =
<rrahman@cisco.com> wrote:
>=20
> Hi Carl,
>=20
> Yangvalidator.org has the following errors for -20, pyang is fine =
though.
>=20
> Regards,
> Reshad.
>=20
> Confdc Output
> ietf-network-instance@2018-03-20.yang:18: error: module =
'ietf-yang-schema-mount' not found
> yanglint Validation
> err : Data model "ietf-yang-schema-mount" not found.
> err : Importing "ietf-yang-schema-mount" module into =
"ietf-network-instance" failed.
> err : Module "ietf-network-instance" parsing failed.
> err : Importing "ietf-network-instance" module into =
"ietf-subscribed-notifications" failed.
> err : Module "ietf-subscribed-notifications" parsing failed.
>=20
>=20
> =EF=BB=BFOn 2018-12-19, 6:37 PM, "Netconf on behalf of Carl Moberg" =
<netconf-bounces@ietf.org on behalf of calle@tail-f.com> wrote:
>=20
>=20
>=20
>> On Dec 19, 2018, at 8:40 PM, Martin Bjorklund <mbj@tail-f.com> wrote:
>>=20
>> "Eric Voit (evoit)" <evoit@cisco.com> wrote:
>>> Thanks Martin,
>>>=20
>>>=20
>>>=20
>>> I have the version addressing the double quotes here:
>>>=20
>>> =
https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-su=
bscribed-notifications-20.xml
>>>=20
>>>=20
>>>=20
>>> Before I upload this -20, I want to see if you have concerns with =
the Pyang Validation issue shown below.   Reshad mentioned that other =
users have seen it.  Is this something which should stop me from =
posting?
>>>=20
>>=20
>> You get this error b/c you are running an old version of pyang that
>> isn't compatible with the (newer) version of pip on your system.  I
>> suggest you upgrade pyang.
>>=20
>=20
>     Yup, thanks. Upgraded and yangvalidator.org now works (better).
>=20
>    _______________________________________________
>    Netconf mailing list
>    Netconf@ietf.org
>    https://www.ietf.org/mailman/listinfo/netconf
>=20
>=20


From nobody Wed Dec 19 16:13:20 2018
Return-Path: <calle@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4F75129AB8 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 16:13:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ggvzr1erzGTH for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 16:13:16 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id E9F041200D7 for <netconf@ietf.org>; Wed, 19 Dec 2018 16:13:15 -0800 (PST)
Received: from ams-camoberg-nitro7.cisco.com (unknown [173.38.220.46]) by mail.tail-f.com (Postfix) with ESMTPSA id BF5261AE0446; Thu, 20 Dec 2018 01:13:11 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Carl Moberg <calle@tail-f.com>
In-Reply-To: <B6F8FE35-B713-4EB1-9E9A-88873126908D@tail-f.com>
Date: Thu, 20 Dec 2018 01:13:10 +0100
Cc: "netconf@ietf.org" <netconf@ietf.org>, =?utf-8?Q?Martin_Bj=C3=B6rklund?= <mbj@tail-f.com>, lhotka@nic.cz
Content-Transfer-Encoding: quoted-printable
Message-Id: <3E762C43-7F3A-4EB3-A6CB-22006950D57B@tail-f.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com> <20181219.204027.1134533539828819405.mbj@tail-f.com> <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com> <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com> <B6F8FE35-B713-4EB1-9E9A-88873126908D@tail-f.com>
To: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/KL3cPZK4XDsAsOoAUBIkn9aWC14>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 00:13:18 -0000

 Actually, and to put a finer point on the below. I do extract YANG =
modules from drafts, but only store those that pass extraction and =
validation. And it turns out that validation of the module extracted =
from https://www.ietf.org/id/draft-ietf-netmod-schema-mount-12.txt fails =
because the file name in the CODE BEGINS marker is missing the =
=E2=80=9C.yang=E2=80=9D suffix which violates =
https://tools.ietf.org/html/rfc6087#section-3.1.


> On Dec 20, 2018, at 12:57 AM, Carl Moberg <calle@tail-f.com> wrote:
>=20
> Reshad,
>=20
> Yes, so the YANG modules in the draft tries to import the =
'ietf-yang-schema-mount=E2=80=99 and 'ietf-network-instance' YANG =
modules which are not available in the repo in the validator. The reason =
why we don=E2=80=99t keep them in the repo is that the specification =
that defines those modules (draft-ietf-netmod-schema-mount, and =
draft-ietf-rtgwg-ni-model respectively) are not published yet and we =
only keep published YANG modules.
>=20
> The easiest way forward is probably to extract the YANG modules from =
your draft (perhaps using the https://github.com/xym-tool/xym tool), zip =
up your module with the imported modules and validate them using the =
=E2=80=9CUpload multiple YANG files or a zip archive=E2=80=9D option.
>=20
> I am considering storing draft-level YANG files (they are many and =
broken :-) in the validator repo as well. Maybe time to revisit that.
>=20
>> On Dec 20, 2018, at 12:46 AM, Reshad Rahman (rrahman) =
<rrahman@cisco.com> wrote:
>>=20
>> Hi Carl,
>>=20
>> Yangvalidator.org has the following errors for -20, pyang is fine =
though.
>>=20
>> Regards,
>> Reshad.
>>=20
>> Confdc Output
>> ietf-network-instance@2018-03-20.yang:18: error: module =
'ietf-yang-schema-mount' not found
>> yanglint Validation
>> err : Data model "ietf-yang-schema-mount" not found.
>> err : Importing "ietf-yang-schema-mount" module into =
"ietf-network-instance" failed.
>> err : Module "ietf-network-instance" parsing failed.
>> err : Importing "ietf-network-instance" module into =
"ietf-subscribed-notifications" failed.
>> err : Module "ietf-subscribed-notifications" parsing failed.
>>=20
>>=20
>> =EF=BB=BFOn 2018-12-19, 6:37 PM, "Netconf on behalf of Carl Moberg" =
<netconf-bounces@ietf.org on behalf of calle@tail-f.com> wrote:
>>=20
>>=20
>>=20
>>> On Dec 19, 2018, at 8:40 PM, Martin Bjorklund <mbj@tail-f.com> =
wrote:
>>>=20
>>> "Eric Voit (evoit)" <evoit@cisco.com> wrote:
>>>> Thanks Martin,
>>>>=20
>>>>=20
>>>>=20
>>>> I have the version addressing the double quotes here:
>>>>=20
>>>> =
https://github.com/netconf-wg/rfc5277bis/blob/master/draft-ietf-netconf-su=
bscribed-notifications-20.xml
>>>>=20
>>>>=20
>>>>=20
>>>> Before I upload this -20, I want to see if you have concerns with =
the Pyang Validation issue shown below.   Reshad mentioned that other =
users have seen it.  Is this something which should stop me from =
posting?
>>>>=20
>>>=20
>>> You get this error b/c you are running an old version of pyang that
>>> isn't compatible with the (newer) version of pip on your system.  I
>>> suggest you upgrade pyang.
>>>=20
>>=20
>>    Yup, thanks. Upgraded and yangvalidator.org now works (better).
>>=20
>>   _______________________________________________
>>   Netconf mailing list
>>   Netconf@ietf.org
>>   https://www.ietf.org/mailman/listinfo/netconf
>>=20
>>=20
>=20
> _______________________________________________
> Netconf mailing list
> Netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf


From nobody Wed Dec 19 16:48:56 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F0EF1294D0; Wed, 19 Dec 2018 16:48:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level: 
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8YhcQZi6V7ZK; Wed, 19 Dec 2018 16:48:53 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB0BD126C01; Wed, 19 Dec 2018 16:48:52 -0800 (PST)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id A8AA64D9FC966; Thu, 20 Dec 2018 00:48:45 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 20 Dec 2018 00:48:47 +0000
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.172]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0415.000; Thu, 20 Dec 2018 08:48:43 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Jan Lindblad <janl@tail-f.com>, =?gb2312?B?QmFsqKJ6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] [Netconf]   magic leaf 'type' in IETF interfaces
Thread-Index: AQHUltbN9lVO78lVgUuAW3HVKNk4taWGzEeA
Date: Thu, 20 Dec 2018 00:48:42 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B1B55C9@nkgeml513-mbx.china.huawei.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
In-Reply-To: <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA9B1B55C9nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/nEYJMI7qp7PjrN6N0DSkNdXotcs>
Subject: Re: [Netconf] [netmod]    magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 00:48:56 -0000

--_000_B8F9A780D330094D99AF023C5877DABA9B1B55C9nkgeml513mbxchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA9B1B55C9nkgeml513mbxchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:99645996;
	mso-list-template-ids:-1946903590;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Hi:<o:p></=
o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:=CB=
=CE=CC=E5">=B7=A2=BC=FE=C8=CB<span lang=3D"EN-US">:</span></span></b><span =
lang=3D"EN-US" style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5"> netmod =
[mailto:netmod-bounces@ietf.org]
</span><b><span style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5">=B4=FA=
=B1=ED </span></b><span lang=3D"EN-US" style=3D"font-size:10.0pt;font-famil=
y:=CB=CE=CC=E5">Jan Lindblad<br>
</span><b><span style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5">=B7=A2=
=CB=CD=CA=B1=BC=E4<span lang=3D"EN-US">:</span></span></b><span lang=3D"EN-=
US" style=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5"> 2018</span><span s=
tyle=3D"font-size:10.0pt;font-family:=CB=CE=CC=E5">=C4=EA<span lang=3D"EN-U=
S">12</span>=D4=C2<span lang=3D"EN-US">18</span>=C8=D5<span lang=3D"EN-US">
 21:37<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> Bal</span>=A8=A2<span lang=3D"EN-US">zs Lengyel<br>
</span><b>=B3=AD=CB=CD<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> netconf@ietf.org; netmod@ietf.org<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Re: [netmod] [Netconf] magic leaf 'type' in IETF interfaces<o:p></o:p></s=
pan></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi,<o:p></o:p></span></p>
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto"><span lang=3D"EN-US">While I agree with Martin, in our systems we =
have a number of places, where the system does create configuration in runn=
ing, due to<o:p></o:p></span></p>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-=
alt:auto;mso-list:l0 level1 lfo1">
<span lang=3D"EN-US">different levels of automation and autonomous algorith=
ms kick-in<o:p></o:p></span></li><li class=3D"MsoNormal" style=3D"mso-margi=
n-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo1">
<span lang=3D"EN-US">the created config needs to be possible to be further =
modified by the operator<o:p></o:p></span></li></ul>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"color:#1F497D;mso-margin-top-alt:auto;marg=
in-right:72.0pt;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo1">
<span lang=3D"EN-US" style=3D"color:windowtext">the created config needs to=
 be referenced from operator created config</span><span lang=3D"EN-US"><o:p=
></o:p></span></li></ul>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-right:72.0pt=
;mso-margin-bottom-alt:auto">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;;color:#1F497D">[Qin]: We have a new draft that h=
as just been posted to discuss some of these issues which allow system crea=
tion configuration in running<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-right:72.0pt=
;mso-margin-bottom-alt:auto">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://tools.ietf.org=
/html/draft-wu-netconf-nmda-compatibility-00">https://tools.ietf.org/html/d=
raft-wu-netconf-nmda-compatibility-00</a><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;margin-right:72.0pt=
;mso-margin-bottom-alt:auto">
<span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:&quot;Calibri&qu=
ot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<ul type=3D"disc">
<li class=3D"MsoNormal" style=3D"mso-margin-top-alt:auto;mso-margin-bottom-=
alt:auto;mso-list:l0 level1 lfo1">
<span lang=3D"EN-US">the created config is not always ephemeral, it might n=
eed to be part of backup/restore<o:p></o:p></span></li></ul>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This is only a sampling from &q=
uot;the list of excuses&quot;. I have heard many more. The road to hell is =
paved with good intentions, however. If we want to build automation based o=
n sound theory, clearly separating the orders
 from managers from a system's own operational view is key, IMO. Reliabilit=
y, security, accountability are growing in importance, and they all play in=
 this direction.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">We may not need to standardize =
rules to outlaw the above; the market will take care of that. What we need =
to ensure is that it is possible to be standards compliant without having t=
o implement design excuses like these.</span><span lang=3D"EN-US"><o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp; [Qin]: I would support standardizing some of guidance =
rules or design rules on how to deal with these cases.<o:p></o:p></span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Best Regards,<o:p></o:p></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">/jan<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABA9B1B55C9nkgeml513mbxchi_--


From nobody Wed Dec 19 16:57:57 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEDC7126F72; Wed, 19 Dec 2018 16:57:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GF3eD7fIFO3R; Wed, 19 Dec 2018 16:57:46 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2AB3A1294D0; Wed, 19 Dec 2018 16:57:46 -0800 (PST)
Received: from lhreml707-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 35FFAA068949A; Thu, 20 Dec 2018 00:57:42 +0000 (GMT)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml707-cah.china.huawei.com (10.201.108.48) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 20 Dec 2018 00:57:43 +0000
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.172]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Thu, 20 Dec 2018 08:57:40 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Andy Bierman <andy@yumaworks.com>, Jan Lindblad <janl@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
Thread-Index: AQHUl8tEIaeGkfvXD0+KnC4oEKYl6aWGzJKQ
Date: Thu, 20 Dec 2018 00:57:40 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B1B55F5@nkgeml513-mbx.china.huawei.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com> <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com> <875zvpeh5h.fsf@nic.cz> <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com>
In-Reply-To: <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA9B1B55F5nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/GqfgaWpbds0WljOxrrsdMWFCaAQ>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 00:57:49 -0000

--_000_B8F9A780D330094D99AF023C5877DABA9B1B55F5nkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA9B1B55F5nkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABA9B1B55F5nkgeml513mbxchi_--


From nobody Wed Dec 19 17:32:10 2018
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DD8212D4EF for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 17:32:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level: 
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mjGaEXbhElhc for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 17:32:06 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0ABB127133 for <netconf@ietf.org>; Wed, 19 Dec 2018 17:32:05 -0800 (PST)
Received: from LHREML710-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id CE42AF420306A for <netconf@ietf.org>; Thu, 20 Dec 2018 01:32:01 +0000 (GMT)
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by LHREML710-CAH.china.huawei.com (10.201.108.33) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 20 Dec 2018 01:32:02 +0000
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Thu, 20 Dec 2018 01:32:02 +0000
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1591.10 via Frontend Transport; Thu, 20 Dec 2018 01:32:02 +0000
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.172]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Thu, 20 Dec 2018 09:31:50 +0800
From: Qin Wu <bill.wu@huawei.com>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Difference between test-then-set and set within <edit-config>operation
Thread-Index: AdSYA8d/6gfS7uj/SK6nQEU6b7fF0w==
Date: Thu, 20 Dec 2018 01:31:50 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABA9B1B5673@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.138.33.244]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABA9B1B5673nkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/HnjW044UKMRitv1AOU3Jti0Nxdg>
Subject: [Netconf] Difference between test-then-set and set within <edit-config>operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 01:32:09 -0000

--_000_B8F9A780D330094D99AF023C5877DABA9B1B5673nkgeml513mbxchi_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi, All:
RFC6241 said:
"



      test-option:  The <test-option> element MAY be specified only if

         the device advertises the :validate:1.1 capability

         (Section 8.6<https://tools.ietf.org/html/rfc6241#section-8.6>).



         The <test-option> element has one of the following values:

         test-then-set:  Perform a validation test before attempting to

            set.  If validation errors occur, do not perform the

            <edit-config> operation.  This is the default test-option.



         set:  Perform a set without a validation test first.



         test-only:  Perform only the validation test, without

            attempting to set.

"
It is not clear to me the real difference between test-then-set and set wit=
in <edit-config> operation? Why test-then-set is set as default option?
Do we use explicitly validate operation defined section 8.6.4 of RFC6241 to=
 perform validation test in the test-then-set?
RFC 7950 section 8.3.3 said:
"
If the datastore is
"running" or "startup", these constraints MUST be enforced at the end
   of the <edit-config> or <copy-config> operation.  If the datastore is
   "candidate", the constraint enforcement is delayed until a <commit>
   or <validate> operation takes place.
"
It gives me impression that for <running>, the configuration MUST be valida=
ted before it can be set.
Therefore there seems no difference between test-then-set and set option.
But for <candiate> datastore, selecting between test-then-set and set optio=
n seems to have value.
So when we will choose to use 'test-then-set', when we will choose to use '=
set'?
Do we need to clarify this in RFC6241 for this?

-Qin

--_000_B8F9A780D330094D99AF023C5877DABA9B1B5673nkgeml513mbxchi_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 12 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	text-align:justify;
	text-justify:inter-ideograph;
	font-size:10.5pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML \9884\8BBE\683C\5F0F Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:SimSun;}
span.HTMLChar
	{mso-style-name:"HTML \9884\8BBE\683C\5F0F Char";
	mso-style-priority:99;
	mso-style-link:"HTML \9884\8BBE\683C\5F0F";
	font-family:SimSun;}
span.EmailStyle19
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
/* Page Definitions */
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" style=3D"text-justify-t=
rim:punctuation">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi, All:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">RFC6241 said:<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8220;<o:p></o:p></span></p>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&n=
bsp;</o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; test-option:&nbsp; The &lt;test-option&gt; element =
MAY be specified only if<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the device advertises the :valida=
te:1.1 capability<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (<a href=3D"https://tools.ietf.or=
g/html/rfc6241#section-8.6"><span style=3D"color:windowtext;text-decoration=
:none">Section 8.6</span></a>).<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&n=
bsp;</o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The &lt;test-option&gt; element h=
as one of the following values:<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; test-then-set:&nbsp; Perform a va=
lidation test before attempting to<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; set.&nbsp; If v=
alidation errors occur, do not perform the<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;edit-config=
&gt; operation.&nbsp; This is the default test-option.<o:p></o:p></span></p=
re>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&n=
bsp;</o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; set:&nbsp; Perform a set without =
a validation test first.<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><o:p>&n=
bsp;</o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; test-only:&nbsp; Perform only the=
 validation test, without<o:p></o:p></span></pre>
<pre style=3D"page-break-before:always"><span lang=3D"EN-US" style=3D"font-=
size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; attempting to s=
et.<o:p></o:p></span></pre>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">It is not clear to me the real =
difference between test-then-set and set witin &lt;edit-config&gt; operatio=
n? Why test-then-set is set as default option?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Do we use explicitly validate o=
peration defined section 8.6.4 of RFC6241 to perform validation test in the=
 test-then-set?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">RFC 7950 section 8.3.3 said:<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8220;<o:p></o:p></span></p>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left;text-indent:=
15.75pt;page-break-before:always">
<span lang=3D"EN-US">If the datastore is<o:p></o:p></span></p>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left;text-indent:=
15.75pt;page-break-before:always">
<span lang=3D"EN-US">&quot;running&quot; or &quot;startup&quot;, these cons=
traints MUST be enforced at the end<o:p></o:p></span></p>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left;page-break-b=
efore:always">
<span lang=3D"EN-US">&nbsp;&nbsp; of the &lt;edit-config&gt; or &lt;copy-co=
nfig&gt; operation.&nbsp; If the datastore is<o:p></o:p></span></p>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left;page-break-b=
efore:always">
<span lang=3D"EN-US">&nbsp;&nbsp; &quot;candidate&quot;, the constraint enf=
orcement is delayed until a &lt;commit&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" align=3D"left" style=3D"text-align:left;page-break-b=
efore:always">
<span lang=3D"EN-US">&nbsp;&nbsp; or &lt;validate&gt; operation takes place=
.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&#8221;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">It gives me impression that for=
 &lt;running&gt;, the
</span><span lang=3D"EN" style=3D"font-size:10.0pt">configuration MUST be v=
alidated before it can be set.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN" style=3D"font-size:10.0pt">Therefo=
re there seems no difference between test-then-set and set option.<o:p></o:=
p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN" style=3D"font-size:10.0pt">But for=
 &lt;candiate&gt; datastore, selecting between test-then-set and set option=
 seems to have value.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN" style=3D"font-size:10.0pt">So</spa=
n><span lang=3D"EN">
</span><span lang=3D"EN-US">when we will choose to use &#8216;test-then-set=
&#8217;, when we will choose to use &#8216;set&#8217;?<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Do we need to clarify this in R=
FC6241 for this?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">-Qin<o:p></o:p></span></p>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABA9B1B5673nkgeml513mbxchi_--


From nobody Wed Dec 19 23:46:43 2018
Return-Path: <mbj@tail-f.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 13E551310B8 for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 23:46:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jQt_Dppysd6d for <netconf@ietfa.amsl.com>; Wed, 19 Dec 2018 23:46:39 -0800 (PST)
Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id A20981310B5 for <netconf@ietf.org>; Wed, 19 Dec 2018 23:46:39 -0800 (PST)
Received: from localhost (unknown [173.38.220.45]) by mail.tail-f.com (Postfix) with ESMTPSA id 6098A1AE0397; Thu, 20 Dec 2018 08:46:36 +0100 (CET)
Date: Thu, 20 Dec 2018 08:46:35 +0100 (CET)
Message-Id: <20181220.084635.1007231808550572557.mbj@tail-f.com>
To: calle@tail-f.com
Cc: rrahman@cisco.com, netconf@ietf.org, lhotka@nic.cz
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <3E762C43-7F3A-4EB3-A6CB-22006950D57B@tail-f.com>
References: <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com> <B6F8FE35-B713-4EB1-9E9A-88873126908D@tail-f.com> <3E762C43-7F3A-4EB3-A6CB-22006950D57B@tail-f.com>
X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=utf-8
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/XfOlppqb3Lk59PLF0lIYUFxATR4>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 07:46:42 -0000
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From nobody Thu Dec 20 01:08:36 2018
Return-Path: <sergio.belotti@nokia.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36B24131110; Thu, 20 Dec 2018 01:08:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.964
X-Spam-Level: 
X-Spam-Status: No, score=-1.964 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id y4QTJ4xpM4aq; Thu, 20 Dec 2018 01:08:29 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on072c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E937013110D; Thu, 20 Dec 2018 01:08:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com;  s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8/54RMHUcmOMAgpR+PnDJdI+WXVkDZOQv7RkH6mUcJk=; b=FEPqP8nxXsHoGtLC2Tt1bZEGshdfvGkU68g7hQibpSRb10kD81zvJX25qAAItWNxiay8LlMIwlW6/vhIPEIV/4uqJHcq8BfG148HN7oJJH/QeSp30Bf6+XEhqm0O87ov2BgyxR6+MaUsiTVKWUmTGybjCIuiYWMvQhPEGdxUBeI=
Received: from AM0PR07MB5921.eurprd07.prod.outlook.com (20.178.83.29) by AM0PR07MB4723.eurprd07.prod.outlook.com (52.135.152.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1446.13; Thu, 20 Dec 2018 09:08:23 +0000
Received: from AM0PR07MB5921.eurprd07.prod.outlook.com ([fe80::2472:b9b2:f133:85e8]) by AM0PR07MB5921.eurprd07.prod.outlook.com ([fe80::2472:b9b2:f133:85e8%3]) with mapi id 15.20.1446.020; Thu, 20 Dec 2018 09:08:23 +0000
From: "Belotti, Sergio (Nokia - IT/Vimercate)" <sergio.belotti@nokia.com>
To: Andy Bierman <andy@yumaworks.com>, Jan Lindblad <janl@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] [Netconf] magic leaf 'type' in IETF interfaces
Thread-Index: AQHUlv2bHKpB64q9oEOoL5It3/ZnuKWFzQ4AgABPvgCAAEuGgIAA7vXg
Date: Thu, 20 Dec 2018 09:08:23 +0000
Message-ID: <AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0@AM0PR07MB5921.eurprd07.prod.outlook.com>
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com> <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com> <875zvpeh5h.fsf@nic.cz> <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com>
In-Reply-To: <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=sergio.belotti@nokia.com; 
x-originating-ip: [93.36.178.236]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM0PR07MB4723; 6:02WJceh7Yjoaf7TLGMIEj37umQvSJ7itqgUL/Mvwygqba33yGki4HB+LgUH/0daP4r9T626JnwbKFZ6Yz24dXu0orHT3uLsLop7FXgklcnWQPF9WsWI9yRdEcc75nu31g5ZRgOze9NziBLz87svAanX2yNAOxBpvR+2IKcXbBCxBvpNzutb3Zu1cZ37BLYKva7xrz2wQRObXG2i4Dc7CDHFT29qaavZhKWk11vCOrDKqpt5vZB7YsJoptQH3m0kQArZZ47tH39N/EnF7cOPUCisGWertGjI5JIuToQxF1lb5HsqGR5q05q4tmBrybOQNtZOOo6x16ZRVbUyQ6C13ByFL7W/b8T/NDY7JAK2bfkz4YCsLU0PXwEnXcmxnua0wCY4n3BJJkZmHXAKboAyTTFsXdoEzETMeIokM81JLms5t/vcUvfZdi7k7OpC86qavgvtERVNPhliojn8vx0Iqaw==; 5:dgPHIUvXEhMsKwtWBp8ZK7AzMvzEo8LjVI0tBvJIYUGA4YIzeN2ktn9mEcS3htYW7Rsvno5mvMdcioQFyXOTKxydZqfmwgfJ6bD6hFSCECx0yaM4T73fhXrM00l08j6fU8m07j8vkt6QHrGqK/1OWYx6iRsAGqxhQl4fedzM6Uc=; 7:lnR0LAEzbikRXWrkUmMmf4Jj2ss+9Fr2ChHP/DvlgyflmYXGqZrwqnyt0/aWuIIdgOv9KwaXfB1KZKMgP95WQQlq4+kE5xyhuOU4bKNWDVFu2lr3/K/YWxHQ9F2mxSjONs7fyt0eH5woea2+aGLrOA==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: e6c3417d-3552-48bc-8686-08d6665ab20b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(4534185)(4627221)(201703031133081)(201702281549075)(5600074)(711020)(4618075)(2017052603328)(7193020); SRVR:AM0PR07MB4723; 
x-ms-traffictypediagnostic: AM0PR07MB4723:
x-microsoft-antispam-prvs: <AM0PR07MB4723086AD788A2CA45F8C23891BF0@AM0PR07MB4723.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(11241501185)(806100)(5005026)(6040522)(2401047)(8121501046)(3231475)(944501520)(52105112)(93006095)(93001095)(10201501046)(3002001)(6055026)(149066)(150057)(6041310)(20161123558120)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(201708071742011)(7699051)(76991095); SRVR:AM0PR07MB4723; BCL:0; PCL:0; RULEID:; SRVR:AM0PR07MB4723; 
x-forefront-prvs: 0892FA9A88
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39860400002)(376002)(346002)(136003)(396003)(52314003)(43544003)(189003)(199004)(478600001)(53936002)(14454004)(8676002)(105586002)(186003)(2906002)(74316002)(7696005)(33656002)(26005)(97736004)(9686003)(71200400001)(71190400001)(86362001)(236005)(2201001)(14444005)(256004)(68736007)(55016002)(11346002)(54896002)(6306002)(8936002)(476003)(6116002)(114624004)(110136005)(606006)(102836004)(3846002)(2501003)(53546011)(6506007)(966005)(66066001)(486006)(76176011)(9326002)(446003)(6246003)(229853002)(81166006)(81156014)(7520500002)(316002)(790700001)(106356001)(25786009)(5660300001)(99286004)(93886005)(7736002)(6436002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR07MB4723; H:AM0PR07MB5921.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 8/u5r0IZlOsK0QTEDLYqhuGFFgiCnwtTVoovzPwWoMJUfrselhY+QOAlK+/qcaCns8c53u0VHsruvB83iNMa59vgoaLqJHhX9J5yHgxbjCTYvh6Or+ydeLjl02ykNWfJLAEXJAcFmav7pSaEVaKpeVCLbSzKbyoJfD9sIfJ5kn3jg5NfcxEcrCqzXrAx/wPUH98zBa1TiVw8A9aVohoo64VIMC/I3vnDvDkdBlmxyo6Dqip7zZmhRcMnfzAvSF/drpMw0nYyqAJKvXfbEIRIulaJUFN6LECGFosGPKlreCRVzi/qjGEVRRczIFb9w0F6
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0AM0PR07MB5921eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e6c3417d-3552-48bc-8686-08d6665ab20b
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2018 09:08:23.8952 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB4723
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Yg_8u5rVCbndgjKksfIbN2cFe0k>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 09:08:34 -0000

--_000_AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0AM0PR07MB5921eurp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0AM0PR07MB5921eurp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0AM0PR07MB5921eurp_--


From nobody Thu Dec 20 05:28:47 2018
Return-Path: <rrahman@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 753CA1277D2 for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 05:28:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oCWsCH_EUHDn for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 05:28:43 -0800 (PST)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4ADD12426E for <netconf@ietf.org>; Thu, 20 Dec 2018 05:28:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5350; q=dns/txt; s=iport; t=1545312522; x=1546522122; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=IOwOfUO+rPjuCMJC+Xyzo+FNDP1LDWWo9S1TDdLdwtE=; b=R9J7UkGjKYUttVP+BJzlAnIsUbzQV4L/VVvkvu0RHMryucMM+J6z0oBj uYz6QodsFdmLKrw4CEef+gLF6Dmlpn3gS0tKpaEAqyYfP+RwDj03QnzBB QiGfyLla78JRBjg0keWLYC+LYvO0CVcScgOBZpi/ZZjYKfpwzGEMM6Qt5 M=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ADAAD0lxtc/4QNJK1kGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBUQQBAQEBAQsBggNmgQInCoNziBmLe4FoJZddgXsLAQE?= =?us-ascii?q?YDQeDekYCF4JVIjQJDQEDAQECAQECbRwMhTwBAQEDAQEBIRE6CQIQAgEIDgo?= =?us-ascii?q?CAiYCAgIlCxUQAgQOBYMiAYF5CA+nQYEviiqBC4s0F4FAP4E4DBOCTIMeAQE?= =?us-ascii?q?CAYFRJIJxMYImAolBOYVigVGQEAkChw+KVBiCLI8xjkiLHgIRFIEnHziBVnA?= =?us-ascii?q?VOyoBgkEJhX+FFIU/cgGBJ4p0K4EBAYEeAQE?=
X-IronPort-AV: E=Sophos;i="5.56,377,1539648000"; d="scan'208";a="497539733"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Dec 2018 13:28:41 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id wBKDSf3v030978 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 20 Dec 2018 13:28:41 GMT
Received: from xch-rcd-005.cisco.com (173.37.102.15) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 20 Dec 2018 07:28:40 -0600
Received: from xch-rcd-005.cisco.com ([173.37.102.15]) by XCH-RCD-005.cisco.com ([173.37.102.15]) with mapi id 15.00.1395.000; Thu, 20 Dec 2018 07:28:40 -0600
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: Carl Moberg <calle@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>, =?utf-8?B?TWFydGluIEJqw7Zya2x1bmQ=?= <mbj@tail-f.com>, "lhotka@nic.cz" <lhotka@nic.cz>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
Thread-Index: AQHUlvtyiIAPgkY8IUe2KPTAUo4ZuKWGeqcAgAA1X4CAACv6gIAAQimA//+uqACAAFbpAIAABHgAgACITIA=
Date: Thu, 20 Dec 2018 13:28:40 +0000
Message-ID: <76000823-F35C-4421-BD98-0B2D9ABD6CF8@cisco.com>
References: <154515596361.5411.7153657725124836233@ietfa.amsl.com> <20181219.145202.1027346732573212384.mbj@tail-f.com> <91e0bc7bee2e4b56bc968565fa43d78c@XCH-RTP-013.cisco.com> <20181219.204027.1134533539828819405.mbj@tail-f.com> <3C140E32-5CD1-4F13-A025-F22ABAE54CBB@tail-f.com> <7D59A993-EE20-429C-B5A0-C18F8B405EE8@cisco.com> <B6F8FE35-B713-4EB1-9E9A-88873126908D@tail-f.com> <3E762C43-7F3A-4EB3-A6CB-22006950D57B@tail-f.com>
In-Reply-To: <3E762C43-7F3A-4EB3-A6CB-22006950D57B@tail-f.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [161.44.212.53]
Content-Type: text/plain; charset="utf-8"
Content-ID: <7E1980CA9561EC41879600522029C518@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/G_Nm3uHKZ3D_itjWn_3VDs8-oXo>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-subscribed-notifications-19.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 13:28:45 -0000
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From nobody Thu Dec 20 07:32:09 2018
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A80F130E3F for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 07:32:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DAYUmXr1p7sz for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 07:31:57 -0800 (PST)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A62C0130E54 for <netconf@ietf.org>; Thu, 20 Dec 2018 07:31:56 -0800 (PST)
Received: by mail-lf1-x136.google.com with SMTP id p6so1686662lfc.1 for <netconf@ietf.org>; Thu, 20 Dec 2018 07:31:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QDmQtxL+wAcIUnogEBkWKHcg4gZhiZ2SXcVPm0wz++M=; b=tBjfq2GrEFlOcFzz5EQIOseWMaqm1Jg6RtzitmMHRefq2vDyqnj/Hi55fZF0txHq5d F8yr80tqD1j70Amyeoj3VIIbeGD7Mcuv6Lnvt5Ztv9q6+Hsix+16xCsOYWG+kJCoC9xl lh4iq9q5dKHBqppQvCWNpKGbWgpakgHK/cwcbTQn73YacqWLBVCPxmL5DOoWrXbRgXej p9X82BAzMRxAtD/a/UKg/vsm53mMoi7Qpg04iiwlb56SRF3V0xnfxGP4oxCAeniRQ9Oy U2f0MNzj0iZrUUv1bguCYAEb/8yS03yW+7jVzizf4OGZm4Ed65ouIwVphXCwqXrrx3LI UDWw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QDmQtxL+wAcIUnogEBkWKHcg4gZhiZ2SXcVPm0wz++M=; b=qqcIhVDWKsf6JXALpRDpk6H4eMfpZaQ5x05MifnAKKXdNZmrcWcXnc4MAqKPtO11TQ aOCXU7S9N2VRKqABosKXGNvzYnJW/qL791NYfehmRwqe7+CcWTi2+9+HdWaYiyDQqlJM xcgXST0YvpHzXPxzBEceOPSkqzUCNor8Sru2GSJa1zaXm1Y/OdRH6U4guJeAwR2dZoFZ MfgHr70KtTcIJP6/xiikkyJTEc1oT7aYyP6/oHDFZZLNYzs9EXZxISI5zwApJS8Gus7B rShWJIi4CvtOdLqltY2ulZL7l7wftPi0shXe1EYkizxllK89uRi+VjO0DFQiRcOtfiBW jkaQ==
X-Gm-Message-State: AA+aEWZ9/koZIpU08ASwUQOXG1ggujBXR8cJQpR4SkofHugzAn7MNXIL xiydo/LghjacDKR/j2gpNqpD3MAjRyuUEBCNX1wB2A==
X-Google-Smtp-Source: AFSGD/WWUWpj2OGUucdWctEl7S75C0nVpFzpxtDZTnbYoPAGhBlEvqc0IP8xY2IlrwzEmDkBG1Hfw8dn9+zEBInqzHQ=
X-Received: by 2002:a19:ca51:: with SMTP id h17mr14620521lfj.126.1545319914658;  Thu, 20 Dec 2018 07:31:54 -0800 (PST)
MIME-Version: 1.0
References: <VI1PR07MB39818BD20967B36B8F24DBA69BA10@VI1PR07MB3981.eurprd07.prod.outlook.com> <20181217.091505.218628572185200621.mbj@tail-f.com> <83b139a1-a0ab-5fbc-f702-7f0d50a46864@ericsson.com> <90DB3C3B-FD52-4903-81B0-93985E6F74FE@tail-f.com> <CABCOCHQc+kuNiw4guOsU5oRxnwZA0u7-sA5zHUKcERdqytaQpg@mail.gmail.com> <6912DD4C-4C4E-45E8-9F0E-D8D8139F83AE@tail-f.com> <875zvpeh5h.fsf@nic.cz> <CABCOCHSuRma0bqB8qZjim2Y=V1PDwuEzUMG0-t5VKMUH4FwaYg@mail.gmail.com> <AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0@AM0PR07MB5921.eurprd07.prod.outlook.com>
In-Reply-To: <AM0PR07MB5921ADC000E6FFF7E418F2EB91BF0@AM0PR07MB5921.eurprd07.prod.outlook.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 20 Dec 2018 07:31:43 -0800
Message-ID: <CABCOCHR9M0O8hAeZ44DDnF6YSKk-Q6M8FDu4p_b0JhQk=ck+OA@mail.gmail.com>
To: "Belotti, Sergio (Nokia - IT/Vimercate)" <sergio.belotti@nokia.com>
Cc: Jan Lindblad <janl@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>,  "netmod@ietf.org" <netmod@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000093f452057d75d4b3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/AfULf_yAlgawOJZg4EtVI0fvG-0>
Subject: Re: [Netconf] [netmod]  magic leaf 'type' in IETF interfaces
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 15:32:00 -0000

--00000000000093f452057d75d4b3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Thu, Dec 20, 2018 at 1:08 AM Belotti, Sergio (Nokia - IT/Vimercate) <
sergio.belotti@nokia.com> wrote:

> Hi,
>
>
>
> On Wed, Dec 19, 2018 at 6:16 AM Ladislav Lhotka <lhotka@nic.cz> wrote:
>
> Jan Lindblad <janl@tail-f.com> writes:
>
> > Hi,
> >>> While I agree with Martin, in our systems we have a number of places,
> where the system does create configuration in running, due to
> >>>
> >>> different levels of automation and autonomous algorithms kick-in
> >>> the created config needs to be possible to be further modified by the
> operator
> >>> the created config needs to be referenced from operator created confi=
g
> >>> the created config is not always ephemeral, it might need to be part
> of backup/restore
> >> This is only a sampling from "the list of excuses". I have heard many
> more. The road to hell is paved with good intentions, however.. If we wan=
t
> to build automation based on sound theory, clearly separating the orders
> from managers from a system's own operational view is key, IMO.
> Reliability, security, accountability are growing in importance, and they
> all play in this direction.
> >>
> >> We may not need to standardize rules to outlaw the above; the market
> will take care of that. What we need to ensure is that it is possible to =
be
> standards compliant without having to implement design excuses like these=
.
> >>
> >>
> >> NMDA has a lot of room for proprietary mechanisms for converting
> <running> to <intended>.
> >> Many times the features desired by engineers exceed the capabilities o=
f
> YANG, such as
> >> a dynamic default leaf.  YANG allows a simple constant, and no busines=
s
> logic to pick the default.
> >> This is a very valid use of "server auto-magic".
> >>
> >> Maybe a future version of YANG can improve the client visibility into
> this "auto-magic"
> >
> > As you say, this is not uncommon. I usually recommend to leave out any
> > default statement, and write in the description what happens if this
> > leaf isn't set. The operator can then override the default by giving a
> > value.
>
> Anyway, this is not a case where the server writes something on its own
> to a configuration datastore.
>
>
>
>
>
> I don't think it is a problem if NMDA or non-NMDA servers write to
> <running>.
>
> Just part of the complexity that is baked in -- NMDA does nothing to help
> the client know
>
> why <running> is different than <intended> anyway.
>
>
>
> SB>> But RFC 8342 says :
>
> =E2=80=9CIt represents the configuration after all configuration transfor=
mations
> to <running> are performed (e.g.,template expansion, removal of inactive
> configuration)=E2=80=9D
>
>
>
> So my understanding is that by definition =E2=80=9Cintended=E2=80=9D can =
be different from
> =E2=80=9Crunning=E2=80=9D.
>
> Am I missed something?
>
>
>


The client can see WHAT changed because of server-auto-magic but not WHY
a particular server implementation converts <foo> into <bar> if <foo> is
edited.
A client (using plain YANG) cannot predict at all what will happen if <foo>
is edited.

The issue remains: how does a client know that a mandatory leaf is not
actually required in <running>?  I guess vague auto-magic description-text
is good enough


Andy


> >
> > While some more advanced features for default values may be of some
> > utility, the simplicity of YANG is also important. We don't want to
> > make the YANG models -- the interface contracts -- the new place for
> > all business logic.
>
> Absolutely.
>
>
>
> I am not proposing YANG needs a new default-stmt. There is a
> description-stmt
>
> and vendors can add their own extensions to flag auto-magic data nodes.
>
>
>
> Lada
>
> >
> > /jan
>
>
>
>
>
> Andy
>
>
>
> Thanks
>
> Sergio
>
>
>
> Sergio Belotti
>
> Senior System Engineer and Standardization Architect
>
> IP/Optical Networks, Optics BU
>
> Nokia
>
> M: +39-335761776
>
> Via Energy Park, 20871 Vimercate (MB) , Italy
>
> sergio.belotti@nokia.com
>
>
>
>
>
>
>
> >
> > _______________________________________________
> > netmod mailing list
> > netmod@ietf.org
> > https://www.ietf.org/mailman/listinfo/netmod
>
> --
> Ladislav Lhotka
> Head, CZ.NIC Labs
> PGP Key ID: 0xB8F92B08A9F76C67
>
>

--00000000000093f452057d75d4b3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr">On Thu, Dec 20, 2018 at 1:08 AM Belotti, Sergio (Nokia - I=
T/Vimercate) &lt;<a href=3D"mailto:sergio.belotti@nokia.com">sergio.belotti=
@nokia.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">





<div lang=3D"EN-US">
<div class=3D"gmail-m_-4620939831639169759WordSection1">
<div>
<div>
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Wed, Dec 19, 2018 at 6:16 AM Ladislav Lhotka &lt;=
<a href=3D"mailto:lhotka@nic.cz" target=3D"_blank">lhotka@nic.cz</a>&gt; wr=
ote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal">Jan Lindblad &lt;<a href=3D"mailto:janl@tail-f.com" =
target=3D"_blank">janl@tail-f.com</a>&gt; writes:<br>
<br>
&gt; Hi,<br>
&gt;&gt;&gt; While I agree with Martin, in our systems we have a number of =
places, where the system does create configuration in running, due to<br>
&gt;&gt;&gt; <br>
&gt;&gt;&gt; different levels of automation and autonomous algorithms kick-=
in<br>
&gt;&gt;&gt; the created config needs to be possible to be further modified=
 by the operator<br>
&gt;&gt;&gt; the created config needs to be referenced from operator create=
d config<br>
&gt;&gt;&gt; the created config is not always ephemeral, it might need to b=
e part of backup/restore<br>
&gt;&gt; This is only a sampling from &quot;the list of excuses&quot;. I ha=
ve heard many more. The road to hell is paved with good intentions, however=
.. If we want to build automation based on sound theory, clearly separating=
 the orders from managers from a system&#39;s own operational
 view is key, IMO. Reliability, security, accountability are growing in imp=
ortance, and they all play in this direction.<br>
&gt;&gt; <br>
&gt;&gt; We may not need to standardize rules to outlaw the above; the mark=
et will take care of that. What we need to ensure is that it is possible to=
 be standards compliant without having to implement design excuses like the=
se.<br>
&gt;&gt; <br>
&gt;&gt; <br>
&gt;&gt; NMDA has a lot of room for proprietary mechanisms for converting &=
lt;running&gt; to &lt;intended&gt;.<br>
&gt;&gt; Many times the features desired by engineers exceed the capabiliti=
es of YANG, such as<br>
&gt;&gt; a dynamic default leaf.=C2=A0 YANG allows a simple constant, and n=
o business logic to pick the default.<br>
&gt;&gt; This is a very valid use of &quot;server auto-magic&quot;.<br>
&gt;&gt; <br>
&gt;&gt; Maybe a future version of YANG can improve the client visibility i=
nto this &quot;auto-magic&quot;<br>
&gt;<br>
&gt; As you say, this is not uncommon. I usually recommend to leave out any=
<br>
&gt; default statement, and write in the description what happens if this<b=
r>
&gt; leaf isn&#39;t set. The operator can then override the default by givi=
ng a<br>
&gt; value.<br>
<br>
Anyway, this is not a case where the server writes something on its own<br>
to a configuration datastore.<u></u><u></u></p>
</blockquote>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I don&#39;t think it is a problem if NMDA or non-NMD=
A servers write to &lt;running&gt;.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Just part of the complexity that is baked in -- NMDA=
 does nothing to help the client know<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">why &lt;running&gt; is different than &lt;intended&g=
t; anyway.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">SB&gt;&gt; But RFC 8342 says :<u></u><u></u></p>
<p class=3D"gmail-m_-4620939831639169759MsoPlainText"><span style=3D"font-f=
amily:Calibri,sans-serif">=E2=80=9C</span><span style=3D"font-family:&quot;=
Courier New&quot;">It represents the configuration after all configuration =
transformations to &lt;running&gt; are performed (e.g.,template expansion, =
removal of inactive
 configuration)=E2=80=9D<u></u><u></u></span></p>
<p class=3D"gmail-m_-4620939831639169759MsoPlainText"><span style=3D"font-f=
amily:&quot;Courier New&quot;"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal">So my understanding is that by definition =E2=80=9Ci=
ntended=E2=80=9D can be different from =E2=80=9Crunning=E2=80=9D.<u></u><u>=
</u></p>
<p class=3D"MsoNormal">Am I missed something?<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0</p></div></div></div></div></div></blockquote=
><div><br></div><div><br></div><div>The client can see WHAT changed because=
 of server-auto-magic but not WHY</div><div>a particular server implementat=
ion converts &lt;foo&gt; into &lt;bar&gt; if &lt;foo&gt; is edited.</div><d=
iv>A client (using plain YANG) cannot predict at all what will happen if &l=
t;foo&gt; is edited.</div><div><br></div><div>The issue remains: how does a=
 client know that a mandatory leaf is not</div><div>actually required in &l=
t;running&gt;?=C2=A0 I guess vague auto-magic description-text is good enou=
gh</div><div><br></div><div><br></div><div>Andy</div><div><br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex"><div lang=3D"EN-US"><div class=
=3D"gmail-m_-4620939831639169759WordSection1"><div><div><div><p class=3D"Ms=
oNormal"><u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal" style=3D"margin-bottom:12pt"><br>
&gt;<br>
&gt; While some more advanced features for default values may be of some<br=
>
&gt; utility, the simplicity of YANG is also important. We don&#39;t want t=
o<br>
&gt; make the YANG models -- the interface contracts -- the new place for<b=
r>
&gt; all business logic.<br>
<br>
Absolutely.<u></u><u></u></p>
</blockquote>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I am not proposing YANG needs a new default-stmt. Th=
ere is a description-stmt<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">and vendors can add their own extensions to flag aut=
o-magic data nodes.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal">Lada<br>
<br>
&gt;<br>
&gt; /jan<u></u><u></u></p>
</blockquote>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Andy<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Thanks<u></u><u></u></p>
<p class=3D"MsoNormal">Sergio<u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"IT"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(127,127,127)">Sergio Belott=
i<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(127,127,127)">Senior System=
 Engineer and Standardization Architect<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(127,127,127)">IP/Optical Ne=
tworks, Optics BU<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:rgb(127,127,127)">Nokia </span>=
<span style=3D"font-size:12pt;color:black"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"IT" style=3D"color:rgb(127,127,127)">M=
: +39-335761776<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"IT" style=3D"color:rgb(127,127,127)">V=
ia Energy Park, 20871 Vimercate (MB) , Italy</span><span lang=3D"IT" style=
=3D"font-size:12pt;color:black"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"IT"><a href=3D"mailto:sergio.belotti@n=
okia.com" target=3D"_blank"><span style=3D"color:rgb(5,99,193)">sergio.belo=
tti@nokia.com</span></a><u></u><u></u></span></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal">&gt;<br>
&gt; _______________________________________________<br>
&gt; netmod mailing list<br>
&gt; <a href=3D"mailto:netmod@ietf.org" target=3D"_blank">netmod@ietf.org</=
a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/netmod" target=3D"_bl=
ank">https://www.ietf.org/mailman/listinfo/netmod</a><br>
<br>
-- <br>
Ladislav Lhotka<br>
Head, CZ.NIC Labs<br>
PGP Key ID: 0xB8F92B08A9F76C67<u></u><u></u></p>
</blockquote>
</div>
</div>
</div>

</blockquote></div></div>

--00000000000093f452057d75d4b3--


From nobody Thu Dec 20 10:52:57 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D42A11311F8; Thu, 20 Dec 2018 10:52:49 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.2
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <154533196982.19062.13734868545043068788@ietfa.amsl.com>
Date: Thu, 20 Dec 2018 10:52:49 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/yuZa5rQcbA7f8duf8TCbtEUtqlY>
Subject: [Netconf] I-D Action: draft-ietf-netconf-zerotouch-26.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 18:52:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Zero Touch Provisioning for Networking Devices
        Authors         : Kent Watsen
                          Mikael Abrahamsson
                          Ian Farrer
	Filename        : draft-ietf-netconf-zerotouch-26.txt
	Pages           : 95
	Date            : 2018-12-20

Abstract:
   This draft presents a technique to securely provision a networking
   device when it is booting in a factory-default state.  Variations in
   the solution enables it to be used on both public and private
   networks.  The provisioning steps are able to update the boot image,
   commit an initial configuration, and execute arbitrary scripts to
   address auxiliary needs.  The updated device is subsequently able to
   establish secure connections with other systems.  For instance, a
   device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040)
   connections with deployment-specific network management systems.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-zerotouch-26
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-zerotouch-26

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-zerotouch-26


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu Dec 20 11:49:11 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C57A1130E64; Thu, 20 Dec 2018 11:49:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.765
X-Spam-Level: 
X-Spam-Status: No, score=-2.765 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W_4cGgXOSMXI; Thu, 20 Dec 2018 11:49:04 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 811EF1311B3; Thu, 20 Dec 2018 11:49:04 -0800 (PST)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBKJikoI024146; Thu, 20 Dec 2018 11:48:53 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=BmV8hMuh2IkZMD6w7hhQ2hArVRaUGlMIEJoCWCaAP7M=; b=ZsATF6/Hrxruh2qtac/VWzqhwCyVGUik4prUYvY/LVXf6FJl9TdqhIwrLOaI0g2A7g4T 6C712CIeVCzr2/8ytv8nThXGLdSguqbUT/qdFC6r7swktZzkNSpBQE/KxnyUwnHo+VpE 1XU27z61MY/8lxmfeWZvVwe+IFKhGs31jCAuGGdaLZ0Nxcm3VOHWlAMDpXS66OkHol2h twNjHe4ZQAqfaRCjUWylQTM/c8uZZsKzQ8neBfC+SuH1vc2zFbDgzIwe2aMh6vVDaSO8 fnxrT+A82mSCgXh08lp9Z4VwGMqzDcs9EnkT9Ibezs8w+xsEMySimQidd/hYAdR4F5p9 1A== 
Received: from nam01-sn1-obe.outbound.protection.outlook.com (mail-sn1nam01lp2056.outbound.protection.outlook.com [104.47.32.56]) by mx0b-00273201.pphosted.com with ESMTP id 2pggqv038n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 20 Dec 2018 11:48:53 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB6297.namprd05.prod.outlook.com (20.178.27.206) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1471.10; Thu, 20 Dec 2018 19:48:48 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1446.015; Thu, 20 Dec 2018 19:48:47 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: Alexey Melnikov <aamelnikov@fastmail.fm>, The IESG <iesg@ietf.org>
CC: "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
Thread-Index: AQHUjMdfcgz3uvchk06pPxfK6ViltaV4S9WAgAF8iICADgRMAA==
Date: Thu, 20 Dec 2018 19:48:47 +0000
Message-ID: <6058F165-D099-4279-A27D-BA415AC4548A@juniper.net>
References: <154403409772.31942.18387130156502248943.idtracker@ietfa.amsl.com> <C6DF1C92-1132-4E8E-A27F-70B79157C9E7@juniper.net> <1544546745.239011.1606019152.63663D44@webmail.messagingengine.com>
In-Reply-To: <1544546745.239011.1606019152.63663D44@webmail.messagingengine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB6297; 6:suHFurEwGgVPZWXwxNjsmNQbGx7XDXVuOpnyUxt/N1d6Mqr8ieySb6sOTMosi+Xg1pFP9qcpf7rxQ8EuBrY/SvE+0IzRYyI0NiA0vF5hpjK+hwSxunmJOAisTkPJ59MgDVfqCJX8i2MWqQw/PPMKjYI8X+nrSZDu/bFY/MYvypdkOhX5lU1Z8Ey0UGpMjUpWgtAiGj87HUzjizTRMWa960mhBIhBAWCK3XYEQ9VNFcfSl0IC8OMJGji2j2GDhyDtMiugoIR82CQfv16IDaARNc9JDBIxEg/33FZhM43k4PFI+stWZ0yMS1zr/vMb84IsfVhA26VbVQydXLUaFRI6uW9rTgZWQ8iEzFVVKIW6EbP3SQefBeiDZ7njh3lb/EiZ5r/DoMBMxdA4xZ47PzBnfX8eXzDLfI7v83fufi1Hf2c18W9dxsS4eY73qSiLm4Zl01tJ2O1gk2BlYiBPrahBNg==; 5:VrKCK2H5oZsvoLsISfbKNa7Uw/T/tkOCuksUI57t66q1iK5lugcFhmPaXo2Jivj6AeFU6+zErDT9E30VfQHsKEXqc2SA7mpeE7vVPvXcpQdlGh6lastcbUiJzU62IoQKVleW4F5r3ApSH5/5oevRGin0SR5L5u1/AuFmUp3/09E=; 7:q3pzyhrJTtlfl74vIyFj/oJEyyWzFonS6ueubtIQoU+eMV/xeF8oG1Udz4oNzOnQJGePzW4prHsQBZxwDTz/TmZNqVuahb9NZbCVbYXEizu4lByFm2tGYi1dEadUnY0hgwGfLjSNGVUN6EPocYw3IA==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 4c40e91d-1e95-4818-536e-08d666b42887
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB6297; 
x-ms-traffictypediagnostic: DM6PR05MB6297:
x-microsoft-antispam-prvs: <DM6PR05MB6297AE9520217A69A58AE7D8A5BF0@DM6PR05MB6297.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(5005026)(6040522)(2401047)(8121501046)(3002001)(10201501046)(3231475)(944501520)(52105112)(93006095)(93001095)(6055026)(149066)(150057)(6041310)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB6297; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB6297; 
x-forefront-prvs: 0892FA9A88
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(376002)(136003)(366004)(346002)(39860400002)(189003)(199004)(58126008)(4326008)(6436002)(316002)(68736007)(53936002)(97736004)(4744004)(106356001)(6486002)(110136005)(6306002)(345774005)(6246003)(6512007)(229853002)(86362001)(54906003)(575784001)(2616005)(478600001)(81156014)(81166006)(966005)(14454004)(3846002)(7736002)(105586002)(11346002)(186003)(14444005)(256004)(8936002)(446003)(82746002)(2906002)(76176011)(486006)(102836004)(33656002)(6116002)(71190400001)(305945005)(71200400001)(5660300001)(83716004)(8676002)(99286004)(25786009)(26005)(66066001)(476003)(6506007)(36756003); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB6297; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: O32vRk4vnLwKDGMtp1s6K7EiOoHmqBQPgi3Msv7jj+3PZi80osnl4FVTFAmSHq+lzBMOoS1d0+IWSS7BMMG5UdlJK+4+oZNmev/t3/UvbwNrw3z5YLXj+Xjn+izjyoOz3e96Tc2Q29DFPPqmuM6FU7c2EY5nCOzk9IpEx63Jg71J0GnMbrnIfJWYl4oyfhxkhCj9G0AU7CL4pQ+2CEb6oJQ+N7lydgcSOwDbHGZQswiRkgFZXbX9ANQylR/ECGlBbJ0bTCp0jwzw7N26F49INS3kGL4C4xH09H87jUR8JndH5RRFWcIQBKC5b5nqxCwW
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <73BAA3307887814F94ECC4B096734606@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 4c40e91d-1e95-4818-536e-08d666b42887
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2018 19:48:47.7926 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB6297
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-20_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812200161
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/vfdsSAcO-kKuGpO9-kj7JQZFd5Y>
Subject: Re: [Netconf] Alexey Melnikov's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 19:49:09 -0000
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From nobody Thu Dec 20 12:15:21 2018
Return-Path: <adam@nostrum.com>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C711C130EFE; Thu, 20 Dec 2018 12:15:18 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Adam Roach <adam@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154533691880.19091.8144078009993515092.idtracker@ietfa.amsl.com>
Date: Thu, 20 Dec 2018 12:15:18 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/dnoTiNf69cC8rxG7kSIDVQNxZQY>
Subject: [Netconf] Adam Roach's No Objection on draft-ietf-netconf-zerotouch-26: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 20:15:19 -0000

Adam Roach has entered the following ballot position for
draft-ietf-netconf-zerotouch-26: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for addressing my discuss point.



From nobody Thu Dec 20 13:24:59 2018
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36093130F72 for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 13:24:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.765
X-Spam-Level: 
X-Spam-Status: No, score=-2.765 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.065, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6IfGchdFhtNx for <netconf@ietfa.amsl.com>; Thu, 20 Dec 2018 13:24:53 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 993FC130ED7 for <netconf@ietf.org>; Thu, 20 Dec 2018 13:24:53 -0800 (PST)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBKLORhh008375 for <netconf@ietf.org>; Thu, 20 Dec 2018 13:24:52 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=W84gBh3K+Ot8olIP/Zaio0Eb195c2yGdkfOCQuacOt0=; b=dGqlifMo5jV/dh7lNxz2uUoK2sAQ0gOJTxX9uTI2sEbPve9FwNqRX9FX+R9MQ86t6oVM MCga65ZA557jtOzBHd94xDZCdjVRhj6ue3nYx4lYLn/c7nsDkFtN0qUo4BIJbsmj/HOT krgVwIMkQ5Y4dC8a1r/IHsXfTBHQccEJC59b1LZFNfqhO2TluEWhqXi07qaO4pIVkxSp /M1q4xNbyo8L7BabfzyM6s2yzqejOyeDx/XH6uSxlB8TGSLrmsL17+FCQUz+7AD2gUXp v45IuHtFd+SohXUXfvKXi/jIyado+YBX5hMRqsLqKDkNVqEYvGC4subm632pWuAvvOHr fQ== 
Received: from nam02-cy1-obe.outbound.protection.outlook.com (mail-cys01nam02lp2059.outbound.protection.outlook.com [104.47.37.59]) by mx0a-00273201.pphosted.com with ESMTP id 2pgg9hr9hw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for <netconf@ietf.org>; Thu, 20 Dec 2018 13:24:52 -0800
Received: from DM6PR05MB4665.namprd05.prod.outlook.com (20.176.109.202) by DM6PR05MB5340.namprd05.prod.outlook.com (20.176.120.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1446.14; Thu, 20 Dec 2018 21:24:50 +0000
Received: from DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c]) by DM6PR05MB4665.namprd05.prod.outlook.com ([fe80::f0f3:20f0:2104:638c%2]) with mapi id 15.20.1446.015; Thu, 20 Dec 2018 21:24:50 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] I-D Action: draft-ietf-netconf-zerotouch-26.txt
Thread-Index: AQHUmJU9jQowK1LF7UWTvWOZKKILc6WHz+IA
Date: Thu, 20 Dec 2018 21:24:50 +0000
Message-ID: <077F57C7-3569-4755-9020-421255D2A420@juniper.net>
References: <154533196982.19062.13734868545043068788@ietfa.amsl.com>
In-Reply-To: <154533196982.19062.13734868545043068788@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.10.4.181110
x-originating-ip: [66.129.241.11]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM6PR05MB5340; 6:OTmCm6i0eeZob7kb2OCDh4RiIN97SngsQivNXlkmdXBCtwEPJGQBpH7K4TQsRfzLYQ+I7VY6DIBWZbtYEyucoB5pYsTLAnDEaZBKaJIdgnv54c0qqX5PjWhowytrrmW7P0dxxdgWJ8qwWH+9lWTTdBvnozcDkcioW9ybQnHWnuQkqo1Le6w8vrWloeFDvQpf4frH9LAPvVWa0kv0kuFMKbhwEDUPqim5VrDDKeR+vpd2VVZwj68irFkNEE6XG1DeaqkqS64XgqFD8kb5HgEHId1riYsDRDVE062KvMrp633VjzFF4WjRORkb/VqyTVpEVIpTCQORfdMsgScJluqShCkPsEpBsFO/0W+Zn1gXP9HewO4z8qVrjml0wrXOBgk9e4HhXtUyX35ijV2PUonTbmR+Pa+s3IKTQdhWbJMmSV/1v3Twpp6stalwgSeeZee6ILIVR5tWXeBvY/akJ1D93w==; 5:uxjwiAFradoXjQiMy3TLc2EinLAoCf9uwkun0F5XbZ2a+Z2ET34LUMEs6ZKuWXPG6XaxRkWvu8xCwiOV26WgYFoSXpX2qgODByiuLv536tyVWOX0xZsfhuFQ+kbMCUMWRzeoXvRRWMnoa15MNnLQtbR3jtwuvz62MchvCULW5P8=; 7:WKWQh1numP8CtSYCXMNU4ZWby1RLrCmvAkM4DOWNBP6Zpwb3GIz538I7qsrtxyf7BBQgzXw9tRh25M/qTdYNyHRU1DgG4xtmtA8Nm/BpFQg6KvM2MqXydFlvAKQBA/quy9Gxfm1JwdaWUBBTyQSIbg==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: cef5cb0a-4ea3-40bf-b7dc-08d666c19320
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM6PR05MB5340; 
x-ms-traffictypediagnostic: DM6PR05MB5340:
x-microsoft-antispam-prvs: <DM6PR05MB53406C9B4C154F3BB3D64C71A5BF0@DM6PR05MB5340.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(999002)(5005026)(6040522)(2401047)(8121501046)(3002001)(10201501046)(3231475)(944501520)(52105112)(93006095)(93001095)(6055026)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123562045)(20161123560045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:DM6PR05MB5340; BCL:0; PCL:0; RULEID:; SRVR:DM6PR05MB5340; 
x-forefront-prvs: 0892FA9A88
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(39860400002)(396003)(376002)(366004)(136003)(13464003)(478694002)(189003)(199004)(8676002)(1730700003)(33656002)(81166006)(66574012)(58126008)(81156014)(8936002)(5660300001)(2501003)(6246003)(99286004)(25786009)(6436002)(36756003)(2616005)(446003)(6916009)(966005)(486006)(53936002)(575784001)(316002)(86362001)(11346002)(14454004)(76176011)(66066001)(476003)(6512007)(5640700003)(53546011)(97736004)(6506007)(106356001)(256004)(186003)(105586002)(7736002)(26005)(2906002)(6116002)(3846002)(14444005)(305945005)(229853002)(71190400001)(71200400001)(6486002)(83716004)(6306002)(102836004)(478600001)(82746002)(2351001)(4001150100001)(68736007); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB5340; H:DM6PR05MB4665.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: p1RseO8Y4veVko6FD0bgJBW0FwdL+M09LL+uOhcjKw9BDpDObi4dEM3dWfHQg3/cDhJOnqkUVwJHYZl37f05O7Y+ecIFMK1S+XcxwUMKesKXUof7KzXXiIwXhBtRgFjwERHT5R95xYN3ghlG1Dfd5EkOhq7+BurdR3cWhJq1+te1b/Zb4F8rWOdnlqyls/VKM6xxbdSu9qsengo275avU77XuSNKqSiw7lEPg7/5lNVwNhTulS2SCgSqDh0iWssHZIuIr5Ws6mDgxJk15c7poWPQZMK/i0MT+pP9la4MrI0Hf7UkrH0gfMVx0fbGsD9S
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <0FA50024B779C6448946165AE9876540@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: cef5cb0a-4ea3-40bf-b7dc-08d666c19320
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Dec 2018 21:24:50.1129 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB5340
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-20_10:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812200175
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/cottijGFJg477_3pVa0_cM95muo>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-zerotouch-26.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Dec 2018 21:24:58 -0000
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=


From nobody Fri Dec 21 09:28:39 2018
Return-Path: <suresh@kaloom.com>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C9A8812875B; Fri, 21 Dec 2018 09:28:29 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Suresh Krishnan <suresh@kaloom.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-zerotouch@ietf.org, Mahesh Jethanandani <mjethanandani@gmail.com>, Bert Wijnen <bwijnen@bwijnen.net>, Bert Wijnen <bwietf@bwijnen.net>, netconf-chairs@ietf.org, mjethanandani@gmail.com, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.89.2
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <154541330981.20378.7121000100490083269.idtracker@ietfa.amsl.com>
Date: Fri, 21 Dec 2018 09:28:29 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Fa7d0SyOTcVIIQtd-4Cp_e5WsnQ>
Subject: [Netconf] Suresh Krishnan's No Objection on draft-ietf-netconf-zerotouch-26: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Dec 2018 17:28:30 -0000

Suresh Krishnan has entered the following ballot position for
draft-ietf-netconf-zerotouch-26: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for addressing my DISCUSS and comments.



From nobody Sat Dec 29 11:04:15 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12EE412008F; Sat, 29 Dec 2018 11:04:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vSrSObzAtDGm; Sat, 29 Dec 2018 11:04:02 -0800 (PST)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-eopbgr820112.outbound.protection.outlook.com [40.107.82.112]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 097A8129AA0; Sat, 29 Dec 2018 11:04:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RguKRE+z2aFn9/Ls3KhVa9ewvMT1l0txt51EMQg00DI=; b=MKVplDeK4qoUuvEEpH5rvpi8yzsnYQnv5zTH6dew73ZdFf5+K3Cg5Pt8bfyqhw1n3s2EIbNmB1BAPayaqa1r/40kpbkXG1t6PSq6FE3dUSfs7irNgA5WONfhxKZCwbamATI158cRmALSfkTEGZNvNkwZRLfCJJ/4CRtl9oC4hkY=
Received: from BN6PR0101CA0003.prod.exchangelabs.com (2603:10b6:405:2a::16) by BL0PR01MB4020.prod.exchangelabs.com (2603:10b6:208:41::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1471.20; Sat, 29 Dec 2018 19:03:59 +0000
Received: from DM3NAM03FT064.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e49::205) by BN6PR0101CA0003.outlook.office365.com (2603:10b6:405:2a::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.20 via Frontend Transport; Sat, 29 Dec 2018 19:03:59 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by DM3NAM03FT064.mail.protection.outlook.com (10.152.83.1) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1446.11 via Frontend Transport; Sat, 29 Dec 2018 19:03:58 +0000
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id wBTJ3s0T020756 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 29 Dec 2018 14:03:57 -0500
Date: Sat, 29 Dec 2018 13:03:54 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Kent Watsen <kwatsen@juniper.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Message-ID: <20181229190354.GB57547@kduck.kaduk.org>
References: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com> <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net> <CFE18196-AC39-4BF7-94A9-98AA6ADCAEAB@juniper.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <CFE18196-AC39-4BF7-94A9-98AA6ADCAEAB@juniper.net>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(376002)(346002)(396003)(136003)(39860400002)(2980300002)(199004)(189003)(88552002)(186003)(4326008)(126002)(476003)(2906002)(106002)(16586007)(58126008)(36906005)(54906003)(305945005)(246002)(486006)(6246003)(786003)(316002)(229853002)(106466001)(46406003)(14444005)(50466002)(478600001)(26005)(8676002)(47776003)(9686003)(76176011)(55016002)(7696005)(75432002)(86362001)(6666004)(5660300001)(956004)(426003)(104016004)(33656002)(1941001)(6916009)(1076003)(23726003)(97756001)(53416004)(356004)(336012)(446003)(26826003)(11346002)(8936002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR01MB4020; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; A:1; MX:1; 
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM03FT064; 1:MJcC+nuHbj5dGB5G6v6O/rhoTfy3g5tyQFzFPMXjj0YUMmhQcV8uCuLRGDPPXoY2fILoKiKZ45gM+nE6VakSgxCy14jDPcJJrckTx+joVOrfBJ8OB3U7tTHBoxSG8ai0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6e118a82-7f29-46a3-b789-08d66dc06377
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600109)(711020)(4608076)(4709027)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060); SRVR:BL0PR01MB4020; 
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4020; 3:ZvP+80ypWr9ltvhsoTyY+AeWbkrIijm1nsctI0M1YKRjbEb0Z1sPrlFFXhmX5nezhfyknTIUvenZjyfhZbgkBy9KZR6Da7cayT05jc6iiMMRAAQOxBO2/1SgPyS1kBy+/XZiwmjEYGOBNqdwqafwsow1vmd6vHRbFMQaRin2cWD9zoRGT/Uuu2gIfbDSrnHRTfPUvCvhYaquQJ5qzzpbiFPul5Er81Sor3pTNlqn5ZSkDzTYMBBcrrWvik+tUPlxjKokQUQF5wQe5+7ngvDLa067YgwcHQaS0Fea2t1b/fMv8uaw8rh5jCifCO/3EBBSuA3X1JaUGCbgEXbGI6XeWg==; 25:cL4+BGn0Xzza3JbMnzQvkyF6j+tQwtmOB6wi0/aUo+PmAgb3TIK/bMivlhzpUhNe3/mE45xR9IwLhXiX+F5Ctnr+VN1RQ6hFLQfZHlsQcRczJSRTuX7iAWCWiE5vG5l8qheKFJmyLhZHrC6rfaFPYFn7+jOcrv1GgvqQs1dsxSSuL8+m9gv/a67B7ZL24siRNUQyysAmAGyF0H/TIIdNvR4cn4tEUssVJixVxR2NmqPISXgTZhTcmnB8GSKWELkDwX8i/YC3Kr0NdOcv29WEgvakKqgMHHQO/C0ogMZdw8cidcenE/kfpXtRtlJ7V/zX3l3pOhNTnzGR+bVyhXXjWA==; 31:RKU0Jyp3ZZWqVqNrmM/rKmiPjlXR96kl0JcvPDAIknmHtTp1laUb5ioEByFjCYmSePIpHmzpJ4Q27DQlKhwOdqRGOM+sirRw/eKB80AZ5I9qmKttALRR/TiJ75qATSl558XeWIHe17F5yybP8koGaH52qiDadxgSt2JpMvsDIviUFGd/vMhhDKg0aWQRI437ozT33/Wpt9Xm8DAvs96TvDTQ/MMrlg5VyYNmuOblDU8=
X-MS-TrafficTypeDiagnostic: BL0PR01MB4020:
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4020; 20: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; 4:ADAsRVwtawCfEc7168xGs1Xr8CHAKu3Gpw3fy4OJZfWQ+8QrUhzxL4vbKQSWQwaGQR3bys2tExo2YGtHhrNUpkxkepLSHxD2BWPVDz7Q9j0XfNVjHVDjrmaR1EEOWjIxgJOk+PcNtsfxRaiFovzttlLo3ihxPdCU5NzN1bZ656wm0mWrasK1tC+WtQtdlDPQj3cif67Y9jFbXP8M08aEmEh+aRJjNNg68kXE6TWxOUQ9dVxljI37xH4Vzwlb0v8Tw/NBGWWOLqKCk5mbBI6bIA==
X-Microsoft-Antispam-PRVS: <BL0PR01MB402007ADF44C01B845A8EE8DA0B00@BL0PR01MB4020.prod.exchangelabs.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(908002)(999002)(5005026)(6040522)(8220055)(2401047)(8121501046)(10201501046)(3002001)(93006095)(93004095)(3231475)(944501520)(52105112)(6041310)(20161123562045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(201702281529075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(201708071742011)(7699051)(76991095); SRVR:BL0PR01MB4020; BCL:0; PCL:0; RULEID:; SRVR:BL0PR01MB4020; 
X-Forefront-PRVS: 09011458FC
X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL0PR01MB4020; 23:TNwuSS7bwWJXXWLmodSgcz0GVJIgEKCw/BOZYLYWF?= =?us-ascii?Q?m9j4VZus+4QvnuR0pZ07fYcYuUX0iACbdhMUHFKzir27tvBrz4OxxDYMQ4hf?= =?us-ascii?Q?Zv++MDx92CRCaQdfnECCFbA68SBpbjJyayscmnujAVb2tSG/ucncIaw5PZkn?= =?us-ascii?Q?Kfms91hGOiJ4Jda8sae/kn9AxNPyMqL47Hic4zF6gctCbvpLWfdwAIt4cpQu?= =?us-ascii?Q?NqADhY8P8E2hHWYEtTmM42eBM2R+KAyLZzCnL1mW+D8KKWIZKqQiQfuhdYun?= =?us-ascii?Q?2myYKBv+txI5F4RC4GiW6LtS0E/bpx4EGEsM/GmwWrrz9rUVnTgb7oHZkAlV?= =?us-ascii?Q?gJbNlkIdQUT3J0ZIEEDSiJEUHQ9stKGegqVf8yY/OT2Y6qvUTiqS0DudvdzH?= =?us-ascii?Q?RPMiGkKgy2jtSlPH8lkpP1MHpMmZ5iH43ge+j2YlYKxg0+ATtJ+7CFdrqpyh?= =?us-ascii?Q?Q0id+5Vtj9Y8aLhQc8fcd2DpeiZrPkbF8zwS/8lrJdgajLjpZ4xVisDpabgH?= =?us-ascii?Q?A09jC9cDf/MXwZArhjhu45CClcjZnXnjcSDQ30DDCX2YhA4Tr0P20H/N8qZw?= =?us-ascii?Q?0/tUW1eyFw5/WtVviJyGcVIIf93wbCaPhTTS/N+NGj3jh4mFaef/scggLDuq?= =?us-ascii?Q?u9DjOMVybEXou8xgkRgRpOzEfubp4N3dEe1C3kblydnBR/one8yM4tqZIplc?= =?us-ascii?Q?gKFGR1+BNHv5nTiC83oe5Nn49IHjvoEljjRUQI5fcc+9LjrskI6yznHfF5Mx?= =?us-ascii?Q?hwEXhzR3TPqkpdZnXfTf+P9ku4m6zKcBLPhnU86wmBAs1HxmSw0CyTHFZCaU?= =?us-ascii?Q?khulT4KeIxqkwcSPdpVJo1rFIhojt+9/R73Ian/mYu4kRKqBINmaAvY0od9H?= =?us-ascii?Q?TJndJJXeF1dDP9nXAggCObik7lyJXALgKG6E+Smm3QriRdHTjdhHlXLplsq6?= =?us-ascii?Q?E94dGHv3dH96Koox4rP++YRy4yuh7goG7LppmxHirzwbNirOhghGbaOPTPNS?= =?us-ascii?Q?NCdq1ZxNJ1J8CvKEyc3C9XxXHj2FtHNuN0TaVXnRAQAxIJlnqZQiu6SbX9L3?= =?us-ascii?Q?pGmMQ4yQDxDDM8/2oSz0XYQAPKoqPT/AJ4OFO4bnB+zV8QgFuoke7+fix4XX?= =?us-ascii?Q?0tPqEQZ+7ZQTXK5H+u6F033Xs/MBE0u3X7f9KxJo278FgTgQ3v5WbmYtXzPp?= =?us-ascii?Q?4tNy7UHPRfgMmEfF6W3qxOzIT9fowMfI/xsM0bDw7VJ5kb49niVz+w7iV4fE?= =?us-ascii?Q?MJweGGT9/mDbjE6R5LHysOkklHJ1/Wll5TrxsOHvGb3ExN42ti8HRX0PvXE7?= =?us-ascii?B?UT09?=
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: W9wDYdGAM5Y4HJU1MaDMEJaScXDWsgLWKXneOh1821VNzlDZswosgqP1s5HLQyvIBnkEzJ8ka0urIYLWP0i/KjSPkhtHXpq5PcXkwOFXExNnsPDeQISZ1xyiFyJp/lFz5JRqP1cmrPyT0Ms6NlubGOdh34+iI0vUFF4GskJ4kkepVMYequrQPjOQpXSBFqum5vEgnrTTyBN5c08rggwYHOha5X5hzUm7WgnMtnYajYiDFYSGEBs57VGaQD6mAxM0bFq4bEm7zIreYNOePatDyNfdECc3LwY78W3oAZtYCZNq37cdMLBKkwLQlNGvf5m9
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4020; 6:sSuSBzM5SzWw2d454tIm06hOoRGRGQa0X19uJAuTXPBoRL0fj8C59WnT61ca/ACRdk75FBowRiIJZiWBWvI7c+w04A+BeWCS4GEJOhSVfLxCd6EDn+O8wam4KrnzjlO2ncOaXIZ/KBW1aUAZmB0qtK35HmpPBVWScOHfxxnucOeE+RgRrQxzNxccNCm87FouD7CnkMSYPDx+rgQHIm5I6pcHztS15z4SJYYPa1OD6aM+DGEyaa/wd8mIanIzeHG6v3eFIlCNvnUNmC3MRYfTyYKhHj3S8sRm5ZRgpMt1S5YDpTGT5hcJ1muDdA5BLd0xiRny+B2ko0nMys79jkC8aO4bNLoO0lghFwB+DJ9X/bXNcI9NV4giQdupMGbtB4VxsWGcVScDyfoVG3h+NgzotJHRxR0NG0gMHBLSLf9cw2wa8gAmT6/Ak0fu4ms9+n0ZU8tJQqttMsRZz7KefvhyZw==; 5:sgLG/bNTwfilwAhGv37oBqB1sjV3s1w0I6CWh2xw7cfSk/jdYA2F/LO2EfEKWQQFrKSgRCQCYohdEtdPJDxEKffw9X/Lys0JxFWCVoH8nTqijVd5jeao1KhPjYNO2V8LZZhUU1lNlWqJ2l7RoNXsu0lM3m7QkMpB6uaxytlzuG0=; 7:Z+zixdt6ke0VUmhQSy1cdNRi6619W7ZsoXiX2Q2SA9H/l+3DmxUYMLe9pI3ta56lTDAqWMZ9P7hbHKAVodd94CYDQOJuap1QGEFJU5k6pIKCIclH7Tet50DqiYSaDHOTawv0lkbSqjAH1LuqvTUWbg==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 29 Dec 2018 19:03:58.5223 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 6e118a82-7f29-46a3-b789-08d66dc06377
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11];  Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR01MB4020
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/vJ_cXyBZ67bzAOBMETzvFvYQ6R8>
Subject: Re: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Dec 2018 19:04:06 -0000

On Mon, Dec 10, 2018 at 09:34:34PM +0000, Kent Watsen wrote:
> 
> Hi Ben,
> 
> Regarding this DISCUSS item:
> 
> >>(3) Nonce length
> >>
> >>Section 7.3 describes the nonce leaf:
> >>
> >>         leaf nonce {
> >>           type binary {
> >>             length "8..32";
> >>
> >>There is probably some discussion to be had about the minimum nonce
> >>length (not necessarily in the document itself).  Do you have a 
> >>pointer handy to previous disucsions or do we need to have it now?
> >>(I do see that this is just following RFC 8366, so hopefully this
> >>is an easy question.)
> >
> >
> > I sent email to my RFC 8366 co-authors, as they were behind setting
> > this min nonce length.  I have yet to hear back from them, but will
> > let you know when I do.
> 
> I received the following response from one of my RFC 8366 co-authors:
> 
>   ===start====
>   I think we wanted something that was big enough to have some 
>   reasonable entropy.  But, we didn't want to force receivers to
>   store too much.
> 
>   More than 32-bytes shouldn't be a problem for most receivers, but
>   we wouldn't expect them to accommodate kilobytes.  The registrar
>   may need to store an index over nonce values for some situations.
>   ===stop===
> 
> Does this resolve this DISCUSS item?

I agree that 32 bytes of entropy should be plenty and we don't want to ask
endpoints to store kilobytes.  My uncertainty is more at the other end,
whether 64 bytes is enough for defending against all the possible attacks
that may be in scope.  In general, it's simplest to just require a 128-bit
(or larger) nonce, but there is certainly a reasonable argument to make
that in some cases 64 bits is enough and the difference is important for
the low-end systems.

For example, if we're only concerned about a device possibly generating the
same nonce value twice, and an attacker storing+replaying the old response,
then 64 bits should be enough.  But if the attacker can (even off-path) try
to spoof response and collide the nonce value to trick the device into
accepting the spoofed reply, then 128 bits are needed, for our usual
security margins.

I don't want to insist that you include a discussion of the various attacks
and security margins in this document, which is not really the place for
it.  But it might be good to recommend at least 16 bytes of nonce (or even
make the minimum bound 16 bytes, if appropriate).

My apologies for not making the concern more clear in the original ballot
position, especially with the long delay cycle for responses.

-Benjamin


From nobody Sat Dec 29 16:30:23 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97EE11294D0; Sat, 29 Dec 2018 16:30:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.701
X-Spam-Level: 
X-Spam-Status: No, score=-1.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DL6rF3gQXXFS; Sat, 29 Dec 2018 16:30:12 -0800 (PST)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-eopbgr750127.outbound.protection.outlook.com [40.107.75.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E62B130DC0; Sat, 29 Dec 2018 16:30:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=q2s37zXAtXstiOeIyCDpolwSY2sw0/PrRuAxh+7VEek=; b=RPU2uv1A+83N4wvWjIzEqCEyy9mgUix6FsJeN8POQ8wdYOdsK72Jt6lsP7ZOJUIvomxeh3QCc+cSBvXNPsr9he6Z/5A9ckTKGxL6ZJjzzGyfT3/duE0nZBTxEt0SjibX/9UJi3roN/4polWGyNcmamYORydJS7LeJATYzaUIJG0=
Received: from BL0PR0102CA0060.prod.exchangelabs.com (10.167.241.101) by BN6PR0101MB2947.prod.exchangelabs.com (10.174.86.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1471.20; Sun, 30 Dec 2018 00:30:08 +0000
Received: from DM3NAM03FT058.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e49::209) by BL0PR0102CA0060.outlook.office365.com (2603:10b6:208:25::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.20 via Frontend Transport; Sun, 30 Dec 2018 00:30:08 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by DM3NAM03FT058.mail.protection.outlook.com (10.152.82.212) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.13 via Frontend Transport; Sun, 30 Dec 2018 00:30:07 +0000
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id wBU0U3hK015579 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 29 Dec 2018 19:30:05 -0500
Date: Sat, 29 Dec 2018 18:30:03 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Kent Watsen <kwatsen@juniper.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-netconf-zerotouch@ietf.org" <draft-ietf-netconf-zerotouch@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
Message-ID: <20181230003002.GC57547@kduck.kaduk.org>
References: <154390493154.31734.13025584839857369253.idtracker@ietfa.amsl.com> <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <F526DA60-77EC-45D6-ADE0-B345020A89BF@juniper.net>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(376002)(346002)(396003)(136003)(39860400002)(2980300002)(51914003)(51444003)(189003)(199004)(40224003)(53234004)(75432002)(26826003)(966005)(33656002)(1941001)(106466001)(23756003)(53416004)(4326008)(229853002)(88552002)(2870700001)(478600001)(2906002)(6916009)(54906003)(5660300001)(246002)(476003)(486006)(345774005)(186003)(36906005)(8676002)(126002)(426003)(4744004)(956004)(446003)(11346002)(50466002)(9686003)(86362001)(104016004)(7696005)(14444005)(76176011)(53946003)(356004)(55016002)(26005)(316002)(786003)(6306002)(106002)(1076003)(58126008)(336012)(47776003)(6246003)(305945005)(8936002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR0101MB2947; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; MX:1; A:1; 
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM03FT058; 1:xWcOFOb6otorox8tuF04kaGMcQFwYBxV4GSnojJddcrne4z+lBoDj7sSgemf8u1v62DbdDlOo0jMWC95+kN6u20PgNStHBBkGy8S8Q02nTWxohGTiyNIeag7E/MlJzfL
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 963da21a-bac7-4204-1725-08d66dedf3dd
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600109)(711020)(4608076)(4709027)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060); SRVR:BN6PR0101MB2947; 
X-Microsoft-Exchange-Diagnostics: 1; BN6PR0101MB2947; 3:/Gr+W6SJkwvPNdnQ0XegVmltzZghbQsPiR857LpZrhJPGt2eItTBjw1ACFubJNuToVgTpAI06q6nHDVOPICW/zjDn2gofoeXHdt8DK2mK0JOPPQtHnBeYM3w80vj0pZhc/MSR2/7k4JTVF7MnU2nykHqzFU7OxUEJv5zDrARqMDqygoEcHboTpDkhV/1zYmGjVMiAo8YCl5NLhlGRyJF2dpd2/imauQPcvl18aZoOxLKDflzD91ls4wBfGvSW3OZW59woegiccyH/i0coSW4x2vYilh/7WPIy0EMXfGg+QOwJCDYziia/jOBH10w+/uHEuQvY/+gclm66IH37mO6WA==; 25:GGpGAOyBfviGjXXXB44pHWYu0mhonQg5Md9QzPWlf1kWpDs6gEimA9L8Fm5SA1Q7uJB7UqoCeV8hpnYCug21UtjKOLZp3lj2iy5IUPBYRl0ulI8dflTHi9MFHN85Owim2rB4c712Gmtnxx4FWlBhw7o0yBEu/NFkip77/AsueBnRMNwREv+RmCiL4RZ3rdI4kfBOwU7nsXkmTBKw6E9Zal0/RsSR3F1zW9eZ4bjojgPYwWbMVD6IRi40fz4iztFzvsgNQpFK7BjKzY1CegnCYYlCtVP85Lzh0ydmAAXd21GUVEIqIioJZNTrO9h6Rsxqp7xQL7YgzRUuUS3ruxVqDw==; 31:wHo8L3TNSyUHS3+kTLvdPhSSkQU81PmuA5MtTd8dUKZzQ7zBMUJD65IJ+09/UDWmDnC6Qk3YrtJ5xQ4PRgLqFXfbp1x1k0TmFnUO1wC57o1DUC01FCQpQbA3kqTtchqHWzaOgVNDsbL/XEZ9+uEAIjxteAHE3Mbj6h4+2cEXoN6FfX/utasRC+VGNRMqDeX/UpR3++L7Bp+d4hkWGtvgHf3zPOVdrbDlcKP5rilDk1Q=
X-MS-TrafficTypeDiagnostic: BN6PR0101MB2947:
X-Microsoft-Exchange-Diagnostics: 1; BN6PR0101MB2947; 20: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; 4:CxoKa4GkNUb5zZGJGaocgyOoCn0bdhORtez6huEhwUn1Ae98JZY+Ua9py8tLIujEK7jUVRjBzi0/lznWu7scLCkNAlRZMSTnJObrplc8YItMeDxzqdpFRa7vRuYQdyN8p/ILlsULAQN5w4LbC0jr3hn6qOFAWmyWnokiDIpzFMx4leqv+VT0hS34pbqQRNa3+u23XIxhh7nMYUPSsOlW3Y45/p/CuAm6eDyss6OXzyrGpA5e3JezaVMxevrymwgdDActcH2fMy17UOVRy4HMLg==
X-Microsoft-Antispam-PRVS: <BN6PR0101MB294743DF2FA5B68639A05B36A0B10@BN6PR0101MB2947.prod.exchangelabs.com>
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(3230021)(908002)(999002)(5005026)(6040522)(8220055)(2401047)(8121501046)(93006095)(93004095)(3231475)(944501520)(4982022)(52105112)(3002001)(10201501046)(6041310)(201703131423095)(201702281528075)(201702281529075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(20161123558120)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:BN6PR0101MB2947; BCL:0; PCL:0; RULEID:; SRVR:BN6PR0101MB2947; 
X-Forefront-PRVS: 0902222726
X-Microsoft-Exchange-Diagnostics: =?iso-8859-1?Q?1; BN6PR0101MB2947; 23:370LgdUFSQVwIRVH0nPNIJvSBmg9jYrAC1UmP?= =?iso-8859-1?Q?wD1D6tLZSjDJ9kucJoIg8PrWMQwr9XvVmHu1k+QaM51/yFeEDFku/J09/H?= =?iso-8859-1?Q?iphBuCu7ACoXLffHJ2pvtxgLDob8m4xRYKLFtrllk8j6WxrlZcDvq/NVqW?= =?iso-8859-1?Q?zJkZSM0zoIepoa6AxaUDO1Ytg+BOnQ5Dd0V7IX3PDtr9pGWtt48ePIk7sc?= =?iso-8859-1?Q?LSOD6KxsilGx8OiuXr5t8Wirnqisn2sZp+kfJPjofuHQs5BmUNywBlWdro?= =?iso-8859-1?Q?lgrr98mRh33LkDrhnH5zOMK52MrgyN2AuSvG8TlyPBm/tAU+o/9W5YyGue?= =?iso-8859-1?Q?2HcVx6IfXXttU99QG5jdRx5iF8Bithu4mkAY+i/7GKx5gMLKf9eZtyOEyW?= =?iso-8859-1?Q?NtKdRA7R1ihVKMEybaIVFOqTFAdhwgi40JIgF3fJjLL5SDVRxEhyxPKAuy?= =?iso-8859-1?Q?LIHJkpqeVCcJVMc7Qep+aVTIdWBpCtDtCCdnzQi2E8xFzK6kbO3B9YigQy?= =?iso-8859-1?Q?SZaV1+TH1YPvsPyc3qrCnKzqnmdU6kMPHqC56EMc3XilqhaAHS8dLe6Xi6?= =?iso-8859-1?Q?zBrlXDpjw8LAKRIb7+BUL124BLOjDRkNPJed7iqiRwbr9ekvxnVx74tu4t?= =?iso-8859-1?Q?pmjIDqT7GQJCZVDBjB27wIZEKfFLxCv9X53e5pZqoo0xNVGGAbzSkQqhYH?= =?iso-8859-1?Q?TsinSLjL5kVViKRUASPkUnYv/F1r7uUcHQb1TSSH5B/KNBPYfhCEbrJeus?= =?iso-8859-1?Q?akqK8IMs83u37ITWr7F1EZZCYbdc2zwDXT7dAQzLoPkE+Zb378rmIDX42p?= =?iso-8859-1?Q?ucjbZWp6bLK5i6hR/iqqlulyr2eS8qjEGMxgmXw+ftv46lP3cZ7f6aFlyb?= =?iso-8859-1?Q?7QAWZ8CtKrsIL/jxyDLfDy1cHLfbAkGF/jAW+MFwV3idHdZETwnDjsBK2X?= =?iso-8859-1?Q?BhQRtLScTXBdvHbboqTy/+X8FIYYsS11yNaNgtSkl1KxBafu1Wbael1cLA?= =?iso-8859-1?Q?jLiA8hhILI/9TLoitzoaRLy3SGDfgNe2aRoH2t1Jm4jUYXIIlqfTRiM4KF?= =?iso-8859-1?Q?RGK4wJQxV4WQoIBG0TLHVAPrxFHbrGYFUaheQqN+aOyIRlVYy/qlGOzR2h?= =?iso-8859-1?Q?DtpytCFVbu4OcUeVobVFjd/6ky12pPkKTCLqb7UczlXinPh0OOaiGdLjSI?= =?iso-8859-1?Q?vE+w3fHcQ7VAJis0/EJVkOta07LC/kNGkRohqlYfeXFDLR9LLShrkjFCO7?= =?iso-8859-1?Q?jDjYcBHsFE/Mpg0xuj09lcKff94GP3wU14LdNbQl8xdmoVIwRyo7rV0iwa?= =?iso-8859-1?Q?5TBwSRbD0PwRntJXGivEMUSHownJ4YHRYiwmPbHMiz380iS5gQhcfCE8fS?= =?iso-8859-1?Q?6xiAH8fc5OcFe+/5Fy/N38HK9T+Hx1K/LJd7qa8fwaIyWnSPY0GBWZqCIS?= =?iso-8859-1?Q?DQ3pj00ZZkxixXUkbHZifBHdUj7rAkKVMhJaQZcLd/mbjbxmlDZRyin72e?= =?iso-8859-1?B?dz09?=
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: z0dPxVyUnvo3DDu8LbaSIj17V5lZokubcVVjvEpD/iey1dK6nEOO2/8xY/77OU7BntVZ9b418PlPmMPNJKWdOfBIw0HHwFUdR6c54DuF9IPQZ9hi/RtmAePrNtbR+801vI59K2Fn5IqAajV8qw0NoWYBf9iTNHApWTicwATApMPSWe+AwcryLIiDY9vMxQX6wEvDHRjealhACFAAe95rztKEfNqEeruN4qzU4xEYoJOxpHyhwFdkb90yoIJ9TgijImnavNCsZw4GvIiMBHWSUphaYFdOuE3b7kgxqBuiwRD76B5r7+JSUYrflCxdsaZV
X-Microsoft-Exchange-Diagnostics: 1; BN6PR0101MB2947; 6:vV8TjKGnxLXH0v303u+aKGnUQNRFgg4C910UeUCEeFrNGP10b+RjypT+Q9XRBWuG8p6LvYRzWpowzi8ohLJt1XKizBJA+GBv1WfzyCnr4Qf2Jg4pWEwKY11X/OQ1QQIPBhYKgHKcMD5vprnWU1JUgRDB+LJesKcBx4Q1UCl7sUwMhC1fitum4MLlEJ5kbUcFI+NtT95KT2HuIuzF/XcE+NblKek4LZPk1Nm3tPeEACrYTrUfF7gFFMXXQVeTKVSldiakznmk2tdt/di7Kk3AqgWYG4Ksd50rnZvqb2HXzcZEBsEHfHNoNjuRPmffEhfoiS+d+mShDujFrV29MqMOhdyM5z6ztXCKM+7d22QS/RTDlg/flYWwwKU0lefh4YukBqPyPzkl+IlB9uDsF4uL0Ho1Y9Va3bLizf7XrTL6lfpdnAHMWgu2brbkBkNBeVGMrCJ03k6JAturWZUlMu1Jzg==; 5:gAJGpYpkHHTrThNFScSvsMSey2/K/GqLamsVCPjttVHc8KxlmX3HNS7Q3as6V13rRA267bfome9hkgmRly8wN5TuMfwaeV0whjjJWmQ9gcaVJ4MsSV+h6VrYAHhlzDBOomtbec2NvFp7+sd0nM0L7eqqg8Zm7/r+tS3tNnQv4Ac=; 7:vs8eUfxKyuHYFcQIxR7v0+usnk7m+UiJFUailHcMeitHkcPprfNTByU7YHF9gNWdkTSXjsE7NkdtAgp17JeIpJEO8KVGCX2TqzEA9W9yYSBO+XgALLMifuJPTXEoqlgQPOktqGQZzPu/I+dDRtcP1A==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Dec 2018 00:30:07.8502 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 963da21a-bac7-4204-1725-08d66dedf3dd
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11];  Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR0101MB2947
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/9buj14VpmEkYgWMNxgY_Ib3eJXA>
Subject: Re: [Netconf] Benjamin Kaduk's Discuss on draft-ietf-netconf-zerotouch-25: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 30 Dec 2018 00:30:16 -0000

Hi Kent,

Now that I'm mostly back from vacation+holidays, let's get back to this...

On Sat, Dec 08, 2018 at 02:46:11AM +0000, Kent Watsen wrote:
> Hi Benjamin,
> 
> Thanks for your review!  See below for responses.
> 
> It took me quite some time to compose this response; I can only imagine
> how long it took you to compose your message.
> 
> For when I write "Fixed", or otherwise indicate a change has been made,
> unless stated otherwise, I mean to say that the changes are in my local
> copy (not yet in a published update).

Understood.

> Kent // author
> 
> 
> 
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > First off, thanks for this clear and considered document and design; it
> > really lays out the scenario of applicability and the functionality quite
> > well.  I just have a couple lingering places that we might want to nail
> > down a little bit tighter...
> >
> > (1) SSH key formats
> >
> > The module in Section 7.3 says:
> >
> >           leaf-list ssh-host-key {
> >             type binary;
> >             description
> >               "The binary public key data for this SSH key, as
> >                specified by RFC 4253, Section 6.6, i.e.:
> >
> >                  string    certificate or public key format
> >                            identifier
> >                  byte[n]   key/certificate data.";
> >             reference
> >               "RFC 4253: The Secure Shell (SSH) Transport Layer
> >                          Protocol";
> >
> > but RFC 4523 Section 6.6 says:
> >
> >   The key type MUST always be explicitly known (from algorithm
> >   negotiation or some other source).  It is not normally included in
> >   the key blob.
> >
> >   Certificates and public keys are encoded as follows:
> >
> >      string    certificate or public key format identifier
> >      byte[n]   key/certificate data
> >
> > How is the key type known for the SZTP usage?
> 
> Good catch.  The fix here is to mimic RFC7317's "authorized-key" list.
> That is, convert "ssh-host-key" from a "leaf-list" to a "list"
> containing the extra "algorithm" node.  This fix is here:
> 
> https://github.com/netconf-wg/zero-touch/commit/7a33c418f733aebcd95f2c91c4e9abbccfd362e4

Sounds good.

> 
> 
> 
> > (2) Privilege escalation by design
> >
> > There's text in Section 2.1 (and, really, throughout) that indicates that
> > a device being bootstrapped should allow a trusted bootstrap server to
> > behave as (i.e., supply) a trust anchor for verifying a different service.
> > In some sense this is elevating an EE cert to a CA cert, and I had hoped
> > to see some discussion of this escalation in the security considerations.
> > (Same for the owner cert, though there's a stronger argument that the 
> > owner should be considered fully privileged here.)
> 
> Correct, "redirect information" from a trusted source should contain a
> trust-anchor certificate (actually, a CMS containing a chain of certs).
> 
> Yes, the device's trust in a TLS trust anchor cert (e.g., provided via the
> manufacturing process) is used to trust the EE cert for a bootstrap 
> server that returns a new trust anchor cert, enabling the device to 
> pin the new TA cert for subsequent EE cert validation.  
> 
> This is similar to a CA in that a chain of trusted certs is formed, but
> it isn't quite like a CA cert, in that the EE cert doesn't itself sign
> the new TA cert; it only signs that transport used to convey the TA cert.
> 
> Regarding the owner cert being similar, I think you mean that the 
> ownership voucher [RFC 8366] is similar, which is true.  In this case,
> the device's trust in a trust anchor for voucher-signing certs (e.g., 
> provided via the manufacturing process) is used to trust a specific
> signing cert for a voucher, which encodes a new trust anchor cert 
> (the 'pinned-domain-cert'), which is, in fact, the issuing CA for
> the owner certificate.
> 
> Okay, so we have these two things.  In both cases, trust anchors are 
> conveyed via trusted mechanisms.  Do you want me to add a Security
> Consideration saying this?  
> 
> I somehow thought this concept was fairly common, is it not done 
> elsewhere?

It is fairly common, but it is probably still worth describing the security
properties of the protocol exchanges, here.  (In that a compromise of the
initial interaction can result in compromise of all subsequent
interactions, just as for trust-on-first-use.)

> 
> 
> 
> > (3) Nonce length
> >
> > Section 7.3 describes the nonce leaf:
> >
> >         leaf nonce {
> >           type binary {
> >             length "8..32";
> >
> > There is probably some discussion to be had about the minimum nonce
> > length (not necessarily in the document itself).  Do you have a 
> > pointer handy to previous disucsions or do we need to have it now?
> > (I do see that this is just following RFC 8366, so hopefully this
> > is an easy question.)
> 
> 
> I sent email to my RFC 8366 co-authors, as they were behind setting
> this min nonce length.  I have yet to hear back from them, but will
> let you know when I do.

[covered in separate thread]

> 
> 
> 
> > (4) OPTION_V4_ZEROTOUCH_REDIRECT repeated instances
> >
> > (In Section 8.1.)
> >
> > I think I may just be misunderstanding things here, but aren't
> >
> >   As the list of URIs may exceed the maximum allowed length of a single
> >   DHCPv4 option (255 octets), the client MUST implement [RFC3396],
> >   allowing the URI list to be split across a number of
> >   OPTION_V4_ZEROTOUCH_REDIRECT option instances.
> >
> > and
> >
> >   The DHCPv4 server MAY include a single instance of Option
> >   OPTION_V4_ZEROTOUCH_REDIRECT in DHCP messages it sends.  Servers MUST
> >   NOT send more than one instance of the OPTION_V4_ZEROTOUCH_REDIRECT
> >   option.
> >
> > in conflict about sending more than one instance of
> > OPTION_V4_ZEROTOUCH_REDIRECT?
> 
> Yes, these statements appear to be contradictory.  I asked my co-author,
> Ian Farrer, our local DHCP expert, to answer this question.  I think some
> word-smithing is needed to convey that a "singleton" option may be split
> into pieces.

If memory serves, this was resolved in a different AD's ballot thread.

> 
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Should we consider recommending AuthEnvelopedData throughout instead
> > of just EnvelopedData?
> 
> I don't think this is necessary as 1) the decrypted data can be tested
> to be a well-formed CMS and 2) using SZTP to cause the device to act as a
> decryption oracle doesn't work well, if at all, as the decrypted text
> isn't subsequently made available.
> 

I'm not sure that (2) is relevant, but (1) and being a SignedData ought to
be enough.  Thanks for thinking it through with me.

> 
> > TLS and CMS are probably good enough about adding context in their
> > signatures (well, provided modern versions are used) that we don't
> > get too much heartburn about reusing the same key directly for both
> > zerotouch [artifact] decryption and TLS client certificates, but 
> > it's generally the sort of thing that we frown upon.
> 
> Understood, which is why the last paragraph of Section 3.4 (Artifact
> Encryption) says "This [encryption] certificate MAY be the same as 
> the TLS-level client certificate the device uses when connecting to
> bootstrap servers.".  The draft is going out of its way to say that
> this is okay.  This is necessary, in part, because devices tend to
> have only a single IDevID certificate, and hence it tends to be used
> for both digitalSignature (for when used as a TLS client cert) and
> keyEncipherment (for decrypting the zerotouch artifacts).  The draft
> also leaves open the possibility to use distinct certificates for
> each purpose.  Perhaps a Security Consideration for this would be
> good?  [But given that these are distinct/separate uses, with no
> leakage between (AFAICT), then maybe not needed?]

I would suggest (recalling that this is a non-blocking comment) adding some
text that this does allow for reuse of the private key to make different
types of signatures, but there are not any known ways to cause a signature
made in one context to be (mis)interpreted as valid in the other.

> 
> 
> > I a little bit wonder if we want references for TLS and/or HTTP client
> > authentication.  Section 2.5 of RFC 8040 might be enough (though it is
> > of course not citing TLS 1.3).
> 
> This draft's use of TLS and HTTP authentication is exclusively for
> RESTCONF (RFC 8040).   I'm generally hoping to just reference that
> RFC and let it speak for itself.
> 
> Correct, RFC 8040 does not cite TLS 1.3 explicitly, though TLS 1.3 is
> allowed, as Section 2.1 says:
> 
>    RESTCONF does not require a specific version of HTTP.  However, it 
>    is RECOMMENDED that at least HTTP/1.1 [RFC7230] be supported by all
>    implementations.
> 
> BTW, does this comment regard Section 9.6?  

Section 9.6 is about making sure the client does not send sensitive data to
an unauthenticated server, which is not limited to the data in the
certifcate; my comment here is more about the mechanics of the client
authenticating itself to a server for the server to make authorization
decisions (admittedly, I did not mention "authorization" prior to now, so
my apologies for being unclear).  Client authentication is mentioned
directly or in passing in at least sections 5.1 (which does mention Section
2.5 of RFC 8040 already) and 5.3 (ditto), as well as 9.6.

> 
> 
> > (Are there generic RESTCONF internationalization considerations?
> > I see 8040 say "just use UTF-8", but is more needed?)
> 
> I'm not aware of any problems here.  No RFC 8040 errata has been filed.
> Is there something in particular you're thinking about?

Nothing in particular, no.  

> 
> 
> > Section 1.2
> >
> >   Network Management System (NMS):  The acronym "NMS" is used
> >       throughout this document to refer to the deployment specific
> >
> > nit: deployment-specific (with hyphen)
> 
> Fixed (as well as the instance in Section C.2)
> 
> 
> 
> > Section 2.1
> >
> > Does RFC 8340 require a "ro" (or similar) to appear in the tree
> > diagram? (Both here and in §2.2.)
> 
> No, because these are "yang-data" structures.
> https://tools.ietf.org/html/rfc8340#section-2.3.

Ah, thanks for the pointer -- learn something every day.

> 
> 
> > Section 3.2
> >
> > Do we want to impose any ordering requirements on the certificate
> > chain (e.g., owner cert must come first, each cert SHOULD certify
> > the one immediately prior to it, etc.)?
> 
> The owner certificate is encoded using a CMS SignedData structure.
> SignedData is defined in RFC 5652, 5.1.  The "certificates" field
> is of type "CertificateSet", defined in Section 10.2.3 as a "SET OF",
> which is defined in ASN.1 as an unordered collection.  So, ordering
> is not possible.

Okay.

> 
> 
> > Section 3.4
> >
> > Thank you for including the motivating text about sign-then-encrypt.
> > I do wonder if it's worth saying anything about why the well-publicized
> > security risks of mac-then-encrypt do not apply.  (The authors of
> > draft-campbell-sip-messaging-smime probably already have some text
> > that could be used, but it doesn't seem to be in the public view yet.)
> 
> Are you referring to the padding oracle attack?  As mentioned above, the

Right.

> solution presented in this document doesn't lend the device to being a
> very good decryption oracle.  I suppose the fix would be to add to this
> section (or the Security Considerations section?) something like:
> 
>   This document specifies the encryption of signed objects, as opposed
>   to the signing of encrypted objects, as might be expected given well-
>   publicized oracle attacks (e.g., the padding oracle attack).  This
>   document does not view such attacks as being feasible in the context
>   of the solution because i) the decrypted text never leaves the device
>   and ii) the solution does not differentiate between a "bootstrap-error"
>   cause by a decryption failure versus a failure occurring when parsing
>   the decrypted text.

That works for me, thanks.  (But feel free to leave it out if you don't
think it's adding value, too.)

> 
> 
> > Section 4.1
> >
> > Mounting all filesystems found on removable devices can be a security
> > risk, with intentionally malformed filesystem images causing system
> > compromise in some cases.
> 
> Is the concern the mounting of *all* or *any* filesystems?  It seems 
> that even if there were just one filesystem, it could be intentionally
> malformed.  Are you hoping to see a Security Consideration for this?

The concern was any, thanks for figuring out what I meant.
Thinking about this again after the long gap, it seems a pretty generic
consideration, so it's unclear that Security Considerations text in this
document specifically would be particularly helpful.

> 
> 
> > Section 4.2
> >
> > I agree with Adam about registering "zerotouch" (and the name is
> > perhaps overly generic?).
> >
> > I'm also not sure I properly understand the "zt-info"/zt-* TXT
> > records' usage; would they need to be registered akin to
> > draft-moonesamy-dnsop-special-use-label-registry?
> 
> First, regarding the term "zerotouch" being perhaps overly generic,
> I have somewhat felt this way for a while.  One thing that could be
> done fairly easily is to more the bulk of the "zerotouch" references
> to "sztp", the acronym given throughout.  Admittedly, what SZTP
> stands for isn't tremendously better, but I think that it is
> generally better than just "zerotouch".  Thoughts?

SZTP does seem better than just "zerotouch" to me, all things considered.

> Second, I am not a DNS expert, do you know who we can discuss
> such things with?  That said, I guess our idea was to use TXT
> records like RFC 1464, where the TXT value itself has the form
> "<attribute name>=<attribute value>", in which case it doesn't
> seem to need IANA registration?

Please correct me if I'm wrong, but I think this issue was already covered
in a different AD's ballot thread.

That said, the addition of <serial number>._zerotouch.fqdn in the -26 seems
to indicate that mention of draft-ietf-dnsop-attrleaf is appropriate, if I
remember correctly how that works.

> 
> 
> > Section 5.3
> >
> > This is the first time we talk about "serial number" as device identity;
> > maybe a forward-reference is in order?
> 
> I'm unsure what the forward reference would be to.  However, I think that
> we could add "serial number" to Section 5.1 (Initial State), as a new
> first item in the <read-only storage> box.  Would that be better?

It looks like -26 added some text relating "serial number" and "device
identity [certificate]", so let's call this OBE.

> 
> > Does the device have any reason to track whether the incoming artifact is
> > encrypted (whether at the CMS layer or the transport layer)?  I can't think
> > of one, but sometimes this is useful information in other settings.
> 
> I also cannot think of a reason.  That the incoming CMS is encrypted has
> no bearing on device's processing logic.  This is expected, given that the
> device's public key is, well, public, and therefore access to it has no
> special meaning.  Note that encryption here is used to ensure privacy, as
> only the device can decrypt/access the data.

Agreed.

> 
> >   If the zero touch information artifact contains onboarding
> >   information, and trust-state is FALSE, the device MUST exit the
> >   recursive algorithm (as this is not allowed, see the figure above),
> >   returning to the bootstrapping sequence described in Section 5.2.
> >   Otherwise, the device MUST attempt to process the onboarding
> >   information as described in Section 5.6.  In either case, success or
> >   failure, the device MUST exit the recursive algorithm, returning to
> >   the bootstrapping sequence described in Section 5.2, the only
> >   difference being in how it responds to the "Able to bootstrap from
> >   any source?" conditional described in the figure in the section.
> >
> > Does this "either case" refer to just the processing of onboarding
> > information, or the exit vs. attempt to process cases?  (I assume the
> > former, but perhaps some editorial work is in order.)
> 
> Your intuition is correct :)   How about this:
> 
>   OLD:
>     In either case, success or failure, ...
> 
>   NEW:
>     Whether the processing of the onboarding information succeeds
>     or fails, ...

SGTM :)

> 
> 
> 
> >   If the zero touch information artifact is signed, and the device is
> >   able to validate the signed data using the algorithm described in
> >   Section 5.4, then the device MUST set trust-state to TRUE; otherwise,
> >   if the device is unable to validate the signed data, the device MUST
> >   set trust-state to FALSE.  Note, this is worded to cover the special
> >   case when signed data is returned even from a trusted bootstrap
> >   server.
> >
> > Having read Section 5.4, I'm still unsure where the special handling
> > for this special case is described.
> 
> There is no special handling per se but, the point that is trying 
> (perhaps ineffectually) is that, if signed-data is received from a
> trusted-source, validating the signature is all that matters, that
> the source was trusted becomes irrelevant to being able to validate
> the data.  Makes sense now?  Does it need to be reworded?

It does make sense now, and I don't think it needs to be reworded -- thanks
for the extra explanation.  (I was mostly concerned that there was a
special case that I wasn't finding in the text, but the existing text
describes exactly what to do, so it's alll good.)

> 
> 
> > Section 5.5
> >
> >   Processing redirect information is straightforward, the device
> >   sequentially steps through the list of provided bootstrap servers
> >   until it can find one it can bootstrap from.
> >
> > nit: I think this is a comma splice.
> 
> Changed to a semicolon.
> 
> 
> 
> > Section 5.6
> >                                                Regardless the
> >   reporting-level indicated by the bootstrap server, the device MAY
> >   send progress reports beyond the mandatory ones specified for the
> >   given reporting level.
> >
> > nit: "Regardless of"
> 
> Fixed.
> 
> 
> 
> >   When the onboarding information is obtained from an untrusted
> >   bootstrap server, the device MUST NOT send any progress reports to
> >   the bootstrap server.
> >
> > I'm not sure if I would want a parenthetical "(that is, the onboarding
> > information was authenticated at the CMS layer)", but I would think about
> > adding one.
> 
> How about postpending:
> 
>   ", even though the onboarding information must have been signed and
>    authenticated.  Please be aware that bootstrap servers are recommended,
>    in the last paragraph of Section 9.6, to promote untrusted connections
>    to trusted connections so as, in part, to be able to collect progress
>    reports from devices."
> 
> Too wordy, or just right?

I am prone to being too wordy myself, but that seems just right to me.

> 
> 
> >   The device MUST parse the provided onboarding information document,
> >   to extract values used in subsequent steps.  Whether using a stream-
> >   based parser or not, if there is an error when parsing the onboarding
> >
> > This line makes me consider the scenario where a stream-based parser is
> > used with a trusted bootstrap server and no CMS-layer signature.  At the
> > TLS layer, a truncation attack by the network is possible, and if
> > truncation is not detectable at the application layer, the device could end
> > up misconfigured with neither party aware (unless there's an additional
> > response or something that I'm forgetting about).  I think that for the XML
> > and JSON formats we know and love, truncation would make for a malformed
> > stream due to the outermost scope container, but please correct me if I'm
> > wrong.  There are probably some security considerations to mention w.r.t.
> > any future new encodings of this data model, though.
> 
> The steps are roughly: 
>   a) HTTPS GET an XML/JSON document (the get-bootstrapping-data" response).
>   b) extract the CMS-based artifacts from the XML/JSON document.
>   c) if encrypted, decrypt.
>   d) if signed, authenticate.
>   e) extract the onboarding-information (another XML/JSON doc) from the CMS artifact.
>   f) process the onboarding-information XML/JSON doc
> 
> So here we're at step (f), where the text mentions the possible use of a
> stream parser.  This is rather long after step (a), where TLS truncation
> may occur and, presumably caught in step (b).  This is by way of saying
> that I don't think this is an issue, but interested to hear your response.
> 
> FWIW, the point of this "stream-based parser" comment is to highlight
> that, unlike most all the other progress-types, which seem to reflect
> a serial processing of the steps, the parsing may either be a distinct
> step (e.g., a DOM-based parser) or something that is splayed across all
> the other steps (a stream-based parsed).  In the first case, the all
> the "parsing-*" progress reports (including any parsing-error report)
> are expected to be transmitted before any, e.g., boot-image-* reports
> are sent; whereas, in the second case, the parsing-* reports can be
> intermixed.
> 
> I don't think there is a TLS concern, but perhaps the paragraph needs
> to be reworded?

I think your understanding basically matches mine; I tried to include in my
remark that it would only possibly apply to the case where the predicates
for (c) and (d) are false.  I just plain don't know whether (a)/(b) will
choke if the GET response is an incomplete XML/JSON document.  If it
properly errors out, then there's no concern here, and we should just move
on.  In any case, even if there was an issue, this paragraph would not
really be the place to talk about it -- my comment is only located here
because this is where we start talking about stream-based parsers.  The
errors in question are not necessarily those generated by the stream-based
parser, but can also include those generated at earlier steps.

> 
> 
> >      *  Most steps are atomic.  For instance, when a commit fails, it
> >         is expected to have no impact on the configuration.  Similarly,
> >         if the error occurs when executing a script, the script will
> >         gracefully exit.
> >
> > As a reader it's hard to tell if this is giving guidance to script
> > authors or consumers.
> 
> Is this better?
> 
>    Most steps are atomic.  For example, the processing a configuration
>    is specified as atomic above, and the processing of scripts are
>    similarly atomic, as specified in the "ietf-zerotouch-information"
>    YANG module.

Yes, thanks.  (I think the -26 lost both "of"s, though?)

> 
> 
> > Section 6.2
> >
> > "base64encodedvalue==" is pretty cute, though maybe we could add some
> > trailing numbers to provide different values for the different fields?
> 
> The issue here is that the example documents must be valid (fwiw, they
> are tested each time `xml2rfc` is run).  Previous versions of this 
> document included compete base64 encoding of the real objects, but 
> people complained that it greatly distracted from readability.  To
> address this, the WG agreed to use "base64encodedvalue==" in examples
> to represent YANG "binary" data.
> 
> Is it okay to leave this as is?

This is a non-blocking comment, so by definition my answer is "yes" :)
I mostly just wanted to point out that the examples use the same literal
string to fill in for many different data types -- I agree with not using
"real" examples since they're bulky and not readable in encoded form, but
was just wondering if we could use different short strings to represent
semantically different objects.

> 
> > Section 6.3
> >
> > The YANG module boilerplate is still on the RFC 2119 version of BCP 14
> > (not RFC 8174).
> 
> Fixed. Now both YANG modules read:
> 
>     The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
>     "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", 
>     "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document
>     are to be interpreted as described in BCP 14 [RFC2119]
>     [RFC8174] when, and only when, they appear in all
>     capitals, as shown here.
> 
> 
> 
> > Section 7.2
> >
> > If we're going to say "and receives signed data in the response", maybe we
> > could actually give an example that shows the (base64'd) CMS structure that
> > corresponds to the signature?  Not necessarily the whole payload, but
> > enough to see the outer structure at least...
> 
> See previous response regarding "base64encodedvalue==".  It's tricky
> business.  That said, in a separate "expert review" response from Russ
> Housley, we were thinking to add an appendix section containing all
> the possible ASN.1 structures.  For instance:
> 
>   X. ASN.1 for Various Artifacts
>   X.1. Zero Touch Information
>   X.2. Signed Zero Touch Information
>   X.3. Encrypted and Signed Zero Touch Information
>   X.4. Owner Certificate
>   X.5. Encrypted Owner Certificate
>   X.6. Ownership Voucher
>   X.7. Encrypted Ownership Voucher
> 
> Would this bridge the gap for you?

That would help a lot, thanks!

> 
> 
> > Section 7.3
> >
> > The YANG module boilerplate is still on the RFC 2119 version of
> > BCP 14 (not RFC 8174).
> 
> Yep, fixed along with the fix to the other YANG module.
> 
> 
> 
> >             enum "boot-image-installed-rebooting" {
> >               description
> >                 "Indicates that the device successfully installed
> >                  a new boot image and is about to reboot.  After
> >                  sending this progress type, the device is not
> >                  expected to access the bootstrap server again.";
> >
> > Is this just scoped to the current connection/session?
> > (As opposed to "bootstrap-complete", which probably is a global statement.)
> 
> Yes, just the current scope. how about the following? - or should the last
> sentence be left off?
> 
>               "Indicates that the device successfully installed
>                a new boot image and is about to reboot.  After
>                sending this progress type, the device is not
>                expected to access the bootstrap server again
>                for this bootrapping attempt.  The device may
>                access this bootstrap server after rebooting
>                and restarting the zerotouch bootstrapping
>                process.";

Probably the last sentence is not adding anything useful.

> 
> 
> >   container trust-anchor-certs {
> >   [...]
> >               The CMS MUST contain only a single chain of
> >               certificates.  The device's end-entity certificate
> >               MUST only authenticate to the last intermediate CA
> >               certificate listed in the chain.
> >
> > I'm not sure whether "authenticate to" means that the CA cert directly
> > certifies or is the trust anchor.  Could we maybe use language like
> > "directly certifies the [next|previous]" certificate?
> 
> This text is trying to say that the "last certificate" is the issuer of
> the device's end-entity certificate.  More generally, it's trying to say
> that there are no superfluous certificates in the CMS.  Perhaps:
> 
> NEW:
>                The CMS MUST contain only a single chain of
>                certificates.  The last certificate in the chain
>                MUST be the issuer for the the device's end-entity 
>                certificate.

That looks wonderful, thanks.

> 
> 
> > Also, the split of references of RFC 6187 for trust-anchor-certs but RFCs
> > 5280 and 5652 for trust-anchor-cert seems unusual, since potentially all
> > three would be relevant for both nodes, if I understand correctly.
> 
> True, but my general goal is to have the "reference" statements support
> the "description" statements.  So, in this case, the parent node mentions
> RFC 6187, hence I put the "reference" for it there.  Does it still seem
> unusual to you?

Less so; thanks for the explanation :)

> 
> 
> > Section 9.1
> >
> > At this point draft-ietf-ntp-using-nts-for-ntp exists, though I don't know
> > whether it's appropriate to be citing it yet.
> 
> How about tacking on this last sentence, and list ietf-ntp-using-nts-for-ntp
> as an Informative reference?
>  
>           Implementations SHOULD NOT rely on NTP for time, as
>           NTP is not a secure protocol at this time.  Note, there
>           is an IETF work-in-progress to secure NTP
>           <xref target="I-D.ietf-ntp-using-nts-for-ntp"/>.

SGTM.

> 
> 
> > Section 9.6
> >
> > There is perhaps some room for discussion of the consequences of the device
> > telling the bootstrapping server whether the device thinks the connection
> > is trusted, in that it gives an attacker information about the target.
> > (Granted, it does not seem like much information, but it might be cleaner
> > to define the semantics of the node as being whether the client would like
> > the server to sign its responses at the application layer, which need not
> > have complete overlap with whether the client considers the server to be
> > trusted.
> 
> Hmmm, I agree with the optics.  Perhaps we could change it to "signed-data-
> preferred"?  Keep in mind that signed-data isn't required, as it would be
> okay for the server to return unsigned redirect information.  It's only if
> the data is onboarding information that it would need to be signed.

That works for me.  (It doesn't seem like a big deal either way, of
course.)

> 
> 
> > Section 9.8
> >
> > Does recommending frequent private key refreshes actually help in
> > environments where revocation is unusable (i.e., by virtue of not having
> > reliable time)?  (If not, perhaps that caveat should be more explicit here,
> > even though it is mentioned in Section 9.1 already.)
> 
> Good catch.  How about adding the last two lines below?
>  
>           Bootstrap server administrators are RECOMMENDED to follow best
>           practice to protect the private key used for any online operation.
>           Use of a hardware security module (HSM) is RECOMMENDED.  If an 
>           HSM is not used, frequent private key refreshes are RECOMMENDED,
>           assuming all bootstrapping devices have an accurate clock (see
>           <xref target="clock-sens"/>).

SGTM.

> 
> 
> > Section 9.10
> >
> > I would suggest also mentioning the (lack of) mitigations possible if the
> > operator does not trust all the pre-configured authorities designated by
> > the manufacturers.
> 
> How about adding the last sentence below?
> 
>           Operators should be aware that this system assumes that they trust
>           all the pre-configured bootstrap servers and voucher signing authorities
>           designated by the manufacturers.  While operators may use points in
>           the network to block access to the well-known bootstrap servers, 
>           operators cannot prevent voucher signing authorities from generating
>           vouchers for their devices.

Perfect :)

> 
> > Section 9.11
> >
> >      revealing (e.g., network topology, firewall policies, etc.).  It
> >      is RECOMMENDED that operators encrypt the bootstrapping data when
> >      its contents are considered sensitive, even to the administrators
> >      of a bootstrap server.
> >
> > I don't understand what is meant by "even to the administrators of a
> > bootstrap server"?
> 
> Here I'm thinking that the bootstrap server may be hosted by a 3rd-party,
> or another group within the operator's organization.  For example, the
> NOC generates the artifacts, but IT admins the bootstrap server boxes.
> 
> Any need for an update to this text?

Even given the above clarification, I'm still having a hard time not
reading the current text as saying that the administrators of the bootstrap
server are making the determination that content is considered sensitive.
Maybe "even with respect to distribution to the administrators of a
bootstrap server" or "even to the point of hiding it from the
administrators of a bootstrap server"?

> 
> 
> > Section 9.12
> >
> > nit: the last word is "revoked".
> 
> Fixed.
> 
> 
> 
> > Section 9.13
> >
> >   Implementations should be aware that signed bootstrapping data only
> >   protects the data from modification, the contents are still visible
> >   to others.  [...]
> >
> > nit: this is a comma splice
> 
> Fixed.
> 
> 
> >                                                         This
> >   information should be considered sensitive and precautions should be
> >   taken to protect it (e.g., encrypt artifact with device public key).
> >
> > nit: I think it's more conventional to "encrypt to" a public key than
> > "encrypt with" one.
> 
> How about "encrypt the artifact using the device's public key"?

Sure.

> 
> 
> 
> > Section C.3
> >
> > We could perhaps recommend ecdsa-sha2-* keys instead of ssh-rsa keys.
> 
> Replaced "ssh-rsa key" with "SSH public key"

Even better

> 
> 
> 
> >   4.  Otherwise, if redirect information is found, the device iterates
> >       through the list of specified bootstrap servers, checking to see
> >       if it has bootstrapping data for the device.  [...]
> >
> > The "it" is perhaps ambiguous; I would suggest "each server in turn".
> 
> Replaced "it" with "bootstrap server"

Sure.

Thanks!

-Benjamin


From nobody Mon Dec 31 02:22:34 2018
Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 261611277D2 for <netconf@ietfa.amsl.com>; Mon, 31 Dec 2018 02:22:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.195
X-Spam-Level: ***
X-Spam-Status: No, score=3.195 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RATWARE_OUTLOOK_NONAME=2.95, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oz_wiPZaszF2 for <netconf@ietfa.amsl.com>; Mon, 31 Dec 2018 02:22:30 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70122.outbound.protection.outlook.com [40.107.7.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B482B127B4C for <netconf@ietf.org>; Mon, 31 Dec 2018 02:22:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=R95t5Kxbv/3MgFM4aU9KjlkgZdnDfdTTFF5UGGyfELc=; b=hJaKPgZukEnj0/m4zsIRxmNicmfYNKqXTOsQPDA+j+K/VHY9k3r3LWtcbknZWflVs6ZeW8vdCH34VW2FzfAGFTJOZznmZq8/Cc+x6lra+MkQS62JN7fqEGTF3yJWYwjQ4n/eGzN9Rvf56PFhusiBi8mOtrFTz8I55hVNmPc0pGQ=
Received: from AM0PR07MB5506.eurprd07.prod.outlook.com (20.178.23.17) by AM0PR07MB6066.eurprd07.prod.outlook.com (20.178.112.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1471.13; Mon, 31 Dec 2018 10:22:26 +0000
Received: from AM0PR07MB5506.eurprd07.prod.outlook.com ([fe80::30d7:2d62:cf50:fb2a]) by AM0PR07MB5506.eurprd07.prod.outlook.com ([fe80::30d7:2d62:cf50:fb2a%2]) with mapi id 15.20.1495.005; Mon, 31 Dec 2018 10:22:26 +0000
From: tom petch <ietfc@btconnect.com>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: I-D Action: draft-ietf-netconf-zerotouch-26.txt
Thread-Index: AQHUoPK5ZgNCAgppU0GXFk2D0UgSVg==
Date: Mon, 31 Dec 2018 10:22:26 +0000
Message-ID: <01be01d4a0f2$b013bb80$4001a8c0@gateway.2wire.net>
References: <154533196982.19062.13734868545043068788@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0286.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a1::34) To AM0PR07MB5506.eurprd07.prod.outlook.com (2603:10a6:208:103::17)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [86.139.215.184]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM0PR07MB6066; 6:705vm4l/TFGX9PFQXzrvd7QMRbuunJzusCU16YjBvHgItvjuGluiXEL9U4dAI3WJ+fGqOkx8hEU8mdhIv1V2xZnxxydjdv9puvXQC+gGEqUgv+++NX6lzRlrPv0ZlLeLBS6ohDbAFgfxXWdu+qR+28GmI6EWiJ58Rcbz70Lx5+FaLkbNUv7bMBatpRFbbgIxetI420u0SuQQKrxPkKPphFxKCcqZxz2z4yuhwf6M1J3qf7qEK2LQH4079AM5BDu58trduc5oRWEu8K5g1SMnvylNo1H4SSe9bGcqkNEEJN57R4j1wTiFq8DHrzGpSI/DnAK1J0xbmkej2FHfnHQeWN2JsgdXvziy8pLV0ow4Uy3XGYytoFWEkD5hGMlks+QIVYydmYfkjrwEqi7QwcqgZjqlJyTTpA+09y8qox714Emi87+DY5v/2S77b87QYXUqThfEColPPGPtzQ8FLRZN5w==; 5:GMBZN3xiiMPfBjRC3J06pIai5A5Qgxs31rj44hab+B1GG/QmD2mUVoCuTN5wvNFUR98yyZXdhXIOKSjk+dqIAXzXkC8RyDvO8o6H0GUY0V+w+RPB90A3zwOsVIb3gzthz6xyoIlFq3wa3R5FtsfSpSvoSybBmEb+wWXBq0fGMP8=; 7:VdDfz7tGcrYMO2Q7LsbquhaptmJH6lj5HvKFChmNNw7uqpr0VXrSAkaEwMMrGzzQiKP78GKuk4HxO5UUO57sEM1BDa6AMxyqYlfWWzCptxexaV+NPaButE/SdOM43OmnMof1cYAslC8pVyiVhRcLaw==
x-ms-office365-filtering-correlation-id: c67cc57c-98bd-4517-26bd-08d66f09dc51
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600109)(711020)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:AM0PR07MB6066; 
x-ms-traffictypediagnostic: AM0PR07MB6066:
x-microsoft-antispam-prvs: <AM0PR07MB6066B3B3CD8A3D23AEE7A9F2A0B20@AM0PR07MB6066.eurprd07.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(3230021)(908002)(999002)(5005026)(6040522)(8220055)(2401047)(8121501046)(10201501046)(93006095)(93001095)(3231475)(944501520)(4982022)(52105112)(3002001)(6055026)(6041310)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:AM0PR07MB6066; BCL:0; PCL:0; RULEID:; SRVR:AM0PR07MB6066; 
x-forefront-prvs: 0903DD1D85
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(396003)(366004)(39860400002)(136003)(189003)(199004)(13464003)(1556002)(966005)(229853002)(86152003)(105586002)(7736002)(1730700003)(81156014)(81166006)(8676002)(71200400001)(6306002)(84392002)(305945005)(186003)(6512007)(9686003)(6246003)(2906002)(2351001)(3846002)(5640700003)(6916009)(53936002)(14454004)(6116002)(68736007)(66574012)(71190400001)(106356001)(5660300001)(478600001)(33896004)(99286004)(25786009)(102836004)(6506007)(386003)(26005)(6436002)(97736004)(66066001)(2501003)(76176011)(52116002)(44736005)(6486002)(256004)(14496001)(14444005)(8936002)(86362001)(476003)(446003)(316002)(4001150100001)(486006); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR07MB6066; H:AM0PR07MB5506.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 4goIaziR492F9CnJrTTSohmni43K8nCGiQKhW7SwSMtUVxP2bczAuva8JejcKiZsVN+5IHEsvWReFWayceLEcdioB9hnyW84ubA1Ni9AP7EzJjzPCBLIS3hKgnisBcftW69d9fTdjaEyg1TFWRRHeKJOuvNNkD/hO0+iuPKfB5n3/U9JZvFT8ZBGskXzV8Ca1/74NWNUi1Ji5Q6jPMeUEDxmjlvGXgpFU/oqe79+09CX1jiJYftXJGEeXhvgKvVwqVMkwNK5FhXByPCWC9TEwOaZk8H9ToUdATwJoKqoRfR8MX+HkJi2vzmy9u3zW6CF
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <AE4BFF3A9948994DA75DCD14E5ABD196@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c67cc57c-98bd-4517-26bd-08d66f09dc51
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Dec 2018 10:22:26.4323 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB6066
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/8YOZffwiRT56h44E7b03pI27E3s>
Subject: Re: [Netconf] I-D Action: draft-ietf-netconf-zerotouch-26.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Dec 2018 10:22:32 -0000

Kent

You have added the reference to RFC8174 to the YANG modules but ...
it appears as [RFC8174] which to my eyes looks like a HTML/XML anchor
which will not work in a plain text YANG module.

Tom Petch

----- Original Message -----
From: <internet-drafts@ietf.org>
To: <i-d-announce@ietf.org>
Cc: <netconf@ietf.org>
Sent: Thursday, December 20, 2018 6:52 PM

>
> A New Internet-Draft is available from the on-line Internet-Drafts
directories.
> This draft is a work item of the Network Configuration WG of the IETF.
>
>         Title           : Zero Touch Provisioning for Networking
Devices
>         Authors         : Kent Watsen
>                           Mikael Abrahamsson
>                           Ian Farrer
> Filename        : draft-ietf-netconf-zerotouch-26.txt
> Pages           : 95
> Date            : 2018-12-20
>
> Abstract:
>    This draft presents a technique to securely provision a networking
>    device when it is booting in a factory-default state.  Variations
in
>    the solution enables it to be used on both public and private
>    networks.  The provisioning steps are able to update the boot
image,
>    commit an initial configuration, and execute arbitrary scripts to
>    address auxiliary needs.  The updated device is subsequently able
to
>    establish secure connections with other systems.  For instance, a
>    device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040)
>    connections with deployment-specific network management systems.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-netconf-zerotouch/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-netconf-zerotouch-26
> https://datatracker.ietf.org/doc/html/draft-ietf-netconf-zerotouch-26
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-netconf-zerotouch-26
>
>
> Please note that it may take a couple of minutes from the time of
submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> I-D-Announce mailing list
> I-D-Announce@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html
> or ftp://ftp.ietf.org/ietf/1shadow-sites.txt

