
From nobody Mon Jul  1 13:54:35 2019
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 75C5A1200EC; Mon,  1 Jul 2019 13:54:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FAl0xvjVwEcG; Mon,  1 Jul 2019 13:54:19 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C907C1200E7; Mon,  1 Jul 2019 13:54:19 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id E1B7EB81D7E; Mon,  1 Jul 2019 13:54:12 -0700 (PDT)
To: kent+ietf@watsen.net, andy@yumaworks.com, mbj@tail-f.com, kwatsen@juniper.net
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: warren@kumari.net, iesg@ietf.org, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20190701205412.E1B7EB81D7E@rfc-editor.org>
Date: Mon,  1 Jul 2019 13:54:12 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/HD65pWXEd3IO-LlCVDNTnPfE0No>
Subject: [netconf] [Errata Verified] RFC8040 (5756)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Jul 2019 20:54:22 -0000

The following errata report has been verified for RFC8040,
"RESTCONF Protocol". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid5756

--------------------------------------
Status: Verified
Type: Technical

Reported by: Kent Watsen <kent+ietf@watsen.net>
Date Reported: 2019-06-21
Verified by: Warren Kumari (Ops AD) (IESG)

Section: 8

Original Text
-------------
  module ietf-system {
    leaf system-reset {
      type empty;
    }
  }


Corrected Text
--------------
  module ietf-system {
    leaf system-restart {
      type empty;
    }
  }


Notes
-----
The section on page 84 discusses the "system-restart" RPC from RFC 7317, but the conceptual example has "system-reset".  Fix: s/system-reset/system-restart/.

--------------------------------------
RFC8040 (draft-ietf-netconf-restconf-18)
--------------------------------------
Title               : RESTCONF Protocol
Publication Date    : January 2017
Author(s)           : A. Bierman, M. Bjorklund, K. Watsen
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Tue Jul  2 15:06:16 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 48EC91200F6; Tue,  2 Jul 2019 15:06:14 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210517418.23891.4392044803285693636@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:06:14 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/CNW4r2Qfof2w9gu1qwXVdf5alLg>
Subject: [netconf] I-D Action: draft-ietf-netconf-crypto-types-10.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:06:15 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Common YANG Data Types for Cryptography
        Authors         : Kent Watsen
                          Wang Haiguang
	Filename        : draft-ietf-netconf-crypto-types-10.txt
	Pages           : 64
	Date            : 2019-07-02

Abstract:
   This document defines YANG identities, typedefs, the groupings useful
   for cryptographic applications.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-crypto-types/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-crypto-types-10
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-crypto-types-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-crypto-types-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:08:35 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ABD9F1200F6; Tue,  2 Jul 2019 15:08:25 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210530463.23806.3152842693101029131@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:08:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/xQ2iTMmieNtsZRZvRm1tNVBv0fc>
Subject: [netconf] I-D Action: draft-ietf-netconf-keystore-12.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:08:26 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : A YANG Data Model for a Keystore
        Author          : Kent Watsen
	Filename        : draft-ietf-netconf-keystore-12.txt
	Pages           : 34
	Date            : 2019-07-02

Abstract:
   This document defines a YANG 1.1 module called "ietf-keystore" that
   enables centralized configuration of both symmetric and asymmetric
   keys.  The secret value for both key types may be encrypted.
   Asymmetric keys may be associated with certificates.  Notifications
   are sent when certificates are about to expire.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-keystore/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-keystore-12
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-keystore-12

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-keystore-12


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:19:49 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C7B12012A; Tue,  2 Jul 2019 15:19:40 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210598051.23887.7100967939504483384@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:19:40 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/oT4CSCzy9RnQub_ppUNi53mZCew>
Subject: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-02.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:19:41 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : YANG Groupings for TCP Clients and TCP Servers
        Authors         : Kent Watsen
                          Michael Scharf
	Filename        : draft-ietf-netconf-tcp-client-server-02.txt
	Pages           : 18
	Date            : 2019-07-02

Abstract:
   This document defines three YANG modules: the first defines a
   grouping for configuring a generic TCP client, the second defines a
   grouping for configuring a generic TCP server, and the third defines
   a grouping common to the TCP clients and TCP servers.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-tcp-client-server-02
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-tcp-client-server-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-tcp-client-server-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:20:16 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D94B12076D; Tue,  2 Jul 2019 15:20:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210600917.23977.12603500540583094323@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:20:09 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/F15WdMNn6Il3wkYyG_4zq0p1d20>
Subject: [netconf] I-D Action: draft-ietf-netconf-tls-client-server-14.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:20:15 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : YANG Groupings for TLS Clients and TLS Servers
        Authors         : Kent Watsen
                          Gary Wu
                          Liang Xia
	Filename        : draft-ietf-netconf-tls-client-server-14.txt
	Pages           : 45
	Date            : 2019-07-02

Abstract:
   This document defines three YANG modules: the first defines groupings
   for a generic TLS client, the second defines groupings for a generic
   TLS server, and the third defines common identities and groupings
   used by both the client and the server.  It is intended that these
   groupings will be used by applications using the TLS protocol.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-tls-client-server/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-tls-client-server-14
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-tls-client-server-14

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-tls-client-server-14


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:25:12 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 104F8120708; Tue,  2 Jul 2019 15:25:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210630501.23895.15102821078090932463@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:25:05 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/qgYi347x_qLhDxZ-nJwhn9aaGns>
Subject: [netconf] I-D Action: draft-ietf-netconf-netconf-client-server-14.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:25:05 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : NETCONF Client and Server Models
        Author          : Kent Watsen
	Filename        : draft-ietf-netconf-netconf-client-server-14.txt
	Pages           : 69
	Date            : 2019-07-02

Abstract:
   This document defines two YANG modules, one module to configure a
   NETCONF client and the other module to configure a NETCONF server.
   Both modules support both the SSH and TLS transport protocols, and
   support both standard NETCONF and NETCONF Call Home connections.

Editorial Note (To be removed by RFC Editor)

   This draft contains many placeholder values that need to be replaced
   with finalized values at the time of publication.  This note
   summarizes all of the substitutions that are needed.  No other RFC
   Editor instructions are specified elsewhere in this document.

   This document contains references to other drafts in progress, both
   in the Normative References section, as well as in body text
   throughout.  Please update the following references to reflect their
   final RFC assignments:

   o  I-D.ietf-netconf-keystore

   o  I-D.ietf-netconf-tcp-client-server

   o  I-D.ietf-netconf-ssh-client-server

   o  I-D.ietf-netconf-tls-client-server

   Artwork in this document contains shorthand references to drafts in
   progress.  Please apply the following replacements:

   o  "XXXX" --> the assigned RFC value for this draft

   o  "AAAA" --> the assigned RFC value for I-D.ietf-netconf-tcp-client-
      server

   o  "YYYY" --> the assigned RFC value for I-D.ietf-netconf-ssh-client-
      server

   o  "ZZZZ" --> the assigned RFC value for I-D.ietf-netconf-tls-client-
      server

   Artwork in this document contains placeholder values for the date of
   publication of this draft.  Please apply the following replacement:

   o  "2019-07-02" --> the publication date of this draft

   The following Appendix section is to be removed prior to publication:

   o  Appendix B.  Change Log


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-netconf-client-server/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-netconf-client-server-14
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-netconf-client-server-14

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-netconf-client-server-14


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:26:52 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 780AB12019C; Tue,  2 Jul 2019 15:26:50 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156210641045.23891.423069137101470577@ietfa.amsl.com>
Date: Tue, 02 Jul 2019 15:26:50 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Ifq772QzpVOpIA-j_uKFISaxPKQ>
Subject: [netconf] I-D Action: draft-ietf-netconf-restconf-client-server-14.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:26:50 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : RESTCONF Client and Server Models
        Author          : Kent Watsen
	Filename        : draft-ietf-netconf-restconf-client-server-14.txt
	Pages           : 60
	Date            : 2019-07-02

Abstract:
   This document defines two YANG modules, one module to configure a
   RESTCONF client and the other module to configure a RESTCONF server.
   Both modules support the TLS transport protocol with both standard
   RESTCONF and RESTCONF Call Home connections.

Editorial Note (To be removed by RFC Editor)

   This draft contains many placeholder values that need to be replaced
   with finalized values at the time of publication.  This note
   summarizes all of the substitutions that are needed.  No other RFC
   Editor instructions are specified elsewhere in this document.

   This document contains references to other drafts in progress, both
   in the Normative References section, as well as in body text
   throughout.  Please update the following references to reflect their
   final RFC assignments:

   o  I-D.ietf-netconf-keystore

   o  I-D.ietf-netconf-tcp-client-server

   o  I-D.ietf-netconf-tls-client-server

   o  I-D.ietf-netconf-http-client-server

   Artwork in this document contains shorthand references to drafts in
   progress.  Please apply the following replacements:

   o  "XXXX" --> the assigned RFC value for this draft

   o  "AAAA" --> the assigned RFC value for I-D.ietf-netconf-tcp-client-
      server

   o  "BBBB" --> the assigned RFC value for I-D.ietf-netconf-tls-client-
      server

   o  "CCCC" --> the assigned RFC value for I-D.ietf-netconf-http-
      client-server

   Artwork in this document contains placeholder values for the date of
   publication of this draft.  Please apply the following replacement:

   o  "2019-07-02" --> the publication date of this draft

   The following Appendix section is to be removed prior to publication:

   o  Appendix B.  Change Log


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-restconf-client-server/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-restconf-client-server-14
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-restconf-client-server-14

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-restconf-client-server-14


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Jul  2 15:45:28 2019
Return-Path: <0100016bb4dd3135-990ba9e7-c142-4b3b-8557-e618c168906c-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02EF0120106 for <netconf@ietfa.amsl.com>; Tue,  2 Jul 2019 15:45:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wAoBjwK4E6hL for <netconf@ietfa.amsl.com>; Tue,  2 Jul 2019 15:45:25 -0700 (PDT)
Received: from a8-33.smtp-out.amazonses.com (a8-33.smtp-out.amazonses.com [54.240.8.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E7D91200F6 for <netconf@ietf.org>; Tue,  2 Jul 2019 15:45:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562107523; h=From:Content-Type:Content-Transfer-Encoding:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=uz6wPB7JmwXW0iw/rnPjZa8+bJ6+x248SvzGlJj4IN4=; b=S+uuz4Cwg/haz0LTXrXw3c+dD2l94XEt323YAFD+dpGw5FWLAb2fNPrKkiGpQp3V qgTCXZFwQ8IGjr4/Qt7NWdZgJZ28zf7zVv8BSV/nIPqkoHMZokfLf3FDBXbTTjwBV+n mwylIMQgvgiLO1I3mtkDmuRuxpXcR0DoATBnMM/E=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Message-ID: <0100016bb4dd3135-990ba9e7-c142-4b3b-8557-e618c168906c-000000@email.amazonses.com>
Date: Tue, 2 Jul 2019 22:45:23 +0000
To: "netconf@ietf.org" <netconf@ietf.org>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.02-54.240.8.33
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/4AtE0xJ-JXA8Ulb0JiBzYJB8Ors>
Subject: [netconf] updates to client-server drafts
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:45:27 -0000

Following is a synopsis of the latest updates.


crypto-types:
    - only updates to the crypto algorithms were made.
    - we still have an open issues regarding how best to 
      present this (e.g., break up into iana-* modules)...

truststore:
    - no update

keystore:
    - Updated to reflect (previous version of) crypto-type
      draft's use of enumerations over identities.
    - Updated the keystore instance example to include
      a symmetric key (encrypted by an asymmetric key),
      and an asymmetric-key encrypted by a symmetric key.
    - Added examples for the 'generate-symmetric-key'
      and 'generate-asymmetric-key' RPCs.
    - Updated the Introduction section to reflect current
      feature set.

tcp-client-server:
    - Removed the 'external-endpoint-values' container
      from the TCP-server model (per co-author's request)

ssh-client-server:
    - no update

tls-client-server:
    -  Removed the "certificate" container from the 
       "client-identity" container in the ietf-tls-client
       module.
    -  Updated examples to reflect ietf-crypto-types change 
       (e.g., identities --> enumerations)

http-client-server:
    - no update

netconf-client-server:
    -  Adjusting from change in TLS client model (i.e., 
       removing the top-level 'certificate' container), by 
       swapping refining-in a 'mandatory true' statement with
       a 'must' statement outside the 'uses' statement.
    -  Updated examples to reflect ietf-crypto-types change 
       (e.g., identities --> enumerations)

restconf-client-server:
    -  Updated examples to reflect ietf-crypto-types change
       (e.g., identities --> enumerations)
    -  Adjusting from change in TLS client model (removing
       the top-level 'certificate' container).
    -  Added "external-endpoint" to the "http-listen" choice
       in ietf-restconf-server.


Kent // contributor




From nobody Tue Jul  2 15:53:52 2019
Return-Path: <0100016bb4e4e11b-6cbb1c43-dea2-4c3f-a908-4a9ecfc69589-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65893120128 for <netconf@ietfa.amsl.com>; Tue,  2 Jul 2019 15:53:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kbz-gRw_Hv9E for <netconf@ietfa.amsl.com>; Tue,  2 Jul 2019 15:53:48 -0700 (PDT)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB275120106 for <netconf@ietf.org>; Tue,  2 Jul 2019 15:53:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562108027; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=uT11wk5eZnDJVUyMZG6xLZBDNvDQNZYJayDJ42eonRY=; b=I3nT5htTDQbtwPC5Jhsomh5ZzDaLcos1v9rdm58JrXwD465fv+k0WcNlhHrtJV68 Yjqp/YnQoasgIZrEzYrqg05lFomLa9gur67z/ZmKe3QgSIxEIpxD8wfgSHGI7iZpqMZ tb6DKvfUyBavg5EH/YhWI5nfVsr3mRWMD7If/M8Y=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016bb4e4e11b-6cbb1c43-dea2-4c3f-a908-4a9ecfc69589-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_767B268A-7FDA-4EB0-A9F3-0CD6D1BD83DE"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 2 Jul 2019 22:53:47 +0000
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA49BA5A2@nkgeml513-mbx.china.huawei.com>
Cc: Martin Bjorklund <mbj@tail-f.com>, "netconf@ietf.org" <netconf@ietf.org>
To: Qin Wu <bill.wu@huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49BA5A2@nkgeml513-mbx.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.02-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/_6Wm9nH8EDFaZHx0_OimJTtZq4Q>
Subject: Re: [netconf] latest update to crypto-types and keystore drafts
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 22:53:50 -0000

--Apple-Mail=_767B268A-7FDA-4EB0-A9F3-0CD6D1BD83DE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi Qin,

> [Qin]: Not very familiar with this security part, two questions I am =
curious to know:
> 1.      If the manufacturer generated keys (with 'hidden-key' or =
'hidden-private-key') are stored in the factory default datastore, how =
do we protect manufacturer generated keys from leaking, encryption, =
signature?

The "secret value" in the manufacturer generated keys would be presented =
in the configuration as an empty element (no value), as the true value =
is hidden.


> 2.      Public key and private key pair is usually generated together, =
if you put private key in factory default datastore, where do we put =
public key? Rely on TPM hardware to generate public key and put them =
into operational datastore?

The TPM would generate the key-pair, and then share the public-key with =
the system.  It's TBD if the public-key would be in <operational>, =
<factory-default>, or both.


Kent // contributor




--Apple-Mail=_767B268A-7FDA-4EB0-A9F3-0CD6D1BD83DE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Qin,<div class=3D""><br class=3D""><div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" style=3D"color: rgb(31, 73, 125);" =
class=3D"">[Qin]: Not very familiar with this security part, two =
questions I am curious to know:<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt 18pt; text-indent: -18pt; font-size: =
12pt; font-family: &quot;Times New Roman&quot;, serif;" class=3D""><span =
lang=3D"EN-US" style=3D"color: rgb(31, 73, 125);" class=3D""><span =
class=3D"">1.<span style=3D"font-style: normal; font-variant-caps: =
normal; font-weight: normal; font-stretch: normal; font-size: 7pt; =
line-height: normal; font-family: &quot;Times New Roman&quot;;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
lang=3D"EN-US" style=3D"color: rgb(31, 73, 125);" class=3D"">If the =
manufacturer generated keys (with 'hidden-key' or 'hidden-private-key') =
are stored in the factory default datastore, how do we protect =
manufacturer generated keys from leaking, encryption, =
signature?</span></div></div></div></div></blockquote><div><br =
class=3D""></div><div>The "secret value" in the manufacturer generated =
keys would be presented in the configuration as an empty element (no =
value), as the true value is hidden.</div><div><br class=3D""></div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt 18pt; text-indent: -18pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt =
18pt; text-indent: -18pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" class=3D""><span class=3D"">2.<span =
style=3D"font-style: normal; font-variant-caps: normal; font-weight: =
normal; font-stretch: normal; font-size: 7pt; line-height: normal; =
font-family: &quot;Times New Roman&quot;;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
lang=3D"EN-US" style=3D"color: rgb(31, 73, 125);" class=3D"">Public key =
and private key pair is usually generated together, if you put private =
key in factory default datastore, where do we put public key? Rely on =
TPM hardware to generate public key and put them into operational =
datastore?</span></div></div></div></div></blockquote><br =
class=3D""></div><div>The TPM would generate the key-pair, and then =
share the public-key with the system. &nbsp;It's TBD if the public-key =
would be in &lt;operational&gt;, &lt;factory-default&gt;, or =
both.</div><div><br class=3D""></div><div><br class=3D""></div><div>Kent =
// contributor</div><div><br class=3D""></div><div><br =
class=3D""></div><br class=3D""></div></body></html>=

--Apple-Mail=_767B268A-7FDA-4EB0-A9F3-0CD6D1BD83DE--


From nobody Wed Jul  3 03:17:56 2019
Return-Path: <wang.haiguang.shieldlab@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA7A6120735 for <netconf@ietfa.amsl.com>; Wed,  3 Jul 2019 03:17:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z0vMHQov8jj5 for <netconf@ietfa.amsl.com>; Wed,  3 Jul 2019 03:17:52 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97E94120048 for <netconf@ietf.org>; Wed,  3 Jul 2019 03:17:51 -0700 (PDT)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 0F7D08B4D44493F1BE11 for <netconf@ietf.org>; Wed,  3 Jul 2019 11:17:50 +0100 (IST)
Received: from sineml702-chm.china.huawei.com (10.223.161.109) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 3 Jul 2019 11:17:49 +0100
Received: from sineml705-chm.china.huawei.com (10.223.161.112) by sineml702-chm.china.huawei.com (10.223.161.109) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 3 Jul 2019 18:17:47 +0800
Received: from sineml705-chm.china.huawei.com ([10.223.161.112]) by sineml705-chm.china.huawei.com ([10.223.161.112]) with mapi id 15.01.1713.004; Wed, 3 Jul 2019 18:17:47 +0800
From: Wang Haiguang <wang.haiguang.shieldlab@huawei.com>
To: "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>, Kent Watsen <kent+ietf@watsen.net>, "Martin Bjorklund" <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: =?gb2312?B?W25ldGNvbmZdILTwuLQ6ICBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLW5ldGNv?= =?gb2312?Q?nf-crypto-types-09.txt?=
Thread-Index: AQHVLJsHRFibFILkQEuW7PJrMCJoSKa4rweQ
Date: Wed, 3 Jul 2019 10:17:47 +0000
Message-ID: <20303ff0c07346c7ae7cf1200502ecfe@huawei.com>
References: <C02846B1344F344EB4FAA6FA7AF481F13E7B118B@dggemm511-mbx.china.huawei.com> <20190625.084508.905200182299290020.mbj@tail-f.com> <0100016b8f701d10-02dff612-5c5f-4ed3-938d-8b9f25679996-000000@email.amazonses.com> <20190625.224243.332607515244909664.mbj@tail-f.com> <0100016b9640a87c-b6e29e8c-0db0-4f15-bb58-887fc48c81d0-000000@email.amazonses.com> <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com>
In-Reply-To: <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com>
Accept-Language: en-SG, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.215.37.71]
Content-Type: multipart/alternative; boundary="_000_20303ff0c07346c7ae7cf1200502ecfehuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/mPE-IaHjVWzdwCXT1-XCHcgIxtY>
Subject: Re: [netconf] =?gb2312?b?tPC4tDogIEktRCBBY3Rpb246IGRyYWZ0LWlldGYt?= =?gb2312?b?bmV0Y29uZi1jcnlwdG8tdHlwZXMtMDkudHh0?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2019 10:17:55 -0000

--_000_20303ff0c07346c7ae7cf1200502ecfehuaweicom_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64

SGmjrCBhbGwuDQoNCkkgaGF2ZSBzb21lIGNvbW1lbnRzIHJlZ2FyZGluZyB0aGUgbWFuYWdlbWVu
dCBvZiBjcnlwdG8gYWxnb3JpdGhtcyB1c2VkIGJ5IGRpZmZlcmVudCBwcm90b2NvbHMgc3VjaCBh
cyBUTFMsIElQU2VjIGFuZCBTU0wuDQoNCkF0IHRoZSBtb21lbnQsIGRpZmZlcmVudCB3b3JrIGdy
b3VwIG1haW50YWlucyBvd24gZGVmaW5pdGlvbnMgcmVnYXJkaW5nIHRoZSBjcnlwdG8gYWxnb3Jp
dGhtcywgaW5jbHVkaW5nIHB1YmxpYyBrZXkgYWxnb3JpdGhtcywga2V5IGV4Y2hhbmdlIGFsZ29y
aXRobXMsIGhhc2gsIG1hYywgZW5jcnlwdGlvbnMgZXRjLg0KRWFjaCB3b3JraW5nIGdyb3VwIGRl
ZmluZWQgdGhlaXIgb3duIGlkZW50aWZpZXJzIGZvciBjcnlwdG8gYWxnb3JpdGhtcy4gSW4gc29t
ZSBncm91cCwgY3J5cHRvIGFsZ29yaXRobXMgZm9yIGF1dGhlbnRpY2F0aW9uLCBlbmNyeXB0aW9u
IGFuZCBrZXkgZXhjaGFuZ2UgZXRjLiBhcmUgZGVmaW5lZCBzZXBhcmF0ZWx5IHdoaWxlIG90aGVy
cyBtYXkgY29tYmluZWQgaWRlbnRpZmllcnMuDQpUaGUgY3VycmVudCBtZXRob2QgcmVxdWlyZXMg
YWRkaXRpb25hbCBlZmZvcnRzIGluIGVhY2ggZ3JvdXAgZm9yIHByb3RvY29sIGRldmVsb3BtZW50
LCBhbmQgYWxzbyBpbiBpbXBsZW1lbnRhdGlvbiBhbmQgbmV0d29yayBtYW5hZ2VtZW50Lg0KDQpB
IGJldHRlciB3YXkgY291bGQgYmUgdGhhdCB0aGUgSUVURiBzZWN1cml0eSBncm91cCBkZWZpbmUg
YSB1bmlmaWVkIGNyeXB0byBhbGdvcml0aG0gaWRlbnRpZmllcnMgYW5kIHJlZ2lzdGVyIHRoZW0g
d2l0aCBJQU5BLiBUaGVzZSBjcnlwdG8gYWxnb3JpdGhtIGlkZW50aWZpZXJzIGNhbiBiZSBzaGFy
ZWQgYW1vbmcgIGRpZmZlcmVudCB3b3JraW5nIGdyb3VwcyBpbiB0aGVpciBmdXR1cmUgd29yay4N
ClRoZSBjdXJyZW50IGRyYWZ0LWlldGYtY3J5cHRvLXR5cGVzIHByb3ZpZGVzIHZhbHVhYmxlIHdv
cmsgdGhlIGNsYXNzaWZpY2F0aW9uIG9mIGNyeXB0byBhbGdvcml0aG1zLg0KDQpJIHRoaW5rIHdl
IHNob3VsZCBkaXNjdXNzIHRoaXMgcG9pbnQgYW5kIG1ha2UgYSBkZWNpc2lvbiB3aGV0aGVyIHdl
IHNob3VsZCBnZXQgSUFOQSByZWdpc3RyYXRpb24gbnVtYmVycyBmb3IgZGlmZmVyZW50IGNyeXB0
byBhbGdvcml0aG1zIGluIHRoZSBjb21pbmcgZmFjZS10by1mYWNlIG1lZXRpbmcuDQoNCkJlc3Qg
cmVnYXJkcy4NCg0KSGFpZ3VhbmcNCg0KDQpGcm9tOiBuZXRjb25mIFttYWlsdG86bmV0Y29uZi1i
b3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgWGlhbGlhbmcgKEZyYW5rLCBOZXR3b3JrIFN0
YW5kYXJkICYgUGF0ZW50IERlcHQpDQpTZW50OiBUaHVyc2RheSwgSnVuZSAyNywgMjAxOSAxMTo0
NyBBTQ0KVG86IEtlbnQgV2F0c2VuIDxrZW50K2lldGZAd2F0c2VuLm5ldD47IE1hcnRpbiBCam9y
a2x1bmQgPG1iakB0YWlsLWYuY29tPg0KQ2M6IG5ldGNvbmZAaWV0Zi5vcmcNClN1YmplY3Q6IFtu
ZXRjb25mXSC08Li0OiBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLW5ldGNvbmYtY3J5cHRvLXR5cGVz
LTA5LnR4dA0KDQpIaSBNYXJ0aW4sIEtlbnQgYW5kIGFsbCwNClRoYW5rcyBmb3Igc28gcHJvZHVj
dGl2ZSBkaXNjdXNzaW9uIGFuZCBjbGFyaWZpY2F0aW9uIGZvciBvdXIgY3VycmVudCBwcm9ibGVt
cyBhbmQgcG9zc2libGUgc29sdXRpb24uIEFuZCBzb3JyeSBmb3IgbGF0ZSByZXNwb25zZSBzaW5j
ZSBJIGFtIG91dCBvZiBvZmZpY2UgeWVzdGVyZGF5Lg0KDQpMZXQgbWUgZ2l2ZSBtb3JlIGluZm9y
bWF0aW9uIGZvciBiZXR0ZXIgdW5kZXJzdGFuZGluZyB0aGUgZGlmZmljdWx0aWVzIHdlIGFyZSBm
YWNpbmcsIGFuZCBob3BlZnVsIGEgZGlyZWN0aW9uIHdvcnRoIGZvciBnb2luZyB0by4NCg0KUGxl
YXNlIHNlZSBpbmxpbmU6DQoNCg0Kt6K8/sjLOiBLZW50IFdhdHNlbiBbbWFpbHRvOmtlbnQraWV0
ZkB3YXRzZW4ubmV0XQ0Kt6LLzcqxvOQ6IDIwMTnE6jbUwjI3yNUgODowNg0KytW8/sjLOiBNYXJ0
aW4gQmpvcmtsdW5kIDxtYmpAdGFpbC1mLmNvbTxtYWlsdG86bWJqQHRhaWwtZi5jb20+Pg0Ks63L
zTogWGlhbGlhbmcgKEZyYW5rLCBOZXR3b3JrIFN0YW5kYXJkICYgUGF0ZW50IERlcHQpIDxmcmFu
ay54aWFsaWFuZ0BodWF3ZWkuY29tPG1haWx0bzpmcmFuay54aWFsaWFuZ0BodWF3ZWkuY29tPj47
IG5ldGNvbmZAaWV0Zi5vcmc8bWFpbHRvOm5ldGNvbmZAaWV0Zi5vcmc+DQrW98ziOiBSZTogW25l
dGNvbmZdIEktRCBBY3Rpb246IGRyYWZ0LWlldGYtbmV0Y29uZi1jcnlwdG8tdHlwZXMtMDkudHh0
DQoNCkhpIE1hcnRpbiwNCg0KNCkgdG8gZW5hYmxlIHRoZSBTU0ggYW5kIFRMUyBtb2RlbHMgdG8g
dXNlIHR5cGVzIGRlZmluZWQgaW4gdGhlaXINCnByb3RvY29sIHNwZWNzLCBtYXBwaW5nIHRhYmxl
cyB3ZXJlIGFkZGVkIHRvIHRob3NlIGRyYWZ0cyB0byBtYXAgdGhlDQpwcm90b2NvbC1zcGVjaWZp
YyB0eXBlcyB0byB0aGUgZ2VuZXJpYyBjcnlwdG8tdHlwZXMgdHlwZS4NCg0KU28gcGVyaGFwcyB0
aGlzIGlzIG5vdCB0aGUgYmVzdCBzb2x1dGlvbj8gIFRoZSBiaWcgc2V0IG9mIHR5cGVzIChpbg0K
Y3J5cHRvLXR5cGVzKSB3aWxsIGNoYW5nZSBvdmVyIHRpbWUsIGFuZCB0aGUgc3Vic2V0cyB1c2Vk
IGluIHZhcmlvdXMNCmFwcGxpY2F0aW9ucyB3aWxsIGFsc28gY2hhbmdlIG92ZXIgdGltZS4gIFRo
ZSBiZXN0IHNvbHV0aW9uIGZvciBzdWNoDQpzZXRzIGluIHRoZSBJRVRGIHNlZW1zIHRvIGJlIElB
TkEgcmVnaXN0cmllcywgd2l0aCBjb3JyZXNwb25kaW5nDQpJQU5BLW1haW50YWluZWQgWUFORyBt
b2R1bGVzLg0KDQpJJ20gaG9waW5nIHNvbWVvbmUsIHBlcmhhcHMgbXkgY28tYXV0aG9ycywgY2Fu
IHN1Z2dlc3QgYSBwYXRoIGZvcndhcmQuDQoNCltGcmFua106IFdlIG1haW5seSByZWZlcmVuY2Ug
dG8gdGhlc2UgMyBJQU5BIHJlZ2lzdHJpZXMgZm9yIGRlZmluZSBvdXIgY3J5cHRvIHR5cGVzIGlu
IGRyYWZ0Og0KDQoxLiAgICAgICBodHRwczovL3d3dy5pYW5hLm9yZy9hc3NpZ25tZW50cy90bHMt
cGFyYW1ldGVycy90bHMtcGFyYW1ldGVycy54aHRtbDogd2hpY2ggaW5jbHVkZXMgVExTIDEuMiBh
bmQgVExTIDEuMy4NCg0KMi4gICAgICAgaHR0cHM6Ly93d3cuaWFuYS5vcmcvYXNzaWdubWVudHMv
aWtldjItcGFyYW1ldGVycy9pa2V2Mi1wYXJhbWV0ZXJzLnhodG1sLCBodHRwczovL3Rvb2xzLmll
dGYub3JnL2h0bWwvcmZjODIyMS0tIGNyeXB0byBhbGdvcml0aG1zIGd1aWRhbmNlIGZvciBFU1Ag
YW5kIEFILCBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODI0Ny0tIGNyeXB0byBhbGdv
cml0aG1zIGd1aWRhbmNlIGZvciBJS0V2MjogdGhlIDIgZHJhZnRzIGFyZSB0aGUgbGF0ZXN0IHJl
Y29tbWVuZGF0aW9ucyBmb3IgY3J5cHRvIGFsZ29zIG9mIElQc2VjLCBzbyB3ZSBtYWlubHkgcmVm
ZXJlbmNlIHRoZSBkZWZpbml0aW9uIGluIHRoZW07DQoNCjMuICAgICAgIGh0dHBzOi8vd3d3Lmlh
bmEub3JnL2Fzc2lnbm1lbnRzL3NzaC1wYXJhbWV0ZXJzL3NzaC1wYXJhbWV0ZXJzLnhodG1sLCBo
dHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNDI1MyAtLSBtYWluIFNTSCBTcGVjLCBodHRw
czovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODMzMiAtLSBuZXcgUlNBIHdpdGggU0hBMjU2IGFu
ZCBTSEE1MTIgZm9yIGl0cyBhdXRoZW50aWNhdGlvbiBmdW5jdGlvbjogYWxzbywgdGhlIDIgZHJh
ZnRzIGFyZSB0aGUgbWFpbiByZXNvdXJjZSB3ZSBoYXZlIHJlZmVyZW5jZWQuDQoNClNvLCB0aGUg
YWJvdmUgcmVmZXJlbmNlIGFyZSBhbGwgY3VycmVudCBpbnB1dCBmb3IgdGhlIGNyeXB0byB0eXBl
IGRlZmluaXRpb24gaW4gdGhlIGNyeXB0byB0eXBlcyBkcmFmdC4gTm93LCB0aGUgMiBtYWluIGRp
ZmZpY3VsdGllcyBmb3IgdXMgYXJlOg0KDQoxLiAgICAgICBGb3IgdGhlIGFib3ZlIDMgcHJvdG9j
b2xzIGFuZCB0aGVpciByZXNwZWN0aXZlIGFuZCBkaWZmZXJlbnQgY3J5cHRvIGFsZ29yaXRobSBk
ZWZpbml0aW9uIGluIGVhY2ggSUFOQSByZWdpc3RyaWVzLCBzaG91bGQgd2UgYWxpZ24gb3VyIHlh
bmcgbW9kZWwgdG8gYWxsIG9mIHRoZW0sIG9yIG9ubHkgb25lIG9mIHRoZW0/IElmIHRoZSBmb3Jt
ZXIsIHdlIG11c3QgZGVhbCB3aXRoIHRoZSBwcm9ibGVtIHRoYXQgc2FtZSBjcnlwdG8gYWxnbyBo
YXMgZGlmZmVyZW50IElBTkEgbnVtYmVyIGluIGRpZmZlcmVudCBJQU5BIHJlZ2lzdHJpZXM/DQoN
CjIuICAgICAgIENvbnNpZGVyaW5nIFRMUyAxLjIsIHdoaWNoIHVzZXMgYSBjb21iaW5lZCB3YXkg
dG8gcmVwcmVzZW50IGRpZmZlcmVudCB0eXBlcyBvZiBjcnlwdG8gaW50byBvbmUgSUFOQSBudW1i
ZXIgKGUuZy4sIFRMU19ESEVfUlNBX1dJVEhfQUVTXzEyOF9HQ01fU0hBMjU2KS4gVGhhdCBpcyBh
Z2FpbnN0IG91ciBjcnlwdG8gdHlwZSBkZWZpbml0aW9uIHByaW5jaXBsZSAoSVBzZWMgYW5kIFNT
SCBhcmUgYWxsIGFsaWduZWQpOiBhdG9taWMsIHdoaWNoIG1lYW5zIHdlIGFyZSBjdXJyZW50bHkg
ZGVmaW5lIDcgY2F0ZWdvcmllcyBvZiBjcnlwdG8gdHlwZTogSGFzaCBBbGdvcml0aG1zLCBBc3lt
bWV0cmljIEtleSBBbGdvcml0aG1zLCBNQUMgQWxnb3JpdGhtcywgRW5jcnlwdGlvbiBBbGdvcml0
aG1zLCBFbmNyeXB0aW9uIGFuZCBNQUMgQWxnb3JpdGhtcywgU2lnbmF0dXJlIEFsZ29yaXRobXMg
YW5kIEtleSBFeGNoYW5nZSBBbGdvcml0aG1zLiBTbywgaG93IHNob3VsZCB3ZSBtYXAgb3VyIGNy
eXB0byB0eXBlIGRlZmluaXRpb24gYmFjayB0byBUTFMgMS4yIElBTkEgbnVtYmVycz8NCg0KQWZ0
ZXIgY2xhcmlmeWluZyBvdXIgcHJvYmxlbXMsIEkgd2FudCB0byBhc2sgaWYgd2UgY2FuIHNvbHZl
IHRoZW0gYnkgdGhpcyB3YXk6IHdlIHlhbmcgZ3V5cyBkZWZpbmUgYSBjcnlwdG8gdHlwZSB5YW5n
IElBTkEgcmVnaXN0cmllcywgd2hpY2ggY2FuIGtlZXAgb24gYmVpbmcgYWxpZ25lZCB3aXRoIGFs
bCB0aGUgcmVsYXRlZCBwcm90b2NvbHOhryBJQU5BIHJlZ2lzdHJpZXMsIGJ1dCBoYXZlIGl0cyBv
d24gSUFOQSBudW1iZXIgZm9yIGVhY2ggY3J5cHRvIGFsZ29yaXRobXMuIFNvLCBvdXIgZHJhZnQg
anVzdCBuZWVkIHRvIGZvbGxvdyB0aGlzIElBTkEgcmVnaXN0cmllcy4NCg0KOCkgb3VyIGVmZm9y
dHMgdG8gbm9ybWFsaXplIHRoaXMgbWF5IGJlIGZ1dGlsZSwgYW5kIHlldCB3ZSB3YW50IHRvDQpz
dXBwb3J0IGtleXN0b3JlLg0KDQpQZXJoYXBzIHdlIGNhbiB0YWtlIGEgc3RlcCBiYWNrIGFuZCBk
ZWZpbmUganVzdCB0aGUgdHlwZXMgd2UgbmVlZA0KcmlnaHQgbm93IGZvciBrZXlzdG9yZSwgaW4g
b3JkZXIgdG8gZmluaXNoIHRoZXNlIGRyYWZ0cy4gIFRoZW4gd2UgKG9yDQpzb21lIG90aGVyIFdH
KSBjYW4gaW1tZWRpYXRlbHkgc3RhcnQgdG8gd29yayBvbiBhbiB1cGRhdGUgdG8NCmNyeXB0by10
eXBlcyB0aGF0IHdvdWxkIGRlZmluZSBtb3JlIHR5cGVzIGZvciBvdGhlciBwdXJwb3NlcyBhcyB3
ZWxsLg0KDQpNYXliZSwgZGVwZW5kaW5nIG9uIGhvdyB0aGF0IHR1cm5zIG91dCwgaXQgbWF5IGJl
IHRyaXZpYWwgdG8gZXh0ZW5kIHRoZSBhcHByb2FjaCB0byBjb3ZlciBldmVyeXRoaW5nLg0KDQpb
RnJhbmtdOiBiYXNlZCBvbiBteSBjbGFyaWZpY2F0aW9uIGFib3ZlLCBldmVuIHdlIGhhdmUgVExT
IGFuZCBTU0ggbm93LCB3ZSBzdGlsbCBoYXZlIHRvIGRlYWwgd2l0aCB0aGUgYWZvcmVtZW50aW9u
ZWQgMiBkaWZmaWN1bHRpZXMuIElmIHNvLCB3aHkgbm90IGRvIGl0IHJpZ2h0IGF0IHN0YXJ0IHRp
bWU/DQoNCg0KQi5SLg0KRnJhbmsNCg0KS2VudCAvLyBjb250cmlidXRvcg0K

--_000_20303ff0c07346c7ae7cf1200502ecfehuaweicom_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"\@Microsoft YaHei";
	panose-1:2 11 5 3 2 2 4 2 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin:0in;
	margin-bottom:.0001pt;
	text-indent:21.0pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:245186981;
	mso-list-type:hybrid;
	mso-list-template-ids:-1302451112 1674845406 67698713 67698715 67698703 67=
698713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%2\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:42.0pt;
	text-indent:-21.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:63.0pt;
	text-indent:-21.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:84.0pt;
	text-indent:-21.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%5\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:105.0pt;
	text-indent:-21.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:1.75in;
	text-indent:-21.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:147.0pt;
	text-indent:-21.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%8\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:168.0pt;
	text-indent:-21.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:189.0pt;
	text-indent:-21.0pt;}
@list l1
	{mso-list-id:249437759;
	mso-list-type:hybrid;
	mso-list-template-ids:-1088288646 -1221810962 67698713 67698715 67698703 6=
7698713 67698715 67698703 67698713 67698715;}
@list l1:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:.25in;
	text-indent:-.25in;}
@list l1:level2
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%2\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:42.0pt;
	text-indent:-21.0pt;}
@list l1:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:63.0pt;
	text-indent:-21.0pt;}
@list l1:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:84.0pt;
	text-indent:-21.0pt;}
@list l1:level5
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%5\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:105.0pt;
	text-indent:-21.0pt;}
@list l1:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:1.75in;
	text-indent:-21.0pt;}
@list l1:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:147.0pt;
	text-indent:-21.0pt;}
@list l1:level8
	{mso-level-number-format:alpha-lower;
	mso-level-text:"%8\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:168.0pt;
	text-indent:-21.0pt;}
@list l1:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	margin-left:189.0pt;
	text-indent:-21.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Hi</span><span lang=3D"ZH-CN" style=
=3D"font-size:11.0pt;font-family:SimSun;color:#1F497D">=A3=AC</span><span l=
ang=3D"ZH-CN" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,san=
s-serif;color:#1F497D">
</span><span style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans=
-serif;color:#1F497D">all.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I have some comments regarding the ma=
nagement of crypto algorithms used by different protocols such as TLS, IPSe=
c and SSL.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">At the moment, different work group m=
aintains own definitions regarding the crypto algorithms, including public =
key algorithms, key exchange algorithms, hash,
 mac, encryptions etc. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Each working group defined their own =
identifiers for crypto algorithms. In some group, crypto algorithms for aut=
hentication, encryption and key exchange etc.
 are defined separately while others may combined identifiers.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">The current method requires additiona=
l efforts in each group for protocol development, and also in implementatio=
n and network management.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">A better way could be that the IETF s=
ecurity group define a unified crypto algorithm identifiers and register th=
em with IANA. These crypto algorithm identifiers
 can be shared among &nbsp;different working groups in their future work. <=
o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">The current draft-ietf-crypto-types p=
rovides valuable work the classification of crypto algorithms.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">I think we should discuss this point =
and make a decision whether we should get IANA registration numbers for dif=
ferent crypto algorithms in the coming face-to-face
 meeting. <o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Best regards.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Haiguang<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,sans-serif">From:</span></b><span style=3D"font-size:11.0pt;=
font-family:&quot;Calibri&quot;,sans-serif"> netconf [mailto:netconf-bounce=
s@ietf.org]
<b>On Behalf Of </b>Xialiang (Frank, Network Standard &amp; Patent Dept)<br=
>
<b>Sent:</b> Thursday, June 27, 2019 11:47 AM<br>
<b>To:</b> Kent Watsen &lt;kent&#43;ietf@watsen.net&gt;; Martin Bjorklund &=
lt;mbj@tail-f.com&gt;<br>
<b>Cc:</b> netconf@ietf.org<br>
<b>Subject:</b> [netconf] </span><span lang=3D"ZH-CN" style=3D"font-size:11=
.0pt;font-family:SimSun">=B4=F0=B8=B4</span><span style=3D"font-size:11.0pt=
;font-family:&quot;Calibri&quot;,sans-serif">: I-D Action: draft-ietf-netco=
nf-crypto-types-09.txt<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Hi Martin, Kent and all,<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Thanks for so productive discussion a=
nd clarification for our current problems and possible solution. And sorry =
for late response since I am out of office yesterday.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Let me give more information for bett=
er understanding the difficulties we are facing, and hopeful a direction wo=
rth for going to.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Please see inline:<o:p></o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span lang=3D"ZH-CN" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Microsoft YaHei&quot;,sans-serif">=B7=A2=BC=FE=C8=CB</span>=
</b><b><span style=3D"font-size:11.0pt;font-family:&quot;Microsoft YaHei&qu=
ot;,sans-serif">:</span></b><span style=3D"font-size:11.0pt;font-family:&qu=
ot;Microsoft YaHei&quot;,sans-serif">
 Kent Watsen [<a href=3D"mailto:kent&#43;ietf@watsen.net">mailto:kent&#43;i=
etf@watsen.net</a>]
<br>
<b><span lang=3D"ZH-CN">=B7=A2=CB=CD=CA=B1=BC=E4</span>:</b> 2019<span lang=
=3D"ZH-CN">=C4=EA</span>6<span lang=3D"ZH-CN">=D4=C2</span>27<span lang=3D"=
ZH-CN">=C8=D5</span> 8:06<br>
<b><span lang=3D"ZH-CN">=CA=D5=BC=FE=C8=CB</span>:</b> Martin Bjorklund &lt=
;<a href=3D"mailto:mbj@tail-f.com">mbj@tail-f.com</a>&gt;<br>
<b><span lang=3D"ZH-CN">=B3=AD=CB=CD</span>:</b> Xialiang (Frank, Network S=
tandard &amp; Patent Dept) &lt;<a href=3D"mailto:frank.xialiang@huawei.com"=
>frank.xialiang@huawei.com</a>&gt;;
<a href=3D"mailto:netconf@ietf.org">netconf@ietf.org</a><br>
<b><span lang=3D"ZH-CN">=D6=F7=CC=E2</span>:</b> Re: [netconf] I-D Action: =
draft-ietf-netconf-crypto-types-09.txt<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Hi Martin,<o:p></o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">4) to enable the SSH and TLS models to use types def=
ined in their<br>
protocol specs, mapping tables were added to those drafts to map the<br>
protocol-specific types to the generic crypto-types type.<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><br>
So perhaps this is not the best solution? &nbsp;The big set of types (in<br=
>
crypto-types) will change over time, and the subsets used in various<br>
applications will also change over time. &nbsp;The best solution for such<b=
r>
sets in the IETF seems to be IANA registries, with corresponding<br>
IANA-maintained YANG modules.<o:p></o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I'm hoping someone, perhaps my co-authors, can sugge=
st a path forward.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D">[Frank]: We mainly ref=
erence to these 3 IANA registries for define our crypto types in draft:<o:p=
></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:.25in;text-indent:-.25in=
;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,sans-serif;color:#1F497D"><span style=3D"mso-list:Ignore">1.<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"https://www.iana.org/assignments/=
tls-parameters/tls-parameters.xhtml">https://www.iana.org/assignments/tls-p=
arameters/tls-parameters.xhtml</a>:
<span style=3D"color:#1F497D">which includes TLS 1.2 and TLS 1.3. </span><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;co=
lor:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:.25in;text-indent:-.25in=
;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,sans-serif;color:#1F497D"><span style=3D"mso-list:Ignore">2.<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"https://www.iana.org/assignments/=
ikev2-parameters/ikev2-parameters.xhtml">https://www.iana.org/assignments/i=
kev2-parameters/ikev2-parameters.xhtml</a>,
<a href=3D"https://tools.ietf.org/html/rfc8221">https://tools.ietf.org/html=
/rfc8221</a>--
<span style=3D"color:#1F497D">crypto</span> <span style=3D"color:#1F497D">a=
lgorithms guidance for ESP and AH,</span>
<a href=3D"https://tools.ietf.org/html/rfc8247">https://tools.ietf.org/html=
/rfc8247</a>--
<span style=3D"color:#1F497D">crypto algorithms guidance for IKEv2: the 2 d=
rafts are the latest recommendations for crypto algos of IPsec, so we mainl=
y reference the definition in them;</span><span style=3D"font-size:10.5pt;f=
ont-family:&quot;Calibri&quot;,sans-serif;color:#1F497D"><o:p></o:p></span>=
</p>
<p class=3D"MsoListParagraph" style=3D"margin-left:.25in;text-indent:-.25in=
;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,sans-serif;color:#1F497D"><span style=3D"mso-list:Ignore">3.<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><a href=3D"https://www.iana.org/assignments/=
ssh-parameters/ssh-parameters.xhtml">https://www.iana.org/assignments/ssh-p=
arameters/ssh-parameters.xhtml</a>,
<a href=3D"https://tools.ietf.org/html/rfc4253">https://tools.ietf.org/html=
/rfc4253</a> --
<span style=3D"color:#1F497D">main SSH Spec</span>, <a href=3D"https://tool=
s.ietf.org/html/rfc8332">
https://tools.ietf.org/html/rfc8332</a> -- <span style=3D"color:#1F497D">ne=
w RSA with SHA256 and SHA512 for its authentication function: also, the 2 d=
rafts are the main resource we have referenced.</span><span style=3D"font-s=
ize:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color:#1F497D"><o:p><=
/o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">So, the above reference are all curre=
nt input for the crypto type definition in the crypto types draft. Now, the=
 2 main difficulties for us are:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:.25in;text-indent:-.25in=
;mso-list:l1 level1 lfo4">
<![if !supportLists]><span style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,sans-serif;color:#1F497D"><span style=3D"mso-list:Ignore">1.<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:10.5pt;font-family:=
&quot;Calibri&quot;,sans-serif;color:#1F497D">For the above 3 protocols and=
 their respective and different crypto algorithm definition in each IANA re=
gistries, should we align our yang model to
 all of them, or only one of them? If the former, we must deal with the pro=
blem that same crypto algo has different IANA number in different IANA regi=
stries?<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"margin-left:.25in;text-indent:-.25in=
;mso-list:l1 level1 lfo4">
<![if !supportLists]><span style=3D"font-size:10.5pt;font-family:&quot;Cali=
bri&quot;,sans-serif;color:#1F497D"><span style=3D"mso-list:Ignore">2.<span=
 style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"color:#1F497D">Considering TL=
S 1.2, which uses a combined way to represent different types of crypto int=
o one IANA number (e.g., TLS_DHE_RSA_WITH_AES_128_GCM_SHA256). That is agai=
nst our crypto type definition principle
 (IPsec and SSH are all aligned): atomic, which means we are currently defi=
ne 7 categories of crypto type: Hash Algorithms, Asymmetric Key Algorithms,=
 MAC Algorithms, Encryption Algorithms, Encryption and MAC Algorithms, Sign=
ature Algorithms and Key Exchange
 Algorithms. So, how should we map our crypto type definition back to TLS 1=
.2 IANA numbers?</span><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">After clarifying our problems, I want=
 to ask if we can solve them by this way: we yang guys define a crypto type=
 yang IANA registries, which can keep on being
 aligned with all the related protocols=A1=AF IANA registries, but have its=
 own IANA number for each crypto algorithms. So, our draft just need to fol=
low this IANA registries.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal">8) our efforts to normalize this may be futile, and =
yet we want to<br>
support keystore.<o:p></o:p></p>
</blockquote>
<p class=3D"MsoNormal"><br>
Perhaps we can take a step back and define just the types we need<br>
right now for keystore, in order to finish these drafts. &nbsp;Then we (or<=
br>
some other WG) can immediately start to work on an update to<br>
crypto-types that would define more types for other purposes as well.<o:p><=
/o:p></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Maybe, depending on how that turns out, it may be tr=
ivial to extend the approach to cover everything.<o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">[Frank]: based on my clarification ab=
ove, even we have TLS and SSH now, we still have to deal with the aforement=
ioned 2 difficulties. If so, why not do it right
 at start time?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"color:#1F497D"><o:p>&nbsp;</o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">B.R.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D">Frank<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,sans-serif;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal">Kent // contributor<o:p></o:p></p>
</div>
</div>
</body>
</html>

--_000_20303ff0c07346c7ae7cf1200502ecfehuaweicom_--


From nobody Wed Jul  3 03:59:34 2019
Return-Path: <ietfc@btconnect.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EF9B12021C for <netconf@ietfa.amsl.com>; Wed,  3 Jul 2019 03:59:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.248
X-Spam-Level: 
X-Spam-Status: No, score=0.248 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8cE03jISx4EK for <netconf@ietfa.amsl.com>; Wed,  3 Jul 2019 03:59:31 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80099.outbound.protection.outlook.com [40.107.8.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FE0A12004F for <netconf@ietf.org>; Wed,  3 Jul 2019 03:59:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7x3Yh8imFnYAWLqd8Z9p6xFXxFPOHDXXKM+7WR9Jpq8=; b=OL+I4eGQg8By5CTYJhj3/9nbr7m9hKVAiKVxgPHPyaxJ6Uwkq7MfpXQRWCrVcn0KVP+kqzFUQgV5tIIgb1E5rkBZJSQ6QKWKv5Bg+9+yEH0A6fe0vaHgG0ChjtV5+qH43JPPeGV28mL4mvouHSRw5ukKb+KJYsBKJXhRr3Qj6yo=
Received: from AM4PR07MB3204.eurprd07.prod.outlook.com (10.171.188.157) by AM4PR07MB3204.eurprd07.prod.outlook.com (10.171.188.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2052.14; Wed, 3 Jul 2019 10:59:28 +0000
Received: from AM4PR07MB3204.eurprd07.prod.outlook.com ([fe80::1155:d23c:a062:b960]) by AM4PR07MB3204.eurprd07.prod.outlook.com ([fe80::1155:d23c:a062:b960%7]) with mapi id 15.20.2052.010; Wed, 3 Jul 2019 10:59:27 +0000
From: tom petch <ietfc@btconnect.com>
To: Wang Haiguang <wang.haiguang.shieldlab@huawei.com>, "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>, Kent Watsen <kent+ietf@watsen.net>, Martin Bjorklund <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] :  I-D Action: draft-ietf-netconf-crypto-types-09.txt
Thread-Index: AQHVMY5h3RGsGK97y063XW8WXl0KJQ==
Date: Wed, 3 Jul 2019 10:59:27 +0000
Message-ID: <077201d5318e$5ed91620$4001a8c0@gateway.2wire.net>
References: <C02846B1344F344EB4FAA6FA7AF481F13E7B118B@dggemm511-mbx.china.huawei.com> <20190625.084508.905200182299290020.mbj@tail-f.com> <0100016b8f701d10-02dff612-5c5f-4ed3-938d-8b9f25679996-000000@email.amazonses.com> <20190625.224243.332607515244909664.mbj@tail-f.com> <0100016b9640a87c-b6e29e8c-0db0-4f15-bb58-887fc48c81d0-000000@email.amazonses.com> <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com> <20303ff0c07346c7ae7cf1200502ecfe@huawei.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-clientproxiedby: LO2P265CA0063.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:60::27) To AM4PR07MB3204.eurprd07.prod.outlook.com (2603:10a6:205:8::29)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com; 
x-ms-exchange-messagesentrepresentingtype: 1
x-mailer: Microsoft Outlook Express 6.00.2800.1106
x-originating-ip: [86.139.215.234]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b0a5ceda-24c2-45cf-a8c1-08d6ffa5844a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:AM4PR07MB3204; 
x-ms-traffictypediagnostic: AM4PR07MB3204:
x-ms-exchange-purlcount: 8
x-microsoft-antispam-prvs: <AM4PR07MB32048ED46AD7437EC136E61DA0FB0@AM4PR07MB3204.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00872B689F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(376002)(39860400002)(346002)(396003)(136003)(189003)(61684003)(199004)(13464003)(7736002)(6246003)(4326008)(81166006)(81156014)(305945005)(1556002)(25786009)(73956011)(26005)(6486002)(44736005)(229853002)(8676002)(5660300002)(61296003)(102836004)(66946007)(186003)(486006)(71200400001)(446003)(4720700003)(476003)(76176011)(68736007)(14444005)(81686011)(478600001)(6436002)(256004)(110136005)(8936002)(66556008)(81816011)(9686003)(14454004)(52116002)(386003)(53546011)(316002)(6506007)(53936002)(99286004)(6306002)(6512007)(44716002)(64756008)(66476007)(2906002)(62236002)(6116002)(50226002)(966005)(66446008)(86362001)(71190400001)(3846002)(14496001)(66066001)(74416001)(7726001); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR07MB3204; H:AM4PR07MB3204.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0; 
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: M9CucrUDlKfIb8g45d4Y3mJHRcWlXEpJgLuxGYKCq1BExA9idQ16NkiP8LJ5DMDyTLl/NFMHXqhP2zKAGBF7/fK6ZUkv92G0D7GrsjqfJ1m++ttqTZtHUiz2fqL7Dw7Tg54UXxRzCLOza5tQhqxd3Rl9n0YjeBdX0WuU6KfIB2SCXHP29c1aVkKqlew2R9L2zUrVudgtf0bRHL/PxIZ5WWfJMfBfQt3Zk2z/XBqXTJwms34pbniGncze4sOjD4eSI6f5zE25JLlwJzb3phdDC0ZBU7NbaY/IqjtGWHLMWuP1sG/WODEMRcATE0n7eXGHozAy1lK8o12KL69SCFBFDcw7F7kjqzro8LR9V6Rx9rGNlJzstHs9/LLUp47QnnqD1MLDRgAP3NbPi8XIk83zf7Lk4eGBLjSbXMrsS8MoMUw=
Content-Type: text/plain; charset="gb2312"
Content-ID: <EB2D38A4BD61E24D8BA9BEEC91787A1E@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b0a5ceda-24c2-45cf-a8c1-08d6ffa5844a
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2019 10:59:27.7014 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ietfc@btconnect.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3204
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/-Y41O06-m81zpAP3L_SXoGO06mw>
Subject: Re: [netconf] : I-D Action: draft-ietf-netconf-crypto-types-09.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jul 2019 10:59:34 -0000
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==


From nobody Thu Jul  4 02:56:01 2019
Return-Path: <frank.xialiang@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91F161201D7 for <netconf@ietfa.amsl.com>; Thu,  4 Jul 2019 02:55:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AwKp9z0d-IrU for <netconf@ietfa.amsl.com>; Thu,  4 Jul 2019 02:55:56 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9769120176 for <netconf@ietf.org>; Thu,  4 Jul 2019 02:55:55 -0700 (PDT)
Received: from lhreml705-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 10378B8282768A977810 for <netconf@ietf.org>; Thu,  4 Jul 2019 10:55:54 +0100 (IST)
Received: from DGGEMM421-HUB.china.huawei.com (10.1.198.38) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 4 Jul 2019 10:55:53 +0100
Received: from DGGEMM511-MBX.china.huawei.com ([169.254.1.140]) by dggemm421-hub.china.huawei.com ([10.1.198.38]) with mapi id 14.03.0439.000; Thu, 4 Jul 2019 17:55:43 +0800
From: "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>
To: tom petch <ietfc@btconnect.com>, Wang Haiguang <wang.haiguang.shieldlab@huawei.com>, Kent Watsen <kent+ietf@watsen.net>, Martin Bjorklund <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] :  I-D Action: draft-ietf-netconf-crypto-types-09.txt
Thread-Index: AQHVMY5p0BmiaN/OWU21n+8cGP1fTqa6MiSQ
Date: Thu, 4 Jul 2019 09:55:44 +0000
Message-ID: <C02846B1344F344EB4FAA6FA7AF481F13E7BFE93@dggemm511-mbx.china.huawei.com>
References: <C02846B1344F344EB4FAA6FA7AF481F13E7B118B@dggemm511-mbx.china.huawei.com> <20190625.084508.905200182299290020.mbj@tail-f.com> <0100016b8f701d10-02dff612-5c5f-4ed3-938d-8b9f25679996-000000@email.amazonses.com> <20190625.224243.332607515244909664.mbj@tail-f.com> <0100016b9640a87c-b6e29e8c-0db0-4f15-bb58-887fc48c81d0-000000@email.amazonses.com> <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com> <20303ff0c07346c7ae7cf1200502ecfe@huawei.com> <077201d5318e$5ed91620$4001a8c0@gateway.2wire.net>
In-Reply-To: <077201d5318e$5ed91620$4001a8c0@gateway.2wire.net>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.159.76]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/mDqeencjU8Spj6oh9SIckdwYet8>
Subject: [netconf] =?gb2312?b?tPC4tDogIDogIEktRCBBY3Rpb246IGRyYWZ0LWll?= =?gb2312?b?dGYtbmV0Y29uZi1jcnlwdG8tdHlwZXMtMDkudHh0?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jul 2019 09:56:00 -0000
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From nobody Thu Jul  4 05:58:24 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9511120655; Thu,  4 Jul 2019 05:58:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XhTPHd_X0aSk; Thu,  4 Jul 2019 05:58:19 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 39616120180; Thu,  4 Jul 2019 05:58:19 -0700 (PDT)
Received: from lhreml702-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 07426D55811135DB8F22; Thu,  4 Jul 2019 13:58:17 +0100 (IST)
Received: from lhreml706-chm.china.huawei.com (10.201.108.55) by lhreml702-cah.china.huawei.com (10.201.108.43) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 4 Jul 2019 13:58:16 +0100
Received: from lhreml706-chm.china.huawei.com (10.201.108.55) by lhreml706-chm.china.huawei.com (10.201.108.55) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Thu, 4 Jul 2019 13:58:16 +0100
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml706-chm.china.huawei.com (10.201.108.55) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Thu, 4 Jul 2019 13:58:16 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.66]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Thu, 4 Jul 2019 20:58:11 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netconf] [netmod]   RE:  pls clarify get operation
Thread-Index: AdUyY7FGeaBuaUx/SiGx95LI+su/qA==
Date: Thu, 4 Jul 2019 12:58:10 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA49C603F@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA49C603Fnkgeml513mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/83ZqCwfsjBbJ3dNcuGKzb9ta34o>
Subject: Re: [netconf] [netmod]   RE:  pls clarify get operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jul 2019 12:58:22 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA49C603Fnkgeml513mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA49C603Fnkgeml513mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
5a6L5L2TOw0KCXBhbm9zZS0xOjIgMSA2IDAgMyAxIDEgMSAxIDE7fQ0KQGZvbnQtZmFjZQ0KCXtm
b250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2IDMgMiA0
O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToyIDE1IDUg
MiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJcQOWui+S9kyI7DQoJ
cGFub3NlLTE6MiAxIDYgMCAzIDEgMSAxIDEgMTt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0K
cC5Nc29Ob3JtYWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0K
CW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTIuMHB0Ow0KCWZvbnQtZmFtaWx5
OuWui+S9kzt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0
eTo5OTsNCgljb2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNp
dGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsN
Cgljb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNv
LXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIOmihOiuvuagvOW8jyBD
aGFyIjsNCgltYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6
MTIuMHB0Ow0KCWZvbnQtZmFtaWx5OuWui+S9kzt9DQpzcGFuLkVtYWlsU3R5bGUxNw0KCXttc28t
c3R5bGUtdHlwZTpwZXJzb25hbDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsN
Cgljb2xvcjojMUY0OTdEO30NCnNwYW4uRW1haWxTdHlsZTE4DQoJe21zby1zdHlsZS10eXBlOnBl
cnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmOw0KCWNvbG9y
OiMxRjQ5N0Q7fQ0Kc3Bhbi5IVE1MQ2hhcg0KCXttc28tc3R5bGUtbmFtZToiSFRNTCDpooTorr7m
oLzlvI8gQ2hhciI7DQoJbXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJI
VE1MIOmihOiuvuagvOW8jyI7DQoJZm9udC1mYW1pbHk65a6L5L2TO30NCnNwYW4uZ3JleQ0KCXtt
c28tc3R5bGUtbmFtZTpncmV5O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4
cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3Np
emU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1hcmdpbjo3Mi4wcHQgOTAuMHB0IDcyLjBwdCA5MC4wcHQ7
fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwh
LS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3Bp
ZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1s
Pg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRh
dGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8
Ym9keSBsYW5nPSJaSC1DTiIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+DQo8ZGl2IGNsYXNz
PSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4t
dG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1V
UyIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90
OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPnN1Z2dlc3Rpb25zIG9yIGd1aWRlbGluZXMgZGVm
aW5lZCBpbiBOTURBIGFyY2hpdGVjdHVyZSBhbmQgTk1EQSBndWlkZWxpbmUoL3JmYzg0MDcjc2Vj
dGlvbi00LjIzLjMpDQogc2VlbSB0byBvbmx5IGFzc3VtZSBOTURBIGNsaWVudCBvbmx5IHRhbGtz
IHdpdGggTk1EQSBzZXJ2ZXIsIG5vbi1OTURBIGNsaWVudCBvbmx5IHRhbGtzIHdpdGggbm9uLU5N
REEgc2VydmVyLjwvc3Bhbj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD48L286cD48L3NwYW4+PC9w
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj48bzpwPiZu
YnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu
IGxhbmc9IkVOLVVTIj5UcnVlLCBidXQgdGhlcmXigJlzIG5vIHN0YXRlbWVudCB0aGF0IGEgY2xp
ZW50IG9yIHNlcnZlciBjYW5ub3QgYmUgYm90aC4gJm5ic3A7Tm90ZSBhbHNvIHRoYXQgdGhlIE5D
L1JDLU5NREEgUkZDcyBleHBsYWluIGhvdyBjbGllbnRzIGNhbiBkaXNjb3ZlciBpZiBhIHNlcnZl
ciBzdXBwb3J0cyBOTURBLiAmbmJzcDtUaGUgaW50ZW50aW9uIGlzIHRoYXQgdGhlIGNsaWVudCB3
b3VsZCBmaXJzdCB0cnkNCiB0byB1c2UgTk1EQSBhbmQsIGlmIG5vdCBzdXBwb3J0ZWQsIGZhbGxi
YWNrIHRvIG5vbi1OTURBLiZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250
LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+PG86
cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxz
cGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVv
dDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+W1Fpbl06WW91IGFyZSBy
aWdodCwgYnV0IGl0IG5vdCBzcGVjaWZpZWQgaW4gUkZDODQwNy4gcmV2aXNpdGluZyB0aGUgc2Vj
dGlvbiA0LjIzLjMuMSBvZiBSRkM4NDA3PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2Zv
bnQtZmFtaWx5OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj7i
gJw8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0icGFn
ZS1icmVhay1iZWZvcmU6YWx3YXlzIj48c3BhbiBsYW5nPSJFTiI+Jm5ic3A7Jm5ic3A7IEEgc2Vy
dmVyIHRoYXQgbmVlZHMgdG8gc3VwcG9ydCBib3RoIE5NREEgYW5kIG5vbi1OTURBIGNsaWVudHMg
Y2FuPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9InBh
Z2UtYnJlYWstYmVmb3JlOmFsd2F5cyI+PHNwYW4gbGFuZz0iRU4iPiZuYnNwOyZuYnNwOyBhZHZl
cnRpc2UgYm90aCB0aGUgbmV3IE5NREEgbW9kdWxlIGFuZCB0aGUgdGVtcG9yYXJ5IG5vbi1OTURB
IG1vZHVsZS48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHls
ZT0icGFnZS1icmVhay1iZWZvcmU6YWx3YXlzIj48c3BhbiBsYW5nPSJFTiI+Jm5ic3A7Jm5ic3A7
IEEgbm9uLU5NREEgY2xpZW50IGNhbiB1c2Ugc2VwYXJhdGUgJnF1b3Q7Zm9vJnF1b3Q7IGFuZCAm
cXVvdDtmb28tc3RhdGUmcXVvdDsgc3VidHJlZXMsPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9InBhZ2UtYnJlYWstYmVmb3JlOmFsd2F5cyI+PHNwYW4g
bGFuZz0iRU4iPiZuYnNwOyZuYnNwOyBleGNlcHQgdGhlICZxdW90O2Zvby1zdGF0ZSZxdW90OyBz
dWJ0cmVlIGlzIGxvY2F0ZWQgaW4gYSBkaWZmZXJlbnQgKHRlbXBvcmFyeSk8bzpwPjwvbzpwPjwv
c3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0icGFnZS1icmVhay1iZWZvcmU6
YWx3YXlzIj48c3BhbiBsYW5nPSJFTiI+Jm5ic3A7Jm5ic3A7IG1vZHVsZS4mbmJzcDsgVGhlIE5N
REEgbW9kdWxlIGNhbiBiZSB1c2VkIGJ5IGEgbm9uLU5NREEgY2xpZW50IHRvIGFjY2VzczxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJwYWdlLWJyZWFr
LWJlZm9yZTphbHdheXMiPjxzcGFuIGxhbmc9IkVOIj4mbmJzcDsmbmJzcDsgdGhlIGNvbnZlbnRp
b25hbCBjb25maWd1cmF0aW9uIGRhdGFzdG9yZXMgYW5kIHRoZSBkZXByZWNhdGVkICZsdDtnZXQm
Z3Q7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9InBh
Z2UtYnJlYWstYmVmb3JlOmFsd2F5cyI+PHNwYW4gbGFuZz0iRU4iPiZuYnNwOyZuYnNwOyBvcGVy
YXRpb24gdG8gYWNjZXNzIG5lc3RlZCAmcXVvdDtjb25maWcgZmFsc2UmcXVvdDsgZGF0YSBub2Rl
cy48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n
PSJFTiIgc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZx
dW90OyxzYW5zLXNlcmlmO2NvbG9yOiMxRjQ5N0QiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1z
aXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29s
b3I6IzFGNDk3RCI+4oCdPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCI+PHNwYW4gbGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5
OiZxdW90O0NhbGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj5JdCBwcm92aWRl
cyBndWlkZWxpbmUgaG93IHRvIGNyZWF0ZSB0ZW1wb3Jhcnkgbm9uLU5NREEgbW9kdWxlIGZyb20g
Tk1EQSBtb2R1bGUsIGJ1dCB0ZW1wb3Jhcnkgbm9uLU5NREEgbW9kdWxlIGlzIG5vdCBzdGFuZGFy
ZCBtb2R1bGUuIFNvIGV2ZXJ5Ym9keQ0KIHdpbGwgY3JlYXRlIHRoZSBzYW1lIHRlbXBvcmFyeSBu
b24tTk1EQSBtb2R1bGU/IDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWls
eTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SSBhbHNvIGZl
ZWwgdGhpcyBzZWNvbmQgcGFyYWdyYXBoIGlzIG5vdCB2ZXJ5IGNsZWFyLCBlc3BlY2lhbGx5IHRo
ZSBsYXN0IHNlbnRlbmNlLCAmbmJzcDtpcyBuZXN0ZWQgY29uZmlnIGZhbHNlIGRhdGEgbm9kZXMg
cGFydCBvZiBOTURBIG1vZHVsZSBvciB0ZW1wb3JhcnkNCiBub24tTk1EQTxvOnA+PC9vOnA+PC9z
cGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0i
Zm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2Vy
aWY7Y29sb3I6IzFGNDk3RCI+TW9kdWxlPyBMb29rcyBsaWtlJm5ic3A7IG5lc3RlZCBjb25maWcg
ZmFsc2UgZGF0YSBub2RlIHBhcnQgb2YgTk1EQSBtb2R1bGU/DQo8bzpwPjwvbzpwPjwvc3Bhbj48
L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
c2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2Nv
bG9yOiMxRjQ5N0QiPkNhbiBub24tTk1EQSBjbGllbnQgY29uc3VtZSBOTURBIG1vZHVsZT8gSWYg
dGhlIGFuc3dlciBpcyBZZXMsIHdoeSB0aGUgc2VydmVyIG5lZWQgdG8gYWR2ZXJ0aXNlIGJvdGgg
Tk1EQSBhbmQgdGVtcG9yYXJ5IG5vbi1OTURBIG1vZHVsZT88bzpwPjwvbzpwPjwvc3Bhbj48L3A+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQtc2l6
ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1b3Q7Q2FsaWJyaSZxdW90OyxzYW5zLXNlcmlmO2NvbG9y
OiMxRjQ5N0QiPldoeSAmbHQ7Z2V0Jmd0OyBvcGVyYXRpb24gaXMgZGVwcmVjYXRlZCB3aGVuIG5v
bi1OTURBIGNsaWVudCB1c2VzIE5NREEgbW9kdWxlPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEw
LjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxpYnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFG
NDk3RCI+SG93IGRvZXMgdGhlIG5vbi1OTURBIGNsaWVudCBkZWFsIHdpdGggdGVtcG9yYXJ5IG5v
bi1OTURBIG1vZHVsZT8gVXNlICZsdDtnZXQmZ3Q7IG9wZXJhdGlvbiB0byBnZXQgYWNjZXNzIHRv
IGl0PzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxh
bmc9IkVOLVVTIiBzdHlsZT0iZm9udC1zaXplOjEwLjVwdDtmb250LWZhbWlseTomcXVvdDtDYWxp
YnJpJnF1b3Q7LHNhbnMtc2VyaWY7Y29sb3I6IzFGNDk3RCI+SG93IGRvZXMgdGhlIG5vbi1OTURB
IGNsaWVudCBkaXN0aW5ndWlzaCBOTURBIG1vZHVsZSBmcm9tIHRlbXBvcmFyeSBOb24tTk1EQSBt
b2R1bGU/PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g
bGFuZz0iRU4tVVMiIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O0Nh
bGlicmkmcXVvdDssc2Fucy1zZXJpZjtjb2xvcjojMUY0OTdEIj48bzpwPiZuYnNwOzwvbzpwPjwv
c3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5n
PSJFTi1VUyI+S2VudCAvLyBjb250cmlidXRvciZuYnNwOzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4N
CjwvZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_B8F9A780D330094D99AF023C5877DABAA49C603Fnkgeml513mbxchi_--


From nobody Thu Jul  4 19:04:22 2019
Return-Path: <wang.haiguang.shieldlab@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A85412012B for <netconf@ietfa.amsl.com>; Thu,  4 Jul 2019 19:04:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cI0CRY_wyu2h for <netconf@ietfa.amsl.com>; Thu,  4 Jul 2019 19:04:18 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16F2712007C for <netconf@ietf.org>; Thu,  4 Jul 2019 19:04:18 -0700 (PDT)
Received: from lhreml707-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id B1331D03B8668707F778 for <netconf@ietf.org>; Fri,  5 Jul 2019 03:04:15 +0100 (IST)
Received: from sineml702-chm.china.huawei.com (10.223.161.109) by lhreml707-cah.china.huawei.com (10.201.108.48) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 5 Jul 2019 03:04:15 +0100
Received: from sineml705-chm.china.huawei.com (10.223.161.112) by sineml702-chm.china.huawei.com (10.223.161.109) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 5 Jul 2019 10:04:13 +0800
Received: from sineml705-chm.china.huawei.com ([10.223.161.112]) by sineml705-chm.china.huawei.com ([10.223.161.112]) with mapi id 15.01.1713.004; Fri, 5 Jul 2019 10:04:13 +0800
From: Wang Haiguang <wang.haiguang.shieldlab@huawei.com>
To: "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>, tom petch <ietfc@btconnect.com>, Kent Watsen <kent+ietf@watsen.net>, Martin Bjorklund <mbj@tail-f.com>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] :  I-D Action: draft-ietf-netconf-crypto-types-09.txt
Thread-Index: AQHVMY5pkmmr0SbdRkuIu5naPq/Ck6a5tBEAgAGTsgA=
Date: Fri, 5 Jul 2019 02:04:13 +0000
Message-ID: <93e01a1014194663a9b262554030506e@huawei.com>
References: <C02846B1344F344EB4FAA6FA7AF481F13E7B118B@dggemm511-mbx.china.huawei.com> <20190625.084508.905200182299290020.mbj@tail-f.com> <0100016b8f701d10-02dff612-5c5f-4ed3-938d-8b9f25679996-000000@email.amazonses.com> <20190625.224243.332607515244909664.mbj@tail-f.com> <0100016b9640a87c-b6e29e8c-0db0-4f15-bb58-887fc48c81d0-000000@email.amazonses.com> <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com> <20303ff0c07346c7ae7cf1200502ecfe@huawei.com> <077201d5318e$5ed91620$4001a8c0@gateway.2wire.net> <C02846B1344F344EB4FAA6FA7AF481F13E7BFE93@dggemm511-mbx.china.huawei.com>
In-Reply-To: <C02846B1344F344EB4FAA6FA7AF481F13E7BFE93@dggemm511-mbx.china.huawei.com>
Accept-Language: en-SG, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.215.37.71]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/HxopWoh8jNfU5SbLDPi7l8WhPQw>
Subject: Re: [netconf] : I-D Action: draft-ietf-netconf-crypto-types-09.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jul 2019 02:04:20 -0000

SGmjrCBUb20NCg0KVGhhbmtzIHZlcnkgbXVjaCBmb3IgdGhlIHN1Z2dlc3Rpb24uIA0KDQpGcmFu
ayBnaXZlIGEgZ29vZCBzdWdnZXN0aW9uLCBhIGJldHRlciB3YXkgY291bGQgYmUgd2UgcHVibGlz
aCB0aGUgUkZDIGZpcnN0IGFuZCB0aGVuIGNyZWF0ZSB0aGUgSUFOQSBsaXN0IGxhdGVyLiANCg0K
UmVnYXJkcy4NCg0KSGFpZ3VhbmcNCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206
IFhpYWxpYW5nIChGcmFuaywgTmV0d29yayBTdGFuZGFyZCAmIFBhdGVudCBEZXB0KSANClNlbnQ6
IFRodXJzZGF5LCBKdWx5IDQsIDIwMTkgNTo1NiBQTQ0KVG86IHRvbSBwZXRjaCA8aWV0ZmNAYnRj
b25uZWN0LmNvbT47IFdhbmcgSGFpZ3VhbmcgPHdhbmcuaGFpZ3Vhbmcuc2hpZWxkbGFiQGh1YXdl
aS5jb20+OyBLZW50IFdhdHNlbiA8a2VudCtpZXRmQHdhdHNlbi5uZXQ+OyBNYXJ0aW4gQmpvcmts
dW5kIDxtYmpAdGFpbC1mLmNvbT4NCkNjOiBuZXRjb25mQGlldGYub3JnDQpTdWJqZWN0OiC08Li0
OiBbbmV0Y29uZl0gOiBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLW5ldGNvbmYtY3J5cHRvLXR5cGVz
LTA5LnR4dA0KDQpIaSBUb20sDQpBZ3JlZSB3aXRoIHlvdXIgZ2VuZXJhbCBvYnNlcnZhdGlvbi4N
Cg0KUGxlYXNlIHNlZSBpbmxpbmU6DQoNCg0KLS0tLS3Tyrz+1K28/i0tLS0tDQq3orz+yMs6IHRv
bSBwZXRjaCBbbWFpbHRvOmlldGZjQGJ0Y29ubmVjdC5jb21dDQq3osvNyrG85DogMjAxOcTqN9TC
M8jVIDE4OjU5DQrK1bz+yMs6IFdhbmcgSGFpZ3VhbmcgPHdhbmcuaGFpZ3Vhbmcuc2hpZWxkbGFi
QGh1YXdlaS5jb20+OyBYaWFsaWFuZyAoRnJhbmssIE5ldHdvcmsgU3RhbmRhcmQgJiBQYXRlbnQg
RGVwdCkgPGZyYW5rLnhpYWxpYW5nQGh1YXdlaS5jb20+OyBLZW50IFdhdHNlbiA8a2VudCtpZXRm
QHdhdHNlbi5uZXQ+OyBNYXJ0aW4gQmpvcmtsdW5kIDxtYmpAdGFpbC1mLmNvbT4NCrOty806IG5l
dGNvbmZAaWV0Zi5vcmcNCtb3zOI6IFJlOiBbbmV0Y29uZl0gOiBJLUQgQWN0aW9uOiBkcmFmdC1p
ZXRmLW5ldGNvbmYtY3J5cHRvLXR5cGVzLTA5LnR4dA0KDQotLS0tLSBPcmlnaW5hbCBNZXNzYWdl
IC0tLS0tDQpGcm9tOiAiV2FuZyBIYWlndWFuZyIgPHdhbmcuaGFpZ3Vhbmcuc2hpZWxkbGFiQGh1
YXdlaS5jb20+DQpTZW50OiBXZWRuZXNkYXksIEp1bHkgMDMsIDIwMTkgMTE6MTcgQU0NCg0KPiBI
aaOsIGFsbC4NCj4NCj4gSSBoYXZlIHNvbWUgY29tbWVudHMgcmVnYXJkaW5nIHRoZSBtYW5hZ2Vt
ZW50IG9mIGNyeXB0byBhbGdvcml0aG1zDQp1c2VkIGJ5IGRpZmZlcmVudCBwcm90b2NvbHMgc3Vj
aCBhcyBUTFMsIElQU2VjIGFuZCBTU0wuDQo+DQo+IEF0IHRoZSBtb21lbnQsIGRpZmZlcmVudCB3
b3JrIGdyb3VwIG1haW50YWlucyBvd24gZGVmaW5pdGlvbnMNCnJlZ2FyZGluZyB0aGUgY3J5cHRv
IGFsZ29yaXRobXMsIGluY2x1ZGluZyBwdWJsaWMga2V5IGFsZ29yaXRobXMsIGtleSBleGNoYW5n
ZSBhbGdvcml0aG1zLCBoYXNoLCBtYWMsIGVuY3J5cHRpb25zIGV0Yy4NCj4gRWFjaCB3b3JraW5n
IGdyb3VwIGRlZmluZWQgdGhlaXIgb3duIGlkZW50aWZpZXJzIGZvciBjcnlwdG8NCmFsZ29yaXRo
bXMuIEluIHNvbWUgZ3JvdXAsIGNyeXB0byBhbGdvcml0aG1zIGZvciBhdXRoZW50aWNhdGlvbiwg
ZW5jcnlwdGlvbiBhbmQga2V5IGV4Y2hhbmdlIGV0Yy4gYXJlIGRlZmluZWQgc2VwYXJhdGVseSB3
aGlsZSBvdGhlcnMgbWF5IGNvbWJpbmVkIGlkZW50aWZpZXJzLg0KPiBUaGUgY3VycmVudCBtZXRo
b2QgcmVxdWlyZXMgYWRkaXRpb25hbCBlZmZvcnRzIGluIGVhY2ggZ3JvdXAgZm9yDQpwcm90b2Nv
bCBkZXZlbG9wbWVudCwgYW5kIGFsc28gaW4gaW1wbGVtZW50YXRpb24gYW5kIG5ldHdvcmsgbWFu
YWdlbWVudC4NCj4NCj4gQSBiZXR0ZXIgd2F5IGNvdWxkIGJlIHRoYXQgdGhlIElFVEYgc2VjdXJp
dHkgZ3JvdXAgZGVmaW5lIGEgdW5pZmllZA0KY3J5cHRvIGFsZ29yaXRobSBpZGVudGlmaWVycyBh
bmQgcmVnaXN0ZXIgdGhlbSB3aXRoIElBTkEuIFRoZXNlIGNyeXB0byBhbGdvcml0aG0gaWRlbnRp
ZmllcnMgY2FuIGJlIHNoYXJlZCBhbW9uZyAgZGlmZmVyZW50IHdvcmtpbmcgZ3JvdXBzIGluIHRo
ZWlyIGZ1dHVyZSB3b3JrLg0KPiBUaGUgY3VycmVudCBkcmFmdC1pZXRmLWNyeXB0by10eXBlcyBw
cm92aWRlcyB2YWx1YWJsZSB3b3JrIHRoZQ0KY2xhc3NpZmljYXRpb24gb2YgY3J5cHRvIGFsZ29y
aXRobXMuDQo+DQo+IEkgdGhpbmsgd2Ugc2hvdWxkIGRpc2N1c3MgdGhpcyBwb2ludCBhbmQgbWFr
ZSBhIGRlY2lzaW9uIHdoZXRoZXIgd2UNCnNob3VsZCBnZXQgSUFOQSByZWdpc3RyYXRpb24gbnVt
YmVycyBmb3IgZGlmZmVyZW50IGNyeXB0byBhbGdvcml0aG1zIGluIHRoZSBjb21pbmcgZmFjZS10
by1mYWNlIG1lZXRpbmcuDQoNClllczotKSB0cm91YmxlIGlzLCBXR3MgYXJlIGluZGVwZW5kZW50
IGFuZCBldmVuIGlmIHRoZXkgYXJlIGluIHRoZSBzYW1lIGFyZWEgd2l0aCB0aGUgc2FtZSBBRCwg
aXQgY2FuIGJlIGEgY2hhbGxlbmdlIHRvIGdldCBhIGNvbW1vbiBhcHByb2FjaC4NCihJIGhhdmUg
YmVlbiB0cnlpbmcsIG1vc3RseSBmYWlsaW5nLCB0byBnZXQgYSBjb29yZGluYXRlZCBhcHByb2Fj
aCBpbiBSb3V0aW5nIHdoZXJlIGFuIGludGVyZmFjZSBjYW4gaGF2ZSBkaWZmZXJlbnQgYXR0cmli
dXRlczAuDQoNCkhlcmUsIHRoZXJlIGlzIGFsc28gYSB0ZWNobmljYWwgY2hhbGxlbmdlIHRoYXQg
dGhlIHBvdGVudGlhbCBsaXN0IG9mIGFsZ29yaXRobXMgaXMgbG9uZywgZGlmZmVyZW50IHByb3Rv
Y29scyBoYXZlIGRpZmZlcmVudCB2aWV3cyBvZiB3aGF0IGlzIGN1cnJlbnQsIHdoYXQgaXMgb2Jz
b2xldGUgYW5kIHNvIG9uIHNvIHdlIGNvdWxkIGFuZCBzaG91bGQgY3JlYXRlIGEgbGlzdCBvZiBl
dmVyeXRoaW5nIHdlIGNhbiB0aGluayBvZiBhbmQgZ2V0IGEgU2VjdXJpdHkgZGlyZWN0b3JhdGUg
dmlldyBvZiB3aGljaCBhcmUgYWNjZXB0YWJsZSwgaW4gdGVybXMgb2Ygc3RyZW5ndGgsIGZvciB3
aGF0OyBhbmQsIHBlcmhhcHMsIGFkZCBhIHRpY2sgbGlzdCBvZiB3aGljaCBwcm90b2NvbHMgdXNl
IHRoZW0sIHNvIHRoYXQgaXQgaXMgZWFzeSB0byBleHRyYWN0IGFsbCB0aG9zZSB3aXRoIGUuZy4g
SVBzZWMgaW4gdGhlIHRpY2tsaXN0LCBmb3IgdXNlIGJ5IElQc2VjLCB3aGljaCB3b3VsZCBiZSBk
aWZmZXJlbnQgbGlzdCBmb3IgdGhvc2Ugd2l0aCBORVRDT05GIGluIHRoZSB0aWNrIGxpc3QuDQoN
CltGcmFua106IEFncmVlIHRoYXQgdGlja2xpc3QgaXMgYW4gZWFjaCB3YXkgZm9yIHRoaXMgZ29h
bCwgYSBtaW5vciBwcm9ibGVtIGlzIHRoZSBiYXNpYyBsaXN0IHdpbGwgYmUgdGhlIG1heGltdW0g
bGlzdCBmb3IgYWxsIHRoZSBwcm90b2NvbCBhbmQgd2lsbCBiZSB2ZXJ5IGxhcmdlLiBUaGUgb3Ro
ZXIgc2ltaWxhciBpZGVhIGluIG15IG1pbmQgaXM6IGZpcnN0bHksIHdlIHNob3VsZCBoYXZlIG9u
ZSBiYXNpYyBjcnlwdG8gYWxnb3JpdGhtIElBTkEgbGlzdCwgd2hpY2ggaXMgYSBiYXNpcyBmb3Ig
ZWFjaCBzcGVjaWZpYyBwcm90b2NvbCdzIGFsZ29yaXRobSBsaXN0LiBTZWNvbmRseSwgZWFjaCBw
cm90b2NvbCAoaS5lLiwgdGxzLCBpcHNlYywgc3NoIC4uLikgaW5oZXJpdHMgdGhlIGJhc2ljIGFs
Z29yaXRobSBsaXN0IHdpdGggcmVxdWlyZWQgbW9kaWZpY2F0aW9uIChpLmUuLCBhZGQgbmV3IGFs
Z28sIG9ic29sZXRlIG9sZCBhbGdvLCAuLi4pLiBMYXN0bHksIGFueSB1cGRhdGUgb2YgdGhlIGJh
c2ljIGxpc3QgbXVzdCByZWZsZWN0IGludG8gZWFjaCBwcm90b2NvbCdzIGxpc3QsIGJ1dCBlYWNo
IHByb3RvY29sJ3MgbGlzdCBjYW4gaGF2ZSBpdHMgb3duIHVwZGF0ZSB3aXRoIG5vIGluZmx1ZW5j
ZSBiYWNrIHRvIGJhc2ljIGxpc3QuIEJ5IHRoaXMgd2F5LCB0aGUgYmFzaWMgbGlzdCBjYW4gYmUg
YSBtaW5pbXVtIGxpc3QsIGFuZCBlYWNoIHByb3RvY29sJ3MgbGlzdCBvbmx5IG5lZWRzIHRvIGZv
Y3VzIG9uIHRoZSBsZWZ0IHBhcnQgaW4gYWRkaXRpb24gdG8gYmFzaWMgbGlzdC4NCg0KVGhlbiBh
bGwgd2UgY2FuIGRvIGlzIG1ha2UgaXQgZWFzeSB0byB1c2UsIHdpZGVseSBrbm93biBhYm91dCBh
bmQgZW5jb3VyYWdlIG90aGVycyB0byB1c2UgLSBvciB0ZWxsIHVzIHdoeSBub3QuDQoNCkJ1dCB0
aGUgZmlyc3Qgc3RlcCwgd2hpY2gsIGFmdGVyIG11Y2ggZGlzY3Vzc2lvbiwgd2UgaGF2ZSB5ZXQg
dG8gdGFrZSwgaXMgdG8gY3JlYXRlIGEgbGlzdC4gSSBwcmVmZXIgbXVsdGlwbGUgbGlzdHMsIGZv
ciBlbmNyeXB0LCBNQUMgYW5kIHNvIG9uLCBlYXNpZXIgdG8gbWFpbnRhaW4uDQoNCltGcmFua106
IGFncmVlIHRvbyB3aXRoIHRoaXMgd2F5IGZvcndhcmRpbmcuIFdlIGhhdmUgbmVhcmx5IGZpbmlz
aGVkIHRoZSBjcnlwdG8gYWxnb3JpdGhtcyBsaXN0IGRlZmluaXRpb24gaW4gZHJhZnQtaWV0Zi1u
ZXRjb25mLWNyeXB0by10eXBlcy0xMC4gU28sIG15IHF1ZXN0aW9uIGlzIGNhbiB3ZSBwdWJsaXNo
IGl0IGFzIHRoZSBSRkMgYmVmb3JlIHRoZSBJQU5BIGxpc3QgaXMgY3JlYXRlZD8NCg0KQi5SLg0K
RnJhbmsNCg0KVG9tIFBldGNoDQoNCg0KDQoNCg0KDQoNCg0KPg0KPiBCZXN0IHJlZ2FyZHMuDQo+
DQo+IEhhaWd1YW5nDQo+DQo+DQo+IEZyb206IG5ldGNvbmYgW21haWx0bzpuZXRjb25mLWJvdW5j
ZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBYaWFsaWFuZw0KKEZyYW5rLCBOZXR3b3JrIFN0YW5k
YXJkICYgUGF0ZW50IERlcHQpDQo+IFNlbnQ6IFRodXJzZGF5LCBKdW5lIDI3LCAyMDE5IDExOjQ3
IEFNDQo+IFRvOiBLZW50IFdhdHNlbiA8a2VudCtpZXRmQHdhdHNlbi5uZXQ+OyBNYXJ0aW4gQmpv
cmtsdW5kDQo8bWJqQHRhaWwtZi5jb20+DQo+IENjOiBuZXRjb25mQGlldGYub3JnDQo+IFN1Ympl
Y3Q6IFtuZXRjb25mXSC08Li0OiBJLUQgQWN0aW9uOg0KZHJhZnQtaWV0Zi1uZXRjb25mLWNyeXB0
by10eXBlcy0wOS50eHQNCj4NCj4gSGkgTWFydGluLCBLZW50IGFuZCBhbGwsDQo+IFRoYW5rcyBm
b3Igc28gcHJvZHVjdGl2ZSBkaXNjdXNzaW9uIGFuZCBjbGFyaWZpY2F0aW9uIGZvciBvdXIgY3Vy
cmVudA0KcHJvYmxlbXMgYW5kIHBvc3NpYmxlIHNvbHV0aW9uLiBBbmQgc29ycnkgZm9yIGxhdGUg
cmVzcG9uc2Ugc2luY2UgSSBhbSBvdXQgb2Ygb2ZmaWNlIHllc3RlcmRheS4NCj4NCj4gTGV0IG1l
IGdpdmUgbW9yZSBpbmZvcm1hdGlvbiBmb3IgYmV0dGVyIHVuZGVyc3RhbmRpbmcgdGhlIGRpZmZp
Y3VsdGllcw0Kd2UgYXJlIGZhY2luZywgYW5kIGhvcGVmdWwgYSBkaXJlY3Rpb24gd29ydGggZm9y
IGdvaW5nIHRvLg0KPg0KPiBQbGVhc2Ugc2VlIGlubGluZToNCj4NCj4NCj4gt6K8/sjLOiBLZW50
IFdhdHNlbiBbbWFpbHRvOmtlbnQraWV0ZkB3YXRzZW4ubmV0XQ0KPiC3osvNyrG85DogMjAxOcTq
NtTCMjfI1SA4OjA2DQo+IMrVvP7IyzogTWFydGluIEJqb3JrbHVuZCA8bWJqQHRhaWwtZi5jb208
bWFpbHRvOm1iakB0YWlsLWYuY29tPj4NCj4gs63LzTogWGlhbGlhbmcgKEZyYW5rLCBOZXR3b3Jr
IFN0YW5kYXJkICYgUGF0ZW50IERlcHQpDQo8ZnJhbmsueGlhbGlhbmdAaHVhd2VpLmNvbTxtYWls
dG86ZnJhbmsueGlhbGlhbmdAaHVhd2VpLmNvbT4+Ow0KbmV0Y29uZkBpZXRmLm9yZzxtYWlsdG86
bmV0Y29uZkBpZXRmLm9yZz4NCj4g1vfM4jogUmU6IFtuZXRjb25mXSBJLUQgQWN0aW9uOiBkcmFm
dC1pZXRmLW5ldGNvbmYtY3J5cHRvLXR5cGVzLTA5LnR4dA0KPg0KPiBIaSBNYXJ0aW4sDQo+DQo+
IDQpIHRvIGVuYWJsZSB0aGUgU1NIIGFuZCBUTFMgbW9kZWxzIHRvIHVzZSB0eXBlcyBkZWZpbmVk
IGluIHRoZWlyIA0KPiBwcm90b2NvbCBzcGVjcywgbWFwcGluZyB0YWJsZXMgd2VyZSBhZGRlZCB0
byB0aG9zZSBkcmFmdHMgdG8gbWFwIHRoZSANCj4gcHJvdG9jb2wtc3BlY2lmaWMgdHlwZXMgdG8g
dGhlIGdlbmVyaWMgY3J5cHRvLXR5cGVzIHR5cGUuDQo+DQo+IFNvIHBlcmhhcHMgdGhpcyBpcyBu
b3QgdGhlIGJlc3Qgc29sdXRpb24/ICBUaGUgYmlnIHNldCBvZiB0eXBlcyAoaW4NCj4gY3J5cHRv
LXR5cGVzKSB3aWxsIGNoYW5nZSBvdmVyIHRpbWUsIGFuZCB0aGUgc3Vic2V0cyB1c2VkIGluIHZh
cmlvdXMgDQo+IGFwcGxpY2F0aW9ucyB3aWxsIGFsc28gY2hhbmdlIG92ZXIgdGltZS4gIFRoZSBi
ZXN0IHNvbHV0aW9uIGZvciBzdWNoIA0KPiBzZXRzIGluIHRoZSBJRVRGIHNlZW1zIHRvIGJlIElB
TkEgcmVnaXN0cmllcywgd2l0aCBjb3JyZXNwb25kaW5nIA0KPiBJQU5BLW1haW50YWluZWQgWUFO
RyBtb2R1bGVzLg0KPg0KPiBJJ20gaG9waW5nIHNvbWVvbmUsIHBlcmhhcHMgbXkgY28tYXV0aG9y
cywgY2FuIHN1Z2dlc3QgYSBwYXRoIGZvcndhcmQuDQo+DQo+IFtGcmFua106IFdlIG1haW5seSBy
ZWZlcmVuY2UgdG8gdGhlc2UgMyBJQU5BIHJlZ2lzdHJpZXMgZm9yIGRlZmluZSBvdXINCmNyeXB0
byB0eXBlcyBpbiBkcmFmdDoNCj4NCj4gMS4NCmh0dHBzOi8vd3d3LmlhbmEub3JnL2Fzc2lnbm1l
bnRzL3Rscy1wYXJhbWV0ZXJzL3Rscy1wYXJhbWV0ZXJzLnhodG1sOg0Kd2hpY2ggaW5jbHVkZXMg
VExTIDEuMiBhbmQgVExTIDEuMy4NCj4NCj4gMi4NCmh0dHBzOi8vd3d3LmlhbmEub3JnL2Fzc2ln
bm1lbnRzL2lrZXYyLXBhcmFtZXRlcnMvaWtldjItcGFyYW1ldGVycy54aHRtbA0KLCBodHRwczov
L3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODIyMS0tIGNyeXB0byBhbGdvcml0aG1zIGd1aWRhbmNl
IGZvciBFU1AgYW5kIEFILCBodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODI0Ny0tIGNy
eXB0byBhbGdvcml0aG1zIGd1aWRhbmNlIGZvciBJS0V2MjogdGhlIDIgZHJhZnRzIGFyZSB0aGUg
bGF0ZXN0IHJlY29tbWVuZGF0aW9ucyBmb3IgY3J5cHRvIGFsZ29zIG9mIElQc2VjLCBzbyB3ZSBt
YWlubHkgcmVmZXJlbmNlIHRoZSBkZWZpbml0aW9uIGluIHRoZW07DQo+DQo+IDMuDQpodHRwczov
L3d3dy5pYW5hLm9yZy9hc3NpZ25tZW50cy9zc2gtcGFyYW1ldGVycy9zc2gtcGFyYW1ldGVycy54
aHRtbCwNCmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM0MjUzIC0tIG1haW4gU1NIIFNw
ZWMsDQpodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODMzMiAtLSBuZXcgUlNBIHdpdGgg
U0hBMjU2IGFuZCBTSEE1MTIgZm9yIGl0cyBhdXRoZW50aWNhdGlvbiBmdW5jdGlvbjogYWxzbywg
dGhlIDIgZHJhZnRzIGFyZSB0aGUgbWFpbiByZXNvdXJjZSB3ZSBoYXZlIHJlZmVyZW5jZWQuDQo+
DQo+IFNvLCB0aGUgYWJvdmUgcmVmZXJlbmNlIGFyZSBhbGwgY3VycmVudCBpbnB1dCBmb3IgdGhl
IGNyeXB0byB0eXBlDQpkZWZpbml0aW9uIGluIHRoZSBjcnlwdG8gdHlwZXMgZHJhZnQuIE5vdywg
dGhlIDIgbWFpbiBkaWZmaWN1bHRpZXMgZm9yIHVzIGFyZToNCj4NCj4gMS4gICAgICAgRm9yIHRo
ZSBhYm92ZSAzIHByb3RvY29scyBhbmQgdGhlaXIgcmVzcGVjdGl2ZSBhbmQgZGlmZmVyZW50DQpj
cnlwdG8gYWxnb3JpdGhtIGRlZmluaXRpb24gaW4gZWFjaCBJQU5BIHJlZ2lzdHJpZXMsIHNob3Vs
ZCB3ZSBhbGlnbiBvdXIgeWFuZyBtb2RlbCB0byBhbGwgb2YgdGhlbSwgb3Igb25seSBvbmUgb2Yg
dGhlbT8gSWYgdGhlIGZvcm1lciwgd2UgbXVzdCBkZWFsIHdpdGggdGhlIHByb2JsZW0gdGhhdCBz
YW1lIGNyeXB0byBhbGdvIGhhcyBkaWZmZXJlbnQgSUFOQSBudW1iZXIgaW4gZGlmZmVyZW50IElB
TkEgcmVnaXN0cmllcz8NCj4NCj4gMi4gICAgICAgQ29uc2lkZXJpbmcgVExTIDEuMiwgd2hpY2gg
dXNlcyBhIGNvbWJpbmVkIHdheSB0byByZXByZXNlbnQNCmRpZmZlcmVudCB0eXBlcyBvZiBjcnlw
dG8gaW50byBvbmUgSUFOQSBudW1iZXIgKGUuZy4sIFRMU19ESEVfUlNBX1dJVEhfQUVTXzEyOF9H
Q01fU0hBMjU2KS4gVGhhdCBpcyBhZ2FpbnN0IG91ciBjcnlwdG8gdHlwZSBkZWZpbml0aW9uIHBy
aW5jaXBsZSAoSVBzZWMgYW5kIFNTSCBhcmUgYWxsIGFsaWduZWQpOiBhdG9taWMsIHdoaWNoIG1l
YW5zIHdlIGFyZSBjdXJyZW50bHkgZGVmaW5lIDcgY2F0ZWdvcmllcyBvZiBjcnlwdG8gdHlwZTog
SGFzaCBBbGdvcml0aG1zLCBBc3ltbWV0cmljIEtleSBBbGdvcml0aG1zLCBNQUMgQWxnb3JpdGht
cywgRW5jcnlwdGlvbiBBbGdvcml0aG1zLCBFbmNyeXB0aW9uIGFuZCBNQUMgQWxnb3JpdGhtcywg
U2lnbmF0dXJlIEFsZ29yaXRobXMgYW5kIEtleSBFeGNoYW5nZSBBbGdvcml0aG1zLiBTbywgaG93
IHNob3VsZCB3ZSBtYXAgb3VyIGNyeXB0byB0eXBlIGRlZmluaXRpb24gYmFjayB0byBUTFMgMS4y
IElBTkEgbnVtYmVycz8NCj4NCj4gQWZ0ZXIgY2xhcmlmeWluZyBvdXIgcHJvYmxlbXMsIEkgd2Fu
dCB0byBhc2sgaWYgd2UgY2FuIHNvbHZlIHRoZW0gYnkNCnRoaXMgd2F5OiB3ZSB5YW5nIGd1eXMg
ZGVmaW5lIGEgY3J5cHRvIHR5cGUgeWFuZyBJQU5BIHJlZ2lzdHJpZXMsIHdoaWNoIGNhbiBrZWVw
IG9uIGJlaW5nIGFsaWduZWQgd2l0aCBhbGwgdGhlIHJlbGF0ZWQgcHJvdG9jb2xzoa8gSUFOQSBy
ZWdpc3RyaWVzLCBidXQgaGF2ZSBpdHMgb3duIElBTkEgbnVtYmVyIGZvciBlYWNoIGNyeXB0byBh
bGdvcml0aG1zLiBTbywgb3VyIGRyYWZ0IGp1c3QgbmVlZCB0byBmb2xsb3cgdGhpcyBJQU5BIHJl
Z2lzdHJpZXMuDQo+DQo+IDgpIG91ciBlZmZvcnRzIHRvIG5vcm1hbGl6ZSB0aGlzIG1heSBiZSBm
dXRpbGUsIGFuZCB5ZXQgd2Ugd2FudCB0byANCj4gc3VwcG9ydCBrZXlzdG9yZS4NCj4NCj4gUGVy
aGFwcyB3ZSBjYW4gdGFrZSBhIHN0ZXAgYmFjayBhbmQgZGVmaW5lIGp1c3QgdGhlIHR5cGVzIHdl
IG5lZWQgDQo+IHJpZ2h0IG5vdyBmb3Iga2V5c3RvcmUsIGluIG9yZGVyIHRvIGZpbmlzaCB0aGVz
ZSBkcmFmdHMuICBUaGVuIHdlIChvciANCj4gc29tZSBvdGhlciBXRykgY2FuIGltbWVkaWF0ZWx5
IHN0YXJ0IHRvIHdvcmsgb24gYW4gdXBkYXRlIHRvIA0KPiBjcnlwdG8tdHlwZXMgdGhhdCB3b3Vs
ZCBkZWZpbmUgbW9yZSB0eXBlcyBmb3Igb3RoZXIgcHVycG9zZXMgYXMgd2VsbC4NCj4NCj4gTWF5
YmUsIGRlcGVuZGluZyBvbiBob3cgdGhhdCB0dXJucyBvdXQsIGl0IG1heSBiZSB0cml2aWFsIHRv
IGV4dGVuZA0KdGhlIGFwcHJvYWNoIHRvIGNvdmVyIGV2ZXJ5dGhpbmcuDQo+DQo+IFtGcmFua106
IGJhc2VkIG9uIG15IGNsYXJpZmljYXRpb24gYWJvdmUsIGV2ZW4gd2UgaGF2ZSBUTFMgYW5kIFNT
SA0Kbm93LCB3ZSBzdGlsbCBoYXZlIHRvIGRlYWwgd2l0aCB0aGUgYWZvcmVtZW50aW9uZWQgMiBk
aWZmaWN1bHRpZXMuIElmIHNvLCB3aHkgbm90IGRvIGl0IHJpZ2h0IGF0IHN0YXJ0IHRpbWU/DQo+
DQo+DQo+IEIuUi4NCj4gRnJhbmsNCj4NCj4gS2VudCAvLyBjb250cmlidXRvcg0KPg0KDQoNCi0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLQ0KLS0tLS0tLS0NCg0KDQo+IF9fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fDQo+IG5ldGNvbmYgbWFpbGluZyBsaXN0DQo+IG5ldGNvbmZA
aWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9uZXRjb25m
DQo+DQoNCg==


From nobody Fri Jul  5 07:41:26 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FFBA12008A; Fri,  5 Jul 2019 07:41:25 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.2
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: netconf@ietf.org
Message-ID: <156233768497.21982.2581541129542033595@ietfa.amsl.com>
Date: Fri, 05 Jul 2019 07:41:25 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/LHMDl8twHomOv9lzltJRsXKlh4A>
Subject: [netconf] I-D Action: draft-ietf-netconf-notification-capabilities-02.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jul 2019 14:41:25 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Network Configuration WG of the IETF.

        Title           : Yang-Push Notification Capabilities
        Authors         : Balazs Lengyel
                          Alexander Clemm
                          Benoit Claise
	Filename        : draft-ietf-netconf-notification-capabilities-02.txt
	Pages           : 17
	Date            : 2019-07-05

Abstract:
   This document proposes a YANG module that allows a server to specify
   server capabilities related to "Subscription to YANG Datastores"
   (Yang-Push).  It proposes to use YANG Instance Data to document this
   information and make it already available at implementation time, but
   also allow it to be reported at runtime.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-notification-capabilities/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-netconf-notification-capabilities-02
https://datatracker.ietf.org/doc/html/draft-ietf-netconf-notification-capabilities-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-netconf-notification-capabilities-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Sun Jul  7 20:10:51 2019
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D8C71200FA; Sun,  7 Jul 2019 20:10:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WLN4AGvJMWzI; Sun,  7 Jul 2019 20:10:48 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB3ED1200F7; Sun,  7 Jul 2019 20:10:47 -0700 (PDT)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 644A5A99E749E112C70E; Mon,  8 Jul 2019 04:10:46 +0100 (IST)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 8 Jul 2019 04:10:46 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.134]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0415.000; Mon, 8 Jul 2019 11:07:27 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: "netconf@ietf.org" <netconf@ietf.org>
CC: "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>
Thread-Topic: New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AQHVNTZDwBfbWqqXaUyVrraPIkdGOqbAAoxQ
Date: Mon, 8 Jul 2019 03:07:27 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BEE7B2D1@NKGEML515-MBS.china.huawei.com>
References: <156255351762.5059.4778388707413708715.idtracker@ietfa.amsl.com>
In-Reply-To: <156255351762.5059.4778388707413708715.idtracker@ietfa.amsl.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.156.116]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/xocKhi8VkSjNxNXX6ZqQj1VUtnM>
Subject: [netconf] FW: New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jul 2019 03:10:50 -0000
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==


From nobody Mon Jul  8 23:03:22 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E098C120169 for <netconf@ietfa.amsl.com>; Mon,  8 Jul 2019 23:03:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CfO_KMBuhzky for <netconf@ietfa.amsl.com>; Mon,  8 Jul 2019 23:03:18 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CAF9120154 for <netconf@ietf.org>; Mon,  8 Jul 2019 23:03:18 -0700 (PDT)
Received: from LHREML714-CAH.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id C1BB1810090C8CD4A628 for <netconf@ietf.org>; Tue,  9 Jul 2019 07:03:16 +0100 (IST)
Received: from lhreml715-chm.china.huawei.com (10.201.108.66) by LHREML714-CAH.china.huawei.com (10.201.108.37) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 9 Jul 2019 07:03:16 +0100
Received: from lhreml715-chm.china.huawei.com (10.201.108.66) by lhreml715-chm.china.huawei.com (10.201.108.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Tue, 9 Jul 2019 07:03:16 +0100
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml715-chm.china.huawei.com (10.201.108.66) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Tue, 9 Jul 2019 07:03:15 +0100
Received: from NKGEML513-MBX.china.huawei.com ([169.254.1.66]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Tue, 9 Jul 2019 14:02:59 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Tianran Zhou <zhoutianran@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AdU2CHMG9JnViFsETl2WTaEeLGjsWQ==
Date: Tue, 9 Jul 2019 06:02:59 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/lhodpim1KZxhHWiaa2nuixUjtu8>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 06:03:21 -0000
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From nobody Mon Jul  8 23:38:52 2019
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 900BD120314 for <netconf@ietfa.amsl.com>; Mon,  8 Jul 2019 23:38:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iZ-kY7WS1KIc for <netconf@ietfa.amsl.com>; Mon,  8 Jul 2019 23:38:47 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7239C120307 for <netconf@ietf.org>; Mon,  8 Jul 2019 23:38:47 -0700 (PDT)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 506B1891F9E9409DECD9 for <netconf@ietf.org>; Tue,  9 Jul 2019 07:38:45 +0100 (IST)
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 9 Jul 2019 07:38:45 +0100
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Tue, 9 Jul 2019 07:38:44 +0100
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Tue, 9 Jul 2019 07:38:44 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.134]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0415.000; Tue, 9 Jul 2019 14:38:36 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AdU2CHMGwBfbWqqXaUyVrraPIkdGOgAFaxMw
Date: Tue, 9 Jul 2019 06:38:36 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.156.116]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/fb8Qewyxn3Ld07AbUDRIDmHicBc>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 06:38:51 -0000
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From nobody Tue Jul  9 04:58:45 2019
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB331200E9; Tue,  9 Jul 2019 04:58:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J0dhUlr0dqdt; Tue,  9 Jul 2019 04:58:33 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B173A1200E0; Tue,  9 Jul 2019 04:58:33 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 5D2ECB8160A; Tue,  9 Jul 2019 04:58:31 -0700 (PDT)
To: mbj@tail-f.com, andy@yumaworks.com, mbj@tail-f.com, kwatsen@juniper.net
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: ibagdona@gmail.com, iesg@ietf.org, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20190709115831.5D2ECB8160A@rfc-editor.org>
Date: Tue,  9 Jul 2019 04:58:31 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/UWyyEfbBdFnORj3fSy2neG3f4YY>
Subject: [netconf] [Errata Verified] RFC8040 (5566)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 11:58:35 -0000

The following errata report has been verified for RFC8040,
"RESTCONF Protocol". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid5566

--------------------------------------
Status: Verified
Type: Technical

Reported by: Martin Björklund <mbj@tail-f.com>
Date Reported: 2018-12-03
Verified by: Ignas Bagdonas (IESG)

Section: B.3.2

Original Text
-------------
          "player" : {
            "gap" : 0.5
          }


Corrected Text
--------------
          "player" : {
            "gap" : "0.5"
          }


Notes
-----
The quoted text occurs twice; p 128 and p 130.

The leaf "gap" is defined as type decimal64 in A.1.  According to RFC 7951, section 6.1, a decimal64 type is represented as a string in JSON.

--------------------------------------
RFC8040 (draft-ietf-netconf-restconf-18)
--------------------------------------
Title               : RESTCONF Protocol
Publication Date    : January 2017
Author(s)           : A. Bierman, M. Bjorklund, K. Watsen
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Tue Jul  9 11:31:05 2019
Return-Path: <0100016bd800adea-6301d1c5-5a82-4eaa-a7f3-afd421399950-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE8E512006B; Tue,  9 Jul 2019 11:30:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cUdz-GsXO--Y; Tue,  9 Jul 2019 11:30:54 -0700 (PDT)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4AC4812000F; Tue,  9 Jul 2019 11:30:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562697051; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=aO7g9h/V32cXtg5d/8lXt7YUgDLfzS1axpV5iKBdeAE=; b=KgLVgeLAWX6LhS6HJyW3GxLy7QQMMQEQecLWVTj+cYLnEeefWqDG9AiJLSL2Bn4h 6uvJrNqgdXsxenXEK2YU41e8X9B+nNMLEIeV2vQ9PZKepTp1VXA8x/mN7Oq6ikMtzOu DZ/EHx7aqXutFVEIFqjVrWsl00VV6V9WkAd+7P68=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016bd800adea-6301d1c5-5a82-4eaa-a7f3-afd421399950-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_CF4FB185-41B8-4110-AF78-CC0A27A78B85"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 9 Jul 2019 18:30:51 +0000
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA49C603F@nkgeml513-mbx.china.huawei.com>
Cc: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
To: Qin Wu <bill.wu@huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49C603F@nkgeml513-mbx.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.09-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/wgFx5GBHtf-iXwrM-4tiF4MI6EQ>
Subject: Re: [netconf] [netmod]   RE:  pls clarify get operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 18:30:57 -0000

--Apple-Mail=_CF4FB185-41B8-4110-AF78-CC0A27A78B85
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

[Just back from a 4th of July thing]

Hi Qin,

> It provides guideline how to create temporary non-NMDA module from =
NMDA module, but temporary non-NMDA module is not standard module. So =
everybody will create the same temporary non-NMDA module?





> I also feel this second paragraph is not very clear, especially the =
last sentence,  is nested config false data nodes part of NMDA module or =
temporary non-NMDA
> Module? Looks like  nested config false data node part of NMDA module?

True, but as I wrote Frank on the 28th: =20

"Some drafts already publish a "state" module in their Appendix and, =
when they do, there is a completely standard non-NMDA IETF solution.  I =
don't know if this strategy is being followed universally but, if not, =
then I don't believe the IETF would object at all to the publication of =
drafts for missing state models in drafts that only assumed NMDA."  =20

Are you facing this situation currently?   If so, with which modules?  =
Have you considered submitting an I-D to define the missing state tree =
module?


> Can non-NMDA client consume NMDA module?

Sort of.  The config-true nodes will appear in the <running> as usual, =
and the config-false nodes can be accessed via the standard operations.  =
But there will be issues as, for instance, the config-false nodes will =
only appear for configured items and the operational value for =
config-true nodes will be missing, the latter of which may be important =
as an NMDA-optimized data model is unlikely to define config-false nodes =
for any config-true nodes, and hence the config-false that are defined =
may be far and few between, leading to an unacceptably incomplete =
upstate view.


> If the answer is Yes, why the server need to advertise both NMDA and =
temporary non-NMDA module?

Not "yes", see above.


> Why <get> operation is deprecated when non-NMDA client uses NMDA =
module?

It's not deprecated (yet).


> How does the non-NMDA client deal with temporary non-NMDA module? Use =
<get> operation to get access to it?

Yes.

> How does the non-NMDA client distinguish NMDA module from temporary =
Non-NMDA module?

There is nothing in a module's definition that a client can key off to =
determine that at the moment.  A client could use deductive reasoning =
(e.g., if there's a foo-state tree, then most likely non-NMDA), but this =
is pretty limited.   Per RFC 8407, the RFC's Introduction section should =
indicate when a module is NMDA-optimized, so non-generic clients should =
know.


Kent // contributor



--Apple-Mail=_CF4FB185-41B8-4110-AF78-CC0A27A78B85
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">[Just back from a 4th of July thing]</div><div class=3D""><br =
class=3D""></div>Hi Qin,<br class=3D""><div><br =
class=3D""></div><div><blockquote type=3D"cite" class=3D""><div =
class=3D""><div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" =
class=3D""><div class=3D"WordSection1"><div class=3D""><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">It provides guideline how to create temporary =
non-NMDA module from NMDA module, but temporary non-NMDA module is not =
standard module. So everybody
 will create the same temporary non-NMDA module? =
</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div lang=3D"ZH-CN" link=3D"blue"=
 vlink=3D"purple" class=3D""><div class=3D"WordSection1"><div =
class=3D""><p class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p class=3D""></o:p></span></p><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">I also feel this second paragraph is not very =
clear, especially the last sentence, &nbsp;is nested config false data =
nodes part of NMDA module or temporary
 non-NMDA<o:p class=3D""></o:p></span></p><p class=3D"MsoNormal"><span =
lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">Module? Looks like&nbsp; nested config false data =
node part of NMDA module?
</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div>True, but as I wrote Frank on the 28th: =
&nbsp;</div><div><br class=3D""></div></div><blockquote style=3D"margin: =
0 0 0 40px; border: none; padding: 0px;" class=3D""><div><div>"Some =
drafts already publish a "state" module in their Appendix and, when they =
do, there is a completely standard non-NMDA IETF solution. &nbsp;I don't =
know if this strategy is&nbsp;being followed universally but, if not, =
then I don't believe the IETF would object at all to the publication of =
drafts for missing state models in drafts that only assumed NMDA." =
&nbsp;&nbsp;</div></div></blockquote><div><div><br =
class=3D""></div><div>Are you facing this situation currently? &nbsp; If =
so, with which modules? &nbsp;Have you considered submitting an I-D to =
define the missing state tree module?</div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div lang=3D"ZH-CN" link=3D"blue" =
vlink=3D"purple" class=3D""><div class=3D"WordSection1"><div class=3D""><p=
 class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p class=3D""></o:p></span></p><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">Can non-NMDA client consume NMDA module? =
</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Sort of. &nbsp;The config-true nodes will appear =
in the &lt;running&gt; as usual, and the config-false nodes can be =
accessed via the standard operations. &nbsp;But there will be issues as, =
for instance, the config-false nodes will only appear for configured =
items and the operational value for config-true nodes will be missing, =
the latter of which may be important as an NMDA-optimized data model is =
unlikely to define config-false nodes for any config-true nodes, and =
hence the config-false that are defined may be far and few between, =
leading to an unacceptably incomplete upstate view.</div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" =
class=3D""><div class=3D"WordSection1"><div class=3D""><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">If the answer is Yes, why the server need to =
advertise both NMDA and temporary non-NMDA =
module?</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Not "yes", see above.</div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" =
class=3D""><div class=3D"WordSection1"><div class=3D""><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p class=3D""></o:p></span></p><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">Why &lt;get&gt; operation is deprecated when =
non-NMDA client uses NMDA =
module?</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div>It's not deprecated (yet).</div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div lang=3D"ZH-CN" link=3D"blue" vlink=3D"purple" =
class=3D""><div class=3D"WordSection1"><div class=3D""><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p class=3D""></o:p></span></p><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">How does the non-NMDA client deal with temporary =
non-NMDA module? Use &lt;get&gt; operation to get access to =
it?</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div>Yes.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div lang=3D"ZH-CN" link=3D"blue" =
vlink=3D"purple" class=3D""><div class=3D"WordSection1"><div class=3D""><p=
 class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p class=3D""></o:p></span></p><p =
class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D"">How does the non-NMDA client distinguish NMDA =
module from temporary Non-NMDA =
module?</span></p></div></div></div></div></blockquote><div><br =
class=3D""></div><div>There is nothing in a module's definition that a =
client can key off to determine that at the moment. &nbsp;A client could =
use deductive reasoning (e.g., if there's a foo-state tree, then most =
likely non-NMDA), but this is pretty limited. &nbsp; Per RFC 8407, the =
RFC's Introduction section should indicate when a module is =
NMDA-optimized, so non-generic clients should know.</div><div><br =
class=3D""></div><div><br class=3D""></div>Kent // =
contributor</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div lang=3D"ZH-CN" link=3D"blue" =
vlink=3D"purple" class=3D""><div class=3D"WordSection1"><div class=3D""><p=
 class=3D"MsoNormal"><span lang=3D"EN-US" =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,sans-serif;color=
:#1F497D" class=3D""><o:p =
class=3D""></o:p></span></p></div></div></div></div></blockquote></div><br=
 class=3D""><style class=3D""><!--
/* Font Definitions */
@font-face
	{font-family:=E5=AE=8B=E4=BD=93;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=E5=AE=8B=E4=BD=93";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:=E5=AE=8B=E4=BD=93;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML =E9=A2=84=E8=AE=BE=E6=A0=BC=E5=BC=8F Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:=E5=AE=8B=E4=BD=93;}
span.EmailStyle17
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:#1F497D;}
span.HTMLChar
	{mso-style-name:"HTML =E9=A2=84=E8=AE=BE=E6=A0=BC=E5=BC=8F =
Char";
	mso-style-priority:99;
	mso-style-link:"HTML =E9=A2=84=E8=AE=BE=E6=A0=BC=E5=BC=8F";
	font-family:=E5=AE=8B=E4=BD=93;}
span.grey
	{mso-style-name:grey;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style></body></html>=

--Apple-Mail=_CF4FB185-41B8-4110-AF78-CC0A27A78B85--


From nobody Tue Jul  9 15:00:11 2019
Return-Path: <0100016bd8c03b78-f8458a02-ea7d-4a0d-bebe-8ee8af9afc1b-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0B8A1201CB for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 15:00:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lhO4xzOblJXc for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 15:00:07 -0700 (PDT)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CE021201B8 for <netconf@ietf.org>; Tue,  9 Jul 2019 15:00:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562709605; h=From:Content-Type:Mime-Version:Subject:Date:References:To:In-Reply-To:Message-Id:Feedback-ID; bh=8zffM/AoOFukFnCvT//NRMYnrOylcjHK1Etiu6wCt4g=; b=V52+myercUe+gzD0dM4vMbFa7nTyWKp6c68wbmjy0zTcwAmLl0Ioo1+EjDccaIJA TYVlqjHQB+PmHtIeKP7W1hOKgUby9Mqx5H6ltrAXJBJXhUOQXznzgLZwrRvZWQVMsFx U2arWCjcrCpq4JNnwH0PK4V3Oz5c85WpogXmUWfg=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_05CECC08-A779-46F8-84FF-C06ADAE81EB3"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 9 Jul 2019 22:00:05 +0000
References: <C02846B1344F344EB4FAA6FA7AF481F13E7B118B@dggemm511-mbx.china.huawei.com> <20190625.084508.905200182299290020.mbj@tail-f.com> <0100016b8f701d10-02dff612-5c5f-4ed3-938d-8b9f25679996-000000@email.amazonses.com> <20190625.224243.332607515244909664.mbj@tail-f.com> <0100016b9640a87c-b6e29e8c-0db0-4f15-bb58-887fc48c81d0-000000@email.amazonses.com> <C02846B1344F344EB4FAA6FA7AF481F13E7B45A1@dggemm511-mbx.china.huawei.com> <20303ff0c07346c7ae7cf1200502ecfe@huawei.com> <077201d5318e$5ed91620$4001a8c0@gateway.2wire.net> <C02846B1344F344EB4FAA6FA7AF481F13E7BFE93@dggemm511-mbx.china.huawei.com> <93e01a1014194663a9b262554030506e@huawei.com>
To: "netconf@ietf.org" <netconf@ietf.org>
In-Reply-To: <93e01a1014194663a9b262554030506e@huawei.com>
Message-ID: <0100016bd8c03b78-f8458a02-ea7d-4a0d-bebe-8ee8af9afc1b-000000@email.amazonses.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.09-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/lePBMIQr3HVfFMIy3avzKSKQUCs>
Subject: [netconf] algorithms in crypto-types
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 22:00:10 -0000

--Apple-Mail=_05CECC08-A779-46F8-84FF-C06ADAE81EB3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


This message proposes an approach for how to support algorithms that is =
quite different than in the current draft.

But, first, let me preface this by saying I continue to believe the =
current approach is ideal (as in idealistic), but fear that it may be =
trying to solve a problem that should be solved by the crypto community, =
not us (and hence not very practical).    To be ensure this is the case, =
the Chairs need to reach out to the Security Directorate for guidance.  =
With luck, a representative will be up to speed and able to attend our =
session Monday morning.  Stay tuned.

That being the case, I'd like to suggest an alternative approach, which =
is for ietf-crypto-types to define even more ASN.1 types, specifically, =
ASN.1 types for public and private keys.   But, first, let me explain =
how I came to think of this idea.  As mentioned before, I'm implementing =
ietf-restconf-server and when I got to the point of needing to populate =
values for the public and private key nodes, I took a shortcut of just =
storing the DER-encoded ASN.1 values provided by a utility such as =
OpenSSL.  Of course, ietf-restconf-server is primarily about HTTP over =
TLS, and hence it's common a create keys in the process of generating =
the PKI hierarchies needed to support TLS trust-anchor and end-entity =
certificates.   I was just being lazy at the time but, after awhile =
stewing on it, I'm wondering if this might not be an idea worth =
standardizing.

To be clear, the idea is to define the public/private key nodes as being =
ASN.1 types and, in doing so, inherit the algorithm identities used by =
ASN.1, thus negating the need to define any YANG-level identities.

Framing this idea a little more, if we were to do this:

1) ietf-crypto-types might be better titled ietf-asn1-types.  Already =
the module defines many ASN.1 types (listed below) and, after adding a =
few more ASN.1 types for the public and private key structures, and =
removing the identities/enumerations for the algorithms, all the =
typedefs would there be ASN.1 based.   [Here are the current ASN.1 types =
defined in the current module: x509, crl, cms, data-content-cms, =
signed-data-cms, enveloped-data-cms, digested-data-cms, =
encrypted-data-cms, authenticated-data-cms, trust-anchor-cert-x509, =
end-entity-cert-x509, trust-anchor-cert-cms, and end-entity-cert-cms.]

2) the solution in the suite of client-server drafts would be very much =
ASN.1 oriented.  This would be (for the most part) splendid for =
TLS-based protocols, but not very helpful for other protocols, notably =
SSH (unless using the X.509 extensions per RFC 6187).   It sounds =
limiting but, let's be honest, TLS is the basis for most protocols and =
hence this would be a 90% solution.  Further, when thinking about =
ietf-truststore, it's fairly uncommon to use trust-anchors with SSH.  =
And, for ietf-keystore, I'm unsure at this point to what extent =
keystores are used to protect SSH private keys - I've never seen a =
TPM/HSM used to protect an SSH key, unless the key were encrypted (as in =
the latest keystore draft), or was an X.509 end-entity certificate (per =
RFC 6187, albeit I don't know any vendor that supports RFC 6187 today).

3) this approach would do little to help the other WGs (e.g., SACM) with =
their YANG modeling endeavors.  Note that the reason my co-authors from =
Huawei were attracted to helping us with this effort was because they =
want to embrace-and-extend it for other work.  I'm not up-to-speed on =
that, and thus look to them to share more about the landscape in which =
this module fits.


Kent // contributor


--Apple-Mail=_05CECC08-A779-46F8-84FF-C06ADAE81EB3
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;" class=3D""><div class=3D""><br =
class=3D""></div><div class=3D"">This message proposes an approach for =
how to support algorithms that is quite different than in the current =
draft.</div><div class=3D""><br class=3D""></div><div class=3D"">But, =
first, let me preface this by saying I continue to believe the current =
approach is ideal (as in idealistic), but fear that it may be trying to =
solve a problem that should be solved by the crypto community, not us =
(and hence not very practical). &nbsp; &nbsp;To be ensure this is the =
case, the Chairs need to reach out to the Security Directorate for =
guidance. &nbsp;With luck, a representative will be up to speed and able =
to attend our session Monday morning. &nbsp;Stay tuned.</div><div =
class=3D""><br class=3D""></div><div class=3D"">That being the case, I'd =
like to suggest an alternative approach, which is for ietf-crypto-types =
to define even more ASN.1 types, specifically, ASN.1 types for public =
and private keys. &nbsp; But, first, let me explain how I came to think =
of this idea. &nbsp;As mentioned before, I'm implementing =
ietf-restconf-server and when I got to the point of needing to populate =
values for the public and private key nodes, I took a shortcut of just =
storing the DER-encoded ASN.1 values provided by a utility such as =
OpenSSL. &nbsp;Of course, ietf-restconf-server is primarily about HTTP =
over TLS, and hence it's common a create keys in the process of =
generating the PKI hierarchies needed to support TLS trust-anchor and =
end-entity certificates. &nbsp; I was just being lazy at the time but, =
after awhile stewing on it, I'm wondering if this might not be an idea =
worth standardizing.</div><div class=3D""><br class=3D""></div><div =
class=3D"">To be clear, the idea is to define the public/private key =
nodes as being ASN.1 types and, in doing so, inherit the algorithm =
identities used by ASN.1, thus negating the need to define any =
YANG-level identities.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Framing this idea a little more, if we were to do =
this:</div><div class=3D""><br class=3D""></div><div class=3D"">1) =
ietf-crypto-types might be better titled ietf-asn1-types. &nbsp;Already =
the module defines many ASN.1 types (listed below) and, after adding a =
few more ASN.1 types for the public and private key structures, and =
removing the identities/enumerations for the algorithms, all the =
typedefs would there be ASN.1 based. &nbsp; [Here are the current ASN.1 =
types defined in the current module: =
x509,&nbsp;crl,&nbsp;cms,&nbsp;data-content-cms,&nbsp;signed-data-cms,&nbs=
p;enveloped-data-cms,&nbsp;digested-data-cms,&nbsp;encrypted-data-cms,&nbs=
p;authenticated-data-cms,&nbsp;trust-anchor-cert-x509,&nbsp;end-entity-cer=
t-x509,&nbsp;trust-anchor-cert-cms, and end-entity-cert-cms.]</div><div =
class=3D""><br class=3D""></div><div class=3D"">2) the solution in the =
suite of client-server drafts would be very much ASN.1 oriented. =
&nbsp;This would be (for the most part) splendid for TLS-based =
protocols, but not very helpful for other protocols, notably SSH (unless =
using the X.509 extensions per RFC 6187). &nbsp; It sounds limiting but, =
let's be honest, TLS is the basis for most protocols and hence this =
would be a 90% solution. &nbsp;Further, when thinking about =
ietf-truststore, it's fairly uncommon to use trust-anchors with SSH. =
&nbsp;And, for ietf-keystore, I'm unsure at this point to what extent =
keystores are used to protect SSH private keys - I've never seen a =
TPM/HSM used to protect an SSH key, unless the key were encrypted (as in =
the latest keystore draft), or was an X.509 end-entity certificate (per =
RFC 6187, albeit I don't know any vendor that supports&nbsp;RFC =
6187&nbsp;today).</div><div class=3D""><br class=3D""></div><div =
class=3D"">3) this approach would do little to help the other WGs (e.g., =
SACM) with their YANG modeling endeavors. &nbsp;Note that the reason my =
co-authors from Huawei were attracted to helping us with this effort was =
because they want to embrace-and-extend it for other work. &nbsp;I'm not =
up-to-speed on that, and thus look to them to share more about the =
landscape in which this module fits.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div class=3D"">Kent=
 // contributor</div><div class=3D""><br class=3D""></div></body></html>=

--Apple-Mail=_05CECC08-A779-46F8-84FF-C06ADAE81EB3--


From nobody Tue Jul  9 15:35:49 2019
Return-Path: <mjethanandani@gmail.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8D02120073 for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 15:35:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.703
X-Spam-Level: 
X-Spam-Status: No, score=-0.703 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, PDS_NO_HELO_DNS=1.295, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MNHvtxufGydd for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 15:35:46 -0700 (PDT)
Received: from mail-pg1-x531.google.com (mail-pg1-x531.google.com [IPv6:2607:f8b0:4864:20::531]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E596712006D for <netconf@ietf.org>; Tue,  9 Jul 2019 15:35:45 -0700 (PDT)
Received: by mail-pg1-x531.google.com with SMTP id u17so164484pgi.6 for <netconf@ietf.org>; Tue, 09 Jul 2019 15:35:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=eDbAz3shFHeRE0jNX9sP0/quT/0r7nPPuBabq/60io0=; b=gBQKnzjwkQuPQY6Bl0Kv+JRRWvCIuJRGpeeIrtKVG7v2RZNbSuUvfihFkeTh9yncMs JPtf2MGlBGqUOf1jqUtAfgu3uf3Fdc+aFaWVV1yyvfddu1FysV9Ni1HHElnXxgHltV8R SsdRcEyrbUZfjUbDc7nKEiLjXVUEntai+1ZPSUT5hdkVzzC/oCojiJ0y9f4yBVHaBZwG mdhMh82zTNBZ7drEfFigWS7opSCItgzovRj2Vtase/JQ187phvIq7IdA0mRlAHUeIVZ4 FgVepHKyrytNIe2LoKn/hXvC93VZeXvKyaKSo5N1Kw3lV42vKpy442fN19OkGJg7k/Vr /jrQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=eDbAz3shFHeRE0jNX9sP0/quT/0r7nPPuBabq/60io0=; b=CONr9cUEvahhygVcgjLxJHd/N0tXX0Rrv+jYefUqp21tc2u4cVttTMbrR2c6gZSVvm bcssOqSbiub2Beet7Hv/49bgksLf/brI78rRa0GxhLlcRyggu8e0PR12F3SxlZH95WBX vQ1YKpRYoZiIyyMBhrCrae805Q0v5uIE//BUVPSjgFr1lvm30PIXgUZPvwUuor//6n8j /YH7oT9rulTHXJAKUXHA9hJNK5KBt8UXRUC/CUBmqI0xzGlG3tOzH19NpCVvCGejvM9E Ph6sjoffJfpSfgMBskpjPdg7uKKyfwIUIadh8kynQ59MDyBHqz5wCG0gxijLN52Fp8KU RHuQ==
X-Gm-Message-State: APjAAAXvhjOxuBnnWRXG+4tH5eusnwDh0uEbRGoGU8BrhQdhirPICZcz nEHOwW9L2p9aEADRK9oMvRo=
X-Google-Smtp-Source: APXvYqwwpUlLzXqQCBGYhrHC05ggZxL/O0aCnlt1yRL6mtFBelUk6htr2E9lBjrIU6gI4y3U9qu2hw==
X-Received: by 2002:a65:50c5:: with SMTP id s5mr33048864pgp.368.1562711745379;  Tue, 09 Jul 2019 15:35:45 -0700 (PDT)
Received: from [10.1.244.27] ([66.170.99.95]) by smtp.gmail.com with ESMTPSA id e13sm134383pff.45.2019.07.09.15.35.44 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Jul 2019 15:35:44 -0700 (PDT)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Mahesh Jethanandani <mjethanandani@gmail.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA49B254C@nkgeml513-mbx.china.huawei.com>
Date: Tue, 9 Jul 2019 15:35:43 -0700
Cc: Netconf <netconf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <ADD974B9-E978-48B5-AFFA-AB4E5C77DA71@gmail.com>
References: <B8F9A780D330094D99AF023C5877DABAA49B254C@nkgeml513-mbx.china.huawei.com>
To: Qin Wu <bill.wu@huawei.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/MAOkcyjp8UhVeWZV4IT8N7HWFFg>
Subject: Re: [netconf] New Version Notification for draft-mahesh-netconf-https-notif-00.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 22:35:48 -0000

Hi Qin,

> On Jun 26, 2019, at 6:33 PM, Qin Wu <bill.wu@huawei.com> wrote:
>=20
> Interesting draft, a few quick questions?
> 1.Which other document are you refer to when you say "defers the =
configuration and management of the receivers to other documents"
> Client server model documents?=20

Subscribed Notifications defers the config of receivers to other drafts. =
The module in the https-notif draft augments the receiver container in =
the ietf-subscribed-notifications module.

> 2.Does the mechanism defined this draft rely on call home to establish =
connection with the receiver or collector?

No. This draft relies on a standard HTTP client. The module defined in =
this draft imports the HTTP client module, not the HTTP server module.

> 3. draft-ietf-netconf-restconf-notif also talks about HTTP based =
notification. Is this draft related to =
draft-ietf-netconf-restconf-notif-15? Or simply one focuses on =
configured subscription while the other focuses on dynamic subscription.

It is the latter, but more than that. This is a simple HTTP-based =
protocol, and does not assume a RESTCONF session.

Thanks.

>=20
> -Qin
> -----=E9=82=AE=E4=BB=B6=E5=8E=9F=E4=BB=B6-----
> =E5=8F=91=E4=BB=B6=E4=BA=BA: netconf [mailto:netconf-bounces@ietf.org] =
=E4=BB=A3=E8=A1=A8 Mahesh Jethanandani
> =E5=8F=91=E9=80=81=E6=97=B6=E9=97=B4: 2019=E5=B9=B46=E6=9C=8827=E6=97=A5=
 8:44
> =E6=94=B6=E4=BB=B6=E4=BA=BA: Netconf <netconf@ietf.org>
> =E4=B8=BB=E9=A2=98: [netconf] Fwd: New Version Notification for =
draft-mahesh-netconf-https-notif-00.txt
>=20
> Just posted this new draft.
>=20
> As the introduction says, the Subscribed Notifications draft defines a =
YANG module for configuring subscribed notifications. That module =
defines a subscription container that contains a list of receivers. But =
that draft defers the configuration and management of the receivers to =
other documents. This draft defines one of those transports and how to =
configure it.
>=20
> Comments are welcome.
>=20
>> Begin forwarded message:
>>=20
>>=20
>> A new version of I-D, draft-mahesh-netconf-https-notif-00.txt
>> has been successfully submitted by Mahesh Jethanandani and posted to=20=

>> the IETF repository.
>>=20
>> Name:		draft-mahesh-netconf-https-notif
>> Revision:	00
>> Title:		An HTTPS-based Transport for Configured =
Subscriptions
>> Document date:	2019-06-26
>> Group:		Individual Submission
>> Pages:		11
>> URL:            =
https://www.ietf.org/internet-drafts/draft-mahesh-netconf-https-notif-00.t=
xt
>> Status:         =
https://datatracker.ietf.org/doc/draft-mahesh-netconf-https-notif/
>> Htmlized:       =
https://tools.ietf.org/html/draft-mahesh-netconf-https-notif-00
>> Htmlized:       =
https://datatracker.ietf.org/doc/html/draft-mahesh-netconf-https-notif
>>=20
>>=20
>> Abstract:
>>  This document defines a YANG data module for configuring HTTPS based
>>  configured subscription, as defined I-D.ietf-netconf-subscribed-
>>  notifications.  The use of HTTPS maximizes transport-level
>>  interoperability, while allowing for encoding selection from text,
>>  e.g.  XML or JSON, to binary.
>>=20
>>=20
>>=20
>>=20
>> Please note that it may take a couple of minutes from the time of=20
>> submission until the htmlized version and diff are available at =
tools.ietf.org.
>>=20
>> The IETF Secretariat
>>=20
>=20
> Mahesh Jethanandani
> mjethanandani@gmail.com
>=20
>=20
>=20
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf

Mahesh Jethanandani
mjethanandani@gmail.com




From nobody Tue Jul  9 16:59:40 2019
Return-Path: <0100016bd92da313-fe74f9de-e69b-4c0a-9dab-66246fd8ac77-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D63361200C3 for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 16:59:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vc6E3Mi7IK3v for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 16:59:36 -0700 (PDT)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8FE5120018 for <netconf@ietf.org>; Tue,  9 Jul 2019 16:59:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562716775; h=From:Content-Type:Content-Transfer-Encoding:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=+g1laFMERaOx5U29qyn01LRg/7KFvRVExu1E4O1GWwg=; b=EVpvfYArTJ8hhoCvFexDw4fZJmzWgm9h1DM09LMAZn560QniR4IA0Q58VDnjc91I apdY6KfLlggieWk5oKG+zjivLAd8qs5OnlkrfamN7AtzvmMXvAQHcFuveG+f3mIKD96 Yhw9yAM6hgrV1DoNNNh5SpM/5+MBLQ8HXwSl3bxQ=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Message-ID: <0100016bd92da313-fe74f9de-e69b-4c0a-9dab-66246fd8ac77-000000@email.amazonses.com>
Date: Tue, 9 Jul 2019 23:59:35 +0000
To: "netconf@ietf.org" <netconf@ietf.org>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.09-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Z0t6_0GQMhptf3Rc9azz1MoSWV4>
Subject: [netconf] draft netconf 105 agenda posted.
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jul 2019 23:59:39 -0000

The draft NETCONF 105 agenda has been posted and reproduced below.

	https://datatracker.ietf.org/doc/agenda-105-netconf

Any corrections or updates needed?  (We noticed a number or expected =
presentation requests were not made.)

Presenters, please let the chairs know ASAP if needing to present =
remotely.

Thanks,
Kent and Mahesh




Agenda for the NETCONF WG Session in IETF 105
---------------------------------------------

Session:
  =20
   10:00-12:00	Monday
   Morning Session I
   Room: Viger (2nd floor)


WG Chairs:
   Mahesh Jethanandani (mjethanandani at gmail dot com)
   Kent Watsen (kent plus ietf at watsen dot net)


Available During Session:
   Audio stream:  http://mp3.conf.meetecho.com/ietf/ietf1058.m3u
   Etherpad:      https://etherpad.ietf.org/p/notes-ietf-105-netconf
   Slides:        =
https://datatracker.ietf.org/meeting/105/session/netconf
   Meetecho:      http://www.meetecho.com/ietf105/netconf/
   Jabber:        xmpp:netconf@jabber.ietf.org?join

         =20
Available Post Session:
   Recording:     https://www.ietf.org/audio/ietf105/
   YouTube:       https://www.youtube.com/user/ietf/playlists
       =20
         =20
Introduction

  Chairs (10 minutes)
  Session Intro & WG Status


Chartered items:

   Kent Watsen (30 min)
   Status and Issues on Client-Server Drafts
   https://tools.ietf.org/html/draft-ietf-netconf-crypto-types-10
   https://tools.ietf.org/html/draft-ietf-netconf-trust-anchors-05
   https://tools.ietf.org/html/draft-ietf-netconf-keystore-12
   https://tools.ietf.org/html/draft-ietf-netconf-tcp-client-server-02
   https://tools.ietf.org/html/draft-ietf-netconf-ssh-client-server-14
   https://tools.ietf.org/html/draft-ietf-netconf-tls-client-server-14
   =
https://tools.ietf.org/html/draft-ietf-netconf-netconf-client-server-14
   =
https://tools.ietf.org/html/draft-ietf-netconf-restconf-client-server-14
   =
https://tools.ietf.org/html/draft-kwatsen-netconf-http-client-server-03

   Tianran Zhou (10 min)
   Subscription to Multiple Stream Originators
   =
https://tools.ietf.org/html/draft-zhou-netconf-multi-stream-originators-06=


   Balazs Lengyel (10 min)
   YangPush Notification Capabilities
   =
https://tools.ietf.org/html/draft-ietf-netconf-notification-capabilities-0=
1


Non-Chartered items:

   Mahesh Jethanandani (10 min)
   https://tools.ietf.org/html/draft-mahesh-netconf-https-notif-00


50 Minutes Remaining.



From nobody Tue Jul  9 18:36:44 2019
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 213CE120077 for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 18:36:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ys8EB5hwaaGm for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 18:36:41 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF3D012001E for <netconf@ietf.org>; Tue,  9 Jul 2019 18:36:40 -0700 (PDT)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 6A897BB8B663FF8D8664; Wed, 10 Jul 2019 02:36:38 +0100 (IST)
Received: from lhreml707-chm.china.huawei.com (10.201.108.56) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 10 Jul 2019 02:36:38 +0100
Received: from lhreml707-chm.china.huawei.com (10.201.108.56) by lhreml707-chm.china.huawei.com (10.201.108.56) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Wed, 10 Jul 2019 02:36:37 +0100
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml707-chm.china.huawei.com (10.201.108.56) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Wed, 10 Jul 2019 02:36:37 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.134]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0415.000; Wed, 10 Jul 2019 09:36:31 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Mahesh Jethanandani <mjethanandani@gmail.com>, Netconf <netconf@ietf.org>
Thread-Topic: suggest to consider multiple message originators//RE: New Version Notification for draft-mahesh-netconf-https-notif-00.txt
Thread-Index: AdU2vkNwf7i6e/TxTYq3YWQjfpnTeA==
Date: Wed, 10 Jul 2019 01:36:30 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BEE7E779@NKGEML515-MBS.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.156.116]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg>
Subject: [netconf] suggest to consider multiple message originators//RE: New Version Notification for draft-mahesh-netconf-https-notif-00.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2019 01:36:43 -0000

Hi Mahesh,

When preparing a configured subscription example for multiple message origi=
nators. I think your proposal in draft-mahesh-netconf-https-notif-00 could =
easily adapt to multiple message originators scenario.
You can see my example in A.2 in draft-zhou-netconf-multi-stream-originator=
s-06.=20
I suggest to include a list of channels in the receiver configuration. On o=
ne hand, it can support the multiple message originators scenario. On the o=
ther hand, one channel configuration can be compatible with existing sub-no=
tif.

Cheers,
Tianran

> -----Original Message-----
> From: netconf [mailto:netconf-bounces@ietf.org] On Behalf Of Mahesh
> Jethanandani
> Sent: Thursday, June 27, 2019 8:44 AM
> To: Netconf <netconf@ietf.org>
> Subject: [netconf] Fwd: New Version Notification for
> draft-mahesh-netconf-https-notif-00.txt
>=20
> Just posted this new draft.
>=20
> As the introduction says, the Subscribed Notifications draft defines a YA=
NG
> module for configuring subscribed notifications. That module defines a
> subscription container that contains a list of receivers. But that draft
> defers the configuration and management of the receivers to other documen=
ts.
> This draft defines one of those transports and how to configure it.
>=20
> Comments are welcome.
>=20
> > Begin forwarded message:
> >
> >
> > A new version of I-D, draft-mahesh-netconf-https-notif-00.txt
> > has been successfully submitted by Mahesh Jethanandani and posted to
> > the IETF repository.
> >
> > Name:		draft-mahesh-netconf-https-notif
> > Revision:	00
> > Title:		An HTTPS-based Transport for Configured Subscriptions
> > Document date:	2019-06-26
> > Group:		Individual Submission
> > Pages:		11
> > URL:
> https://www.ietf.org/internet-drafts/draft-mahesh-netconf-https-notif-00
> .txt
> > Status:
> https://datatracker.ietf.org/doc/draft-mahesh-netconf-https-notif/
> > Htmlized:
> https://tools.ietf.org/html/draft-mahesh-netconf-https-notif-00
> > Htmlized:
> https://datatracker.ietf.org/doc/html/draft-mahesh-netconf-https-notif
> >
> >
> > Abstract:
> >   This document defines a YANG data module for configuring HTTPS based
> >   configured subscription, as defined I-D.ietf-netconf-subscribed-
> >   notifications.  The use of HTTPS maximizes transport-level
> >   interoperability, while allowing for encoding selection from text,
> >   e.g.  XML or JSON, to binary.
> >
> >
> >
> >
> > Please note that it may take a couple of minutes from the time of
> > submission until the htmlized version and diff are available at
> tools.ietf.org.
> >
> > The IETF Secretariat
> >
>=20
> Mahesh Jethanandani
> mjethanandani@gmail.com
>=20
>=20
>=20
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf


From nobody Tue Jul  9 19:24:19 2019
Return-Path: <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A857120048 for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 19:24:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lh0hDscdMjcx for <netconf@ietfa.amsl.com>; Tue,  9 Jul 2019 19:24:15 -0700 (PDT)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0470F1200C5 for <netconf@ietf.org>; Tue,  9 Jul 2019 19:24:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1562725453; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=S4NIJGZduaAgjrqOZWUky5oysuS+jHh8tkVj2v+hqkQ=; b=GBnJSEA9MZ9fVyoichw3upHxXm0qlbkSUdOVH0NxnDftyuaatzXxak3eTTCL5q3t vfjuhvstaXygROV6djKO2cXan6bKjcKucgOdJfa2cAwNgCW8QCKZkJhrqgwI9HJ8e8z 2Pq9dYMf0EodGM3INklRvZKxi0GDzt9v3n2BIxBs=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_95434BEC-F264-446F-9F05-15F963A39C19"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 10 Jul 2019 02:24:13 +0000
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com>
Cc: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
To: Tianran Zhou <zhoutianran@huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.10-54.240.8.83
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/-XJFSVgAlHXmFFeFzK8_DMH7vGI>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2019 02:24:17 -0000

--Apple-Mail=_95434BEC-F264-446F-9F05-15F963A39C19
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi Tianran,

>> 1. In dynamic subscription case, how does Publisher agent behind =
Publisher
>> master know where a particular receiver is when pushing subscribed =
data to
>> the receiver in a separate channel?
> I think Appendix A.1 gives one example to show how this works in =
RESTCONF case.
> Firstly, the reply to the dynamic subscription will return the =
resource access URIs.
> Then, the receiver can use the URIs to GET the data.
> This is similar to draft-ietf-netconf-restconf-notif-15.

I was also unsure (the draft needs to be more clear with regards to =
expected behavior).  That said, I have a fews concerns:

1) will the client (a.k.a. the receiver) establish a full RESTCONF =
protocol connection to each line-card?  What YANG-library response might =
the line-cards return?
2) are we sure the client connections will always be routable to the =
line cards?
3) are there any security issues with line-cards having open ports?

Given the above, and the potential symmetry to the configured case, did =
you consider letting the server establish the connection to the client?  =
=46rom an operator's perspective, perhaps both options need to be =
supported?  =20


>> 2. How multi-stream originator works for configured subscription =
case?=20
> In appendix A.2, I use the similar example as in =
draft-mahesh-netconf-https-notif-00 to illustrate.
> In brief, the originators run on client mode, and connect to the =
receiver actively.

This example appears to be an exact copy/paste from =
draft-mahesh-netconf-https-notif, at least.  I didn't notice any =
differences and, that being the case, am unsure (again) what the =
expected behavior was intended to be.  Could you add a sequence diagram =
illustrating internal interactions?

Kent // contributor





--Apple-Mail=_95434BEC-F264-446F-9F05-15F963A39C19
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Hi&nbsp;Tianran,</div><br class=3D""><div><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D""><blockquote =
type=3D"cite" class=3D"">1. In dynamic subscription case, how does =
Publisher agent behind Publisher<br class=3D"">master know where a =
particular receiver is when pushing subscribed data to<br class=3D"">the =
receiver in a separate channel?<br class=3D""></blockquote>I think =
Appendix A.1 gives one example to show how this works in RESTCONF =
case.<br class=3D"">Firstly, the reply to the dynamic subscription will =
return the resource access URIs.<br class=3D"">Then, the receiver can =
use the URIs to GET the data.<br class=3D"">This is similar to =
draft-ietf-netconf-restconf-notif-15.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>I was =
also unsure (the draft needs to be more clear with regards to expected =
behavior). &nbsp;That said, I have a fews concerns:</div><div><br =
class=3D""></div><div>1) will the client (a.k.a. the receiver) establish =
a full RESTCONF protocol connection to each line-card? &nbsp;What =
YANG-library response might the line-cards return?</div><div>2) are we =
sure the client connections will always be routable to the line =
cards?</div><div>3) are there any security issues with line-cards having =
open ports?</div><div><br class=3D""></div><div>Given the above, and the =
potential symmetry to the configured case, did you consider letting the =
server establish the connection to the client? &nbsp;=46rom an =
operator's perspective, perhaps both options need to be supported? =
&nbsp;&nbsp;</div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div class=3D""><blockquote =
type=3D"cite" class=3D"">2. How multi-stream originator works for =
configured subscription case? <br class=3D""></blockquote>In appendix =
A.2, I use the similar example as in draft-mahesh-netconf-https-notif-00 =
to illustrate.<br class=3D"">In brief, the originators run on client =
mode, and connect to the receiver actively.<br =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>This =
example appears to be an exact copy/paste =
from&nbsp;draft-mahesh-netconf-https-notif, at least. &nbsp;I didn't =
notice any differences and, that being the case, am unsure (again) what =
the expected behavior was intended to be. &nbsp;Could you add a sequence =
diagram illustrating internal interactions?</div><div><br =
class=3D""></div>Kent // contributor</div><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div></body></html>=

--Apple-Mail=_95434BEC-F264-446F-9F05-15F963A39C19--


From nobody Wed Jul 10 02:20:00 2019
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C76F91200FD for <netconf@ietfa.amsl.com>; Wed, 10 Jul 2019 02:19:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7_AuK6v6glWs for <netconf@ietfa.amsl.com>; Wed, 10 Jul 2019 02:19:57 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80C3A1200A3 for <netconf@ietf.org>; Wed, 10 Jul 2019 02:19:56 -0700 (PDT)
Received: from lhreml701-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 1C107E11975F8008FFF3 for <netconf@ietf.org>; Wed, 10 Jul 2019 10:19:54 +0100 (IST)
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml701-cah.china.huawei.com (10.201.108.42) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 10 Jul 2019 10:19:53 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.134]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0415.000; Wed, 10 Jul 2019 17:19:45 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AdU2CHMGwBfbWqqXaUyVrraPIkdGOgAFaxMwABlYt4AAHdF6IA==
Date: Wed, 10 Jul 2019 09:19:44 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com> <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com>
In-Reply-To: <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.156.116]
Content-Type: multipart/alternative; boundary="_000_BBA82579FD347748BEADC4C445EA0F21BEE7EA88NKGEML515MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/p9Ppk4S9Ck3nMGp5deLFWuxO6-s>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jul 2019 09:20:00 -0000

--_000_BBA82579FD347748BEADC4C445EA0F21BEE7EA88NKGEML515MBSchi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_BBA82579FD347748BEADC4C445EA0F21BEE7EA88NKGEML515MBSchi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:=CB=CE=CC=E5;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@=CB=CE=CC=E5";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:=D0=C2=CB=CE=CC=E5;
	panose-1:2 1 6 9 3 1 1 1 1 1;}
@font-face
	{font-family:"\@=D0=C2=CB=CE=CC=E5";
	panose-1:2 1 6 9 3 1 1 1 1 1;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman",serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:=D0=C2=CB=CE=CC=E5;
	color:#1F497D;
	font-weight:normal;
	font-style:normal;
	text-decoration:none none;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 90.0pt 72.0pt 90.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"ZH-CN" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">Hi Kent</span><span style=3D"font-=
size:10.5pt;font-family:=D0=C2=CB=CE=CC=E5;color:#1F497D">=A3=AC<span lang=
=3D"EN-US"><o:p></o:p></span></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">Thanks for your comments. Please s=
ee inline.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">Tianran<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0cm 0cm 0cm =
4.0pt">
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US" style=3D"font-size:11.0pt;fo=
nt-family:&quot;Calibri&quot;,sans-serif">From:</span></b><span lang=3D"EN-=
US" style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif"> =
Kent Watsen [mailto:kent@watsen.net]
<br>
<b>Sent:</b> Wednesday, July 10, 2019 10:24 AM<br>
<b>To:</b> Tianran Zhou &lt;zhoutianran@huawei.com&gt;<br>
<b>Cc:</b> Qin Wu &lt;bill.wu@huawei.com&gt;; netconf@ietf.org<br>
<b>Subject:</b> Re: [netconf] New Version Notification for draft-zhou-netco=
nf-multi-stream-originators-06.txt<o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi&nbsp;Tianran,<o:p></o:p></sp=
an></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span lang=3D"EN-US">1. In dynamic subscription case=
, how does Publisher agent behind Publisher<br>
master know where a particular receiver is when pushing subscribed data to<=
br>
the receiver in a separate channel?<o:p></o:p></span></p>
</blockquote>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I think Appendix A.1 gives one =
example to show how this works in RESTCONF case.<br>
Firstly, the reply to the dynamic subscription will return the resource acc=
ess URIs.<br>
Then, the receiver can use the URIs to GET the data.<br>
This is similar to draft-ietf-netconf-restconf-notif-15.<o:p></o:p></span><=
/p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I was also unsure (the draft ne=
eds to be more clear with regards to expected behavior). &nbsp;That said, I=
 have a fews concerns:<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">[Tianran]: I am not sure if I am d=
oing the right thing on the examples. Maybe you can give some more suggesti=
ons.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">This draft intent to provide a tra=
nsport independent solution. Actual transport design, say RESTCONF, NETCONF=
, HTTPS, may have several options and need some more
 considerations. I am not sure if we should consider them all in this draft=
. So the question is what kind of example is helpful? I did not see a simil=
ar example in the draft-ietf-netconf-subscribed-notifications.<o:p></o:p></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">The following questions are respec=
t to one potential RESTCONF transport solution I am considering. I give onl=
y my considerations.<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">1) will the client (a.k.a. the =
receiver) establish a full RESTCONF protocol connection to each line-card? =
&nbsp;What YANG-library response might the line-cards return?<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">[Tianran]:
</span><span lang=3D"EN-US" style=3D"color:#1F497D">I do not think it=A1=AF=
s necessary to establish a full RESTCONF connection to each line-card. May =
be the http connection with server push capability is OK.<o:p></o:p></span>=
</p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">2) are we sure the client conne=
ctions will always be routable to the line cards?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">[Tianran]: I assume the address is=
 routable.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">3) are there any security issue=
s with line-cards having open ports?<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">[Tianran]: The master returns the =
URIs containing the line-card port to the receiver within an security chann=
el.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Given the above, and the potent=
ial symmetry to the configured case, did you consider letting the server es=
tablish the connection to the client? &nbsp;From an operator's perspective,=
 perhaps both options need to be supported?
 &nbsp;&nbsp;<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">[Tianran]: Good question. It</span=
><span lang=3D"EN-US" style=3D"font-size:10.5pt;color:#1F497D">=A1=AF</span=
><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-family:=D0=C2=CB=CE=CC=
=E5;color:#1F497D">s
 impossible to include all the transports in this draft. This example seek =
to be compatible with draft-ietf-netconf-restconf-notif.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">On the other hand, maybe we can co=
nsider only to use the https client as in draft-mahesh-netconf-https-notif =
as the only tcp transport for all the scenario.<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<p class=3D"MsoNormal"><span lang=3D"EN-US">2. How multi-stream originator =
works for configured subscription case?
<o:p></o:p></span></p>
</blockquote>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In appendix A.2, I use the simi=
lar example as in draft-mahesh-netconf-https-notif-00 to illustrate.<br>
In brief, the originators run on client mode, and connect to the receiver a=
ctively.<o:p></o:p></span></p>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">This example appears to be an e=
xact copy/paste from&nbsp;draft-mahesh-netconf-https-notif, at least. &nbsp=
;I didn't notice any differences and, that being the case, am unsure (again=
) what the expected behavior was intended to be.
 &nbsp;Could you add a sequence diagram illustrating internal interactions?=
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">[Tianra=
n]Again, I want to be compatible with existing transport proposals as in</s=
pan><span lang=3D"EN-US">
<span style=3D"color:#1F497D">draft-mahesh-netconf-https-notif. &nbsp;So I =
suggested to include a list of channels in the receiver configuration. On o=
ne hand, it can support the multiple message originators scenario. On the o=
ther hand, one channel configuration can
 be compatible with the one message originator scenario.<o:p></o:p></span><=
/span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">Only th=
is modification
</span><span lang=3D"EN-US" style=3D"font-family:Wingdings;color:#1F497D">J=
</span><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:4.8pt"><span lang=3D"EN-US" sty=
le=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;receiver&gt;<=
o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:4.8pt"><span lang=3D"EN-US" sty=
le=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;n=
ame&gt;foo&lt;/name&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal" style=3D"margin-left:4.8pt"><span lang=3D"EN-US" sty=
le=3D"color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;c=
hannel&gt;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D">&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;tcp-params&gt;<o:=
p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:#1F497D"><o:p>&n=
bsp;</o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D">I can add a sequence diagram to sh=
ow how it works for this transport/example.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:10.5pt;font-=
family:=D0=C2=CB=CE=CC=E5;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Kent // contributor<o:p></o:p><=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><o:p>&nbsp;</o:p></span></p>
</div>
</div>
</div>
</body>
</html>

--_000_BBA82579FD347748BEADC4C445EA0F21BEE7EA88NKGEML515MBSchi_--


From nobody Thu Jul 11 06:45:04 2019
Return-Path: <cabo@tzi.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47E2812026F; Thu, 11 Jul 2019 06:44:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.197
X-Spam-Level: 
X-Spam-Status: No, score=-4.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AFQRMTDjepHg; Thu, 11 Jul 2019 06:44:42 -0700 (PDT)
Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E4F7D120119; Thu, 11 Jul 2019 06:44:41 -0700 (PDT)
Received: from [192.168.217.110] (p5089AF0A.dip0.t-ipconnect.de [80.137.175.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 45ky3C3xl0zyVZ; Thu, 11 Jul 2019 15:44:39 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Carsten Bormann <cabo@tzi.org>
Date: Thu, 11 Jul 2019 15:44:38 +0200
Cc: Netconf <netconf@ietf.org>, NETMOD WG <netmod@ietf.org>, yot@ietf.org
X-Mao-Original-Outgoing-Id: 584545476.604437-e9f458df7968ab826f10fd10c6a58847
Reply-To: core <core@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <5B9F7D96-8E1D-4B04-8F48-0BD165E28F73@tzi.org>
To: core <core@ietf.org>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/r6xt_R-lFyH15eRsWN-oQifH2Wk>
Subject: [netconf] =?utf-8?q?=F0=9F=94=94_CoRE_Working_Group_Adoption_cal?= =?utf-8?q?l_for_draft-veillette-core-yang-library-05=2Etxt?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 13:44:49 -0000

RFC 8525 defines a YANG data model for information about the YANG =
modules, datastores, and datastore schemas used by a network management =
server.   This data model is based on string representations of YANG =
identifiers.

To be more useful in a constrained environment (CoRECONF/COMI), it is =
useful to have a YANG data model that can employ the efficiency of SIDs =
(draft-ietf-core-sid).  draft-veillette-core-yang-library-05.txt =
provides a straightforward translation of RFC 8525 to SID-based =
identification, with some legacy support removed and some other =
efficiencies added.  This specification complements the three other =
CoRECONF specifications draft-ietf-core-yang-cbor, draft-ietf-core-sid, =
and draft-ietf-core-comi, which we hope to ship soon.

This starts a one-week working group adoption call.
This is a formal call for adoption of this draft as a WG document of the =
CoRE WG.
If you have read the draft and support adopting it, please say so.
If you see a problem with adopting it as a WG document, please tell us.
For both, remember that WG adoption does not mean that we already have =
consensus on all the details(*), just that this is the right working =
document to address the issue (and that we should address the issue in =
the first place); you are encouraged to mention any issues that you =
already know.

This WGA call is CCed to the netconf and netmod working groups, as the =
expertise about YANG modules is focused there, as well as the =
yang-of-things non-WG mailing list.  Please respond to core@ietf.org, or =
exceptionally to core-chairs@ietf.org (for off-list comments).

This formal WG adoption call runs until the end of July 18th.

Gr=C3=BC=C3=9Fe, Carsten

(*) say, is the module-set index really limited to an 8-bit number?


From nobody Sun Jul 14 12:14:46 2019
Return-Path: <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A8FF120292 for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 12:14:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CIBMbPhZv6nx for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 12:14:41 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F91C120291 for <netconf@ietf.org>; Sun, 14 Jul 2019 12:14:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1563131680; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=jNGL1hGKzVNY3sVCC84lu2/U5JlC8YgvkXpGH9j+ZlY=; b=Q6fNLGGmqfNzYfJ4JEa+1/4mWqYvmFWY1wYNmcWA4ANgHyspT27AzOMwVjMbV7/S azdH2E0uHDWPnBXu76gjvnVEMvlEm/mdtIoT9unPomHQnW/V3e2Go033WUgaoryU6i4 4y9moJFUulTz4HNtrhFKbFAWssRewUPriAFxK3iE=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B4548FF1-4C24-49CB-8618-31367E7DC060"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Sun, 14 Jul 2019 19:14:40 +0000
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com>
Cc: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
To: Tianran Zhou <zhoutianran@huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com> <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.14-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/oNhxu5JlKnuTTE94sLVNoyk2kQI>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 19:14:44 -0000

--Apple-Mail=_B4548FF1-4C24-49CB-8618-31367E7DC060
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

=3D=3D=3D Re: dynamic subscription case =3D=3D=3D

> I was also unsure (the draft needs to be more clear with regards to =
expected behavior).  That said, I have a fews concerns:
> =20
> [Tianran]: I am not sure if I am doing the right thing on the =
examples. Maybe you can give some more suggestions.
> This draft intent to provide a transport independent solution. Actual =
transport design, say RESTCONF, NETCONF, HTTPS, may have several options =
and need some more considerations. I am not sure if we should consider =
them all in this draft. So the question is what kind of example is =
helpful? I did not see a similar example in the =
draft-ietf-netconf-subscribed-notifications.

Do not take draft-ietf-netconf-subscribed-notifications as an example to =
follow when it comes to examples.  The lack of examples in that draft =
continues to cause confusion.  As RFC 8407 says: "Each specification =
that defines one or more modules SHOULD contain usage examples, either =
throughout the document or in an appendix.".

It is understood that, in addition to variations in encoding (e.g., XML, =
JSON), this document (and SN) have variations in transports (RC, HTTP, =
etc.).  This additional dimension is easily addressed, just preface your =
examples with something like "For instance, assuming the use of the =
transport defined by [draft-foo-bar] and using the XML (or JSON) =
encoding, the following example illustrates yada yada..."


>  The following questions are respect to one potential RESTCONF =
transport solution I am considering. I give only my considerations.
> 1) will the client (a.k.a. the receiver) establish a full RESTCONF =
protocol connection to each line-card?  What YANG-library response might =
the line-cards return?
> [Tianran]: I do not think it=E2=80=99s necessary to establish a full =
RESTCONF connection to each line-card. May be the http connection with =
server push capability is OK.

Fine, but my point is that your draft needs to explicitly say it and, =
more importantly, state exactly what is or is not allowed over such less =
than full connections.


>  2) are we sure the client connections will always be routable to the =
line cards?
> [Tianran]: I assume the address is routable.

Again, the draft needs to state this.


> 3) are there any security issues with line-cards having open ports?
> [Tianran]: The master returns the URIs containing the line-card port =
to the receiver within an security channel.

True, but the line-card has an open port that could be detected via a =
port sweep and thereafter attacked (DoS?).  The Security Considerations =
section needs to mention this.


>  Given the above, and the potential symmetry to the configured case, =
did you consider letting the server establish the connection to the =
client?  =46rom an operator's perspective, perhaps both options need to =
be supported?  =20
> [Tianran]: Good question. It=E2=80=99s impossible to include all the =
transports in this draft. This example seek to be compatible with =
draft-ietf-netconf-restconf-notif.
> On the other hand, maybe we can consider only to use the https client =
as in draft-mahesh-netconf-https-notif as the only tcp transport for all =
the scenario.

Hmmm, my guess is that pretty much all transports supporting configured =
subscriptions will have the server (i.e., line cards) proactively =
initiate the connections to the notifications-receivers (and not have =
the receivers connecting to the servers).   This is more a =
macro-observation than a draft-mahesh-netconf-https-notif specific =
thing, though that draft follows this pattern too.=20





=3D=3D=3D Re: configured subscription case =3D=3D=3D
=20
> This example appears to be an exact copy/paste from =
draft-mahesh-netconf-https-notif, at least.  I didn't notice any =
differences and, that being the case, am unsure (again) what the =
expected behavior was intended to be.  Could you add a sequence diagram =
illustrating internal interactions?
> =20
> [Tianran]Again, I want to be compatible with existing transport =
proposals as in draft-mahesh-netconf-https-notif.  So I suggested to =
include a list of channels in the receiver configuration. On one hand, =
it can support the multiple message originators scenario. On the other =
hand, one channel configuration can be compatible with the one message =
originator scenario.
> =20
> Only this modification J
>        <receiver>
>          <name>foo</name>
>          <channel>
>            <tcp-params>
> =20
> =20
> I can add a sequence diagram to show how it works for this =
transport/example.

Ah, a "channel" container was added, I didn't see that before.  The =
draft should've defined YANG module to add a "channel" container.  That =
said, I don't think what you're hoping to achieve here is legal/valid =
YANG (please ensure that all examples are validated using e.g., =
`yanglint`).



=20
Kent // contributor


--Apple-Mail=_B4548FF1-4C24-49CB-8618-31367E7DC060
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">=3D=3D=
=3D Re:&nbsp;<span style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, =
0); font-family: &quot;Times New Roman&quot;, serif; font-size: 16px;" =
class=3D"">dynamic subscription case&nbsp;</span>=3D=3D=3D<div =
class=3D""><font color=3D"#000000" face=3D"Times New Roman, serif" =
size=3D"3" class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" =
class=3D""><br class=3D""></span></font><div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div style=3D"border-style: none none none solid; =
border-left-width: 1.5pt; border-left-color: blue; padding: 0cm 0cm 0cm =
4pt;" class=3D""><div class=3D""><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" class=3D"">I was =
also unsure (the draft needs to be more clear with regards to expected =
behavior). &nbsp;That said, I have a fews concerns:<o:p =
class=3D""></o:p></span></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; =
font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" =
class=3D"">[Tianran]: I am not sure if I am doing the right thing on the =
examples. Maybe you can give some more suggestions.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">This =
draft intent to provide a transport independent solution. Actual =
transport design, say RESTCONF, NETCONF, HTTPS, may have several options =
and need some more considerations. I am not sure if we should consider =
them all in this draft. So the question is what kind of example is =
helpful? I did not see a similar example in the =
draft-ietf-netconf-subscribed-notifications.</span></div></div></div></div=
></div></div></blockquote><div><br class=3D""></div><div>Do not =
take&nbsp;draft-ietf-netconf-subscribed-notifications as an example to =
follow when it comes to examples. &nbsp;The lack of examples in that =
draft continues to cause confusion. &nbsp;As RFC 8407 says: "Each =
specification that defines one or more modules SHOULD contain usage =
examples, either throughout the document or in an =
appendix.".</div><div><br class=3D""></div><div>It is understood that, =
in addition to variations in encoding (e.g., XML, JSON), this document =
(and SN) have variations in transports (RC, HTTP, etc.). &nbsp;This =
additional dimension is easily addressed, just preface your examples =
with something like "For instance, assuming the use of the transport =
defined by [draft-foo-bar] and using the XML (or JSON) encoding, the =
following example illustrates yada yada..."</div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
style=3D"border-style: none none none solid; border-left-width: 1.5pt; =
border-left-color: blue; padding: 0cm 0cm 0cm 4pt;" class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span><span style=3D"color: rgb(31, 73, 125); =
font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; font-size: 10.5pt;" =
class=3D"">The following questions are respect to one potential RESTCONF =
transport solution I am considering. I give only my =
considerations.</span></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" class=3D"">1) will =
the client (a.k.a. the receiver) establish a full RESTCONF protocol =
connection to each line-card? &nbsp;What YANG-library response might the =
line-cards return?<o:p class=3D""></o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D"">[Tianran]:<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" class=3D"">I do not think it=E2=80=99s =
necessary to establish a full RESTCONF connection to each line-card. May =
be the http connection with server push capability is =
OK.</span></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Fine, but my point is that your draft needs to =
explicitly say it and, more importantly, state exactly what is or is not =
allowed over such less than full connections.</div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"border-style: none none none =
solid; border-left-width: 1.5pt; border-left-color: blue; padding: 0cm =
0cm 0cm 4pt;" class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span><span style=3D"font-size: 12pt;" =
class=3D"">2) are we sure the client connections will always be routable =
to the line cards?</span></div></div><div class=3D""><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D"">[Tianran]: I assume the address is =
routable.</span></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Again, the draft needs to state =
this.</div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div style=3D"border-style: none none none solid; =
border-left-width: 1.5pt; border-left-color: blue; padding: 0cm 0cm 0cm =
4pt;" class=3D""><div class=3D""><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" class=3D"">3) are =
there any security issues with line-cards having open ports?<o:p =
class=3D""></o:p></span></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D"">[Tianran]: The master returns the URIs containing the =
line-card port to the receiver within an security =
channel.</span></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>True, but the line-card has an open port that =
could be detected via a port sweep and thereafter attacked (DoS?). =
&nbsp;The Security Considerations section needs to mention =
this.</div><div><br class=3D""></div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div style=3D"border-style: none none none solid; =
border-left-width: 1.5pt; border-left-color: blue; padding: 0cm 0cm 0cm =
4pt;" class=3D""><div class=3D""><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D""><o:p class=3D""></o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D""><o:p class=3D"">&nbsp;</o:p></span><span =
style=3D"font-size: 12pt;" class=3D"">Given the above, and the potential =
symmetry to the configured case, did you consider letting the server =
establish the connection to the client? &nbsp;=46rom an operator's =
perspective, perhaps both options need to be supported? =
&nbsp;&nbsp;</span></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; =
font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" =
class=3D"">[Tianran]: Good question. It</span><span lang=3D"EN-US" =
style=3D"font-size: 10.5pt; color: rgb(31, 73, 125);" =
class=3D"">=E2=80=99</span><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D"">s impossible to include all the transports in this =
draft. This example seek to be compatible with =
draft-ietf-netconf-restconf-notif.<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; =
color: rgb(31, 73, 125);" class=3D"">On the other hand, maybe we can =
consider only to use the https client as in =
draft-mahesh-netconf-https-notif as the only tcp transport for all the =
scenario.</span></div></div></div></div></div></blockquote><div><br =
class=3D""></div><div>Hmmm, my guess is that pretty much all transports =
supporting configured subscriptions will have the server (i.e., line =
cards) proactively initiate the connections to the =
notifications-receivers (and not have the receivers connecting to the =
servers). &nbsp; This is more a macro-observation than a =
draft-mahesh-netconf-https-notif specific thing, though that draft =
follows this pattern too.&nbsp;</div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div>=3D=3D=3D Re:&nbsp;<span =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-family: =
&quot;Times New Roman&quot;, serif; font-size: 16px;" =
class=3D"">configured subscription case&nbsp;</span>=3D=3D=3D</div><div =
class=3D""><span style=3D"font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif; caret-color: rgb(0, 0, 0);" =
class=3D"">&nbsp;</span><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
style=3D"border-style: none none none solid; border-left-width: 1.5pt; =
border-left-color: blue; padding: 0cm 0cm 0cm 4pt;" class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: &quot;Times New Roman&quot;, serif;" =
class=3D""><span lang=3D"EN-US" class=3D"">This example appears to be an =
exact copy/paste from&nbsp;draft-mahesh-netconf-https-notif, at least. =
&nbsp;I didn't notice any differences and, that being the case, am =
unsure (again) what the expected behavior was intended to be. =
&nbsp;Could you add a sequence diagram illustrating internal =
interactions?<o:p class=3D""></o:p></span></div></div><div class=3D""><div=
 style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span lang=3D"EN-US" style=3D"color: rgb(31, 73, =
125);" class=3D"">[Tianran]Again, I want to be compatible with existing =
transport proposals as in</span><span lang=3D"EN-US" class=3D""><span =
class=3D"Apple-converted-space">&nbsp;</span><span style=3D"color: =
rgb(31, 73, 125);" class=3D"">draft-mahesh-netconf-https-notif. &nbsp;So =
I suggested to include a list of channels in the receiver configuration. =
On one hand, it can support the multiple message originators scenario. =
On the other hand, one channel configuration can be compatible with the =
one message originator scenario.<o:p =
class=3D""></o:p></span></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span lang=3D"EN-US" style=3D"color: rgb(31, 73, =
125);" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" class=3D"">Only this =
modification<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span lang=3D"EN-US" =
style=3D"font-family: Wingdings; color: rgb(31, 73, 125);" =
class=3D"">J</span><span lang=3D"EN-US" style=3D"color: rgb(31, 73, =
125);" class=3D""><o:p class=3D""></o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt 4.8pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;receiver&gt;<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt 4.8pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;name&gt;foo&lt;/name&gt;<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt 4.8pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"color: rgb(31, 73, 125);" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;channel&gt;<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;tcp-params&gt;<o:p class=3D""></o:p></span></div><div style=3D"margin:=
 0cm 0cm 0.0001pt; font-size: 12pt; font-family: &quot;Times New =
Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" style=3D"color: =
rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: &quot;Times New Roman&quot;, =
serif;" class=3D""><span lang=3D"EN-US" style=3D"color: rgb(31, 73, =
125);" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
&quot;Times New Roman&quot;, serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; =
color: rgb(31, 73, 125);" class=3D"">I can add a sequence diagram to =
show how it works for this =
transport/example.</span></div></div></div></div></div></blockquote><div =
class=3D""><br class=3D""></div><div class=3D"">Ah, a "channel" =
container was added, I didn't see that before. &nbsp;The draft should've =
defined YANG module to add a "channel" container. &nbsp;That said, I =
don't think what you're hoping to achieve here is legal/valid YANG =
(please ensure that all examples are validated using e.g., =
`yanglint`).</div><div class=3D""><br class=3D""></div><div class=3D""><br=
 class=3D""><br class=3D"">&nbsp;<br class=3D"">Kent // contributor<br =
class=3D""><br class=3D""></div></div></div></body></html>=

--Apple-Mail=_B4548FF1-4C24-49CB-8618-31367E7DC060--


From nobody Sun Jul 14 13:03:54 2019
Return-Path: <0100016bf2159537-b6bc7eda-2958-4da3-a3f8-460a13f45b65-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A1DA120157; Sun, 14 Jul 2019 13:03:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w_EiSR3NZxK4; Sun, 14 Jul 2019 13:03:50 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C02E1200D8; Sun, 14 Jul 2019 13:03:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1563134629; h=From:Content-Type:Mime-Version:Subject:Message-Id:References:To:Date:Feedback-ID; bh=SSqYv8ezSD1IvqrLilROT5bV+EiKZVWgt7Y7pZQuOQs=; b=S80MqKXtSY0DmMacuAAHruYX6hdr4h2THPvl5cAxso2Qm6rkw9qwNDcxY8tJYXU6 MrRx5HEVs2VmGCN2zs+MVymSkyF3l+e7u2WUOClKME4BPamYzw5qxEpM34bD/kpBV1m RdGL5mFIc3fwAlUmetxEDf/ubuOigj0DGu5jHrKE=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_3CAB7517-98AF-4955-9DE9-4455901D0898"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Message-ID: <0100016bf2159537-b6bc7eda-2958-4da3-a3f8-460a13f45b65-000000@email.amazonses.com>
References: <c64dad42-17cb-487f-a9de-20a88aef68b4@nostrum.com>
To: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Date: Sun, 14 Jul 2019 20:03:49 +0000
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.14-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/KMPL4IZeaTeKYOS4y2IAw0lCHCA>
Subject: [netconf] Fwd: New datatracker feature: Allow presenters to upload slides
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 20:03:52 -0000

--Apple-Mail=_3CAB7517-98AF-4955-9DE9-4455901D0898
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

IETF 105 Presenters!

Please note that, per below, *you* are now able to upload your own =
slides to Datatracker.  Please try to do this, the links to use are:

    For NETCONF: =
https://datatracker.ietf.org/meeting/105/session/netconf =
<https://datatracker.ietf.org/meeting/105/session/netconf>
    For NETMOD: https://datatracker.ietf.org/meeting/105/session/netmod =
<https://datatracker.ietf.org/meeting/105/session/netmod>

Thanks,
Kent  // as co-chair of both WGs



> Begin forwarded message:
>=20
> From: Robert Sparks <rjsparks@nostrum.com>
> Subject: New datatracker feature: Allow presenters to upload slides
> Date: July 12, 2019 at 11:51:56 AM EDT
> To: IETF WG Chairs <wgchairs@ietf.org>
>=20
> Shortly after IETF 104, we added the ability for presenters to upload =
slides and suggesting to the chairs that they be added to a session.
>=20
> On the meeting materials page for a group (for example =
<https://datatracker.ietf.org/meeting/105/session/stir>) anyone logged =
in who is not a chair/secretary for the group gets a [Propose Slides] =
button.
>=20
> When they upload slides using that, the chairs will get email, and the =
suggestions will appear in a new block on that page.
>=20
> Chairs can then accept or reject each suggestion.
>=20
> RjS
>=20


--Apple-Mail=_3CAB7517-98AF-4955-9DE9-4455901D0898
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">IETF =
105 Presenters!<div class=3D""><br class=3D""></div><div class=3D"">Please=
 note that, per below, *you* are now able to upload your own slides to =
Datatracker. &nbsp;Please try to do this, the links to use =
are:</div><div class=3D""><br class=3D""></div><div class=3D"">&nbsp; =
&nbsp; For NETCONF:&nbsp;<a =
href=3D"https://datatracker.ietf.org/meeting/105/session/netconf" =
class=3D"">https://datatracker.ietf.org/meeting/105/session/netconf</a></d=
iv><div class=3D"">&nbsp; &nbsp; For NETMOD:&nbsp;<a =
href=3D"https://datatracker.ietf.org/meeting/105/session/netmod" =
class=3D"">https://datatracker.ietf.org/meeting/105/session/netmod</a></di=
v><div class=3D""><br class=3D""></div><div class=3D"">Thanks,</div><div =
class=3D"">Kent &nbsp;// as co-chair of both WGs</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">Begin =
forwarded message:</div><br class=3D"Apple-interchange-newline"><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">From: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">Robert Sparks &lt;<a =
href=3D"mailto:rjsparks@nostrum.com" =
class=3D"">rjsparks@nostrum.com</a>&gt;<br class=3D""></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Subject: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><b class=3D"">New datatracker =
feature: Allow presenters to upload slides</b><br =
class=3D""></span></div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span =
style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Date: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">July 12, 2019 at 11:51:56 AM =
EDT<br class=3D""></span></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span=
 style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">To: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">IETF WG Chairs &lt;<a =
href=3D"mailto:wgchairs@ietf.org" class=3D"">wgchairs@ietf.org</a>&gt;<br =
class=3D""></span></div><br class=3D""><div class=3D""><div =
class=3D"">Shortly after IETF 104, we added the ability for presenters =
to upload slides and suggesting to the chairs that they be added to a =
session.<br class=3D""><br class=3D"">On the meeting materials page for =
a group (for example &lt;<a =
href=3D"https://datatracker.ietf.org/meeting/105/session/stir" =
class=3D"">https://datatracker.ietf.org/meeting/105/session/stir</a>&gt;) =
anyone logged in who is not a chair/secretary for the group gets a =
[Propose Slides] button.<br class=3D""><br class=3D"">When they upload =
slides using that, the chairs will get email, and the suggestions will =
appear in a new block on that page.<br class=3D""><br class=3D"">Chairs =
can then accept or reject each suggestion.<br class=3D""><br =
class=3D"">RjS<br class=3D""><br =
class=3D""></div></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_3CAB7517-98AF-4955-9DE9-4455901D0898--


From nobody Sun Jul 14 14:29:56 2019
Return-Path: <hayden@thebrowns.net.nz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A6F712018A for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 14:29:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.597
X-Spam-Level: 
X-Spam-Status: No, score=-2.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oZKTgPx7C4RR for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 14:29:52 -0700 (PDT)
Received: from esmtp06.digiweb.net.nz (esmtp06.digiweb.net.nz [202.174.114.135]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3A5412003E for <netconf@ietf.org>; Sun, 14 Jul 2019 14:29:51 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by esmtp06.digiweb.net.nz (Postfix) with ESMTP id 0F9906235E for <netconf@ietf.org>; Mon, 15 Jul 2019 09:29:49 +1200 (NZST)
Received: from esmtp06.digiweb.net.nz ([127.0.0.1]) by localhost (esmtp06.digiweb.net.nz [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NBbUnhPiavA6 for <netconf@ietf.org>; Mon, 15 Jul 2019 09:29:48 +1200 (NZST)
Received: from email.discountdomains.co.nz (dd-chc-smail01.digiweb.net.nz [202.174.115.190]) by esmtp06.digiweb.net.nz (Postfix) with ESMTP id 652F7623BA for <netconf@ietf.org>; Mon, 15 Jul 2019 09:29:48 +1200 (NZST)
Received: by email.discountdomains.co.nz via HTTP; Mon, 15 Jul 2019 09:29:41 +1200
From: "hayden" <hayden@thebrowns.net.nz>
To: <netconf@ietf.org>
Date: Mon, 15 Jul 2019 09:29:41 +1200
Reply-To: hayden@thebrowns.net.nz
Message-ID: <e5c3ad18a35d4d338e4b9cc05e24502f@thebrowns.net.nz>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary=0eacd67138b24f3b8035da7896069907
X-Originating-IP: [202.27.34.26]
X-Exim-Id: e5c3ad18a35d4d338e4b9cc05e24502f
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/6b1wQcE3KADNKOSQkSIltQ0cE1M>
Subject: [netconf] ietf-restconf YANG - 'errors' grouping query
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Jul 2019 21:29:54 -0000

This is a multipart message in MIME format.

--0eacd67138b24f3b8035da7896069907
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

 
  Hi all,
  
 I've been working with the ietf-restconf YANG from RFC 8040 and I had a 
query about the 'error' list definition shown below (I've shortened the 
YANG excerpt for brevity).
  
 -- ietf-restconf@2017-01-26.yang excerpt --

 grouping errors {   description     "A grouping that contains a YANG 
container representing the syntax and      semantics of a YANG Patch error 
report within a response message.";    container errors {     description   
    "Represents an error report returned by the server if        a request 
results in an error.";      list error {       description         "An 
entry containing information about one specific error that occurred         
 while processing a RESTCONF request.";       reference         "RFC 6241, 
Section 4.3.";        leaf error-type { ... }        leaf error-tag { ... } 
       leaf error-app-tag { ... }        leaf error-path { ... }        
leaf error-message { ... }        anydata error-info { ... }     }   } }   

 for context, the 'errors' grouping is used for reporting errors, within 
the yang extension statement 'yang-errors' in ietf-restconf, i.e.

 rc:yang-data yang-errors {   uses errors; }    
 Now, on to my point:
  
 Currently the list 'error' itself omits a config statement, and as there 
is no ancestor with a config-statement, presumably the 'error' list 
represents information that is configuration data.
 My understanding is that according to RFC 7950 (Section 7.8.2), lists 
representing configuration data must have a key specified. The excerpt 
above doesn't specify a key and perhaps should?
  
 Alternatively, another view is that as this is 'error' information, it is 
presumably read-only and perhaps the list or container should be explicitly 
marked as 'config false'?
  
  
 Keen to hear any thoughts on the above. Many thanks in advance.
  
 Kind regards,
 Hayden

  


--0eacd67138b24f3b8035da7896069907
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<span style=3D"font-family: Arial, Helvetica, Sans-Serif; font-size: 12px">=
<div>&nbsp;</div>

<div>
<div style=3D"color: rgb(34, 34, 34);">Hi all,</div>

<div style=3D"color: rgb(34, 34, 34);">&nbsp;</div>

<div style=3D"color: rgb(34, 34, 34);">I've been working with the ietf-rest=
conf YANG from RFC 8040 and I had a query about the 'error' list definition=
 shown below&nbsp;(I've shortened the YANG excerpt for&nbsp;brevity).</div>

<div style=3D"color: rgb(34, 34, 34);">&nbsp;</div>

<div style=3D"color: rgb(34, 34, 34);">--&nbsp;<span class=3D"clickable Cli=
ckableEmail inactive" email=3D"ietf-restconf@2017-01-26.yang" style=3D"bord=
er-color: rgb(51, 51, 51); border-style: dotted; border-width: 0px 0px 1px;=
 cursor: pointer;">ietf-restconf@2017-01-26.yang</span>&nbsp;excerpt --</di=
v>

<div style=3D"color: rgb(34, 34, 34);">
<pre>
grouping errors {
  description
    &quot;A grouping that contains a YANG container representing the syntax=
 and
&nbsp;    semantics of a YANG Patch error report within a response message.=
&quot;;

  container errors {
    description
      &quot;Represents an error report returned by the server if
       a request results in an error.&quot;;

    list error {
      description
        &quot;An entry containing information about one specific error that=
 occurred
&nbsp;        while processing a RESTCONF request.&quot;;
      reference
        &quot;RFC 6241, Section 4.3.&quot;;

      leaf error-type { ... }

      leaf error-tag { ... }

      leaf error-app-tag { ... }

      leaf error-path { ... }

      leaf error-message { ... }

      anydata error-info { ... }
    }
  }
}</pre>

<div>&nbsp;</div>

<div>for context, the 'errors' grouping is used for reporting errors, withi=
n the yang extension statement 'yang-errors' in ietf-restconf, i.e.</div>

<div>
<pre style=3D"color: rgb(0, 0, 0);">
rc:yang-data yang-errors {
  uses errors;
}
</pre>

<div>&nbsp;</div>

<div>Now, on to my point:</div>

<div>&nbsp;</div>

<div>Currently the list 'error' itself omits a config statement, and as the=
re is no ancestor with a config-statement, presumably the 'error' list repr=
esents information that is configuration data.</div>

<div>My understanding is that according to&nbsp;RFC 7950 (Section 7.8.2), l=
ists representing configuration data must have a key specified. The excerpt=
 above doesn't specify a key and perhaps should?</div>

<div>&nbsp;</div>

<div>Alternatively, another view is that as this is 'error' information, it=
&nbsp;is presumably read-only and&nbsp;perhaps the list or container should=
 be explicitly marked as 'config false'?</div>

<div>&nbsp;</div>

<div>&nbsp;</div>

<div>Keen to hear any thoughts on the above. Many thanks&nbsp;in advance.</=
div>

<div>&nbsp;</div>

<div>Kind regards,</div>

<div>Hayden</div>
</div>
</div>
</div>

<div style=3D"-webkit-touch-callout: none; -webkit-user-select: none; -khtm=
l-user-select: none;-moz-user-select: none;-ms-user-select: none;-o-user-se=
lect: none;user-select: none;">&nbsp;</div></span>

--0eacd67138b24f3b8035da7896069907--


From nobody Sun Jul 14 20:26:15 2019
Return-Path: <zhoutianran@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9770120041 for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 20:26:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JlJ2gJ1Ayu0N for <netconf@ietfa.amsl.com>; Sun, 14 Jul 2019 20:26:11 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9994E12001B for <netconf@ietf.org>; Sun, 14 Jul 2019 20:26:10 -0700 (PDT)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 08839C1437C842347076 for <netconf@ietf.org>; Mon, 15 Jul 2019 04:26:08 +0100 (IST)
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 15 Jul 2019 04:26:07 +0100
Received: from lhreml701-chm.china.huawei.com (10.201.108.50) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Mon, 15 Jul 2019 04:26:07 +0100
Received: from NKGEML411-HUB.china.huawei.com (10.98.56.70) by lhreml701-chm.china.huawei.com (10.201.108.50) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Mon, 15 Jul 2019 04:26:06 +0100
Received: from NKGEML515-MBS.china.huawei.com ([169.254.5.238]) by nkgeml411-hub.china.huawei.com ([10.98.56.70]) with mapi id 14.03.0439.000; Mon, 15 Jul 2019 11:25:56 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AdU2CHMGwBfbWqqXaUyVrraPIkdGOgAFaxMwABlYt4AAHdF6IADOoxAAAB/zdmA=
Date: Mon, 15 Jul 2019 03:25:55 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21BEE9CA83@NKGEML515-MBS.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com> <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com> <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@email.amazonses.com>
In-Reply-To: <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@email.amazonses.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.111.156.116]
Content-Type: multipart/alternative; boundary="_000_BBA82579FD347748BEADC4C445EA0F21BEE9CA83NKGEML515MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/472sILrDJcxue587ftwKwvYKsgE>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 03:26:14 -0000

--_000_BBA82579FD347748BEADC4C445EA0F21BEE9CA83NKGEML515MBSchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BBA82579FD347748BEADC4C445EA0F21BEE9CA83NKGEML515MBSchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BBA82579FD347748BEADC4C445EA0F21BEE9CA83NKGEML515MBSchi_--


From nobody Mon Jul 15 09:33:57 2019
Return-Path: <0100016bf67baa26-3807ff58-9139-4df1-8222-74fd66474b74-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E339912027D for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 09:33:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDdgnzu6K6HX for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 09:33:49 -0700 (PDT)
Received: from a8-31.smtp-out.amazonses.com (a8-31.smtp-out.amazonses.com [54.240.8.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D68C1202D0 for <netconf@ietf.org>; Mon, 15 Jul 2019 09:33:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1563208428; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=3vufox44Egf1xGefFG8392PV36l7lIgZrXgTU9CSM6g=; b=FHr9BBd1JxXFD/WkT257kbIVTBBzmK2XWK7JvUg8AO9j5fCXR8+gftQfG7poIDU+ 6/OfS3hSW0gCDFPysLCxcaNtxAmUFZwpxPhUIf86jSkCnPMmA+uQcmm7vBpC/Aa4aBe KHv0983BzNJZVGR0JDAikoFRXCNy6WQljZ2+OaAs=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016bf67baa26-3807ff58-9139-4df1-8222-74fd66474b74-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_C73A61D6-FFF3-4D71-A67E-4F7CD5B7C9ED"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 15 Jul 2019 16:33:48 +0000
In-Reply-To: <BBA82579FD347748BEADC4C445EA0F21BEE9CA83@NKGEML515-MBS.china.huawei.com>
Cc: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>, "Eric Voit (evoit)" <evoit@cisco.com>
To: Tianran Zhou <zhoutianran@huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com> <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com> <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE9CA83@NKGEML515-MBS.china.huawei.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.15-54.240.8.31
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/-72dhgdaYSuix_aijZKD3sISnNU>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 16:33:53 -0000

--Apple-Mail=_C73A61D6-FFF3-4D71-A67E-4F7CD5B7C9ED
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

[CC-ing Eric due to urgent SN issue]


Hi Tianran,

> Hmmm, my guess is that pretty much all transports supporting =
configured subscriptions will have the server (i.e., line cards) =
proactively initiate the connections to the notifications-receivers (and =
not have the receivers connecting to the servers).   This is more a =
macro-observation than a draft-mahesh-netconf-https-notif specific =
thing, though that draft follows this pattern too.
> =20
> [Tianran2]: I am sorry I not quite clear. Here we are talking about =
the dynamic subscription. I conclude there are four potential modes.
> 1. The linecard runs on server mode. The connections are dynamically =
set up, when the receiver know the subscription decomposition result at =
run time.
> 2. The linecard runs on server mode. All the potential connections are =
set up. The receiver only get data dynamically.
> 3. The linecard runs on client mode. The connections are dynamically =
set up, when the linecard know the subscription decomposition result at =
run time.
> 4. The linecard runs on client mode. All the potential connections are =
set up. The linecards send data dynamically.

Yes, this section regards dynamic subscriptions, but the =
macro-observation is that it would be good if dynamic-subscriptions =
behaved like configured-subscriptions and, since =
configured-subscriptions will most likely always have the server =
initiating the connection, it would be consistent if that were true for =
dynamic-subscriptions too (as opposed to having open ports).   Makes =
sense?





>  Ah, a "channel" container was added, I didn't see that before.  The =
draft should've defined YANG module to add a "channel" container.  That =
said, I don't think what you're hoping to achieve here is legal/valid =
YANG (please ensure that all examples are validated using e.g., =
`yanglint`).
> =20
> [Tianran2]: I did not define a YANG module for this, because this may =
make the this draft depend on draft-mahesh-netconf-https-notif. But I =
sent the comment to the mailing list to suggest =
draft-mahesh-netconf-https-notif to apply this modification.
> =
https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg =
<https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg=
>
> =20
> Or do you think this draft can define a configuration framework, not =
include the details? So that transport like =
draft-mahesh-netconf-https-notif can augment.

Ah, I recall seeing that message fly by before.  Seems like no one =
replied, too bad.   Really, this is not a something any transport draft =
(e.g., draft-mahesh-netconf-https-notif) should have to specify.  It =
would have to be the SN draft (currently in AUTH48) and likely published =
before Montreal.  This creates quite a problem.  I strongly advise =
raising this to the SN draft authors (specifically Eric Voit, CC-ed) =
ASAP!=20



Kent // contributor


--Apple-Mail=_C73A61D6-FFF3-4D71-A67E-4F7CD5B7C9ED
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">[CC-ing Eric due to urgent SN issue]</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div class=3D"">Hi =
Tianran,</div><div class=3D""><br class=3D""></div><div><blockquote =
type=3D"cite" class=3D""><div class=3D""><span style=3D"font-family: =
=E5=AE=8B=E4=BD=93; font-size: 12pt; caret-color: rgb(0, 0, 0);" =
class=3D"">Hmmm, my guess is that pretty much all transports supporting =
configured subscriptions will have the server (i.e., line cards) =
proactively initiate the connections to the notifications-receivers (and =
not have the receivers connecting to the servers). &nbsp; This is more a =
macro-observation than a draft-mahesh-netconf-https-notif specific =
thing, though that draft follows this pattern too.</span></div><div =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
=E5=AE=8B=E4=BD=93;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
=E5=AE=8B=E4=BD=93;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, =
125);" class=3D"">[Tianran2]: I am sorry I not quite clear. Here we are =
talking about the dynamic subscription. I conclude there are four =
potential modes.<o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">1. The =
linecard runs on server mode. The connections are dynamically set up, =
when the receiver know the subscription decomposition result at run =
time.</span><span lang=3D"EN-US" style=3D"font-size: 10.5pt; =
font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" =
class=3D""><o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">2. The =
linecard runs on server mode. All the potential connections are set up. =
The receiver only get data dynamically.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=
=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">3. The linecard runs on =
client mode.<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span lang=3D"EN-US" =
style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; =
color: rgb(31, 73, 125);" class=3D"">The connections are dynamically set =
up, when the linecard know the subscription decomposition result at run =
time</span><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=
=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">4. The linecard runs on =
client mode. All the potential connections are set up. The linecards =
send data dynamically.</span></div></div></div></blockquote><div><br =
class=3D""></div><div>Yes, this section regards dynamic subscriptions, =
but the macro-observation is that it would be good if =
dynamic-subscriptions behaved like configured-subscriptions and, since =
configured-subscriptions will most likely always have the server =
initiating the connection, it would be consistent if that were true for =
dynamic-subscriptions too (as opposed to having open ports). &nbsp; =
Makes sense?</div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 12pt; font-family: =
=E5=AE=8B=E4=BD=93;" class=3D""><span style=3D"color: rgb(31, 73, 125); =
font-family: =E6=96=B0=E5=AE=8B=E4=BD=93; font-size: 10.5pt;" =
class=3D"">&nbsp;</span><span style=3D"font-size: 12pt;" class=3D"">Ah, =
a "channel" container was added, I didn't see that before. &nbsp;The =
draft should've defined YANG module to add a "channel" container. =
&nbsp;That said, I don't think what you're hoping to achieve here is =
legal/valid YANG (please ensure that all examples are validated using =
e.g., `yanglint`).</span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=
=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" =
class=3D"">[Tianran2]: I did not define a YANG module for this, because =
this may make the this draft depend on draft-mahesh-netconf-https-notif. =
But I sent the comment to the mailing list to suggest =
draft-mahesh-netconf-https-notif to apply this modification.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =E6=96=B0=E5=AE=8B=
=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><a =
href=3D"https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzc=
wnRphPg" style=3D"color: rgb(149, 79, 114); text-decoration: underline;" =
class=3D"">https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwv=
rzcwnRphPg</a><o:p class=3D""></o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 12pt; font-family: =E5=AE=8B=E4=BD=93;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 10.5pt; font-family: =
=E6=96=B0=E5=AE=8B=E4=BD=93; color: rgb(31, 73, 125);" class=3D"">Or do =
you think this draft can define a configuration framework, not include =
the details? So that transport like draft-mahesh-netconf-https-notif can =
augment.</span></div></div></blockquote><div><br class=3D""></div><div>Ah,=
 I recall seeing that message fly by before. &nbsp;Seems like no one =
replied, too bad. &nbsp; Really, this is not a something any transport =
draft (e.g., draft-mahesh-netconf-https-notif) should have to specify. =
&nbsp;It would have to be the SN draft (currently in AUTH48) and likely =
published before Montreal. &nbsp;This creates quite a problem. &nbsp;I =
strongly advise raising this to the SN draft authors (specifically Eric =
Voit, CC-ed) ASAP!&nbsp;</div><div><br class=3D""></div><div><br =
class=3D""></div><div><br class=3D""></div><div>Kent // =
contributor</div><div><br class=3D""></div></div></body></html>=

--Apple-Mail=_C73A61D6-FFF3-4D71-A67E-4F7CD5B7C9ED--


From nobody Mon Jul 15 11:00:07 2019
Return-Path: <evoit@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 403E612011F for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 11:00:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level: 
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=j4D4Va8A; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=cisco.onmicrosoft.com header.b=J9UUn1YI
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zwOuLQyEtnTL for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 11:00:03 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18B1512011E for <netconf@ietf.org>; Mon, 15 Jul 2019 11:00:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=21115; q=dns/txt; s=iport; t=1563213602; x=1564423202; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=9HXKf1ILspNdrCwwAjINYIbpe8lUvbqc0rl8LJogUik=; b=j4D4Va8A4cZcFX0PVbhJuLitEfRjAISG4dtKcwM8T471PkqGtedd1Yqt XRhNDoMsvUU3c0WQrmlndJxze8J/MdWyJClg3esuR6SeOfFXazr6XeOxx 4mSCvy8QQ3Ns6kEeemqICoe4C1H5hCZJrXniqqcNuPxHSwVzw3UI1tFtj Y=;
X-Files: smime.p7s : 3975
IronPort-PHdr: =?us-ascii?q?9a23=3AjZpSwheej1sv8FgjqggFLUzXlGMj4e+mNxMJ6p?= =?us-ascii?q?chl7NFe7ii+JKnJkHE+PFxlwKZD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFn?= =?us-ascii?q?pnwd4TgxRmBceEDUPhK/u/YjI9HdhqX15+9Hb9Ok9QS47z?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BWAADMvixd/5BdJa1lHAEBAQQBAQc?= =?us-ascii?q?EAQGBUwcBAQsBgRQvKScDalUgBAsoCoQSg0cDhFKJfIJbhzOLR4RVgS6BJAN?= =?us-ascii?q?UAgcBAQEJAwEBJQgCAQGEQAKCZSM0CQ4BAwEBBAEBAgEFbYU8DIVKAQEBAQM?= =?us-ascii?q?SEQoTAQEsCQIBDwIBCBUQHQICAjAlAgQBDQ0GFIMBgR1NAx0BDgOhHQKBOIh?= =?us-ascii?q?gcYEygnkBAQWBMgGDVhiCDAcDBoE0AYFQig4XgUA/gVeCTD6CYQKBSxgVFoJ?= =?us-ascii?q?dMoImi38VgmSFfZVyCQKCGYMrgiCBDY1Pgi2HJY44jTWHSJAIAgQCBAUCDgE?= =?us-ascii?q?BBYFQOIFYcBU7gmyCQQwXFG8BC4I/hRSFP3KBKYwyK4EEAYEgAQE?=
X-IronPort-AV: E=Sophos;i="5.63,493,1557187200";  d="p7s'?scan'208,217";a="595478323"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jul 2019 18:00:01 +0000
Received: from xch-rcd-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id x6FHxxma029325 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 15 Jul 2019 18:00:01 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 15 Jul 2019 13:00:00 -0500
Received: from xhs-aln-003.cisco.com (173.37.135.120) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 15 Jul 2019 12:59:57 -0500
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-003.cisco.com (173.37.135.120) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 15 Jul 2019 12:59:56 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jRU2NDVAzbxFAP+G0mAxj8A2CyAq0MAn2JAOEwcSXNAueAk/JFYu8RjCXKJAgZIkEvALB6clCN5uBWi2vsNBitqwrzWf+b9L8qN/22PH75qJKzd7X8Pe5GLEIUVCUsfAKPOfbOfixjEvNNZbCpbSqkhHYMuYi+Crp+meNyf0kmslQqoyCMBQSyoiE0HgPPwcLh2uru3CPy7bmvYSIg/8FGLpzDDpHZs2Rv5msYz+7joC0HN4857X7KtCqTg3NMiyCl/KO/NpywLusqUw61LuFVGLA3Ktc5+KYrNhNsm47ZiJP+VG/ZMpjcQbnzlPyqQfeoWZHVfaTNz1limB24nItQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y6lF1IKoQ4Qi+WUe7tyX/qyCkL3wlDuC2msaU9Uszg8=; b=NkaR5/MKmaR0g4KiMtBzI4RGqfLNmCYEFOjutm40hv8Id0kdNOTcy/4Ev+C5utfq+u8kyKzF84Dr6GpGru2ddbUbSjfBmHelO2Drh9q09+TloJ+Yv7w0+ARWG4BlboWNhGh5dk0h0omM7L/SSpcv1GSe1yeA5OTTwA0CIukrKa7R0cCBVwLBeVjpAX+DtWeyhnYCuhedCeSe7i67OSVlxoCgW18TF3LmHxuV5g4jCIFlnOrR0bgxADsuICLauiLBctEi80hHpMo2ztojAMiIZ1a6e4/XdxzRYXKjRXy6lTFm2PUEizkIpX+XSoyN2OYINBdsykKlf3ZaqpY8tVMJyw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y6lF1IKoQ4Qi+WUe7tyX/qyCkL3wlDuC2msaU9Uszg8=; b=J9UUn1YIZRszNglA1cAjH6tQ65WstxNXQZWhYYz/b49SNC696njxXT2rLyvzP3AFBCUwzADOIJNT2Lag34cx1dLnZT3xLKRbIEkYfPj05v5v8f6PbGETzBGStQZJsmxsAM5SX07ic65DF9FcUTIpsVWWC4TAFVShaDS+VZ+oNGw=
Received: from DM5PR1101MB2362.namprd11.prod.outlook.com (10.173.169.16) by DM5PR1101MB2250.namprd11.prod.outlook.com (10.174.246.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2073.10; Mon, 15 Jul 2019 17:59:55 +0000
Received: from DM5PR1101MB2362.namprd11.prod.outlook.com ([fe80::b838:5708:9829:6bc8]) by DM5PR1101MB2362.namprd11.prod.outlook.com ([fe80::b838:5708:9829:6bc8%4]) with mapi id 15.20.2073.012; Mon, 15 Jul 2019 17:59:55 +0000
From: "Eric Voit (evoit)" <evoit@cisco.com>
To: Kent Watsen <kent@watsen.net>, Tianran Zhou <zhoutianran@huawei.com>
CC: Qin Wu <bill.wu@huawei.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
Thread-Index: AQHVOysascekoK9bwkG1OZPXoxZf9qbL4xcw
Date: Mon, 15 Jul 2019 17:59:55 +0000
Message-ID: <DM5PR1101MB23629CE42808FA4501E08EB4A1CF0@DM5PR1101MB2362.namprd11.prod.outlook.com>
References: <B8F9A780D330094D99AF023C5877DABAA49CDA59@nkgeml513-mbx.china.huawei.com> <BBA82579FD347748BEADC4C445EA0F21BEE7C407@NKGEML515-MBS.china.huawei.com> <0100016bd9b20da3-e9c9fc64-f9e3-4e19-8b01-88504803093d-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE7EA88@NKGEML515-MBS.china.huawei.com> <0100016bf1e894c8-d55d14db-f7ba-4c4a-9ae8-f37aa8ff81a5-000000@email.amazonses.com> <BBA82579FD347748BEADC4C445EA0F21BEE9CA83@NKGEML515-MBS.china.huawei.com> <0100016bf67baa26-3807ff58-9139-4df1-8222-74fd66474b74-000000@email.amazonses.com>
In-Reply-To: <0100016bf67baa26-3807ff58-9139-4df1-8222-74fd66474b74-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=evoit@cisco.com; 
x-originating-ip: [173.38.117.74]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f6bd1ea7-1f85-460c-f29d-08d7094e3e61
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:DM5PR1101MB2250; 
x-ms-traffictypediagnostic: DM5PR1101MB2250:
x-microsoft-antispam-prvs: <DM5PR1101MB2250ECB223EB679DFE0620EBA1CF0@DM5PR1101MB2250.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00997889E7
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(366004)(39860400002)(376002)(136003)(396003)(199004)(189003)(55016002)(52536014)(9686003)(6436002)(6306002)(54896002)(66946007)(33656002)(2420400007)(25786009)(74316002)(15650500001)(14444005)(256004)(7696005)(76116006)(81166006)(76176011)(476003)(54906003)(4326008)(446003)(110136005)(11346002)(66066001)(81156014)(5660300002)(316002)(8936002)(229853002)(66446008)(86362001)(99286004)(7110500001)(8676002)(64756008)(966005)(486006)(7736002)(478600001)(102836004)(14454004)(26005)(3846002)(606006)(53936002)(71200400001)(71190400001)(6116002)(186003)(99936001)(790700001)(66476007)(66556008)(2906002)(66616009)(236005)(6246003)(68736007)(6506007); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR1101MB2250; H:DM5PR1101MB2362.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: PcOmP49YuAlS5fhDQISSpvbRvdQlAq23EAdQWiOG66Gg6QHCtPa4V+bgDDf+T08RObytph615Gl6QSexgbi4hYAwdppT+1+0LeEX+FR1eN8BzgV6f8JnLyJEdHLc+pEACA7nOJspOSezL9rHR3HtdNKmtT3/G+jFYYzgU4koCdc83KnNBEK6ToZZNJgHRElO5E2BuEbkKoO32Ucv73ZGpcDlDVdru2oq0K2u3fDSUV+IFSs6ccsIo9gDek+zKyJEtHqobVIF9KbWD1FGFQsFlqdPaIqwbLqu3RB2JkE6JnSWnQsj26jQuStAL55ZPNNxxigRP19qCEc/USRxplgvXuw04tCdw3hKDJzNvBxumfhcx737lwD+tc9prQVUWmMI3TFWl+xJzIx0K+LmBpMC1WmGlXFIRzLKOrIdkFKV7ak=
Content-Type: multipart/signed; micalg=SHA1; protocol="application/x-pkcs7-signature"; boundary="----=_NextPart_000_0157_01D53B14.3B424080"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f6bd1ea7-1f85-460c-f29d-08d7094e3e61
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2019 17:59:55.3048 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: evoit@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR1101MB2250
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xch-rcd-011.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/i6RBThCmCaLWDU_uqMEspyPbyIM>
Subject: Re: [netconf] New Version Notification for draft-zhou-netconf-multi-stream-originators-06.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 18:00:06 -0000

------=_NextPart_000_0157_01D53B14.3B424080
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0158_01D53B14.3B424080"


------=_NextPart_001_0158_01D53B14.3B424080
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: 7bit

From: Kent Watsen, July 15, 2019 12:34 PM



[CC-ing Eric due to urgent SN issue]





Hi Tianran,



Hmmm, my guess is that pretty much all transports supporting configured 
subscriptions will have the server (i.e., line cards) proactively initiate the 
connections to the notifications-receivers (and not have the receivers 
connecting to the servers).   This is more a macro-observation than a 
draft-mahesh-netconf-https-notif specific thing, though that draft follows 
this pattern too.



[Tianran2]: I am sorry I not quite clear. Here we are talking about the 
dynamic subscription. I conclude there are four potential modes.

1. The linecard runs on server mode. The connections are dynamically set up, 
when the receiver know the subscription decomposition result at run time.

2. The linecard runs on server mode. All the potential connections are set up. 
The receiver only get data dynamically.

3. The linecard runs on client mode. The connections are dynamically set up, 
when the linecard know the subscription decomposition result at run time.

4. The linecard runs on client mode. All the potential connections are set up. 
The linecards send data dynamically.



Yes, this section regards dynamic subscriptions, but the macro-observation is 
that it would be good if dynamic-subscriptions behaved like 
configured-subscriptions and, since configured-subscriptions will most likely 
always have the server initiating the connection, it would be consistent if 
that were true for dynamic-subscriptions too (as opposed to having open 
ports).   Makes sense?



<eric> I think the dynamic subscription case is what several WG members have 
indicated has the most market demand.  With these dynamic subscriptions, there 
has certainly been a desire to match these to the existing transport paradigms 
of NETCONF / RESTCONF.   So I wouldn't suggest changing the overall 
connectivity paradigm of single-stream dynamic subscriptions based on the 
needs multi-line-cards.





 Ah, a "channel" container was added, I didn't see that before.  The draft 
should've defined YANG module to add a "channel" container.  That said, I 
don't think what you're hoping to achieve here is legal/valid YANG (please 
ensure that all examples are validated using e.g., `yanglint`).



[Tianran2]: I did not define a YANG module for this, because this may make the 
this draft depend on draft-mahesh-netconf-https-notif. But I sent the comment 
to the mailing list to suggest draft-mahesh-netconf-https-notif to apply this 
modification.

 <https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg> 
https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg



Or do you think this draft can define a configuration framework, not include 
the details? So that transport like draft-mahesh-netconf-https-notif can 
augment.



Ah, I recall seeing that message fly by before.  Seems like no one replied, 
too bad.   Really, this is not a something any transport draft (e.g., 
draft-mahesh-netconf-https-notif) should have to specify.  It would have to be 
the SN draft (currently in AUTH48) and likely published before Montreal.  This 
creates quite a problem.  I strongly advise raising this to the SN draft 
authors (specifically Eric Voit, CC-ed) ASAP!



<eric> There have been discussions on whether to add multi-line type card 
augmentations for the basic YANG model.  But to-date, these have been seen as 
future augmentations to be worked through the WG.  (Which we are exploring 
now.)



Based on leaving the AUTH48 work as-is, it seems like Tianran's suggestion 
seems a reasonable approach...  Anything specific to multi-line card 
augmentation should be in draft-zhou-netconf-multi-stream-originator.   And 
then any transports which want to support these multi-line card models can 
refer to the appropriate augmentations.


Eric







Kent // contributor




------=_NextPart_001_0158_01D53B14.3B424080
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:SimSun;
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"\@SimSun";
	panose-1:2 1 6 0 3 1 1 1 1 1;}
@font-face
	{font-family:NSimSun;
	panose-1:2 1 6 9 3 1 1 1 1 1;}
@font-face
	{font-family:"\@NSimSun";}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle20
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p =
class=3DMsoNormal><b>From:</b> Kent Watsen, July 15, 2019 12:34 =
PM<br><br><o:p></o:p></p><div><p class=3DMsoNormal>[CC-ing Eric due to =
urgent SN issue]<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Hi Tianran,<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:12.0pt;font-family:SimSun'>Hmmm, my guess is that =
pretty much all transports supporting configured subscriptions will have =
the server (i.e., line cards) proactively initiate the connections to =
the notifications-receivers (and not have the receivers connecting to =
the servers). &nbsp; This is more a macro-observation than a =
draft-mahesh-netconf-https-notif specific thing, though that draft =
follows this pattern too.</span><o:p></o:p></p></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>&nbsp;</span=
><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>[Tianran2]: =
I am sorry I not quite clear. Here we are talking about the dynamic =
subscription. I conclude there are four potential modes.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>1. The =
linecard runs on server mode. The connections are dynamically set up, =
when the receiver know the subscription decomposition result at run =
time.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>2. The =
linecard runs on server mode. All the potential connections are set up. =
The receiver only get data dynamically.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>3. The =
linecard runs on client mode.<span =
class=3Dapple-converted-space>&nbsp;</span>The connections are =
dynamically set up, when the linecard know the subscription =
decomposition result at run time.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>4. The =
linecard runs on client mode. All the potential connections are set up. =
The linecards send data dynamically.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
></div></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Yes, this section regards dynamic subscriptions, but =
the macro-observation is that it would be good if dynamic-subscriptions =
behaved like configured-subscriptions and, since =
configured-subscriptions will most likely always have the server =
initiating the connection, it would be consistent if that were true for =
dynamic-subscriptions too (as opposed to having open ports). &nbsp; =
Makes sense?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'>&lt;eric&gt; I think the dynamic subscription =
case is what several WG members have indicated has the most market =
demand.=C2=A0 With these dynamic subscriptions, there has certainly been =
a desire to match these to the existing transport paradigms of NETCONF / =
RESTCONF.=C2=A0 =C2=A0So I wouldn't suggest changing the overall =
connectivity paradigm of single-stream dynamic subscriptions based on =
the needs multi-line-cards.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>&nbsp;</span=
><span style=3D'font-size:12.0pt;font-family:SimSun'>Ah, a =
&quot;channel&quot; container was added, I didn't see that before. =
&nbsp;The draft should've defined YANG module to add a =
&quot;channel&quot; container. &nbsp;That said, I don't think what =
you're hoping to achieve here is legal/valid YANG (please ensure that =
all examples are validated using e.g., =
`yanglint`).<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>&nbsp;</span=
><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>[Tianran2]: =
I did not define a YANG module for this, because this may make the this =
draft depend on draft-mahesh-netconf-https-notif. But I sent the comment =
to the mailing list to suggest draft-mahesh-netconf-https-notif to apply =
this modification.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><a =
href=3D"https://mailarchive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrz=
cwnRphPg"><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#954F72'>https://mail=
archive.ietf.org/arch/msg/netconf/YmIh2l1xGJUq5gYwvrzcwnRphPg</span></a><=
span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>&nbsp;</span=
><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:NSimSun;color:#1F497D'>Or do you =
think this draft can define a configuration framework, not include the =
details? So that transport like draft-mahesh-netconf-https-notif can =
augment.</span><span =
style=3D'font-size:12.0pt;font-family:SimSun'><o:p></o:p></span></p></div=
></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Ah, I recall seeing that message fly by before. =
&nbsp;Seems like no one replied, too bad. &nbsp; Really, this is not a =
something any transport draft (e.g., draft-mahesh-netconf-https-notif) =
should have to specify. &nbsp;It would have to be the SN draft =
(currently in AUTH48) and likely published before Montreal. &nbsp;This =
creates quite a problem. &nbsp;I strongly advise raising this to the SN =
draft authors (specifically Eric Voit, CC-ed) =
ASAP!&nbsp;<o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'>&lt;eric&gt; There have been discussions on =
whether to add multi-line type card augmentations for the basic YANG =
model.=C2=A0 But to-date, these have been seen as future augmentations =
to be worked through the WG.=C2=A0 (Which we are exploring now.) =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'>Based on leaving the AUTH48 work as-is, it =
seems like Tianran's suggestion seems a reasonable approach...=C2=A0 =
Anything specific to multi-line card augmentation should be in =
draft-zhou-netconf-multi-stream-originator.=C2=A0=C2=A0 And then any =
transports which want to support these multi-line card models can refer =
to the appropriate augmentations.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'color:#2F5597;mso-style-textfill-fill-color:#2F5597;mso-style-te=
xtfill-fill-alpha:100.0%'><br>Eric<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Kent // contributor<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_001_0158_01D53B14.3B424080--

------=_NextPart_000_0157_01D53B14.3B424080
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0157_01D53B14.3B424080--


From nobody Mon Jul 15 15:40:06 2019
Return-Path: <0100016bf7caf6d4-7ecb4e37-33c7-4049-9ab9-2cffdd82972d-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4F5851200A4 for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 15:40:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id je0_oK8WXYDq for <netconf@ietfa.amsl.com>; Mon, 15 Jul 2019 15:40:03 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 807F2120091 for <netconf@ietf.org>; Mon, 15 Jul 2019 15:40:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1563230402; h=From:Content-Type:Mime-Version:Subject:Date:References:To:In-Reply-To:Message-Id:Feedback-ID; bh=rlliGl3ut8P8W8Jf2++33GnIx+CxqJbHn9k5gA5IsP8=; b=CSR1rAJWda2iRnBXsit+7nX7VEcm7ize7JVJIsJPjoj60+KirSdk6ElIGtWX2YQv qFQF2XG4KPkJeny6xmNAhphEtKN+RTCpIfR70s49UhAbQoGQX3NKGIHhOBo24a/65Rc ytDETA/3mEiga+WizOZAjoD4rwsC4TO3sMsh+x8o=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_040C0877-D250-494C-9278-974B77DC68B8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 15 Jul 2019 22:40:02 +0000
References: <0100016bd92da313-fe74f9de-e69b-4c0a-9dab-66246fd8ac77-000000@email.amazonses.com>
To: "netconf@ietf.org" <netconf@ietf.org>
In-Reply-To: <0100016bd92da313-fe74f9de-e69b-4c0a-9dab-66246fd8ac77-000000@email.amazonses.com>
Message-ID: <0100016bf7caf6d4-7ecb4e37-33c7-4049-9ab9-2cffdd82972d-000000@email.amazonses.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.15-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/tHl8WXIjoc-PMKTQ0H2a4GROuJk>
Subject: Re: [netconf] draft netconf 105 agenda posted.
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 22:40:05 -0000

--Apple-Mail=_040C0877-D250-494C-9278-974B77DC68B8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Updated agenda posted.

	https://datatracker.ietf.org/doc/agenda-105-netconf =
<https://datatracker.ietf.org/doc/agenda-105-netconf>

We're still waiting to hear back from the notification-messages authors =
regarding a presentation for that draft.

NETCONF Chairs



> On Jul 9, 2019, at 7:59 PM, Kent Watsen <kent+ietf@watsen.net> wrote:
>=20
>=20
> The draft NETCONF 105 agenda has been posted and reproduced below.
>=20
> 	https://datatracker.ietf.org/doc/agenda-105-netconf
>=20
> Any corrections or updates needed?  (We noticed a number or expected =
presentation requests were not made.)
>=20
> Presenters, please let the chairs know ASAP if needing to present =
remotely.
>=20
> Thanks,
> Kent and Mahesh

--Apple-Mail=_040C0877-D250-494C-9278-974B77DC68B8
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Updated agenda posted.<div class=3D""><br class=3D""></div><div=
 class=3D""><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span><a href=3D"https://datatracker.ietf.org/doc/agenda-105-netconf" =
class=3D"">https://datatracker.ietf.org/doc/agenda-105-netconf</a></div><d=
iv class=3D""><br class=3D""><div class=3D"">We're still waiting to hear =
back from the&nbsp;notification-messages authors regarding a =
presentation for that draft.</div><div class=3D""><br =
class=3D""></div><div class=3D"">NETCONF Chairs</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Jul =
9, 2019, at 7:59 PM, Kent Watsen &lt;<a =
href=3D"mailto:kent+ietf@watsen.net" =
class=3D"">kent+ietf@watsen.net</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D""><br =
class=3D"">The draft NETCONF 105 agenda has been posted and reproduced =
below.<br class=3D""><br class=3D""><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span><a =
href=3D"https://datatracker.ietf.org/doc/agenda-105-netconf" =
class=3D"">https://datatracker.ietf.org/doc/agenda-105-netconf</a><br =
class=3D""><br class=3D"">Any corrections or updates needed? &nbsp;(We =
noticed a number or expected presentation requests were not made.)<br =
class=3D""><br class=3D"">Presenters, please let the chairs know ASAP if =
needing to present remotely.<br class=3D""><br class=3D"">Thanks,<br =
class=3D"">Kent and Mahesh<br =
class=3D""></div></div></blockquote></div></div></div></body></html>=

--Apple-Mail=_040C0877-D250-494C-9278-974B77DC68B8--


From nobody Wed Jul 17 19:43:56 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1CA3120127; Wed, 17 Jul 2019 19:43:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mr0ZnI9osdDY; Wed, 17 Jul 2019 19:43:52 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F145120043; Wed, 17 Jul 2019 19:43:52 -0700 (PDT)
Received: from LHREML713-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id 008656E7327D1BB9797F; Thu, 18 Jul 2019 03:43:50 +0100 (IST)
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by LHREML713-CAH.china.huawei.com (10.201.108.36) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 18 Jul 2019 03:43:49 +0100
Received: from lhreml702-chm.china.huawei.com (10.201.108.51) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1713.5; Thu, 18 Jul 2019 03:43:48 +0100
Received: from NKGEML413-HUB.china.huawei.com (10.98.56.74) by lhreml702-chm.china.huawei.com (10.201.108.51) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1713.5 via Frontend Transport; Thu, 18 Jul 2019 03:43:48 +0100
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.51]) by NKGEML413-HUB.china.huawei.com ([10.98.56.74]) with mapi id 14.03.0439.000; Thu, 18 Jul 2019 10:43:26 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netconf] [netmod]   RE:  pls clarify get operation
Thread-Index: AdU9ETq4sTpTMz3bTxurvnfGNPR27g==
Date: Thu, 18 Jul 2019 02:43:26 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA4A03B74@nkgeml513-mbs.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.134.31.203]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA4A03B74nkgeml513mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/20hrUh1OZ29OsM8HAmLRyrYr0A4>
Subject: Re: [netconf] [netmod]   RE:  pls clarify get operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 02:43:55 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA4A03B74nkgeml513mbschi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA4A03B74nkgeml513mbschi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA4A03B74nkgeml513mbschi_--


From nobody Wed Jul 17 21:34:35 2019
Return-Path: <rohitrranade@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60F58120088; Wed, 17 Jul 2019 21:34:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iv40XZOj48bA; Wed, 17 Jul 2019 21:34:30 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8805D120025; Wed, 17 Jul 2019 21:34:30 -0700 (PDT)
Received: from LHREML710-CAH.china.huawei.com (unknown [172.18.7.106]) by Forcepoint Email with ESMTP id DCDF28FF8D2B282A9ED9; Thu, 18 Jul 2019 05:34:27 +0100 (IST)
Received: from lhreml712-chm.china.huawei.com (10.201.108.63) by LHREML710-CAH.china.huawei.com (10.201.108.33) with Microsoft SMTP Server (TLS) id 14.3.408.0; Thu, 18 Jul 2019 05:34:27 +0100
Received: from lhreml712-chm.china.huawei.com (10.201.108.63) by lhreml712-chm.china.huawei.com (10.201.108.63) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Thu, 18 Jul 2019 05:34:27 +0100
Received: from DGGEML403-HUB.china.huawei.com (10.3.17.33) by lhreml712-chm.china.huawei.com (10.201.108.63) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Thu, 18 Jul 2019 05:34:26 +0100
Received: from DGGEML510-MBX.china.huawei.com ([169.254.2.102]) by DGGEML403-HUB.china.huawei.com ([fe80::74d9:c659:fbec:21fa%31]) with mapi id 14.03.0439.000; Thu, 18 Jul 2019 12:34:16 +0800
From: Rohit R Ranade <rohitrranade@huawei.com>
To: Qin Wu <bill.wu@huawei.com>, Kent Watsen <kent@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netconf] [netmod]   RE:  pls clarify get operation
Thread-Index: AdU9ETq4sTpTMz3bTxurvnfGNPR27gAEGcDw
Date: Thu, 18 Jul 2019 04:34:15 +0000
Message-ID: <991B70D8B4112A4699D5C00DDBBF878A6BD9F7A1@dggeml510-mbx.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA4A03B74@nkgeml513-mbs.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4A03B74@nkgeml513-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.18.150.121]
Content-Type: multipart/alternative; boundary="_000_991B70D8B4112A4699D5C00DDBBF878A6BD9F7A1dggeml510mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/Bu69kOA1O6sxpvkVl5cCAhNQMYE>
Subject: Re: [netconf] [netmod]   RE:  pls clarify get operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 04:34:34 -0000

--_000_991B70D8B4112A4699D5C00DDBBF878A6BD9F7A1dggeml510mbxchi_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SWYgSUVURiBtb2R1bGVzIGRvIG5vdCBkZWZpbmUgYSDigJgtc3RhdGXigJkgc3VidHJlZSwgZm9y
IGV4YW1wbGUgdGhlIOKAnGlldGYtbW9kdWxlLXRhZ3PigJ0sIGVhY2ggdmVuZG9yIHdobyB3YW50
cyB0byBzdXBwb3J0IE5vbi1OTURBIGNsaWVudHMgbWF5IGhhdmUgdG8gYXVnbWVudCBzdWNoIG1v
ZHVsZXMgd2l0aCBhIOKAnC1zdGF0ZeKAnSBzdWJ0cmVlIG9mIHRoZWlyIG93bi4NCg0KDQpGcm9t
OiBuZXRjb25mIFttYWlsdG86bmV0Y29uZi1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2Yg
UWluIFd1DQpTZW50OiAxOCBKdWx5IDIwMTkgMDg6MTMNClRvOiBLZW50IFdhdHNlbiA8a2VudEB3
YXRzZW4ubmV0Pg0KQ2M6IG5ldGNvbmZAaWV0Zi5vcmc7IG5ldG1vZEBpZXRmLm9yZw0KU3ViamVj
dDogUmU6IFtuZXRjb25mXSBbbmV0bW9kXSBSRTogcGxzIGNsYXJpZnkgZ2V0IG9wZXJhdGlvbg0K
DQrlj5Hku7bkuro6IEtlbnQgV2F0c2VuIFttYWlsdG86a2VudEB3YXRzZW4ubmV0XQ0K5Y+R6YCB
5pe26Ze0OiAyMDE55bm0N+aciDEw5pelIDI6MzENCuaUtuS7tuS6ujogUWluIFd1IDxiaWxsLnd1
QGh1YXdlaS5jb208bWFpbHRvOmJpbGwud3VAaHVhd2VpLmNvbT4+DQrmioTpgIE6IG5ldGNvbmZA
aWV0Zi5vcmc8bWFpbHRvOm5ldGNvbmZAaWV0Zi5vcmc+OyBuZXRtb2RAaWV0Zi5vcmc8bWFpbHRv
Om5ldG1vZEBpZXRmLm9yZz4NCuS4u+mimDogUmU6IFtuZXRjb25mXSBbbmV0bW9kXSBSRTogcGxz
IGNsYXJpZnkgZ2V0IG9wZXJhdGlvbg0KDQpbSnVzdCBiYWNrIGZyb20gYSA0dGggb2YgSnVseSB0
aGluZ10NCg0KSGkgUWluLA0KSXQgcHJvdmlkZXMgZ3VpZGVsaW5lIGhvdyB0byBjcmVhdGUgdGVt
cG9yYXJ5IG5vbi1OTURBIG1vZHVsZSBmcm9tIE5NREEgbW9kdWxlLCBidXQgdGVtcG9yYXJ5IG5v
bi1OTURBIG1vZHVsZSBpcyBub3Qgc3RhbmRhcmQgbW9kdWxlLiBTbyBldmVyeWJvZHkgd2lsbCBj
cmVhdGUgdGhlIHNhbWUgdGVtcG9yYXJ5IG5vbi1OTURBIG1vZHVsZT8NCkkgYWxzbyBmZWVsIHRo
aXMgc2Vjb25kIHBhcmFncmFwaCBpcyBub3QgdmVyeSBjbGVhciwgZXNwZWNpYWxseSB0aGUgbGFz
dCBzZW50ZW5jZSwgIGlzIG5lc3RlZCBjb25maWcgZmFsc2UgZGF0YSBub2RlcyBwYXJ0IG9mIE5N
REEgbW9kdWxlIG9yIHRlbXBvcmFyeSBub24tTk1EQQ0KTW9kdWxlPyBMb29rcyBsaWtlICBuZXN0
ZWQgY29uZmlnIGZhbHNlIGRhdGEgbm9kZSBwYXJ0IG9mIE5NREEgbW9kdWxlPw0KVHJ1ZSwgYnV0
IGFzIEkgd3JvdGUgRnJhbmsgb24gdGhlIDI4dGg6DQoNCiJTb21lIGRyYWZ0cyBhbHJlYWR5IHB1
Ymxpc2ggYSAic3RhdGUiIG1vZHVsZSBpbiB0aGVpciBBcHBlbmRpeCBhbmQsIHdoZW4gdGhleSBk
bywgdGhlcmUgaXMgYSBjb21wbGV0ZWx5IHN0YW5kYXJkIG5vbi1OTURBIElFVEYgc29sdXRpb24u
ICBJIGRvbid0IGtub3cgaWYgdGhpcyBzdHJhdGVneSBpcyBiZWluZyBmb2xsb3dlZCB1bml2ZXJz
YWxseSBidXQsIGlmIG5vdCwgdGhlbiBJIGRvbid0IGJlbGlldmUgdGhlIElFVEYgd291bGQgb2Jq
ZWN0IGF0IGFsbCB0byB0aGUgcHVibGljYXRpb24gb2YgZHJhZnRzIGZvciBtaXNzaW5nIHN0YXRl
IG1vZGVscyBpbiBkcmFmdHMgdGhhdCBvbmx5IGFzc3VtZWQgTk1EQS4iDQoNCkFyZSB5b3UgZmFj
aW5nIHRoaXMgc2l0dWF0aW9uIGN1cnJlbnRseT8gICBJZiBzbywgd2l0aCB3aGljaCBtb2R1bGVz
PyAgSGF2ZSB5b3UgY29uc2lkZXJlZCBzdWJtaXR0aW5nIGFuIEktRCB0byBkZWZpbmUgdGhlIG1p
c3Npbmcgc3RhdGUgdHJlZSBtb2R1bGU/DQoNCltRaW5dOiBZZXMsIHdlIGFyZSBsb29raW5nIGZv
ciBjb21wbGV0ZWx5IHN0YW5kYXJkIG5vbi1OTURBIElFVEYgc29sdXRpb24gaW4gdGhpcyBOTURB
IHRyYW5zaXRpb24gdGltZSBwZXJpb2QsIHNpbmNlIHdlIGFzc3VtZSBtYW55IE5FVENPTkYgY2xp
ZW50cyBpbiB0aGUgZXhpc3RpbmcgZGVwbG95bWVudCBkb27igJl0IHN1cHBvcnQgTk1EQS4gV2Ug
YXJlIG5vdCBzdXJlIHN0YXRlIG1vZHVsZSBpbiB0aGUgYXBwZW5kaXggaXMgc3RhbmRhcmQgbm9u
LU5NREEgbW9kZWwgb3Igbm90PyBIb3cgbWFueSBvcGVyYXRvcnMgYW5kIGltcGxlbWVudGVyIHdp
bGwgdXNlIHRoZW0gYXMgc3RhbmRhcmQgbW9kZWwuDQpZZWFoLCBmb3Igc29tZSBvZiBvdGhlciBt
b2RlbCBtYXkgbm90IGRlZmluZSBzdWNoIHN0YXRlIG1vZHVsZSBpbiB0aGUgYXBwZW5kaXguDQpD
YW4gbm9uLU5NREEgY2xpZW50IGNvbnN1bWUgTk1EQSBtb2R1bGU/DQoNClNvcnQgb2YuICBUaGUg
Y29uZmlnLXRydWUgbm9kZXMgd2lsbCBhcHBlYXIgaW4gdGhlIDxydW5uaW5nPiBhcyB1c3VhbCwg
YW5kIHRoZSBjb25maWctZmFsc2Ugbm9kZXMgY2FuIGJlIGFjY2Vzc2VkIHZpYSB0aGUgc3RhbmRh
cmQgb3BlcmF0aW9ucy4gIEJ1dCB0aGVyZSB3aWxsIGJlIGlzc3VlcyBhcywgZm9yIGluc3RhbmNl
LCB0aGUgY29uZmlnLWZhbHNlIG5vZGVzIHdpbGwgb25seSBhcHBlYXIgZm9yIGNvbmZpZ3VyZWQg
aXRlbXMgYW5kIHRoZSBvcGVyYXRpb25hbCB2YWx1ZSBmb3IgY29uZmlnLXRydWUgbm9kZXMgd2ls
bCBiZSBtaXNzaW5nLCB0aGUgbGF0dGVyIG9mIHdoaWNoIG1heSBiZSBpbXBvcnRhbnQgYXMgYW4g
Tk1EQS1vcHRpbWl6ZWQgZGF0YSBtb2RlbCBpcyB1bmxpa2VseSB0byBkZWZpbmUgY29uZmlnLWZh
bHNlIG5vZGVzIGZvciBhbnkgY29uZmlnLXRydWUgbm9kZXMsIGFuZCBoZW5jZSB0aGUgY29uZmln
LWZhbHNlIHRoYXQgYXJlIGRlZmluZWQgbWF5IGJlIGZhciBhbmQgZmV3IGJldHdlZW4sIGxlYWRp
bmcgdG8gYW4gdW5hY2NlcHRhYmx5IGluY29tcGxldGUgdXBzdGF0ZSB2aWV3Lg0KDQpbUWluXTpU
aGF0IGlzIGV4YWN0bHkgdGhlIGlzc3VlIHdlIGFyZSBmYWNpbmcuIEhvdyBkbyB3ZSBhcyBOb24t
Tk1EQSBjbGllbnQgdXNlIE5ETUEgbW9kdWxlIHRvIGdldCBzeXN0ZW0gZ2VuZXJhdGVkIGNvbmZp
Z3VyYXRpb24uIEkgYXNzdW1lIGNvbmZpZyBmYWxzZSBub2RlcyBmb3IgY29uZmlnLXRydWUgbm9k
ZXMgYXJlIHJlZmVycmVkIHRvIHN5c3RlbSBnZW5lcmF0ZWQgY29uZmlndXJhdGlvbi4gVGhlc2Ug
c3lzdGVtIGdlbmVyYXRlZCBjb25maWd1cmF0aW9uIGNhbiBub3QgYmUgb2J0YWluZWQgdGhyb3Vn
aCBnZXQgb3BlcmF0aW9uLg0KDQo=

--_000_991B70D8B4112A4699D5C00DDBBF878A6BD9F7A1dggeml510mbxchi_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_991B70D8B4112A4699D5C00DDBBF878A6BD9F7A1dggeml510mbxchi_--


From nobody Wed Jul 17 23:52:03 2019
Return-Path: <mvasko@cesnet.cz>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 31EA8120606 for <netconf@ietfa.amsl.com>; Wed, 17 Jul 2019 23:52:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cesnet.cz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Kj8q1VfxtNv4 for <netconf@ietfa.amsl.com>; Wed, 17 Jul 2019 23:51:58 -0700 (PDT)
Received: from kalendar.cesnet.cz (kalendar.cesnet.cz [78.128.211.34]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A1C51200EC for <netconf@ietf.org>; Wed, 17 Jul 2019 23:51:58 -0700 (PDT)
Received: by kalendar.cesnet.cz (Postfix, from userid 999) id 0F7D76021F; Thu, 18 Jul 2019 08:51:56 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cesnet.cz; s=kalendar; t=1563432716; bh=7InUIHANfh/0KEMEpVoAV1W7rdzKHVxTs7VqpXkj2YQ=; h=To:Date:Subject:From; b=HUH64V3+QtMIJaBjDakuEfrS3PHDIl5gkvZwLKeNll6DTgtPFDL7T6YQtdkGrciNj LOVWoE1jzcnH8KhQceX6cIJWvneonKvijltE5ce8Gs3rOPNASNiN7ygUkim1chAgf9 IG5bHr7ydkav1ZIHCkbVtp08MWQM18DqFkC3HvQg=
Content-Type: text/plain; charset="utf-8"
To: "netconf" <netconf@ietf.org>
User-Agent: SOGoMail 2.3.23
MIME-Version: 1.0
Date: Thu, 18 Jul 2019 08:51:56 +0200
Message-ID: <5e52-5d301700-29-5aa79a00@178123885>
X-Forward: 2001:67c:1220:80c:b5:55d3:81d5:8636
From: =?utf-8?q?Michal_Va=C5=A1ko?= <mvasko@cesnet.cz>
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/FXF1zsxPlOroustwYbTND5dCkFs>
Subject: [netconf] ietf-netconf-acm extensions
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 06:52:01 -0000

Hi,

I would like to ask for some clarification of NACM extensions meaning w=
hen performing an <edit-config> because my current understanding is mos=
t likely wrong. I will illustrate on an example using ietf-netconf-acm@=
2018-02-14 data.

running configuration:

<nacm xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
  <enable-nacm>true</enable-nacm>
  <write-default>true</write-default>
</nacm>

An arbitrary user (not root, so not the recovery session) sends this <e=
dit-config> config:

<nacm xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
  <enable-nacm>false</enable-nacm>
</nacm>

Now, NACM rules are being applied:
1) On the "nacm" container no access is required (default "merge" opera=
tion on an already existing node [1] 5th paragraph)
2) On the "enable-nacm" write access should be required (decided at 12.=
 in [2])

So the access is granted and NACM is now disabled. I understand this is=
 mostly due to "write-default" being "permit" but what about the "defau=
lt-deny-all" extension instance on the top-level "nacm" container? I th=
ink it was meant to deny any access to the NACM data for every user wit=
hout explicit NACM rule. Effectively, it does absolutely nothing becaus=
e the top-level container can always exist (I guess it depends on the i=
mplementation) so for every <edit-config> no access will be required fo=
r this node. Am I missing something?

Regards,
Michal

[1] https://tools.ietf.org/html/rfc8341#page-17
[2] https://tools.ietf.org/html/rfc8341#section-3.4.5


From nobody Thu Jul 18 01:44:18 2019
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3021E120129 for <netconf@ietfa.amsl.com>; Thu, 18 Jul 2019 01:44:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xynx-MmQzWJn for <netconf@ietfa.amsl.com>; Thu, 18 Jul 2019 01:44:13 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00080.outbound.protection.outlook.com [40.107.0.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F38D12006D for <netconf@ietf.org>; Thu, 18 Jul 2019 01:44:13 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HfhqMW9sofD6AGNKn9sfWgj+kH2Fh2LN4BfPtxLyAm54I1FLPzKoa1WW34pFRG5aIHEE7kifidBDM5F5iZSbDneSpTQ0T0OQZQm/lAhgiH9+j7cJghtBarQdY0sb8/idJTHHiMGrA/1AH9clu22Wn7kfCxX8h/WwuBFyDI0+1kefaRGVCPjntVMeVql+zUB2kSGETsPiVz3HTS+q3oWQ52DJoz/G+GzNLnXDU9e8gbCvcZy5+oSEUn60hvGkA1JGlsLcwo3X7PjOx7c2TYRrvggMqdHiFX/n193OPWrZAVU9FviausFt8oNMFfdmz6qN49n5a4ycxsXz2pHvB0eO8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PY1+PgWEVTchwhDp4S849tN8AA5/f3DmCQpMK85U+yY=; b=kCNqL3Ki9HrkHrTefARks/TObSCxRncz2eDrldwn+cb8atNvX4FTC53AIZNSTMPPs2m4yAkWrs3rsRNU+5WsakPM7upNdh3tDIpdfIlvaL/aVJFoqiCgrif6Fbpj2F8AbopX47b3PmbMAh9wr25UTBdF9+boAaz16RtAgXciuzfioriOHe0eAkCS0U93qNj0mwpl9vmb1gh1h2u2lDkEKpcRxCu24z0smP0VmgQJCiS9wz/OsVcIq1KCy1ZEL5fTyok8W7R6iR2ny/AyXkSpnVdaOOIBx/FtASqJLvJWVKdhsIU2ITYPKlz6BYkFkGy+KRkgx9BtLLp2v5Mz2g+BEA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PY1+PgWEVTchwhDp4S849tN8AA5/f3DmCQpMK85U+yY=; b=ew4daVOa3XWQZwpieoVH8C/iigfqK1nFfFOJiwq260gWH7BFbNYKmc2oh6nHkeRHSgFEzeySceT8x4Io8kvJ42z6KMiqVtYFkEqH4Hpr0C8Ca7BBoMT5mJJ2CqTi4L3QDaltSwNiS6E4JCucM1oiATUuCmxMXkZgRBRX+oJUK7I=
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com (10.169.137.153) by VI1PR0701MB2944.eurprd07.prod.outlook.com (10.173.76.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.7; Thu, 18 Jul 2019 08:44:09 +0000
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::88f6:43be:a1:7ae7]) by VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::88f6:43be:a1:7ae7%6]) with mapi id 15.20.2094.009; Thu, 18 Jul 2019 08:44:08 +0000
From: =?iso-8859-1?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Why do we need YANG Patch ?
Thread-Index: AdU9RDiHR0VpVyXcTdOO0QIojrMCdA==
Date: Thu, 18 Jul 2019 08:44:08 +0000
Message-ID: <VI1PR0701MB22865C1868121B21E5427597F0C80@VI1PR0701MB2286.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7c4634bc-9293-410c-f34f-08d70b5c198f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:VI1PR0701MB2944; 
x-ms-traffictypediagnostic: VI1PR0701MB2944:
x-microsoft-antispam-prvs: <VI1PR0701MB294419C4F49496CB1A0C4ADBF0C80@VI1PR0701MB2944.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 01026E1310
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(366004)(346002)(136003)(396003)(376002)(189003)(199004)(9326002)(25786009)(52536014)(33656002)(7736002)(74316002)(2501003)(5660300002)(71190400001)(71200400001)(81156014)(476003)(81166006)(1730700003)(99936001)(8676002)(8936002)(6436002)(45776006)(4744005)(486006)(53936002)(6916009)(7696005)(66446008)(64756008)(66616009)(66556008)(5640700003)(316002)(66946007)(66476007)(2906002)(76116006)(99286004)(14454004)(54896002)(6116002)(3846002)(26005)(790700001)(66066001)(186003)(86362001)(478600001)(2351001)(6506007)(68736007)(55016002)(256004)(9686003)(6306002)(102836004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0701MB2944; H:VI1PR0701MB2286.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: K3i7jXpF6bHlpuYYeNp/wXpRq9lzEdJcxJhUMrbjfqvXpoxvhlVLsEoRL/eelBm6OXObyImbdo7+Yd4xQNHBcDCKTEI6D4ku9xFLTXEuhIyOjig7Ik9kWWuumqUFxu+AZEJGA24DHdAeba8SgOuupWnS+eFeS4xm7Zlsg1igjT0Ct6KC7CldRajLbgBFV/XcBLE+G+/IKo6ktAl6dLscGWChvR4qVpuSv5sCMluj1tzaRBLHNS3dm0qIxk/FH3EZlLZ7PM+Y5pNNWYnOwJ364o1h9qC3N3ulCtjQyWjF+bjXES93ZUJT8d2iLqTHIiR9MUxegcSzK2FGYKV/DXtLcKGOepzPEa02m40tLfr+CNlS5aKtMw3vgHZI72Z8C8CKgdShHYC+pSK4ET5RgFbHwDewcRX3Uxyo0+2VIVERSgs=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0030_01D53D55.B8F24FA0"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7c4634bc-9293-410c-f34f-08d70b5c198f
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2019 08:44:08.9305 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: balazs.lengyel@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2944
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/H7vkHV8zvMbIb2RXQCBo7lgqGug>
Subject: [netconf] Why do we need YANG Patch ?
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jul 2019 08:44:16 -0000

------=_NextPart_000_0030_01D53D55.B8F24FA0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0031_01D53D55.B8F24FA0"


------=_NextPart_001_0031_01D53D55.B8F24FA0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hello,

I know this probably have discussed earlier, but could someone give me a
short description why do we need YANG patch? As I see it we have 3 patch
methods:

RFC 5789  - PATCH Method for HTTP

RFC 6902 - JSON Patch

RFC 8072 =96 YANG Patch

=20

Why is the JSON patch not good enough (not used) in Restconf?

Regards Balazs


------=_NextPart_001_0031_01D53D55.B8F24FA0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1"><meta name=3DGenerator content=3D"Microsoft Word =
15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Hello,<o:p></o:p></p><p class=3DMsoNormal>I know this =
probably have discussed earlier, but could someone give me a short =
description why do we need YANG patch? As I see it we have 3 patch =
methods:<o:p></o:p></p><p class=3DMsoNormal>RFC 5789=A0 - PATCH Method =
for HTTP<o:p></o:p></p><p class=3DMsoNormal>RFC 6902 - JSON =
Patch<o:p></o:p></p><p class=3DMsoNormal>RFC 8072 &#8211; YANG =
Patch<o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Why is the JSON patch not good enough (not used) in =
Restconf?<o:p></o:p></p><p class=3DMsoNormal>Regards =
Balazs<o:p></o:p></p></div></body></html>
------=_NextPart_001_0031_01D53D55.B8F24FA0--

------=_NextPart_000_0030_01D53D55.B8F24FA0
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_0030_01D53D55.B8F24FA0--


From nobody Sun Jul 21 07:58:57 2019
Return-Path: <bill.wu@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05B3B120020; Sun, 21 Jul 2019 07:58:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UCYeXNLggED9; Sun, 21 Jul 2019 07:58:53 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 716031200B6; Sun, 21 Jul 2019 07:58:52 -0700 (PDT)
Received: from lhreml706-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 47AC06503978D906291E; Sun, 21 Jul 2019 15:58:50 +0100 (IST)
Received: from lhreml711-chm.china.huawei.com (10.201.108.62) by lhreml706-cah.china.huawei.com (10.201.108.47) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sun, 21 Jul 2019 15:58:49 +0100
Received: from lhreml711-chm.china.huawei.com (10.201.108.62) by lhreml711-chm.china.huawei.com (10.201.108.62) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Sun, 21 Jul 2019 15:58:48 +0100
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml711-chm.china.huawei.com (10.201.108.62) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Sun, 21 Jul 2019 15:58:47 +0100
Received: from NKGEML513-MBS.china.huawei.com ([169.254.2.207]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0439.000; Sun, 21 Jul 2019 22:58:44 +0800
From: Qin Wu <bill.wu@huawei.com>
To: Kent Watsen <kent@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netconf] [netmod]   RE:  pls clarify get operation
Thread-Index: AdU9ETq4sTpTMz3bTxurvnfGNPR27gCw1Dg5
Date: Sun, 21 Jul 2019 14:58:43 +0000
Message-ID: <B8F9A780D330094D99AF023C5877DABAA8816CEF@nkgeml513-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAA4A03B74@nkgeml513-mbs.china.huawei.com>
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAA4A03B74@nkgeml513-mbs.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.124.94.138]
Content-Type: multipart/alternative; boundary="_000_B8F9A780D330094D99AF023C5877DABAA8816CEFnkgeml513mbschi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/jphbmX8YE7stj1k15iujivQMM1M>
Subject: Re: [netconf] [netmod]   RE:  pls clarify get operation
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Jul 2019 14:58:56 -0000

--_000_B8F9A780D330094D99AF023C5877DABAA8816CEFnkgeml513mbschi_
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
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--_000_B8F9A780D330094D99AF023C5877DABAA8816CEFnkgeml513mbschi_
Content-Type: text/html; charset="gb2312"
Content-Transfer-Encoding: quoted-printable

<html dir=3D"ltr">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dgb2312">
<style>@font-face {
	font-family: =CB=CE=CC=E5;
}
@font-face {
	font-family: Cambria Math;
}
@font-face {
	font-family: Calibri;
}
@font-face {
	font-family: =CE=A2=C8=ED=D1=C5=BA=DA;
}
@page WordSection1 {margin: 72.0pt 90.0pt 72.0pt 90.0pt; }
P.MsoNormal {
	FONT-SIZE: 12pt; FONT-FAMILY: =CB=CE=CC=E5; MARGIN: 0cm 0cm 0pt
}
LI.MsoNormal {
	FONT-SIZE: 12pt; FONT-FAMILY: =CB=CE=CC=E5; MARGIN: 0cm 0cm 0pt
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; FONT-FAMILY: =CB=CE=CC=E5; MARGIN: 0cm 0cm 0pt
}
A:link {
	TEXT-DECORATION: underline; COLOR: blue
}
SPAN.MsoHyperlink {
	TEXT-DECORATION: underline; COLOR: blue
}
A:visited {
	TEXT-DECORATION: underline; COLOR: purple
}
SPAN.MsoHyperlinkFollowed {
	TEXT-DECORATION: underline; COLOR: purple
}
PRE {
	FONT-SIZE: 12pt; FONT-FAMILY: =CB=CE=CC=E5; MARGIN: 0cm 0cm 0pt
}
SPAN.HTMLChar {
	FONT-FAMILY: =CB=CE=CC=E5
}
SPAN.EmailStyle19 {
	FONT-FAMILY: "Calibri",sans-serif; COLOR: #1f497d
}
SPAN.EmailStyle20 {
	FONT-FAMILY: "Calibri",sans-serif; COLOR: #1f497d
}
SPAN.EmailStyle22 {
	FONT-FAMILY: "Calibri",sans-serif; COLOR: #1f497d
}
.MsoChpDefault {
	FONT-SIZE: 10pt
}
</style><style id=3D"owaParaStyle">P {
	MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px
}
</style>
</head>
<body lang=3D"ZH-CN" vlink=3D"purple" link=3D"blue" fPStyle=3D"1" ocsi=3D"0=
">
<div style=3D"direction: ltr;font-family: Tahoma;color: #000000;font-size: =
10pt;">
<p>I blieve there is sufficient discussion on this issue, we have requested=
 a timeslot in netmod session to give the update, hopefully conluded this d=
iscussion. Thanks!</p>
<p>&nbsp;</p>
<p>-Qin</p>
<div style=3D"FONT-SIZE: 16px; FONT-FAMILY: Times New Roman; COLOR: #000000=
">
<hr tabindex=3D"-1">
<div id=3D"divRpF603091" style=3D"DIRECTION: ltr"><font color=3D"#000000" s=
ize=3D"2" face=3D"Tahoma"><b>=B7=A2=BC=FE=C8=CB:</b> netconf [netconf-bounc=
es@ietf.org] =B4=FA=B1=ED Qin Wu [bill.wu@huawei.com]<br>
<b>=B7=A2=CB=CD=CA=B1=BC=E4:</b> 2019=C4=EA7=D4=C218=C8=D5 10:43<br>
<b>=CA=D5=BC=FE=C8=CB:</b> Kent Watsen<br>
<b>=B3=AD=CB=CD:</b> netconf@ietf.org; netmod@ietf.org<br>
<b>=D6=F7=CC=E2:</b> Re: [netconf] [netmod] RE: pls clarify get operation<b=
r>
</font><br>
</div>
<div></div>
<div>
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><b><span style=3D"FONT-SIZE: 11pt; FONT-FAMILY: &quo=
t;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif">=B7=A2=BC=FE=C8=CB<span lang=
=3D"EN-US">:</span></span></b><span lang=3D"EN-US" style=3D"FONT-SIZE: 11pt=
; FONT-FAMILY: &quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> Kent Watse=
n [mailto:kent@watsen.net]
<br>
</span><b><span style=3D"FONT-SIZE: 11pt; FONT-FAMILY: &quot;=CE=A2=C8=ED=
=D1=C5=BA=DA&quot;,sans-serif">=B7=A2=CB=CD=CA=B1=BC=E4<span lang=3D"EN-US"=
>:</span></span></b><span lang=3D"EN-US" style=3D"FONT-SIZE: 11pt; FONT-FAM=
ILY: &quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sans-serif"> 2019</span><span sty=
le=3D"FONT-SIZE: 11pt; FONT-FAMILY: &quot;=CE=A2=C8=ED=D1=C5=BA=DA&quot;,sa=
ns-serif">=C4=EA<span lang=3D"EN-US">7</span>=D4=C2<span lang=3D"EN-US">10<=
/span>=C8=D5<span lang=3D"EN-US">
 2:31<br>
</span><b>=CA=D5=BC=FE=C8=CB<span lang=3D"EN-US">:</span></b><span lang=3D"=
EN-US"> Qin Wu &lt;bill.wu@huawei.com&gt;<br>
</span><b>=B3=AD=CB=CD<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> netconf@ietf.org; netmod@ietf.org<br>
</span><b>=D6=F7=CC=E2<span lang=3D"EN-US">:</span></b><span lang=3D"EN-US"=
> Re: [netconf] [netmod] RE: pls clarify get operation</span></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">[Just back from a 4th of July t=
hing]</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Qin,</span></p>
<div>
<blockquote style=3D"MARGIN-BOTTOM: 5pt; MARGIN-TOP: 5pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"FONT-SIZE: 10.5pt; FON=
T-FAMILY: &quot;Calibri&quot;,sans-serif; COLOR: #1f497d">It provides guide=
line how to create temporary non-NMDA module from NMDA module, but temporar=
y non-NMDA module is not standard module. So everybody
 will create the same temporary non-NMDA module? </span><span lang=3D"EN-US=
"></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<blockquote style=3D"MARGIN-BOTTOM: 5pt; MARGIN-TOP: 5pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"FONT-SIZE: 10.5pt; FON=
T-FAMILY: &quot;Calibri&quot;,sans-serif; COLOR: #1f497d">I also feel this =
second paragraph is not very clear, especially the last sentence, &nbsp;is =
nested config false data nodes part of NMDA module or
 temporary non-NMDA</span><span lang=3D"EN-US"></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"FONT-SIZE: 10.5pt; FON=
T-FAMILY: &quot;Calibri&quot;,sans-serif; COLOR: #1f497d">Module? Looks lik=
e&nbsp; nested config false data node part of NMDA module?
</span><span lang=3D"EN-US"></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">True, but as I wrote Frank on t=
he 28th: &nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
</div>
<blockquote style=3D"MARGIN-LEFT: 30pt; MARGIN-RIGHT: 0cm">
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&quot;Some drafts already publi=
sh a &quot;state&quot; module in their Appendix and, when they do, there is=
 a completely standard non-NMDA IETF solution. &nbsp;I don't know if this s=
trategy is&nbsp;being followed universally but, if not, then
 I don't believe the IETF would object at all to the publication of drafts =
for missing state models in drafts that only assumed NMDA.&quot; &nbsp;&nbs=
p;</span></p>
</div>
</div>
</blockquote>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Are you facing this situation c=
urrently? &nbsp; If so, with which modules? &nbsp;Have you considered submi=
tting an I-D to define the missing state tree module?</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"COLOR: #1f497d">[Qin]:=
 Yes, we are looking for completely standard non-NMDA IETF solution in this=
 NMDA transition time period, since we assume many NETCONF clients in the e=
xisting deployment don=A1=AFt support NMDA.
 We are not sure state module in the appendix is standard non-NMDA model or=
 not? How many operators and implementer will use them as standard model.</=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"COLOR: #1f497d">Yeah, =
for some of other model may not define such state module in the appendix.</=
span></p>
</div>
<blockquote style=3D"MARGIN-BOTTOM: 5pt; MARGIN-TOP: 5pt">
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"FONT-SIZE: 10.5pt; FON=
T-FAMILY: &quot;Calibri&quot;,sans-serif; COLOR: #1f497d">Can non-NMDA clie=
nt consume NMDA module?
</span><span lang=3D"EN-US"></span></p>
</div>
</div>
</div>
</div>
</blockquote>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Sort of. &nbsp;The config-true =
nodes will appear in the &lt;running&gt; as usual, and the config-false nod=
es can be accessed via the standard operations. &nbsp;But there will be iss=
ues as, for instance, the config-false nodes will only
 appear for configured items and the operational value for config-true node=
s will be missing, the latter of which may be important as an NMDA-optimize=
d data model is unlikely to define config-false nodes for any config-true n=
odes, and hence the config-false
 that are defined may be far and few between, leading to an unacceptably in=
complete upstate view.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"COLOR: #1f497d">[Qin]:=
That is exactly the issue we are facing. How do we as Non-NMDA client use N=
DMA module to get system generated configuration. I assume config false nod=
es for config-true nodes are referred
 to system generated configuration. These system generated configuration ca=
n not be obtained through get operation.</span><span lang=3D"EN-US"><br>
<br>
</span></p>
</div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"></span>&nbsp;</p>
</div>
</div>
</div>
</div>
</body>
</html>

--_000_B8F9A780D330094D99AF023C5877DABAA8816CEFnkgeml513mbschi_--


From nobody Sun Jul 21 13:07:41 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 389A4120135 for <netconf@ietfa.amsl.com>; Sun, 21 Jul 2019 13:07:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oc-iBQT_G5Q5 for <netconf@ietfa.amsl.com>; Sun, 21 Jul 2019 13:07:33 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0740112001B for <netconf@ietf.org>; Sun, 21 Jul 2019 13:07:33 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id m8so1850353lji.7 for <netconf@ietf.org>; Sun, 21 Jul 2019 13:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=tgoKSUEfdPHx5OiOYngfm/sy2oc2jE9zAOUQSSdx/Bo=; b=vds1KoKURQQA+NUMOTbBOnZYOm9g7+1ugrkgB3cztIZDjT2WWGy+1vLl4/JmB+6s/q MkpEWOkX2Iw8Pa9i0G2mXoJsp2yvrOmIi85/+6j2ZU+TgJuNNefqzw2blLq61M5cAH0T vpX8rr0Np11L43NOgFncmn5rxsqO6+YfdzQC1XXj6opcQCFGqy9xuYlIfW9z+PBNdL5H /PoNjRqA+iH9rPmk8bLpPkmQMn9pGq9i/GCX1YkmkyXPlkyLdrDRB3kqYVocOeSIHELS gfeXEJhWEdq2WZHD/1p994XVB0FbZgCEfSHNBN7mzmX+GJuE7GiHYmFieTiPwlsRmKrh QKxw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=tgoKSUEfdPHx5OiOYngfm/sy2oc2jE9zAOUQSSdx/Bo=; b=s6rSVZ8brxlSxpd4aydhInqbrxAk4ZaKQO64VOL877uTblwIqgVGcEC8ZIzhI1mnO/ MA7g2EJEaBBto3wOULYs6jGjkyu5UxdUuFatMcatW6eVr06s0nwuv/BDm09p/KHpAs6V Mf35SuNHeAUOG78QHfGd/dvubrExOetQQUDVbsP5YpDHeFrOEWvBWYdOyYvV0ovOlgPt ome6WA/duw6pM6o/Hlwm5OifiqivDLj2HTXS0F42tBSfYtZcveY7j4D6Mvn0PhGHihRC S0Lxv0ICbYcAf5RLvnTzkvh/Tx7G+q3ITZpKBI+8yrvFcCmK12ScUg3S7KTK+Vt0p9ua PIEg==
X-Gm-Message-State: APjAAAXsFm3LXGDTUirqJuXXQkoYzvskvYWIEz+zndlDObUZmYincDjX UlGnWo4NtjKwnqKGPEVZgo/DbAujPKOWguDhDjhq+w==
X-Google-Smtp-Source: APXvYqzLOD2mMw6XAxGbp3jgV/8Ix5TioGlwM5Qf9AILpOA/8uxSvFigB8oqElkCExk8Ci4MZI+YRzhAnXGmUcRGQcY=
X-Received: by 2002:a2e:8559:: with SMTP id u25mr34034960ljj.224.1563739651118;  Sun, 21 Jul 2019 13:07:31 -0700 (PDT)
MIME-Version: 1.0
References: <5e52-5d301700-29-5aa79a00@178123885>
In-Reply-To: <5e52-5d301700-29-5aa79a00@178123885>
From: Andy Bierman <andy@yumaworks.com>
Date: Sun, 21 Jul 2019 13:07:20 -0700
Message-ID: <CABCOCHSnXHvQUhQ3QZnSKb4mz6ssBKMiWz5wjpLieEi8dTWrJg@mail.gmail.com>
To: =?UTF-8?Q?Michal_Va=C5=A1ko?= <mvasko@cesnet.cz>
Cc: netconf <netconf@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006d29b1058e3682cc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ddCrxls-Qv4SfZhzWZc71MU33IA>
Subject: Re: [netconf] ietf-netconf-acm extensions
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Jul 2019 20:07:36 -0000

--0000000000006d29b1058e3682cc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Wed, Jul 17, 2019 at 11:52 PM Michal Va=C5=A1ko <mvasko@cesnet.cz> wrote=
:

> Hi,
>
> I would like to ask for some clarification of NACM extensions meaning whe=
n
> performing an <edit-config> because my current understanding is most like=
ly
> wrong. I will illustrate on an example using ietf-netconf-acm@2018-02-14
> data.
>
> running configuration:
>
> <nacm xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
>   <enable-nacm>true</enable-nacm>
>   <write-default>true</write-default>
> </nacm>
>
> An arbitrary user (not root, so not the recovery session) sends this
> <edit-config> config:
>
> <nacm xmlns=3D"urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
>   <enable-nacm>false</enable-nacm>
> </nacm>
>
> Now, NACM rules are being applied:
> 1) On the "nacm" container no access is required (default "merge"
> operation on an already existing node [1] 5th paragraph)
> 2) On the "enable-nacm" write access should be required (decided at 12. i=
n
> [2])
>
> So the access is granted and NACM is now disabled. I understand this is
> mostly due to "write-default" being "permit" but what about the
> "default-deny-all" extension instance on the top-level "nacm" container? =
I
> think it was meant to deny any access to the NACM data for every user
> without explicit NACM rule. Effectively, it does absolutely nothing becau=
se
> the top-level container can always exist (I guess it depends on the
> implementation) so for every <edit-config> no access will be required for
> this node. Am I missing something?
>
>
The NACM extensions apply to the entire subtree, so access to to
enable-nacm leaf is
subject to the default-deny-all extension.



> Regards,
> Michal
>


Andy


>
> [1] https://tools.ietf.org/html/rfc8341#page-17
> [2] https://tools.ietf.org/html/rfc8341#section-3.4.5
>
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf
>

--0000000000006d29b1058e3682cc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Wed, Jul 17, 2019 at 11:52 PM Mich=
al Va=C5=A1ko &lt;<a href=3D"mailto:mvasko@cesnet.cz">mvasko@cesnet.cz</a>&=
gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi,<b=
r>
<br>
I would like to ask for some clarification of NACM extensions meaning when =
performing an &lt;edit-config&gt; because my current understanding is most =
likely wrong. I will illustrate on an example using ietf-netconf-acm@2018-0=
2-14 data.<br>
<br>
running configuration:<br>
<br>
&lt;nacm xmlns=3D&quot;urn:ietf:params:xml:ns:yang:ietf-netconf-acm&quot;&g=
t;<br>
=C2=A0 &lt;enable-nacm&gt;true&lt;/enable-nacm&gt;<br>
=C2=A0 &lt;write-default&gt;true&lt;/write-default&gt;<br>
&lt;/nacm&gt;<br>
<br>
An arbitrary user (not root, so not the recovery session) sends this &lt;ed=
it-config&gt; config:<br>
<br>
&lt;nacm xmlns=3D&quot;urn:ietf:params:xml:ns:yang:ietf-netconf-acm&quot;&g=
t;<br>
=C2=A0 &lt;enable-nacm&gt;false&lt;/enable-nacm&gt;<br>
&lt;/nacm&gt;<br>
<br>
Now, NACM rules are being applied:<br>
1) On the &quot;nacm&quot; container no access is required (default &quot;m=
erge&quot; operation on an already existing node [1] 5th paragraph)<br>
2) On the &quot;enable-nacm&quot; write access should be required (decided =
at 12. in [2])<br>
<br>
So the access is granted and NACM is now disabled. I understand this is mos=
tly due to &quot;write-default&quot; being &quot;permit&quot; but what abou=
t the &quot;default-deny-all&quot; extension instance on the top-level &quo=
t;nacm&quot; container? I think it was meant to deny any access to the NACM=
 data for every user without explicit NACM rule. Effectively, it does absol=
utely nothing because the top-level container can always exist (I guess it =
depends on the implementation) so for every &lt;edit-config&gt; no access w=
ill be required for this node. Am I missing something?<br>
<br></blockquote><div><br></div><div>The NACM extensions apply to the entir=
e subtree, so access to to enable-nacm leaf is</div><div>subject to the def=
ault-deny-all extension.</div><div><br></div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">
Regards,<br>
Michal<br></blockquote><div><br></div><div><br></div><div>Andy</div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
[1] <a href=3D"https://tools.ietf.org/html/rfc8341#page-17" rel=3D"noreferr=
er" target=3D"_blank">https://tools.ietf.org/html/rfc8341#page-17</a><br>
[2] <a href=3D"https://tools.ietf.org/html/rfc8341#section-3.4.5" rel=3D"no=
referrer" target=3D"_blank">https://tools.ietf.org/html/rfc8341#section-3.4=
.5</a><br>
<br>
_______________________________________________<br>
netconf mailing list<br>
<a href=3D"mailto:netconf@ietf.org" target=3D"_blank">netconf@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netconf" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/netconf</a><br>
</blockquote></div></div>

--0000000000006d29b1058e3682cc--


From nobody Mon Jul 22 08:30:39 2019
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 91B5C120280 for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 08:30:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rl3aPEwrWq9o for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 08:30:33 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00064.outbound.protection.outlook.com [40.107.0.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F22512028F for <netconf@ietf.org>; Mon, 22 Jul 2019 08:30:33 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YuYuLE2KBbsIX30MFBJVynsQvnOUA63KJ1RthfxwddTXGOtebSMZgsM0r4sv3WkyJZdz6gZn7absXHfKZVPgMId5VFuhYlz3luPCX1d1oNLKLTUjuL/vu5JXfzMxBfmEPrS8ilrSPxU4EoJMDwYxTPqJbHxrcqIQkB5g1BGk15RdnWwcTpYHcJIE4al5sX6aSMbz8MIwRebJhgDD+xNbtoUpZnziny2IueAPxCfue5afZCvedUuP9D0f3x5/ru7eVoZ52UzmrT8BKVyDNZUChGj5MHZI+X3cQTH2B3p0Dx09oltG3F4LaE66Xvf/R2hE8eVGIXFraX1ooWFqucztew==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2JbhBzzZOJKVgpYckgDmi0GUX9ZMoEqszAmVG6icH5o=; b=QHfbA2aXb7QBLc2YE6/TRuxJjyU4HoSS1tdaO6ltTBuP06Q2rWW9xsWe7CMSZsfb4/9Vzj1NUE51xQlZc8iFOC0JwthRndwMi0I/t1Ttci6vNDy42RaU6sOS33dubB0Wrap3PkVWPCpfFUShjdxE5yUHIf/Me0pC/MjXzXYc+ZyW6RiotwBVL623l06pDZM5eocM5X7IfpWWS9c7leJHP8mY+iF5J52ezjf1JxxLHEQ+MgqUjqtWW6mhHj+eXzMb399Hj/TiaNNPMtahxkkYcNShOXuRvzPABKIFK0GawoxuMCdzyAg3OY7UzqHjQ+Pvtoxx3Hdjl2TG6JnDIey8Hw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2JbhBzzZOJKVgpYckgDmi0GUX9ZMoEqszAmVG6icH5o=; b=bx3d/otr+s4y5gD5w16sPcatLYfhoqxC+SAyFKEiAZsw7Pdbo2AmCWmSLqXu+RfOZAgDSmf9iC3htTysv9qw7dg3SazgztnUmoRCUm92giIM5lOc6dTJEdZ4NfT7OFThHfFE1zwxtkb/mAqcTa0jxfDt0jqJdjhcb+L6itBd+xU=
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com (10.169.137.153) by VI1PR0701MB2927.eurprd07.prod.outlook.com (10.173.72.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2115.8; Mon, 22 Jul 2019 15:30:30 +0000
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a]) by VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a%11]) with mapi id 15.20.2115.005; Mon, 22 Jul 2019 15:30:30 +0000
From: =?iso-8859-1?Q?Bal=E1zs_Lengyel?= <balazs.lengyel@ericsson.com>
To: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Balazs comments on draft-mahesh-netconf-https-notif-00
Thread-Index: AdVAmNt5jlACq4jZT/iQQIHGq3+Aag==
Date: Mon, 22 Jul 2019 15:30:30 +0000
Message-ID: <VI1PR0701MB228612909A6BCB94C262B59BF0C40@VI1PR0701MB2286.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [2001:67c:1232:144:1816:c5a7:7b6a:280f]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c0c41883-8b22-4c14-52e7-08d70eb987d5
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:VI1PR0701MB2927; 
x-ms-traffictypediagnostic: VI1PR0701MB2927:
x-microsoft-antispam-prvs: <VI1PR0701MB292788373A8E34E0A7FA4AD1F0C40@VI1PR0701MB2927.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 01068D0A20
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(346002)(366004)(396003)(39860400002)(376002)(199004)(189003)(5640700003)(316002)(6436002)(6916009)(2906002)(55016002)(74316002)(14454004)(86362001)(53936002)(6306002)(33656002)(9686003)(54896002)(4744005)(71190400001)(71200400001)(478600001)(2351001)(66616009)(66476007)(64756008)(66446008)(66946007)(66556008)(8676002)(790700001)(25786009)(76116006)(1730700003)(81156014)(81166006)(99936001)(45776006)(6116002)(7696005)(7736002)(52536014)(256004)(68736007)(8936002)(46003)(486006)(9326002)(99286004)(476003)(186003)(5660300002)(6506007)(2501003)(102836004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0701MB2927; H:VI1PR0701MB2286.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: +zzL8U8MPivXsRu57cfVWl8uEEN1XYe80C7uVppoQzgteVruLukje7pIvHZg+PnYyIAG5lQmv3bpbXS9ShF7PDlZ4u4hsJMLk6TzT5sxo1xSAhrqI5iq3ibvtF5Np6NACHa5hRxBb1chvUkykRJn1OME9NdzCvM+6PDWIZYoaB6iM44mopg1zA9uYdUmBRKM+H7VEKYpJqK8rl80NLywhDMrWa1gkVLbNGCYdilru1B13vjI7TuUcaomd5Ukd3NcG8rAITgXcyqokPAloekBO4rbrjY3GI7tnDJtu2dFpcahvQiqeps7sY64p4xD3teU5SVzn99Zz/WO6POpT9Ne0FmjlFOSji4qJF4tU8TWW4NySy8SzZdrTWpzYzbvz3Se6jmntunVejxbjhuMnZHFN8VJFvp2xcfhe2RNdcyaCZg=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_025A_01D54080.DC4AF870"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c0c41883-8b22-4c14-52e7-08d70eb987d5
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2019 15:30:30.1560 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: balazs.lengyel@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2927
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/bl3VD_NfJI5oOK9IycZM6WxzLgU>
Subject: [netconf] Balazs comments on draft-mahesh-netconf-https-notif-00
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 15:30:37 -0000

------=_NextPart_000_025A_01D54080.DC4AF870
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_025B_01D54080.DC4AF870"


------=_NextPart_001_025B_01D54080.DC4AF870
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hello,

*	I very much like and support and need this work. Some comments:

-        Identities like =93https=94 specifying protocols seem to be a =
generic
issue. They could/should be in some more generic RFC e.g.
ietf-inet-types.yang. We already had the need for protocol identities in
other design work.

-        leaf =93name=94: this is a typical example where a description =
is not
needed, only forced by our style guide. Maybe the style guide should be
changed.

=20

Regards Balazs


------=_NextPart_001_025B_01D54080.DC4AF870
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1"><meta name=3DGenerator content=3D"Microsoft Word =
15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0cm;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:125005165;
	mso-list-type:hybrid;
	mso-list-template-ids:-1976432508 470954096 67698691 67698693 67698689 =
67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Calibri",sans-serif;
	mso-fareast-font-family:Calibri;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal>Hello,<o:p></o:p></p><ul style=3D'margin-top:0cm' =
type=3Ddisc><li class=3DMsoListParagraph =
style=3D'margin-left:0cm;mso-list:l0 level1 lfo1'>I very much like and =
support and need this work. Some comments:<o:p></o:p></li></ul><p =
class=3DMsoListParagraph style=3D'text-indent:-18.0pt;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span style=3D'mso-list:Ignore'>-<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>Identities like &#8220;https&#8221; specifying =
protocols seem to be a generic issue. They could/should be in some more =
generic RFC e.g. ietf-inet-types.yang. We already had the need for =
protocol identities in other design work.<o:p></o:p></p><p =
class=3DMsoListParagraph style=3D'text-indent:-18.0pt;mso-list:l0 level1 =
lfo1'><![if !supportLists]><span style=3D'mso-list:Ignore'>-<span =
style=3D'font:7.0pt "Times New =
Roman"'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
</span></span><![endif]>leaf &#8220;name&#8221;: this is a typical =
example where a description is not needed, only forced by our style =
guide. Maybe the style guide should be changed.<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Regards =
Balazs<o:p></o:p></p></div></body></html>
------=_NextPart_001_025B_01D54080.DC4AF870--

------=_NextPart_000_025A_01D54080.DC4AF870
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_025A_01D54080.DC4AF870--


From nobody Mon Jul 22 08:30:48 2019
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 859E9120313 for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 08:30:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NQi_8V2aYRiX for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 08:30:39 -0700 (PDT)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C4BF120297 for <netconf@ietf.org>; Mon, 22 Jul 2019 08:30:39 -0700 (PDT)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 3A5B1830 for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:38 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.198]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id XgX94iCAG08r for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:38 +0200 (CEST)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:38 +0200 (CEST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 239DF2012C for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:38 +0200 (CEST)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id v9ZX1fx5waTg for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:37 +0200 (CEST)
Received: from exchange.jacobs-university.de (sxchmb03.jacobs.jacobs-university.de [10.70.0.155]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "exchange.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by hermes.jacobs-university.de (Postfix) with ESMTPS id C6C1F20129 for <netconf@ietf.org>; Mon, 22 Jul 2019 17:30:37 +0200 (CEST)
Received: from anna.localdomain (10.50.218.117) by sxchmb03.jacobs.jacobs-university.de (10.70.0.155) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 22 Jul 2019 17:30:37 +0200
Received: by anna.localdomain (Postfix, from userid 501) id F09C62DC25D; Mon, 22 Jul 2019 17:30:36 +0200 (CEST)
Date: Mon, 22 Jul 2019 17:30:36 +0200
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: <netconf@ietf.org>
Message-ID: <20190722153036.qzltp6y5osod7idy@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: netconf@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
User-Agent: NeoMutt/20180716
X-ClientProxiedBy: SXCHMB04.jacobs.jacobs-university.de (10.70.0.156) To sxchmb03.jacobs.jacobs-university.de (10.70.0.155)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/IPzrlZ21OfV2MkSjAsfE7HGO54A>
Subject: [netconf] universal crypto algorithm registry - yet more delay?
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 15:30:47 -0000

Hi,

I have listened to the WG discussions today and I am wondering whether
NETCONF should really be defining a universal crypto algorithm
registry. To me, this seems to be an activity that (if needed) should
be done in the security area.

My concern is not so much an organizational one but more about the
time it takes to deliver the client and server configuration drafts.
The first WG server configuration draft was posted on May 2014, more
than 5 years ago (draft-ietf-netconf-server-model-00). I do appreciate
Kent's efforts to generalize the solution every year but we also need
to deliver something at some point in time that people can implement
and use. It seems that creating a universal crypto algorithm registry
may be yet another unknown we dive into. Can we not design what we
have in such that we may in the future use such a universal crypto
algorithm registry (but we do not have to create it and wait for it to
be created)? Or is this universal crypto algorithm registry just a
small short effort given the other open issues that are still being
discussed?

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Mon Jul 22 13:05:36 2019
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4B1A12008C for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 13:05:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bnJr3t91iFeN for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 13:05:32 -0700 (PDT)
Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F85412008F for <netconf@ietf.org>; Mon, 22 Jul 2019 13:05:32 -0700 (PDT)
Received: by mail-lj1-x22b.google.com with SMTP id d24so38787751ljg.8 for <netconf@ietf.org>; Mon, 22 Jul 2019 13:05:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=TNuBL+tSOtFwEdPNuGaewgqFmf5BB+qB5H0fLnmA5OQ=; b=xyDI/AjQnczf8x4DCPczxv905XTtbFOc/8KrfE7SaNPujEvr3wwIVmeLC8MzMDwe4r 2BAMc7UPsGoTWVIxE6fL11kaizkpj0J1Wd2cjYs9ZF6bL52rRqnQKZwBsHy7X0OSrX4Z q+yDfOe84LwLR1M5wyw9Z9WwlY3kSxImjOMXXNKERTeFyhv1R8uSpsfInoHpVq5d458q jN+TCvhWiUEbo2RqR/kk1Sh7vVdeSBT/X6klE5gnCQCaPxTXkTj9m838paKKdKg/t4rp tj9u84Rmo70jZAjpMVx7njuUHgLVpjqJl4GbVQ0sdYB3j4R9oMZWYV983FhVX+W5zYUe JaGw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=TNuBL+tSOtFwEdPNuGaewgqFmf5BB+qB5H0fLnmA5OQ=; b=XQIHiFFnDNNhA0qwYQTddtIIU8PqEa2kBfdQDxuZI7L4kbXkFGgqlOR/yD11UBwjvl 7HJhApCk4DD3WemhmRxP4QAKAMEwTLdxxXz7nbtPEJiwidnc7u7p5VnXtIy69DNOA0ut ykcJletk20EtfPweA8Zm+E9++QlHiRA0Ark5fIw5DMC/uctzYXyXVYWLW40omhmMa2G7 boOcX3RQ8fqeKyMQdQV3m5RRiqhahyFREUCgWxDFsu3DwnTmJD9DwmLohp5NUpes+D9Q kDTib0yMERZMe7MIwqCDm9GeT6dLtFZ1EZlRHWz0VAG/OscFmvRHs5NN57nKcPtJDm9z i32g==
X-Gm-Message-State: APjAAAWwsIE4SCxZDDot4DMV17+Gywr1smSopyoWxviOOo6JpeiEgRAl IYn6fAVmC8woesXsf+fuSHoHg7jWqA6G7ZYQoI+xxg==
X-Google-Smtp-Source: APXvYqwAMYi+1ZVck7VEV/EPZNjgnQu+DFReia5CERi+9zfz0Oa1rB1PeyrcYQTpjmXQUIOVP8dmEa47KV2RyTma+IM=
X-Received: by 2002:a2e:b0ea:: with SMTP id h10mr31153646ljl.50.1563825930229;  Mon, 22 Jul 2019 13:05:30 -0700 (PDT)
MIME-Version: 1.0
References: <20190722153036.qzltp6y5osod7idy@anna.jacobs.jacobs-university.de>
In-Reply-To: <20190722153036.qzltp6y5osod7idy@anna.jacobs.jacobs-university.de>
From: Andy Bierman <andy@yumaworks.com>
Date: Mon, 22 Jul 2019 13:05:18 -0700
Message-ID: <CABCOCHQgU3Lk+Lz5WrYKdR2L4cHBVMs4dfkNRyvF-hz+0FW7nQ@mail.gmail.com>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Netconf <netconf@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000fef86058e4a9901"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/OTqiCm5mRR88c4bjH0ENOgwEfCc>
Subject: Re: [netconf] universal crypto algorithm registry - yet more delay?
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 20:05:35 -0000

--0000000000000fef86058e4a9901
Content-Type: text/plain; charset="UTF-8"

On Mon, Jul 22, 2019 at 8:30 AM Juergen Schoenwaelder <
j.schoenwaelder@jacobs-university.de> wrote:

> Hi,
>
> I have listened to the WG discussions today and I am wondering whether
> NETCONF should really be defining a universal crypto algorithm
> registry. To me, this seems to be an activity that (if needed) should
> be done in the security area.
>
> My concern is not so much an organizational one but more about the
> time it takes to deliver the client and server configuration drafts.
> The first WG server configuration draft was posted on May 2014, more
> than 5 years ago (draft-ietf-netconf-server-model-00). I do appreciate
> Kent's efforts to generalize the solution every year but we also need
> to deliver something at some point in time that people can implement
> and use. It seems that creating a universal crypto algorithm registry
> may be yet another unknown we dive into. Can we not design what we
> have in such that we may in the future use such a universal crypto
> algorithm registry (but we do not have to create it and wait for it to
> be created)? Or is this universal crypto algorithm registry just a
> small short effort given the other open issues that are still being
> discussed?
>
>

+1 to 'no more delays'.
These drafts have been very unstable and seeing the slide that showed 1 of
4 parts done
and 3 of 4 that need to be done over suggests this is not going to change
any time soon.



> /js
>
>
Andy



> --
> Juergen Schoenwaelder           Jacobs University Bremen gGmbH
> Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
> Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>
>
> _______________________________________________
> netconf mailing list
> netconf@ietf.org
> https://www.ietf.org/mailman/listinfo/netconf
>

--0000000000000fef86058e4a9901
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Mon, Jul 22, 2019 at 8:30 AM Juerg=
en Schoenwaelder &lt;<a href=3D"mailto:j.schoenwaelder@jacobs-university.de=
">j.schoenwaelder@jacobs-university.de</a>&gt; wrote:<br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
I have listened to the WG discussions today and I am wondering whether<br>
NETCONF should really be defining a universal crypto algorithm<br>
registry. To me, this seems to be an activity that (if needed) should<br>
be done in the security area.<br>
<br>
My concern is not so much an organizational one but more about the<br>
time it takes to deliver the client and server configuration drafts.<br>
The first WG server configuration draft was posted on May 2014, more<br>
than 5 years ago (draft-ietf-netconf-server-model-00). I do appreciate<br>
Kent&#39;s efforts to generalize the solution every year but we also need<b=
r>
to deliver something at some point in time that people can implement<br>
and use. It seems that creating a universal crypto algorithm registry<br>
may be yet another unknown we dive into. Can we not design what we<br>
have in such that we may in the future use such a universal crypto<br>
algorithm registry (but we do not have to create it and wait for it to<br>
be created)? Or is this universal crypto algorithm registry just a<br>
small short effort given the other open issues that are still being<br>
discussed?<br>
<br></blockquote><div><br></div><div><br></div><div>+1 to &#39;no more dela=
ys&#39;.</div><div>These drafts have been very unstable and seeing the slid=
e that showed 1 of 4 parts done</div><div>and 3 of 4 that need to be done o=
ver suggests this is not going to change any time soon.</div><div><br></div=
><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
/js<br>
<br></blockquote><div><br></div><div>Andy</div><div><br></div><div>=C2=A0</=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
-- <br>
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer=
sity Bremen gGmbH<br>
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28=
759 Bremen | Germany<br>
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0&lt;<a h=
ref=3D"https://www.jacobs-university.de/" rel=3D"noreferrer" target=3D"_bla=
nk">https://www.jacobs-university.de/</a>&gt;<br>
<br>
_______________________________________________<br>
netconf mailing list<br>
<a href=3D"mailto:netconf@ietf.org" target=3D"_blank">netconf@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/netconf" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/netconf</a><br>
</blockquote></div></div>

--0000000000000fef86058e4a9901--


From nobody Mon Jul 22 14:29:22 2019
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB8B312001B for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 14:29:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pvJvnn5W6ESH for <netconf@ietfa.amsl.com>; Mon, 22 Jul 2019 14:29:17 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80045.outbound.protection.outlook.com [40.107.8.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AFFC31200A3 for <netconf@ietf.org>; Mon, 22 Jul 2019 14:29:16 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BSeEQZDrlbAeXmljnZ5iVxZuI9vLMdTsmAUFMOssSWq9Y5Ch62fBqyv9ii+h/EGRlxtmj+nKx0zRRY/lbeHZ1345BBjejOFQISvGzX24dhK2iWRblQwsQs6NTpfxlvLvGhbwucd6U3qcTROPqrYsEU78rwfNua5Dm7aDVS7Wi8jurF3Fo+omzsRHhjLbtgT53ZITmLlEOWM8ZWnbHaYenUiJPwYzwTLSNpuDM1hOIGDTgmSxkV/6xVbK4bgZzxuXgrNko5GQCECTADl3qRuvLLsbGZcjjeMplK/SYxFiGwHvPfU55A2EEFNkPaXyRARtIzQfiRjhVual1EI0HYDCkA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BtN0oanSArl02FGU6TvWFK3CzMAsxxS539M5YpbrUCo=; b=kB3Q0VUEiT1D28AGYvgjXCd8NO4oWmQC3dDuIezjSelMaqvZgcUXhgUJSyMR/YdTCDd0TxNMGod7FxGRfORrtymRz+eEk8g1ggFsf3cMU5Gx/j6zdqJS8Z00kw9Yxjr2wZkDMsVeC3hmJ2jI9dlXYVjPCu6r7tXBFzX8OhMSAb6hJ6wy1UsP91gSSWEThv1TEb4jqRinVtShbuEL+6IJezupRMLxTZs6iXQjQjh1vI6y+YOc1MNt8YxKVU31lADy1HAtxzHFKBXq/59Mrd4hQkIYskK/nom5FbrBOLKLdStaQ6fNdAr0ldOiL9AvbdIxqT5uCOJLChWStVtYYYheiQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BtN0oanSArl02FGU6TvWFK3CzMAsxxS539M5YpbrUCo=; b=R6gY6lZG0+PLkd6gvBX90yF9UzN3hufRsTXw6IqF/x8BBfCNF0xf5AZECzJHw//tj65EtGUhpj3pcfwffNUb5UDlbQpUfL8THSP+orJpMow6JOOA3/jscVi4ouxzzxEvZm2gVdjpbw8mDFqAY8UVBhL5d4d36SqU6SI/iCi5qhg=
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com (10.169.137.153) by VI1PR0701MB2240.eurprd07.prod.outlook.com (10.169.131.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2115.10; Mon, 22 Jul 2019 21:29:14 +0000
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a]) by VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a%11]) with mapi id 15.20.2115.005; Mon, 22 Jul 2019 21:29:14 +0000
From: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>
To: Andy Bierman <andy@yumaworks.com>, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>, Netconf <netconf@ietf.org>
Thread-Topic: [netconf] universal crypto algorithm registry - yet more delay?
Thread-Index: AQHVQKJ5CWOV2uB0dkmIW7Nv47WMbabXEEwAgAAW9sA=
Date: Mon, 22 Jul 2019 21:29:14 +0000
Message-ID: <VI1PR0701MB2286BC47AC55E7F795F03A0BF0C40@VI1PR0701MB2286.eurprd07.prod.outlook.com>
References: <20190722153036.qzltp6y5osod7idy@anna.jacobs.jacobs-university.de> <CABCOCHQgU3Lk+Lz5WrYKdR2L4cHBVMs4dfkNRyvF-hz+0FW7nQ@mail.gmail.com>
In-Reply-To: <CABCOCHQgU3Lk+Lz5WrYKdR2L4cHBVMs4dfkNRyvF-hz+0FW7nQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [31.133.153.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 90143f54-e3c0-43dd-5605-08d70eeba4fb
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:VI1PR0701MB2240; 
x-ms-traffictypediagnostic: VI1PR0701MB2240:
x-microsoft-antispam-prvs: <VI1PR0701MB22409690E3E503DF52956C48F0C40@VI1PR0701MB2240.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 01068D0A20
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(376002)(346002)(366004)(396003)(39860400002)(199004)(189003)(53546011)(99936001)(71190400001)(71200400001)(7736002)(316002)(2906002)(81156014)(81166006)(8936002)(33656002)(110136005)(966005)(790700001)(11346002)(446003)(486006)(476003)(76176011)(74316002)(8676002)(186003)(26005)(102836004)(6506007)(7696005)(68736007)(6116002)(3846002)(256004)(14444005)(66574012)(9686003)(14454004)(6306002)(55016002)(85182001)(236005)(99286004)(478600001)(6436002)(85202003)(606006)(52536014)(86362001)(66476007)(66556008)(66616009)(66946007)(6246003)(64756008)(66446008)(25786009)(5660300002)(54896002)(76116006)(53936002)(229853002)(66066001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0701MB2240; H:VI1PR0701MB2286.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: xnL2RkW30pdKSkaZLjrJj0d8EMTl+rZInWWk06CSkDhh1F0uiAHEeFxfR2L9impyCNfloleJj9m4SCwO4y+M6VNbMeSYXU9vzpqy9zVZcA5AKTw9ci+JAqoPKUXAWKYq6x+okQy6j59h+W89TMUrU9yhNvxbgjD6RryXs93gnBLKJYotqze+UmkMxY8gWFTRhdLjx2Ijby8eveGADFxAsAZaVhYY3yZrE/5etesI46AVbqpz9vWMOt/Ls9ayzMELP7xYKfaNffOepifqbJuhnP7FSWosM9ik3gj1Tnli3BVqim8zz+ugri6MSuUOtRoyxaN5vARgUgmE4UFs5C8JRKsd9Fh4hmpPFk+6/cXoynqz32se8qP4sKBawExx0wqCdMeAcDNMlb/LZ2+fo1aCiuR47eoI8r29Oj+gJ97MLKo=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_029C_01D540B2.FA43EE90"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 90143f54-e3c0-43dd-5605-08d70eeba4fb
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2019 21:29:14.3403 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: balazs.lengyel@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2240
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/6TiZ-ds3Mt2OuPRK98g1-XX9JmM>
Subject: Re: [netconf] universal crypto algorithm registry - yet more delay?
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 22 Jul 2019 21:29:20 -0000

------=_NextPart_000_029C_01D540B2.FA43EE90
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_029D_01D540B2.FA43EE90"


------=_NextPart_001_029D_01D540B2.FA43EE90
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

+1 for no delays. We might be forced to implement draft versions =
already.=20

Regards Balazs

=20

From: netconf <netconf-bounces@ietf.org> On Behalf Of Andy Bierman
Sent: 2019. j=C3=BAlius 22., h=C3=A9tf=C5=91 16:05
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>; =
Netconf <netconf@ietf.org>
Subject: Re: [netconf] universal crypto algorithm registry - yet more =
delay?

=20

=20

=20

On Mon, Jul 22, 2019 at 8:30 AM Juergen Schoenwaelder =
<j.schoenwaelder@jacobs-university.de =
<mailto:j.schoenwaelder@jacobs-university.de> > wrote:

Hi,

I have listened to the WG discussions today and I am wondering whether
NETCONF should really be defining a universal crypto algorithm
registry. To me, this seems to be an activity that (if needed) should
be done in the security area.

My concern is not so much an organizational one but more about the
time it takes to deliver the client and server configuration drafts.
The first WG server configuration draft was posted on May 2014, more
than 5 years ago (draft-ietf-netconf-server-model-00). I do appreciate
Kent's efforts to generalize the solution every year but we also need
to deliver something at some point in time that people can implement
and use. It seems that creating a universal crypto algorithm registry
may be yet another unknown we dive into. Can we not design what we
have in such that we may in the future use such a universal crypto
algorithm registry (but we do not have to create it and wait for it to
be created)? Or is this universal crypto algorithm registry just a
small short effort given the other open issues that are still being
discussed?

=20

=20

+1 to 'no more delays'.

These drafts have been very unstable and seeing the slide that showed 1 =
of 4 parts done

and 3 of 4 that need to be done over suggests this is not going to =
change any time soon.

=20

=20

/js

=20

Andy

=20

=20

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>

_______________________________________________
netconf mailing list
netconf@ietf.org <mailto:netconf@ietf.org>=20
https://www.ietf.org/mailman/listinfo/netconf


------=_NextPart_001_029D_01D540B2.FA43EE90
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>+1 for no =
delays. We might be forced to implement draft versions already. =
<o:p></o:p></p><p class=3DMsoNormal>Regards Balazs<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><b>From:</b> =
netconf &lt;netconf-bounces@ietf.org&gt; <b>On Behalf Of </b>Andy =
Bierman<br><b>Sent:</b> 2019. j=C3=BAlius 22., h=C3=A9tf=C5=91 =
16:05<br><b>To:</b> Juergen Schoenwaelder =
&lt;j.schoenwaelder@jacobs-university.de&gt;; Netconf =
&lt;netconf@ietf.org&gt;<br><b>Subject:</b> Re: [netconf] universal =
crypto algorithm registry - yet more delay?<o:p></o:p></p><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Mon, Jul 22, 2019 at 8:30 AM Juergen Schoenwaelder &lt;<a =
href=3D"mailto:j.schoenwaelder@jacobs-university.de">j.schoenwaelder@jaco=
bs-university.de</a>&gt; wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Hi,<br><br>I have listened to the WG =
discussions today and I am wondering whether<br>NETCONF should really be =
defining a universal crypto algorithm<br>registry. To me, this seems to =
be an activity that (if needed) should<br>be done in the security =
area.<br><br>My concern is not so much an organizational one but more =
about the<br>time it takes to deliver the client and server =
configuration drafts.<br>The first WG server configuration draft was =
posted on May 2014, more<br>than 5 years ago =
(draft-ietf-netconf-server-model-00). I do appreciate<br>Kent's efforts =
to generalize the solution every year but we also need<br>to deliver =
something at some point in time that people can implement<br>and use. It =
seems that creating a universal crypto algorithm registry<br>may be yet =
another unknown we dive into. Can we not design what we<br>have in such =
that we may in the future use such a universal crypto<br>algorithm =
registry (but we do not have to create it and wait for it to<br>be =
created)? Or is this universal crypto algorithm registry just a<br>small =
short effort given the other open issues that are still =
being<br>discussed?<o:p></o:p></p></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>+1 to 'no more delays'.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>These drafts have been very unstable and seeing the =
slide that showed 1 of 4 parts done<o:p></o:p></p></div><div><p =
class=3DMsoNormal>and 3 of 4 that need to be done over suggests this is =
not going to change any time soon.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>/js<o:p></o:p></p></blockquote><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Andy<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><p class=3DMsoNormal>-- =
<br>Juergen Schoenwaelder&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Jacobs =
University Bremen gGmbH<br>Phone: +49 421 200 3587&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;Campus Ring 1 | 28759 Bremen | Germany<br>Fax:&nbsp; =
&nbsp;+49 421 200 3103&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&lt;<a =
href=3D"https://www.jacobs-university.de/" =
target=3D"_blank">https://www.jacobs-university.de/</a>&gt;<br><br>______=
_________________________________________<br>netconf mailing list<br><a =
href=3D"mailto:netconf@ietf.org" =
target=3D"_blank">netconf@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/netconf" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/netconf</a><o:p><=
/o:p></p></blockquote></div></div></div></body></html>
------=_NextPart_001_029D_01D540B2.FA43EE90--

------=_NextPart_000_029C_01D540B2.FA43EE90
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_029C_01D540B2.FA43EE90--


From nobody Mon Jul 22 19:56:58 2019
Return-Path: <noreply@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FBF512013E; Mon, 22 Jul 2019 19:56:49 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Rifaat Shekh-Yusef via Datatracker <noreply@ietf.org>
To: <secdir@ietf.org>
Cc: netconf@ietf.org, ietf@ietf.org, draft-ietf-netconf-crypto-types.all@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.99.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Message-ID: <156385060911.22708.13715150809401887999@ietfa.amsl.com>
Date: Mon, 22 Jul 2019 19:56:49 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/e8E5qpSSTTeey7VEmRMsH8GtoNI>
Subject: [netconf] Secdir early partial review of draft-ietf-netconf-crypto-types-10
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 02:56:49 -0000

Review is partially done. Another assignment may be needed to complete it.

Reviewer: Rifaat Shekh-Yusef
Review result: Not Ready

There is the open issue of the proper structure of this YANG model, which was 
discussed with the security ADs and IESG, and still to be discussed with IANA.


Meanwhile, I have the following comments:

Page 6, hash-algorithm_t
Why would you include SHA1 and indicate that it is obsolete? why not just drop it?

Page 8, hash-algorithm-t
Why would the default be 0, i.e. NONE?
I think you should select a minimum algorithm that would be considered acceptable as the default.

page 17, encryption-algorithm-t
Why would you include RC4 algorithms?

page 19, signature-algorithm-t
Why would you include dsa-sha1?

page 40, grouping symmetric-key-grouping, leaf hidden-key { nacm:default-deny-write
If I understand hidden-key, it is a key that is not accessible through this model. 
So, what is this meant to describe?

page 45, grouping symmetric-key-pair-with-cert-grouping, input { leaf subject...
The user of Subject field is discouraged, and the SAN field should be used instead.
Take a look at the following:
https://tools.ietf.org/html/rfc6125#section-4





From nobody Mon Jul 22 20:16:22 2019
Return-Path: <watsonbladd@gmail.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAEFC12003E; Mon, 22 Jul 2019 20:16:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02rVA72uOH46; Mon, 22 Jul 2019 20:16:18 -0700 (PDT)
Received: from mail-lj1-x241.google.com (mail-lj1-x241.google.com [IPv6:2a00:1450:4864:20::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21445120091; Mon, 22 Jul 2019 20:16:15 -0700 (PDT)
Received: by mail-lj1-x241.google.com with SMTP id m23so39495089lje.12; Mon, 22 Jul 2019 20:16:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=CGVFJmEl3lbnKEHvV6Er0ndwtckAG+UVXPBsMmiVEi0=; b=d+F8rL0doDJPAA8xtxxZ8umFQMmZCq7ckLnhg4UrT4E5lgjVeVmmKSvbcdGA+UDXXG mMBpqsBldkquDJyHmfrxXDZ42vGOkf3QKJJ2tB5VdHEF/uFclAJ8wdnLU/+4HtDaX8a6 VvNoarxUPzdO41jMyXdw9oyyEHeUGNVZvzR32d9watNUqVWclc74cqVevhWicLyDf6Sg t+jIENI4Z2IWEF1Ivgw2RiudUot+iyOM/sP/BavwEVp7vDKTL6WGD37bOkSIZm+QMAI7 yvPVXdNG+HYNARpYcwoFFtG5QUV4XlWm1mYPyACgKRJurL29c+ezxW7gJIMUhNo1WJOi 7OTw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=CGVFJmEl3lbnKEHvV6Er0ndwtckAG+UVXPBsMmiVEi0=; b=V65CpFTFJuJFNW0TGxpSjw5Fy644vFRA3Lbzkp3ZqZYZvKop2qvDqj0RyPxCBFJMuW dEdIZEzmyqaVSAoIig1t5H3lLyRnIsELODRMXzBfZ/00q1CWwoy1Ixj+F4sjX1X0a2BE XmK8NDoqhzqUQ6c7NZHwTpXEN44ORzM1PBpjQWsA9bNMvV5anOfbIyFBC7vl3Jp7KovB PNTnO2p51njzY08qhevS+WSK/wtYka9wI2tWmTL1nRf8slI4vDVLK63ES7eGfTFo6ILW DKRP7rau8d777Jlg4rQuS4R35eQ9MG0pndTGVVXqaE2e3Glyi+kMzDk+FVzPg+BxvHTN nOSw==
X-Gm-Message-State: APjAAAVasLHeMeY3SdDoUKf/OJbUhGKn0Tt2kSbFdPkD3s2dL8+5nBP4 PLWfD9AD7mMOnY/cODWjhZwP4mmxXTQjhw/Le3Q=
X-Google-Smtp-Source: APXvYqwWVE5i/t7ELDQ7tPX4XAAcl5LyMkUUXkARyynapHSOY6ZMgk96zFYAvVXyYgDsNCMctiVCw/Xq4nZ9dhdRP54=
X-Received: by 2002:a2e:8602:: with SMTP id a2mr36327259lji.206.1563851773207;  Mon, 22 Jul 2019 20:16:13 -0700 (PDT)
MIME-Version: 1.0
References: <156385060911.22708.13715150809401887999@ietfa.amsl.com>
In-Reply-To: <156385060911.22708.13715150809401887999@ietfa.amsl.com>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Mon, 22 Jul 2019 20:16:01 -0700
Message-ID: <CACsn0cnaia-oKaNT7qC6QTTjaJeB+OYbZjHHB1PN7vhGwuzhPw@mail.gmail.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: secdir <secdir@ietf.org>, draft-ietf-netconf-crypto-types.all@ietf.org,  netconf@ietf.org, "<ietf@ietf.org>" <ietf@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/fxtQymhsNxuHtQWD7bILDKL2UcU>
Subject: Re: [netconf] [secdir] Secdir early partial review of draft-ietf-netconf-crypto-types-10
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 03:16:20 -0000

On Mon, Jul 22, 2019 at 7:57 PM Rifaat Shekh-Yusef via Datatracker
<noreply@ietf.org> wrote:
>
>
> Review is partially done. Another assignment may be needed to complete it.
>
> Reviewer: Rifaat Shekh-Yusef
> Review result: Not Ready
>
> There is the open issue of the proper structure of this YANG model, which was
> discussed with the security ADs and IESG, and still to be discussed with IANA.
>
>
> Meanwhile, I have the following comments:
>
> Page 6, hash-algorithm_t
> Why would you include SHA1 and indicate that it is obsolete? why not just drop it?
>
> Page 8, hash-algorithm-t
> Why would the default be 0, i.e. NONE?
> I think you should select a minimum algorithm that would be considered acceptable as the default.

Along those lines why is RSA-1024 in there? The asymmetric algorithm
doesn't differentiate between encryption and signing or other more
exotic things, which I guess is defensible but raises some potential
gotchas. We also have an IANA registry for AEAD schemes: why not use
that? This would have avoided some omissions such as AES-SIV mode.

Lastly one nit: it's elliptic curve not elliptical curve.


From nobody Tue Jul 23 07:58:09 2019
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DC5512011D for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 07:58:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yoYAKBybG7nf for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 07:58:06 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 402581200F8 for <netconf@ietf.org>; Tue, 23 Jul 2019 07:58:06 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id 242B2B80D34; Tue, 23 Jul 2019 07:57:56 -0700 (PDT)
To: rob.enns@gmail.com, mbj@tail-f.com, j.schoenwaelder@jacobs-university.de,  andy@yumaworks.com, ibagdona@gmail.com, warren@kumari.net, kent+ietf@watsen.net, mjethanandani@gmail.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: mjethanandani@gmail.com, netconf@ietf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset=UTF-8
Message-Id: <20190723145756.242B2B80D34@rfc-editor.org>
Date: Tue, 23 Jul 2019 07:57:56 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/CALAgup7cwGnGPWppqP4B83oT0E>
Subject: [netconf] [Technical Errata Reported] RFC6241 (5790)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 14:58:08 -0000

The following errata report has been submitted for RFC6241,
"Network Configuration Protocol (NETCONF)".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid5790

--------------------------------------
Type: Technical
Reported by: Mahesh Jethanandani <mjethanandani@gmail.com>

Section: GLOBAL

Original Text
-------------
OLD:

7.8.  <close-session>

   Description:  Request graceful termination of a NETCONF session.

      When a NETCONF server receives a <close-session> request, it will
      gracefully close the session.  The server will release any locks
      and resources associated with the session and gracefully close
      any associated connections.  Any NETCONF requests received after
      a <close-session> request will be ignored.

   Positive Response:  If the device was able to satisfy the request, an
      <rpc-reply> is sent that includes an <ok> element.

   Negative Response:  An <rpc-error> element is included in the
      <rpc-reply> if the request cannot be completed for any reason.

   Example:

     <rpc message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <close-session/>
     </rpc>

     <rpc-reply message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <ok/>
     </rpc-reply>

NEW

7.8.  <close-session>

   Description:  Request graceful termination of a NETCONF session.

      When a NETCONF server receives a <close-session> request, it will
      gracefully close the session.  The server will release any locks
      and resources associated with the session and gracefully close any
      associated connections.  Any NETCONF requests received after a
      <close-session> request will be ignored.

      For details on what happens if a NETCONF server receives a 
      <close-session> request while processing a confirmed commit,
      please refer to Section 8.4.

   Positive Response:  If the device was able to satisfy the request, an
      <rpc-reply> is sent that includes an <ok> element.

   Negative Response:  An <rpc-error> element is included in the
      <rpc-reply> if the request cannot be completed for any reason.

   Example:

     <rpc message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <close-session/>
     </rpc>

     <rpc-reply message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <ok/>
     </rpc-reply>

OLD

7.9.  <kill-session>

   Description:  Force the termination of a NETCONF session.

      When a NETCONF entity receives a <kill-session> request for an
      open session, it will abort any operations currently in process,
      release any locks and resources associated with the session, and
      close any associated connections.

      If a NETCONF server receives a <kill-session> request while
      processing a confirmed commit (Section 8.4), it MUST restore the
      configuration to its state before the confirmed commit was issued.

      Otherwise, the <kill-session> operation does not roll back
      configuration or other device state modifications made by the
      entity holding the lock.

   Parameters:

      session-id:  Session identifier of the NETCONF session to be
         terminated.  If this value is equal to the current session ID,
         an "invalid-value" error is returned.

   Positive Response:  If the device was able to satisfy the request, an
      <rpc-reply> is sent that includes an <ok> element.

   Negative Response:  An <rpc-error> element is included in the
      <rpc-reply> if the request cannot be completed for any reason.


   Example:

     <rpc message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <kill-session>
         <session-id>4</session-id>
       </kill-session>
     </rpc>

     <rpc-reply message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <ok/>
     </rpc-reply>

NEW

7.9.  <kill-session>

   Description:  Force the termination of a NETCONF session.

      When a NETCONF entity receives a <kill-session> request for an
      open session, it will abort any operations currently in process,
      release any locks and resources associated with the session, and
      close any associated connections.

      For details on what happens if a NETCONF server receives a 
      <kill-session> request while processing a confirmed commit,
      please refer to Section 8.4.

      Otherwise, the <kill-session> operation does not roll back
      configuration or other device state modifications made by the
      entity holding the lock.

   Parameters:

      session-id:  Session identifier of the NETCONF session to be
         terminated.  If this value is equal to the current session ID,
         an "invalid-value" error is returned.

   Positive Response:  If the device was able to satisfy the request, an
      <rpc-reply> is sent that includes an <ok> element.

   Negative Response:  An <rpc-error> element is included in the
      <rpc-reply> if the request cannot be completed for any reason.


   Example:

     <rpc message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <kill-session>
         <session-id>4</session-id>
       </kill-session>
     </rpc>

     <rpc-reply message-id="101"
          xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
       <ok/>
     </rpc-reply>


Section 8.4.1

OLD:

   If the device reboots for any reason before the confirm timeout
   expires, the server MUST restore the configuration to its state
   before the confirmed commit was issued.

NEW:

   If the device reboots for any reason before the confirm timeout
   expires, the server MUST restore the configuration to its state
   before the confirmed commit was issued, unless the confirmed commit 
   also included a <persist> element, in which case the server MAY
   continue the confirmed commit procedure.


Corrected Text
--------------


Notes
-----
This Errata modifies three different sections, Sections 7.8, 7.9 and 8.4.1. The changes in Section 7.8 and 7.9 defer the description of the behavior of confirmed commit to Section 8.4.1.

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC6241 (draft-ietf-netconf-4741bis-10)
--------------------------------------
Title               : Network Configuration Protocol (NETCONF)
Publication Date    : June 2011
Author(s)           : R. Enns, Ed., M. Bjorklund, Ed., J. Schoenwaelder, Ed., A. Bierman, Ed.
Category            : PROPOSED STANDARD
Source              : Network Configuration
Area                : Operations and Management
Stream              : IETF
Verifying Party     : IESG


From nobody Tue Jul 23 13:34:19 2019
Return-Path: <rrahman@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D22EE12096F for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 13:34:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level: 
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=iocCiJlU; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=rFVWVamL
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qIzBMenAMJ3Q for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 13:34:15 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E31B9120904 for <netconf@ietf.org>; Tue, 23 Jul 2019 13:34:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4447; q=dns/txt; s=iport; t=1563914054; x=1565123654; h=from:to:subject:date:message-id:mime-version; bh=UCkYjaQxcUS/pGMfsnZAUbBEWs0pvKhFh+ruURBTlnA=; b=iocCiJlUR4sOME/KLhSCnfnllWrra85C47WkmRpLJ/KOdBx02vQ2BIMA 2DE/85Cq1kScENMDTUOF9vtowZxahAfft4D7roFLPbfvrNbHVR4fz0TmD u+NvcY1MiqlHxeUsO24D9Z77N0I3lJSBT2DMZ6vZndK2zvheYstBUSUJf 8=;
IronPort-PHdr: =?us-ascii?q?9a23=3ALRxhnxHKluBNiRy+7f5OO51GYnJ96bzpIg4Y7I?= =?us-ascii?q?YmgLtSc6Oluo7vJ1Hb+e4z1A3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNV?= =?us-ascii?q?cejNkO2QkpAcqLE0r+eeTwZiw/FcJqX15+9Hb9Ok9QS47z?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0ASAQAIbjdd/49dJa1mHQEBBQEHBQG?= =?us-ascii?q?BVQYBCwGBFC9QA21VIAQLKgqEE4NHA44ATIFqkyCEVYEugSQDVAkBAQEMAQE?= =?us-ascii?q?tAgEBhFmCNyM2Bw4BAwEBBAEBAgEGbYUeDIVjEQoTAQE1AxEBDCEdAgQwJwQ?= =?us-ascii?q?BNIMAAYEdTQMdAQKgDQKBOIhgcYEygnkBAQWFCBiCEwmBNAGLXheBQD+BOAw?= =?us-ascii?q?TilkygiaOeIR+iGuOBgkCghkDlAkbmAqNNZdQAgQCBAUCDgEBBYFXBiuBWHA?= =?us-ascii?q?VOyoBgkGCQoNxilNygSmNHAGBIAEB?=
X-IronPort-AV: E=Sophos;i="5.64,300,1559520000";  d="scan'208,217";a="590566770"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 Jul 2019 20:34:13 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x6NKYDNc030149 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 23 Jul 2019 20:34:14 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 23 Jul 2019 15:34:13 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 23 Jul 2019 15:34:13 -0500
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 23 Jul 2019 15:34:13 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=frGsecxeWf0i3quqOhn/z/ejLIclkZOb+0HMQ1icXVdY6xULFzDv36KdLAbo3R8WLS0tQtxTMDjLtfcS0FrjOBYbJtiQ6oxLiHdNPJ8jnzMnTUn+DW2hAZUrka1iRbZIpk/8c8pCO5FcS1IjbgbPbgR3bxoZrwBR+IvmPIIbY9uCenMuRcMy6CjZ2iovnPnqaDiOpKJEEn3AGnAnPOw7FTv3pLMqqjcInPXlnvV0Mn/ZGxjp4Nso/ror+joEE0SsvdeTRJBZJfYvETeF2Z6UHkOYGf7Fv+Wh2RAeyMTnGs20WWoT/MYH6jEEb8RjTcgNaEQXOXTOkoe84d5d9b9QSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UCkYjaQxcUS/pGMfsnZAUbBEWs0pvKhFh+ruURBTlnA=; b=Rk+WSx/z2yndRW+9evjZ79NghjyECo/vOR2m4FlIehUnZZBlTEDvtJ+OYLeu1QLuD9+ICVaVgkFSPM1rA5eJbifICqcCMpeR5lCfzqJe4iTzozwUkbOh52QuEYQXymJC4QrLhllmdcH9/ZG84ts7aKqgnlCdgyRXjaym9Gk3ucU+bgAUmhp0Dh7Aw/MZc/XlaWIOh3qNraZOP/LhgQfJRZBfVH7nYCNeoeWWD3IQ4Ol74Br0BUTo8ypw4+8P3LJhtKREGsG68+E6VXHkzfWpeJVzZOlT7SL6CqsUy53I+tTbZm/QDtAQJld4UR8Dm9MnPU/NSgt1opRAzumi2pKuJw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=cisco.com;dmarc=pass action=none header.from=cisco.com;dkim=pass header.d=cisco.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UCkYjaQxcUS/pGMfsnZAUbBEWs0pvKhFh+ruURBTlnA=; b=rFVWVamLGJzC9EdxA9FpQVuxGRb9q1PLTruW/HCTIwO4dmMF1livQApRY4goTH0DeF7/HGqgdpaV7Mgqy+wdwVf8/yxLM9VLSFfa9/b3inolz1VA82vVAEm8uFjGqQFZ4mH/t0UXw6dsu9YPhJ7yYkE/LrESMatQAP+ds0ucaNc=
Received: from DM6PR11MB4409.namprd11.prod.outlook.com (52.132.250.158) by DM6PR11MB2553.namprd11.prod.outlook.com (20.176.95.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2094.16; Tue, 23 Jul 2019 20:34:12 +0000
Received: from DM6PR11MB4409.namprd11.prod.outlook.com ([fe80::309b:1948:251:142e]) by DM6PR11MB4409.namprd11.prod.outlook.com ([fe80::309b:1948:251:142e%7]) with mapi id 15.20.2073.008; Tue, 23 Jul 2019 20:34:12 +0000
From: "Reshad Rahman (rrahman)" <rrahman@cisco.com>
To: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Comment on draft-ietf-notification-capabilities
Thread-Index: AQHVQZX8ds7lhqEeQECSgTAu48XmQA==
Date: Tue, 23 Jul 2019 20:34:12 +0000
Message-ID: <A35AA44D-EEFA-4609-8974-5F41FECC98DC@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.1a.0.190609
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rrahman@cisco.com; 
x-originating-ip: [173.38.117.94]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 928565a8-0d89-4568-a2e1-08d70fad1f21
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM6PR11MB2553; 
x-ms-traffictypediagnostic: DM6PR11MB2553:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR11MB2553A9174C4AFB5A99B4433DABC70@DM6PR11MB2553.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0107098B6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(39860400002)(396003)(366004)(376002)(136003)(199004)(189003)(14444005)(476003)(9326002)(8936002)(2616005)(486006)(2906002)(81156014)(33656002)(81166006)(2501003)(99286004)(6486002)(4744005)(26005)(14454004)(6506007)(66066001)(6436002)(102836004)(71190400001)(71200400001)(186003)(7110500001)(5660300002)(478600001)(8676002)(3846002)(53936002)(110136005)(6512007)(316002)(86362001)(54896002)(6306002)(58126008)(15650500001)(7736002)(68736007)(2420400007)(91956017)(6116002)(66946007)(66556008)(790700001)(64756008)(76116006)(66476007)(256004)(36756003)(66446008)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB2553; H:DM6PR11MB4409.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: VkcwFdQLw3H4Rti8XIgoZxLmYoRFiHnXRbt+/D6sksPtHcXjLa93DQwrW41tyntwHTXCdjU42dzUWJ68c+ugbv6VIvN4nE1ur4B+gPyrm0uGBIkfZAutiO5yKwshIqK84u03x/vyMBEjg80yBBURE7ssfE46VQ4cDUSLpNK39fNCPsLbpL9rOeiOFxJ5kIRfYE2tSgzyUwTgBDd4yj9sQBL1WnWD9PrafvF3sob4v8EOr8x72GGkXnUzqjZz3IfswUF3ZbjkP1kZ4/dI/d3fgBjzPTnXxdF+RRPP9KlH6dlbPXGqDm0HZrHLr9b2zJ6ii4y420fPfC6Shc0Mhjbu8ZchzqJ4Z3xnCkz1KGqHrrU9cu7PHJnQ5JMUbTRZ+yw7qSveraw27/X68kEPQExKsmWcJDgogaLpUON4r4iV138=
Content-Type: multipart/alternative; boundary="_000_A35AA44DEEFA460989745F41FECC98DCciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 928565a8-0d89-4568-a2e1-08d70fad1f21
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jul 2019 20:34:12.0222 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rrahman@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB2553
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/hZswByukAi_Eeo7DAWAl7S0FUug>
Subject: [netconf] Comment on draft-ietf-notification-capabilities
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 20:34:17 -0000

--_000_A35AA44DEEFA460989745F41FECC98DCciscocom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGkgQmFsYXpzLA0KDQpTZWN0aW9uIDIgbWVudGlvbnMgdGhhdCB0aGUgY2FwYWJpbGl0aWVzIGNv
dWxkIGNoYW5nZSBhdCBydW4tdGltZS4gRm9yIHRob3NlIGltcGxlbWVudGF0aW9ucyB3aGljaCBz
dXBwb3J0IHRoaXMsIHRoZXJlIHdvdWxkIGJlIHZhbHVlIGlmIHRoZSBkYXRhc3RvcmUtc3Vic2Ny
aXB0aW9uLWNhcGFiaWxpdGllcyBjb250YWluZXIgaXMgb24tY2hhbmdlIGNhcGFibGU/DQpUaGlz
IHNob3VsZCBiZSBpbmRpY2F0ZWQgd2l0aCBhbiBlbnRyeSBmb3IgdGhhdCBub2RlIGluIHRoZSBv
bi1jaGFuZ2Utbm90aWZpY2F0aW9uLWNhcGFiaWxpdHkgbGlzdCAoZm9yIHRoZSBvcGVyYXRpb25h
bCBkYXRhc3RvcmUpPyBDb3VsZCB3ZSBoYXZlIHNvbWUgdGV4dCBpbiB0aGUgZHJhZnQgZm9yIHRo
aXM/DQoNClJlZ2FyZHMsDQpSZXNoYWQuDQo=

--_000_A35AA44DEEFA460989745F41FECC98DCciscocom_
Content-Type: text/html; charset="utf-8"
Content-ID: <0695B6CAB9791546BC19103556AC043A@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_A35AA44DEEFA460989745F41FECC98DCciscocom_--


From nobody Tue Jul 23 14:56:05 2019
Return-Path: <balazs.lengyel@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F3A31209CF for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 14:55:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0jpFApi-jCon for <netconf@ietfa.amsl.com>; Tue, 23 Jul 2019 14:55:48 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60075.outbound.protection.outlook.com [40.107.6.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A5241209C0 for <netconf@ietf.org>; Tue, 23 Jul 2019 14:55:47 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gu2PdVT2YGAjM1sgakKN+ttz+S6fv0QMVoEDcW1TRIz+RNvQNwNaXpCNmNBvPFPRl/auAaXWo5UYoDHNNJdlJCBEUi/FmmYWb4ax4xtmlZlcgbvLW1OSe0PlNdRktfKLpgvqR5T9b+lMDrDcjWVnnTk+qTpIHlcamgOJCTdecHnYItqDGG5nIICHX23RUND3qvp1XTYJGI0s4t7/eJE1ssG1NMLCvelXNZhk/rFvLL9SQmk+JWXnx8smSWAPYEHyKytfGZyhM0/5cuufbvDL8FbDF2pUIQjENLEVg87eH7fUQ+i8S82nCvL9hEDxbLhj/kQS2/kLY+amjChnKsIAHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fgQbPEh2lKeMbHbbz9oH8Mnq+5sRvL8Hsk700fqsDzQ=; b=hx/ALt2WIiIfOZ4lK8ErtliwXRcgvWBi/biOnt6tCITTxWtvLue9FW9p7MOlTQYX2tzBfdFKMrnVGfICikk1TnDX9U/TBSD27sXypPM84JonSlI9ZAie8HG/H2GjCR6CD4eBXNfTwDG+bIDw8mUWw5GSxWzEmUAMZD1qRpEZ0C4gXiOsQPZw5GmnzCu31gIiIa2gI5iwC2BNl4W3kozdppuH6fU5aDmSE2zhci9vLZVCMTywWtL+QCOvugpZiudgbuS5T7jWE6w09dK+b55NbJR91mYfDOEzRAnU2EjRwgemA/U3peNw+7YwhLp/DXgi80plqRdqYBHCjDY1fcJT6g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fgQbPEh2lKeMbHbbz9oH8Mnq+5sRvL8Hsk700fqsDzQ=; b=NkBcwaltzE6SApkYac83ALQS2LQ7CsnWj56g50Wf/x5rLmTl0DpJnNYJbRhPVo+Ls96wu/GXcJQBotpjD5M9bRHw29RF3/gdGvSwmWZ55pwFr+5rAYx4nYbEAPYBjFHDQTiOauNjPjSnaAZE63tdgb9+LiNq0lWk7M9s2FKzcnA=
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com (10.169.137.153) by VI1PR0701MB2654.eurprd07.prod.outlook.com (10.173.78.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2115.10; Tue, 23 Jul 2019 21:55:45 +0000
Received: from VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a]) by VI1PR0701MB2286.eurprd07.prod.outlook.com ([fe80::5556:4c20:cd8d:686a%11]) with mapi id 15.20.2115.005; Tue, 23 Jul 2019 21:55:45 +0000
From: =?utf-8?B?QmFsw6F6cyBMZW5neWVs?= <balazs.lengyel@ericsson.com>
To: "Reshad Rahman (rrahman)" <rrahman@cisco.com>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: Comment on draft-ietf-notification-capabilities
Thread-Index: AQHVQZX8ds7lhqEeQECSgTAu48XmQKbYv4YA
Date: Tue, 23 Jul 2019 21:55:44 +0000
Message-ID: <VI1PR0701MB22863263E6BEA915395089D1F0C70@VI1PR0701MB2286.eurprd07.prod.outlook.com>
References: <A35AA44D-EEFA-4609-8974-5F41FECC98DC@cisco.com>
In-Reply-To: <A35AA44D-EEFA-4609-8974-5F41FECC98DC@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.lengyel@ericsson.com; 
x-originating-ip: [31.133.153.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: df91f1ad-d9d8-4ea8-358b-08d70fb88387
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:VI1PR0701MB2654; 
x-ms-traffictypediagnostic: VI1PR0701MB2654:
x-microsoft-antispam-prvs: <VI1PR0701MB2654AF82479D1CA3301FC90FF0C70@VI1PR0701MB2654.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0107098B6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(346002)(136003)(366004)(39860400002)(376002)(396003)(189003)(199004)(478600001)(7110500001)(790700001)(86362001)(68736007)(6116002)(110136005)(3846002)(316002)(99286004)(102836004)(85182001)(446003)(26005)(55016002)(66476007)(76176011)(6246003)(66616009)(11346002)(2906002)(53546011)(25786009)(76116006)(33656002)(186003)(6506007)(6306002)(66946007)(15650500001)(2420400007)(66446008)(64756008)(66556008)(99936001)(2501003)(6436002)(54896002)(7696005)(53936002)(9686003)(66574012)(256004)(74316002)(476003)(486006)(52536014)(14444005)(14454004)(7736002)(8936002)(66066001)(71190400001)(81156014)(8676002)(229853002)(81166006)(5660300002)(71200400001)(85202003)(4744005); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0701MB2654; H:VI1PR0701MB2286.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: KkW6nFkqunCpytd468DWcGHyepaddj1IunuL5mZbOQG3Yoz5n2bU8kA5f4+U8/YL7s234BzHQ5oYoxvIfg7z/zd7lWvo3r1f5e/HMDf/kZV9KjcY4HdzEHPcIF1GJbUit+FqWLv550YajtVGzTWWnjY+9qaucYJiZ47bLQKofwi/WbmS+ebW9idZy0uVBeVXLsXBr89JkFVTcYnHVmK5Cy4zxOhpQ7nG4XL9AvXvGvMYZegSS4H2szOuHiAuMwLgIrX7CNY0l9FCfs5CTZ8Wz2F69c14xfejRP4prLDqRThDeU+ooOOafEFMJa7WlFxRwPi0FnMgFxmIbtphGo/Jdcd3tOHfMD5vjgRleZ3QM50bIpCz/5MxNRfLnPvnvaT27vNtM9yXDykK0zp6wpVdv8R3A+5twQF/WTyU34DDALY=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_03F4_01D5417F.D892A980"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: df91f1ad-d9d8-4ea8-358b-08d70fb88387
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jul 2019 21:55:45.0020 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: balazs.lengyel@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2654
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/VdEduelGz1_FO9ZZhOlo16ygZGU>
Subject: Re: [netconf] Comment on draft-ietf-notification-capabilities
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 21:56:00 -0000

------=_NextPart_000_03F4_01D5417F.D892A980
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_03F5_01D5417F.D892A980"


------=_NextPart_001_03F5_01D5417F.D892A980
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

OK, will add it.  Balazs

=20

From: Reshad Rahman (rrahman) <rrahman@cisco.com>=20
Sent: 2019. j=C3=BAlius 23., kedd 16:34
To: Bal=C3=A1zs Lengyel <balazs.lengyel@ericsson.com>; netconf@ietf.org
Subject: Comment on draft-ietf-notification-capabilities

=20

Hi Balazs,

=20

Section 2 mentions that the capabilities could change at run-time. For =
those implementations which support this, there would be value if the =
datastore-subscription-capabilities container is on-change capable?

This should be indicated with an entry for that node in the =
on-change-notification-capability list (for the operational datastore)? =
Could we have some text in the draft for this?

=20

Regards,

Reshad.


------=_NextPart_001_03F5_01D5417F.D892A980
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered =
medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
	{mso-style-name:msonormal;
	mso-margin-top-alt:auto;
	margin-right:0cm;
	mso-margin-bottom-alt:auto;
	margin-left:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US =
link=3D"#0563C1" vlink=3D"#954F72"><div class=3DWordSection1><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt'>OK, will add =
it.=C2=A0 Balazs<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt'>From:</span></b><span =
style=3D'font-size:11.0pt'> Reshad Rahman (rrahman) =
&lt;rrahman@cisco.com&gt; <br><b>Sent:</b> 2019. j=C3=BAlius 23., kedd =
16:34<br><b>To:</b> Bal=C3=A1zs Lengyel =
&lt;balazs.lengyel@ericsson.com&gt;; netconf@ietf.org<br><b>Subject:</b> =
Comment on =
draft-ietf-notification-capabilities<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
lang=3DEN-CA style=3D'font-size:11.0pt'>Hi =
Balazs,<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-CA =
style=3D'font-size:11.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-CA style=3D'font-size:11.0pt'>Section =
2 mentions that the capabilities could change at run-time. For those =
implementations which support this, there would be value if the =
datastore-subscription-capabilities container is on-change =
capable?<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-CA =
style=3D'font-size:11.0pt'>This should be indicated with an entry for =
that node in the on-change-notification-capability list (for the =
operational datastore)? Could we have some text in the draft for =
this?<o:p></o:p></span></p><p class=3DMsoNormal><span lang=3DEN-CA =
style=3D'font-size:11.0pt'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-CA =
style=3D'font-size:11.0pt'>Regards,<o:p></o:p></span></p><p =
class=3DMsoNormal><span lang=3DEN-CA =
style=3D'font-size:11.0pt'>Reshad.<o:p></o:p></span></p></div></body></ht=
ml>
------=_NextPart_001_03F5_01D5417F.D892A980--

------=_NextPart_000_03F4_01D5417F.D892A980
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_03F4_01D5417F.D892A980--


From nobody Wed Jul 24 11:05:50 2019
Return-Path: <0100016c25291b3b-ba2af94e-8f60-4ff5-b369-186cd6692de9-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62C65120059 for <netconf@ietfa.amsl.com>; Wed, 24 Jul 2019 11:05:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D_qpAQMShhcG for <netconf@ietfa.amsl.com>; Wed, 24 Jul 2019 11:05:48 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFB7112062A for <netconf@ietf.org>; Wed, 24 Jul 2019 11:05:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1563991546; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=1WsfnZ7G7MZvlpCf9o55KrKbHrJ66fAPFuTZCMmViVw=; b=NE6tBgCPCOKGuio7P/IwTLJxgwYlAqIUpFfTTFXd0yxn+EN79WTqrvAkcgGqspah hCxq1FMu4g7i42hLNK/v+wSh8sFBXBvbhmy+o/r+q+3NzxinxwrV1iHnGp0M9XcnUQe Cyf2EleNMUAWqdKj4wk3ATWnOtJP8FwzbPk6oW7Y=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016c25291b3b-ba2af94e-8f60-4ff5-b369-186cd6692de9-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_4CE191C7-4E31-4548-8150-9EE601BBE2FE"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 24 Jul 2019 18:05:46 +0000
In-Reply-To: <e5c3ad18a35d4d338e4b9cc05e24502f@thebrowns.net.nz>
Cc: "netconf@ietf.org" <netconf@ietf.org>
To: hayden@thebrowns.net.nz
References: <e5c3ad18a35d4d338e4b9cc05e24502f@thebrowns.net.nz>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.24-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/eSWj3bj8fCusBwiQHaOb3b4eX8U>
Subject: Re: [netconf] ietf-restconf YANG - 'errors' grouping query
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jul 2019 18:05:49 -0000

--Apple-Mail=_4CE191C7-4E31-4548-8150-9EE601BBE2FE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi Hayden,

<snip/>

> Currently the list 'error' itself omits a config statement, and as =
there is no ancestor with a config-statement, presumably the 'error' =
list represents information that is configuration data.
> My understanding is that according to RFC 7950 (Section 7.8.2), lists =
representing configuration data must have a key specified. The excerpt =
above doesn't specify a key and perhaps should?

RFC 8040 defines yang-data as not "configuration" by default (much like =
e.g., notifications) and hence, per RFC 7950 Section 7.8.2, the "key" =
statement is optional.  =20

Kent



--Apple-Mail=_4CE191C7-4E31-4548-8150-9EE601BBE2FE
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">Hi&nbsp;Hayden,<div class=""><br class=""></div><div class="">&lt;snip/&gt;</div><div class=""><div><br class=""><blockquote type="cite" class=""><div class=""><span style="color: rgb(34, 34, 34); font-family: Arial, Helvetica, sans-serif; font-size: 12px;" class="">Currently the list 'error' itself omits a config statement, and as there is no ancestor with a config-statement, presumably the 'error' list represents information that is configuration data.</span></div><div class=""><span style="font-family: Arial, Helvetica, Sans-Serif; font-size: 12px" class=""><div class=""><div style="color: rgb(34, 34, 34);" class=""><div class="">

<div class="">My understanding is that according to&nbsp;RFC 7950 (Section 7.8.2), lists representing configuration data must have a key specified. The excerpt above doesn't specify a key and perhaps should?</div></div></div></div></span></div></blockquote><div><br class=""></div><div class="">RFC 8040 defines yang-data as not "configuration" by default (much like e.g., notifications) and hence, per RFC 7950 Section 7.8.2, the "key" statement is optional. &nbsp;&nbsp;</div><div class=""><br class=""></div><div class="">Kent</div><div class=""><br class=""></div><div class=""><br class=""></div></div></div></body></html>
--Apple-Mail=_4CE191C7-4E31-4548-8150-9EE601BBE2FE--


From nobody Wed Jul 24 21:44:15 2019
Return-Path: <cabo@tzi.org>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B01E3120047; Wed, 24 Jul 2019 21:44:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.197
X-Spam-Level: 
X-Spam-Status: No, score=-4.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j5AE29BPapax; Wed, 24 Jul 2019 21:44:05 -0700 (PDT)
Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70EA612001E; Wed, 24 Jul 2019 21:44:05 -0700 (PDT)
Received: from dhcp-9abf.meeting.ietf.org (dhcp-9abf.meeting.ietf.org [31.133.154.191]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 45vKNz01sWzylL; Thu, 25 Jul 2019 06:44:02 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <5B9F7D96-8E1D-4B04-8F48-0BD165E28F73@tzi.org>
Date: Thu, 25 Jul 2019 00:44:00 -0400
Cc: Netconf <netconf@ietf.org>, NETMOD WG <netmod@ietf.org>, yot@ietf.org
X-Mao-Original-Outgoing-Id: 585722638.705287-ac0762aa85689b1cf8d63e5de1103054
Content-Transfer-Encoding: quoted-printable
Message-Id: <B7F4B6B4-CC89-4D07-AC3C-38A5BA203F1C@tzi.org>
References: <5B9F7D96-8E1D-4B04-8F48-0BD165E28F73@tzi.org>
To: core <core@ietf.org>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/WIFTERI2mpVUvXpWbjoTOMh2T9g>
Subject: Re: [netconf]  =?utf-8?q?=F0=9F=94=94_CoRE_Working_Group_Adoption_cal?= =?utf-8?q?l_for_draft-veillette-core-yang-library-05=2Etxt?=
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 04:44:08 -0000

So this was a very thin response on a WG adoption call on the mailing =
list, but given the sense of the room on Tuesday, I think we can accept =
this as a WG draft.
We do have the WG last call as another formal opportunity to stop this =
if it turns out this can be done in a way that preserves full =
compatibility with RFC 8525.

We are now waiting for a final WGLC-ready I-D version of yang-cbor (one =
internal author review is outstanding), and then will WGLC the whole =
cluster (yang-cbor, sid, comi, core-yang-library) in the CoRE WG with a =
CC to the CCs of this mail.
This WGLC will not go through without a number of high-quality reviews.

Gr=C3=BC=C3=9Fe, Carsten


> On Jul 11, 2019, at 09:44, Carsten Bormann <cabo@tzi.org> wrote:
>=20
> RFC 8525 defines a YANG data model for information about the YANG =
modules, datastores, and datastore schemas used by a network management =
server.   This data model is based on string representations of YANG =
identifiers.
>=20
> To be more useful in a constrained environment (CoRECONF/COMI), it is =
useful to have a YANG data model that can employ the efficiency of SIDs =
(draft-ietf-core-sid).  draft-veillette-core-yang-library-05.txt =
provides a straightforward translation of RFC 8525 to SID-based =
identification, with some legacy support removed and some other =
efficiencies added.  This specification complements the three other =
CoRECONF specifications draft-ietf-core-yang-cbor, draft-ietf-core-sid, =
and draft-ietf-core-comi, which we hope to ship soon.
>=20
> This starts a one-week working group adoption call.
> This is a formal call for adoption of this draft as a WG document of =
the CoRE WG.
> If you have read the draft and support adopting it, please say so.
> If you see a problem with adopting it as a WG document, please tell =
us.
> For both, remember that WG adoption does not mean that we already have =
consensus on all the details(*), just that this is the right working =
document to address the issue (and that we should address the issue in =
the first place); you are encouraged to mention any issues that you =
already know.
>=20
> This WGA call is CCed to the netconf and netmod working groups, as the =
expertise about YANG modules is focused there, as well as the =
yang-of-things non-WG mailing list.  Please respond to core@ietf.org, or =
exceptionally to core-chairs@ietf.org (for off-list comments).
>=20
> This formal WG adoption call runs until the end of July 18th.
>=20
> Gr=C3=BC=C3=9Fe, Carsten
>=20
> (*) say, is the module-set index really limited to an 8-bit number?
>=20
>=20
>=20


From nobody Fri Jul 26 11:27:07 2019
Return-Path: <noreply@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D89D1200C1; Fri, 26 Jul 2019 11:27:05 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Adam Roach via Datatracker <noreply@ietf.org>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-netconf-restconf-notif@ietf.org, Kent Watsen <kent+ietf@watsen.net>, netconf-chairs@ietf.org, kent+ietf@watsen.net, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.99.1
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: Adam Roach <adam@nostrum.com>
Message-ID: <156416562537.7680.5253823538050411870.idtracker@ietfa.amsl.com>
Date: Fri, 26 Jul 2019 11:27:05 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/lOMMQ-0DzfhyPEMkFlHiRyrpqrk>
Subject: [netconf] Adam Roach's No Objection on draft-ietf-netconf-restconf-notif-15: (with COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jul 2019 18:27:05 -0000

Adam Roach has entered the following ballot position for
draft-ietf-netconf-restconf-notif-15: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-restconf-notif/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for addressing my discuss points!



From nobody Mon Jul 29 04:44:41 2019
Return-Path: <balazs.kovacs@ericsson.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EC57120187 for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 04:44:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Od95KIcCgyXi for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 04:44:37 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30044.outbound.protection.outlook.com [40.107.3.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53037120181 for <netconf@ietf.org>; Mon, 29 Jul 2019 04:44:37 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FTIngtGOjUtGrJhE/hLKmI466zzkw3X/ELd0XPLo482ciuQTjJeHn9uSZCrsx2HmUI5HeSHnvXn8sQsqd4LVvcZzKfl2r8TGNeAv007V7oNGTUwsMqErVOSw1eBfogO37BdiKaLoF0MoX8uBbDQj3WH9j492UBljEWiYTrdS1sBVV04WB9b3tSKBu/G30tLMMzgOOr5JefOO2G085bV8RcCzoti7k7WMsU8KcK69hgpFl6ehfP5SQSYTKpCtNRHB3MaeyMO56ohiLGOIiyZskBCYC/IKl2JkduXDU0j19KO/fjWGmetNjE25PEvKiKv2yOFTW46zcTCXG1NUvINKUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=el0cYn2a8Iyt3qCkwNdCpk6bgh6niUAwcAyFv+Crljw=; b=cIz47KPMjvivGkq0b+Beo3amSQDGkT1Jnn2Wg5OFUk/pcMxm+QB6pwvqy2pWjcKffn4cbwT0g+4JZq2Or/Gqtw/yvh1mKfe3LlYSpzCm3DjHnWgdOBElFNrYBdk25nkDt6TxW/wSG7cj+0nuytr43FTDhLiscwxLHM5lm1yFDzA2SJTg/sfCyoVZJvqwK8RqFlsuqJ2Q2RTaYet5i2t520cm5Flx4EMWldHBXSGqnDyh2oR9gvykMbSjdQhwjldACH4GgebyfTgkBQ/VBWILXD+2Wgfu43z3gybH/cj/BTSrOGQn1PcgDHPbzH0K8sAtnYZOQ2GSTXginaHxRavqSQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=ericsson.com;dmarc=pass action=none header.from=ericsson.com;dkim=pass header.d=ericsson.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=el0cYn2a8Iyt3qCkwNdCpk6bgh6niUAwcAyFv+Crljw=; b=iHd1ypBCEs81BJgAvuExpoLviUq9FDBCN6ChmQ7fu9Sv8kW2RHaWclr/ssJ5TIsfqoZ+T2r2/2+GvrLXsVLAdG0ghqVKlM7ivHC0MSZsvsnPahRdyPc02FkwPwWzDCO1qerx7yiTbDtCzr7qjvk0lgvhtiVEnXEa2b00yqpH+xo=
Received: from VI1PR07MB4735.eurprd07.prod.outlook.com (20.177.57.146) by VI1PR07MB4432.eurprd07.prod.outlook.com (20.176.7.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.10; Mon, 29 Jul 2019 11:44:34 +0000
Received: from VI1PR07MB4735.eurprd07.prod.outlook.com ([fe80::4d62:fa38:f8a5:9299]) by VI1PR07MB4735.eurprd07.prod.outlook.com ([fe80::4d62:fa38:f8a5:9299%6]) with mapi id 15.20.2136.010; Mon, 29 Jul 2019 11:44:34 +0000
From: =?iso-8859-1?Q?Bal=E1zs_Kov=E1cs?= <balazs.kovacs@ericsson.com>
To: "netconf@ietf.org" <netconf@ietf.org>, Kent Watsen <kent@watsen.net>
Thread-Topic: ietf-keystore, truststore, crypto-types
Thread-Index: AdVGAvfWHyjwiS0ESamK8nx1YV1aGg==
Date: Mon, 29 Jul 2019 11:44:34 +0000
Message-ID: <VI1PR07MB47355EFE36C004F0BB831B8A83DD0@VI1PR07MB4735.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=balazs.kovacs@ericsson.com; 
x-originating-ip: [89.135.192.225]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4df41d99-0576-42cf-5acd-08d7141a20db
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:VI1PR07MB4432; 
x-ms-traffictypediagnostic: VI1PR07MB4432:
x-microsoft-antispam-prvs: <VI1PR07MB4432E702A739708B96077B7E83DD0@VI1PR07MB4432.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 01136D2D90
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(396003)(346002)(376002)(136003)(39860400002)(189003)(199004)(26005)(76116006)(74316002)(4744005)(68736007)(99286004)(102836004)(14444005)(256004)(486006)(110136005)(6436002)(66476007)(66556008)(64756008)(66446008)(7696005)(66946007)(53936002)(33656002)(6306002)(54896002)(55016002)(476003)(2906002)(45776006)(9686003)(316002)(186003)(8936002)(71190400001)(71200400001)(3846002)(6116002)(2501003)(66066001)(790700001)(81166006)(8676002)(81156014)(52536014)(6506007)(25786009)(9326002)(7736002)(14454004)(86362001)(478600001)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB4432; H:VI1PR07MB4735.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Bzr+CnZND2ekIFM21lCQOyuYGneJp3w7JH6aNPESpazf5U2E19IsNN4EnK2FhJ/6DQ57RqreDJYTtIbt6wHo0Jr+GdqO7KeCOsKY7Sn31HDvDbEH8dw007FZ1W2jFHelKOYxzBkZqQLzV3cvqbsKcB3KSlzY3/r5qwkuiOKfToeOjes4AQScH1PmmO/5vuWnY6+tDAaKckIdytcKAvIhSSnzc3mwjC1bXVw8UMnn3V4maC714f3OgqSACH6t4tKDxpFBl07XMvD4UjsjyHw9UJ0+bWjDPSDDAKHZGIE8m7uo/vwEkMmldJjt5ze6kBF8rVDlDawN1aOdcTtosDK1Lj8zErPlF21ZPw5fNxfQQFWchvhHeJJG20DLl2YAFhFGxzda9Rgky01tQiAkq2jZ4a/SKrD1VzkGfole7Erkhvs=
Content-Type: multipart/alternative; boundary="_000_VI1PR07MB47355EFE36C004F0BB831B8A83DD0VI1PR07MB4735eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4df41d99-0576-42cf-5acd-08d7141a20db
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jul 2019 11:44:34.7667 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: balazs.kovacs@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4432
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/S8uuJK_jR7nKBHAFBj8VMYATIc8>
Subject: [netconf] ietf-keystore, truststore, crypto-types
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jul 2019 11:44:40 -0000

--_000_VI1PR07MB47355EFE36C004F0BB831B8A83DD0VI1PR07MB4735eurp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Kent,

A few comments to the latest version of the keystore, truststore, crypto-ty=
pes models.


  1.  Typo

<CODE BEGINS> file "ietf-truststire@2019-06-07.yang"


  1.  Is mandatory true missing from 'cert' leaf in ietf-crypto-types?


     grouping end-entity-cert-grouping {

       description

         "An end entity certificate, and a notification for when

          it is about to (or already has) expire.  Implementations

          SHOULD assert that, where used, the end entity certificate

          contains the expected public key.";

       leaf cert {

         nacm:default-deny-write;

         type end-entity-cert-cms;

         description

           "The binary certificate data for this certificate.";

         reference

           "RFC YYYY: Common YANG Data Types for Cryptography";

       }


  1.  Question: why have the key generation actions been converted to RPCs?=
 If this is because of their earlier containers having now mandatory leaves=
, then have you considered just moving them one level up, adding 'name' as =
parameter, and keeping them as actions? I'd prefer actions.

Thank you,
Balazs

--_000_VI1PR07MB47355EFE36C004F0BB831B8A83DD0VI1PR07MB4735eurp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:"Courier New";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:"Courier New";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:592856702;
	mso-list-type:hybrid;
	mso-list-template-ids:265207318 67698703 67698713 67698715 67698703 676987=
13 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi Kent,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">A few comments to the latest version of the keystore=
, truststore, crypto-types models.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0in" start=3D"1" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0in;mso-list:l0 level1 =
lfo1">Typo<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.0pt;font-family:&quot;Co=
urier New&quot;">&lt;CODE BEGINS&gt; file &quot;ietf-truststire@2019-06-07.=
yang&quot;<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0in" start=3D"2" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0in;mso-list:l0 level1 =
lfo1">Is mandatory true missing from &#8216;cert&#8217; leaf in ietf-crypto=
-types?<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<pre>&nbsp;&nbsp;&nbsp;&nbsp; grouping end-entity-cert-grouping {<o:p></o:p=
></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;An end entity c=
ertificate, and a notification for when<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; it is about to =
(or already has) expire.&nbsp; Implementations<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SHOULD assert t=
hat, where used, the end entity certificate<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; contains the ex=
pected public key.&quot;;<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; leaf cert {<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; nacm:default-deny-wri=
te;<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; type end-entity-cert-=
cms;<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; description<o:p></o:p=
></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;The=
 binary certificate data for this certificate.&quot;;<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; reference<o:p></o:p><=
/pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &quot;RFC=
 YYYY: Common YANG Data Types for Cryptography&quot;;<o:p></o:p></pre>
<pre>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; }<o:p></o:p></pre>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ol style=3D"margin-top:0in" start=3D"3" type=3D"1">
<li class=3D"MsoListParagraph" style=3D"margin-left:0in;mso-list:l0 level1 =
lfo1">Question: why have the key generation actions been converted to RPCs?=
 If this is because of their earlier containers having now mandatory leaves=
, then have you considered just moving
 them one level up, adding &#8216;name&#8217; as parameter, and keeping the=
m as actions? I&#8217;d prefer actions.<o:p></o:p></li></ol>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thank you,<o:p></o:p></p>
<p class=3D"MsoNormal">Balazs<o:p></o:p></p>
</div>
</body>
</html>

--_000_VI1PR07MB47355EFE36C004F0BB831B8A83DD0VI1PR07MB4735eurp_--


From nobody Mon Jul 29 18:31:27 2019
Return-Path: <0100016c4080d8cf-c12d13c2-d356-4c44-b70e-13633e160c93-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B09212002E for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 18:31:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level: 
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SQYs89vDBuJI for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 18:31:23 -0700 (PDT)
Received: from a8-32.smtp-out.amazonses.com (a8-32.smtp-out.amazonses.com [54.240.8.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1097C120019 for <netconf@ietf.org>; Mon, 29 Jul 2019 18:31:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1564450281; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=L7iDjanlfAzA7LtX2Voildje+ZA9E0f4MRDJydsm00M=; b=EhCoYvePh1KDICKLQvPCBq2Q30DcehmFWF777mAqkBaOH1VAqLodXCEe45gvXXs5 PI1qUyDpAsGlhJTudOGnF3xU1mQB48LUZ4ddTzojReZUSXpuXicmNbEe7wuDsmpZnkF xoLglcBhpFqFI5dhrWR59twCm1pY2q8hCv4v76Vg=
From: Kent Watsen <kent@watsen.net>
Message-ID: <0100016c4080d8cf-c12d13c2-d356-4c44-b70e-13633e160c93-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E362A6AB-B6F1-43F0-AEE4-49A8672624F4"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 30 Jul 2019 01:31:21 +0000
In-Reply-To: <VI1PR07MB47355EFE36C004F0BB831B8A83DD0@VI1PR07MB4735.eurprd07.prod.outlook.com>
Cc: "netconf@ietf.org" <netconf@ietf.org>
To: =?utf-8?B?QmFsw6F6cyBLb3bDoWNz?= <balazs.kovacs@ericsson.com>
References: <VI1PR07MB47355EFE36C004F0BB831B8A83DD0@VI1PR07MB4735.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.07.30-54.240.8.32
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/pvBD1dOzQc925hw7NMP96rxrFxo>
Subject: Re: [netconf] ietf-keystore, truststore, crypto-types
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 01:31:25 -0000

--Apple-Mail=_E362A6AB-B6F1-43F0-AEE4-49A8672624F4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Balazs,

=20
> Typo
> =20
> <CODE BEGINS> file "ietf-truststire@2019-06-07.yang =
<mailto:ietf-truststire@2019-06-07.yang>"

I'd previously found/fixed this in my local copy, but thanks for =
reporting it.


=20
> Is mandatory true missing from =E2=80=98cert=E2=80=99 leaf in =
ietf-crypto-types?
> =20
> <snip/>

Possibly, but I don't think so.  For instance, consider =
asymmetric-key-pair-with-cert-grouping that uses both =
asymmetric-key-pair-grouping and end-entity-cert-grouping.   One has to =
create the asymmetric-key prior to being able to execute the =
generate-certificate-signing-request action to create the end-entity =
certificate.=20

That said, this probably is going to raise the question for why then =
asymmetric-key-pair-grouping nodes are mandatory true, or more =
generally, if groupings should ever define mandatory true nodes, rather =
than leave it to the using-schema to refine-in the mandatory true =
statements if desired.



> Question: why have the key generation actions been converted to RPCs? =
If this is because of their earlier containers having now mandatory =
leaves, then have you considered just moving them one level up, adding =
=E2=80=98name=E2=80=99 as parameter, and keeping them as actions? I=E2=80=99=
d prefer actions.

Because the requests are no longer bound to an "object".  The RPCs are =
defined have no effect on either configuration or opstate, they simply =
return a value that the client will, presumably (especially if =
encrypted), return back to the device via a standard config update =
request (e.g, <edit-config>).

FWIW, see "discussion #2" starting on page 12 here =
https://datatracker.ietf.org/meeting/105/materials/slides-105-netconf-clie=
nt-server-suite-of-drafts-00 =
<https://datatracker.ietf.org/meeting/105/materials/slides-105-netconf-cli=
ent-server-suite-of-drafts-00>.

Why do you prefer actions?


Kent


--Apple-Mail=_E362A6AB-B6F1-43F0-AEE4-49A8672624F4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Balazs,<div class=3D""><br class=3D""><div><span style=3D"font-family: =
Calibri, sans-serif; font-size: 11pt; caret-color: rgb(0, 0, 0);" =
class=3D"">&nbsp;</span><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><ol start=3D"1" =
type=3D"1" style=3D"margin-bottom: 0in; margin-top: 0in;" class=3D""><li =
class=3D"MsoListParagraph" style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">Typo<o:p =
class=3D""></o:p></li></ol><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-size: 10pt; font-family: &quot;Courier New&quot;;" =
class=3D"">&lt;CODE BEGINS&gt; file "<a =
href=3D"mailto:ietf-truststire@2019-06-07.yang" style=3D"color: rgb(149, =
79, 114); text-decoration: underline;" =
class=3D"">ietf-truststire@2019-06-07.yang</a>"</span></div></div></blockq=
uote><div><br class=3D""></div><div>I'd previously found/fixed this in =
my local copy, but thanks for reporting it.</div><div><span =
style=3D"font-family: Calibri, sans-serif; font-size: 11pt; caret-color: =
rgb(0, 0, 0);" class=3D""><br class=3D""></span></div><div><span =
style=3D"font-family: Calibri, sans-serif; font-size: 11pt; caret-color: =
rgb(0, 0, 0);" class=3D""><br class=3D""></span></div><div><span =
style=3D"font-family: Calibri, sans-serif; font-size: 11pt; caret-color: =
rgb(0, 0, 0);" class=3D"">&nbsp;</span></div><blockquote type=3D"cite" =
class=3D""><div class=3D"WordSection1" style=3D"page: WordSection1; =
caret-color: rgb(0, 0, 0); font-family: Helvetica-Light; font-size: =
14px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;"><ol start=3D"2" =
type=3D"1" style=3D"margin-bottom: 0in; margin-top: 0in;" class=3D""><li =
class=3D"MsoListParagraph" style=3D"margin: 0in 0in 0.0001pt; font-size: =
11pt; font-family: Calibri, sans-serif;">Is mandatory true missing from =
=E2=80=98cert=E2=80=99 leaf in ietf-crypto-types?<o:p =
class=3D""></o:p></li></ol><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><pre style=3D"margin: 0in 0in 0.0001pt; =
font-size: 10pt; font-family: &quot;Courier New&quot;;" =
class=3D"">&lt;snip/&gt;</pre></div></blockquote><div><br =
class=3D""></div><div>Possibly, but I don't think so. &nbsp;For =
instance, consider asymmetric-key-pair-with-cert-grouping that uses both =
asymmetric-key-pair-grouping and end-entity-cert-grouping. &nbsp; One =
has to create the asymmetric-key prior to being able to execute =
the&nbsp;generate-certificate-signing-request action to create the =
end-entity certificate.&nbsp;</div><div><br class=3D""></div><div>That =
said, this probably is going to raise the question for why then =
asymmetric-key-pair-grouping nodes are mandatory true, or more =
generally, if groupings should ever define mandatory true nodes, rather =
than leave it to the using-schema to refine-in the mandatory true =
statements if desired.</div><div><br class=3D""></div><div><br =
class=3D""></div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica-Light; font-size: 14px; font-style: =
normal; font-variant-caps: normal; font-weight: normal; letter-spacing: =
normal; text-align: start; text-indent: 0px; text-transform: none; =
white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><pre style=3D"margin: 0in 0in 0.0001pt; =
font-size: 10pt; font-family: &quot;Courier New&quot;;" class=3D""><o:p =
class=3D""></o:p></pre><ol start=3D"3" type=3D"1" style=3D"margin-bottom: =
0in; margin-top: 0in;" class=3D""><li class=3D"MsoListParagraph" =
style=3D"margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">Question: why have the key generation actions been =
converted to RPCs? If this is because of their earlier containers having =
now mandatory leaves, then have you considered just moving them one =
level up, adding =E2=80=98name=E2=80=99 as parameter, and keeping them =
as actions? I=E2=80=99d prefer actions.<o:p =
class=3D""></o:p></li></ol><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""></div></div></blockquote><div><br class=3D""></div><div>Because=
 the requests are no longer bound to an "object". &nbsp;The RPCs are =
defined have no effect on either configuration or opstate, they simply =
return a value that the client will, presumably (especially if =
encrypted), return back to the device via a standard config update =
request (e.g, &lt;edit-config&gt;).</div><div><br =
class=3D""></div></div>FWIW, see "discussion #2" starting on page 12 =
here&nbsp;<a =
href=3D"https://datatracker.ietf.org/meeting/105/materials/slides-105-netc=
onf-client-server-suite-of-drafts-00" =
class=3D"">https://datatracker.ietf.org/meeting/105/materials/slides-105-n=
etconf-client-server-suite-of-drafts-00</a>.</div><div class=3D""><br =
class=3D""></div><div class=3D""><div>Why do you prefer =
actions?</div></div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D"">Kent</div><div =
class=3D""><br class=3D""></div></body></html>=

--Apple-Mail=_E362A6AB-B6F1-43F0-AEE4-49A8672624F4--


From nobody Mon Jul 29 21:42:32 2019
Return-Path: <mjethanandani@gmail.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB5D812001B for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 21:42:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OIrJ0vaAnyKL for <netconf@ietfa.amsl.com>; Mon, 29 Jul 2019 21:42:28 -0700 (PDT)
Received: from mail-pf1-x432.google.com (mail-pf1-x432.google.com [IPv6:2607:f8b0:4864:20::432]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B02212000F for <netconf@ietf.org>; Mon, 29 Jul 2019 21:42:28 -0700 (PDT)
Received: by mail-pf1-x432.google.com with SMTP id y15so29152148pfn.5 for <netconf@ietf.org>; Mon, 29 Jul 2019 21:42:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=urYH1LJ7Bo2AYd1ZqMv+LmiIJhCR7dP7cSLkkYj42FI=; b=vDbPy/ei3Ox5OqGSRejxVi3I+ilh1H8g1RafbFYzO31KWLn0SeeAN0ZRjkmyHg8mKt 9vU7L/lHjwjRR2cbhXveG2DmMZBglZZGtL9M4U6RbUQAp9uFOHclfGWz7DMIAIU8QNb5 6CKJfVGWTgS9X2UyrPtDWLospeZW8BewoxfmotntXL237Bb6Nam/7+gzYTV116dV4QtF YzrwG1ghe1iCnzKoUiZl7CaUMbZTIWH59LaT6cQZGJHdjCnBqZeJXeeuhrX6TLs7Pnr8 WSdeANYhN9zMXcvAIhqBwMCcXAMhCFrAVuvV0OjFpVvBoHHYk4YoXYOyPupfuTQPRS2p Wi+A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=urYH1LJ7Bo2AYd1ZqMv+LmiIJhCR7dP7cSLkkYj42FI=; b=MbFgqrg47PvXe3kQOGBmM/8+85eZwoxWn/GZR0MW5OaZZrlId9Rc2lmqdtRVgUwl/C SqxUgvFHu9KG4zSi7CagdVNtnaEyXQHEMq5mCoSvCaS8qEdUzUVNklKhi+YYtkVMx9Tw AB0c9aKhWoRESYgRKefkJGxkpijEuynHsdYTS42OvuDpMUiyvuyzTWk5MJEWXkmrh68l 56+1YnLQ2tMkTEts/sNalw9v6gI+v0Wxo5b59nlu5ajGx/mxps5i+4MP6Xg/Qu1+xt4p LGzYTndIhe2PnSg+ZvWgNIRBNdYTNodnM1JXQ64ZZe+or8wA+uUbTKNAZrPCHdBMdsm+ tQHg==
X-Gm-Message-State: APjAAAXRT0vc4et9yUgdKm8exNBXMWmhg7lTXBIt875SpecW2g+rixUM u3tc7rRATNIDWPBQBLUwjsc=
X-Google-Smtp-Source: APXvYqxoQLO4/orRsokzIqIVP2NyCKmGDa49yP1jgifVq32Avi+JUnWqwaYECBsHB7ICKL0UT62iiQ==
X-Received: by 2002:a63:d210:: with SMTP id a16mr104905301pgg.77.1564461747484;  Mon, 29 Jul 2019 21:42:27 -0700 (PDT)
Received: from ?IPv6:2601:647:5600:5020:4471:b9b1:92e8:312f? ([2601:647:5600:5020:4471:b9b1:92e8:312f]) by smtp.gmail.com with ESMTPSA id o35sm54748985pgm.29.2019.07.29.21.42.26 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 29 Jul 2019 21:42:27 -0700 (PDT)
From: Mahesh Jethanandani <mjethanandani@gmail.com>
Message-Id: <AEF1EFD0-6F1C-4665-A563-9C09ABAC3512@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_AD1406BD-FF22-4097-84C0-F64995770D61"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Mon, 29 Jul 2019 21:42:26 -0700
In-Reply-To: <VI1PR0701MB228612909A6BCB94C262B59BF0C40@VI1PR0701MB2286.eurprd07.prod.outlook.com>
Cc: "netconf@ietf.org" <netconf@ietf.org>
To: =?utf-8?Q?Bal=C3=A1zs_Lengyel?= <balazs.lengyel@ericsson.com>
References: <VI1PR0701MB228612909A6BCB94C262B59BF0C40@VI1PR0701MB2286.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/N3E304dmsRAkQhaRpi7nxgb2ayo>
Subject: Re: [netconf] Balazs comments on draft-mahesh-netconf-https-notif-00
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jul 2019 04:42:30 -0000

--Apple-Mail=_AD1406BD-FF22-4097-84C0-F64995770D61
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Balasz,

> On Jul 22, 2019, at 8:30 AM, Bal=C3=A1zs Lengyel =
<balazs.lengyel@ericsson.com> wrote:
>=20
> Hello,
> I very much like and support and need this work. Some comments:
> -        Identities like =E2=80=9Chttps=E2=80=9D specifying protocols =
seem to be a generic issue. They could/should be in some more generic =
RFC e.g. ietf-inet-types.yang. We already had the need for protocol =
identities in other design work.

[mj] The identity definition is of base type =
subscribed-notifications:transport. As such, it is not a generic =
protocol type. I am not sure it would belong in ietf-inet-types.

> -        leaf =E2=80=9Cname=E2=80=9D: this is a typical example where =
a description is not needed, only forced by our style guide. Maybe the =
style guide should be changed.

[mj] I know I left it as a blank, but even if the description is =
generic, I do not mind putting one. I would rather not change the =
guidance on adding descriptions, as we are woefully short on adding good =
descriptions in the first place.

Thanks.

> =20
> Regards Balazs
> _______________________________________________
> netconf mailing list
> netconf@ietf.org <mailto:netconf@ietf.org>
> https://www.ietf.org/mailman/listinfo/netconf =
<https://www.ietf.org/mailman/listinfo/netconf>

--Apple-Mail=_AD1406BD-FF22-4097-84C0-F64995770D61
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Hi =
Balasz,<br class=3D""><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D"">On Jul 22, 2019, at 8:30 AM, Bal=C3=A1zs =
Lengyel &lt;<a href=3D"mailto:balazs.lengyel@ericsson.com" =
class=3D"">balazs.lengyel@ericsson.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">Hello,<o:p =
class=3D""></o:p></div><ul type=3D"disc" style=3D"margin-bottom: 0cm; =
margin-top: 0cm;" class=3D""><li class=3D"MsoListParagraph" =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;">I very much like and support and need this work. =
Some comments:<o:p class=3D""></o:p></li></ul><div style=3D"margin: 0cm =
0cm 0.0001pt 36pt; font-size: 11pt; font-family: Calibri, sans-serif; =
text-indent: -18pt;" class=3D""><span class=3D"">-<span =
style=3D"font-style: normal; font-variant-caps: normal; font-weight: =
normal; font-stretch: normal; font-size: 7pt; line-height: normal; =
font-family: &quot;Times New Roman&quot;;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>Identities =
like =E2=80=9Chttps=E2=80=9D specifying protocols seem to be a generic =
issue. They could/should be in some more generic RFC e.g. =
ietf-inet-types.yang. We already had the need for protocol identities in =
other design work.</div></div></div></blockquote><div><br =
class=3D""></div>[mj] The identity definition is of base type =
subscribed-notifications:transport. As such, it is not a generic =
protocol type. I am not sure it would belong in =
ietf-inet-types.</div><div><br class=3D""><blockquote type=3D"cite" =
class=3D""><div class=3D""><div class=3D"WordSection1" style=3D"page: =
WordSection1; caret-color: rgb(0, 0, 0); font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; text-align: start; =
text-indent: 0px; text-transform: none; white-space: normal; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: =
none;"><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; font-size: 11pt; =
font-family: Calibri, sans-serif; text-indent: -18pt;" class=3D""><o:p =
class=3D""></o:p></div><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; =
font-size: 11pt; font-family: Calibri, sans-serif; text-indent: -18pt;" =
class=3D""><span class=3D"">-<span style=3D"font-style: normal; =
font-variant-caps: normal; font-weight: normal; font-stretch: normal; =
font-size: 7pt; line-height: normal; font-family: &quot;Times New =
Roman&quot;;" class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span>leaf =
=E2=80=9Cname=E2=80=9D: this is a typical example where a description is =
not needed, only forced by our style guide. Maybe the style guide should =
be changed.</div></div></div></blockquote><div><br class=3D""></div><div =
class=3D"">[mj] I know I left it as a blank, but even if the description =
is generic, I do not mind putting one. I would rather not change the =
guidance on adding descriptions, as we are woefully short on adding good =
descriptions in the first place.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Thanks.</div><div class=3D""><br =
class=3D""></div><blockquote type=3D"cite" class=3D""><div class=3D""><div=
 class=3D"WordSection1" style=3D"page: WordSection1; caret-color: rgb(0, =
0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div style=3D"margin: 0cm 0cm 0.0001pt 36pt; =
font-size: 11pt; font-family: Calibri, sans-serif; text-indent: -18pt;" =
class=3D""><o:p class=3D""></o:p></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Regards Balazs<o:p class=3D""></o:p></div></div><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" =
class=3D"">_______________________________________________</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none; float: none; =
display: inline !important;" class=3D"">netconf mailing list</span><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"mailto:netconf@ietf.org" style=3D"color: rgb(149, 79, 114); =
text-decoration: underline; font-family: Helvetica; font-size: 12px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" class=3D"">netconf@ietf.org</a><br =
style=3D"caret-color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
12px; font-style: normal; font-variant-caps: normal; font-weight: =
normal; letter-spacing: normal; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; text-decoration: none;" class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/netconf" style=3D"color: =
rgb(149, 79, 114); text-decoration: underline; font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; =
-webkit-text-stroke-width: 0px;" =
class=3D"">https://www.ietf.org/mailman/listinfo/netconf</a></div></blockq=
uote></div><br class=3D""></body></html>=

--Apple-Mail=_AD1406BD-FF22-4097-84C0-F64995770D61--

