From nobody Thu Oct 1 15:41:43 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A0871A8F3C for ; Thu, 1 Oct 2015 15:41:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.155 X-Spam-Level: X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IsrXgyTnRdti for ; Thu, 1 Oct 2015 15:41:40 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD65F1A8F3A for ; Thu, 1 Oct 2015 15:41:40 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Thu, 1 Oct 2015 18:41:34 -0400 Message-ID: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0078_01D0FC78.CC6BB430" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQ== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Oct 2015 22:41:42 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0078_01D0FC78.CC6BB430 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit This begins a 2 week WG Last call (10/1 to 10/14) draft-ietf-yang-network-topo - modeling draft http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ draft-ietf-i2rs-yang-l3-topology - L3 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ draft-ietf-i2rs-yang-l2-topology - L2 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topology/ Implementation status: This an OpenDaylight (ODL) implementation of the L3 topology and general model. It is likely the L2 topology model will be supported in future ODL implementations. Jeff and I would appreciate anyone who has implementations of these topology models to provide details on list or offlist to the chairs. Sue Hares ------=_NextPart_000_0078_01D0FC78.CC6BB430 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

This = begins a 2 week WG Last call (10/1 to 10/14)

 

draft-ietf-yang-network-topo – modeling draft =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/=

 

draft-ietf-i2rs-yang-l3-topology – L3 topology =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/

 

draft-ietf-i2rs-yang-l2-topology – L2 topology =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network= -topology/

 

Implementation status:

 

This an = OpenDaylight (ODL) implementation of the L3 topology and general = model.  It is likely the L2 topology model will be supported in = future ODL implementations.   Jeff and I would appreciate = anyone who has implementations of these topology models to provide = details on list or offlist to the chairs.

 

Sue Hares =  

------=_NextPart_000_0078_01D0FC78.CC6BB430-- From nobody Thu Oct 1 16:30:46 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20B4D1A9060 for ; Thu, 1 Oct 2015 16:30:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.26 X-Spam-Level: X-Spam-Status: No, score=-3.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, J_CHICKENPOX_74=0.6, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4yVzslCqcdSA for ; Thu, 1 Oct 2015 16:30:43 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E7071A905F for ; Thu, 1 Oct 2015 16:30:43 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 1A8C1100C for ; Fri, 2 Oct 2015 01:30:42 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id z0iOISv56p4w for ; Fri, 2 Oct 2015 01:30:41 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS for ; Fri, 2 Oct 2015 01:30:41 +0200 (CEST) Received: from localhost (demetrius1.jacobs-university.de [212.201.44.46]) by hermes.jacobs-university.de (Postfix) with ESMTP id D952B20053 for ; Fri, 2 Oct 2015 01:30:40 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius1.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id qh9db2cUQ5YG; Fri, 2 Oct 2015 01:30:40 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id C18882004E; Fri, 2 Oct 2015 01:30:39 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 135C1377A32C; Fri, 2 Oct 2015 01:30:38 +0200 (CEST) Date: Fri, 2 Oct 2015 01:30:38 +0200 From: Juergen Schoenwaelder To: i2rs@ietf.org Message-ID: <20151001233038.GC29135@elstar.local> Mail-Followup-To: i2rs@ietf.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.4.2.3i Archived-At: Subject: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Oct 2015 23:30:45 -0000 A few notes from a quick read of this I-D: - There are multiple places where the text says network.yang but really means ietf-network.yang. The same for network-topology.yang and ietf-network-topology.yang. - The 'organization' and 'contact' are TBD or WILL-BE-DEFINED-LATER. I think this needs to be filled in now. - There is probably a need to add some copyright etc. text to the module descriptions. - Instead of putting I-D names into reference clauses, please insert instructions for the RFC editor so that the editor knows which things need to be replaced with RFC numbers. - The description of the typedef link-id says 'The identifier may be opaque.' What does that mean? It is an inet:uri after all. If two systems populate a link-id, how are they going to come up with the same identifier? Is the SHOULD realistic to achieve? The same comment applies to the typedef tp-id. - I am not sure whether the security considerations are sufficient. I think it would be fair to point out that topology information is most likely information that requires proper protection. See also section 3.4 of RFC6087 which points to the template: http://trac.tools.ietf.org/area/ops/trac/wiki/yang-security-guidelines - Reference 6021 has been obsoleted by RFC 6991. - Reference 6241 is cited but not in the references section. - The IANA considerations section is missing. You need to do IANA registrations of the YANG module name and the namespace URN. - RFC 2119 terms are used but not 'imported'. - There are references without citations: [yang-json], [restconf]. - I do not really understand why RFC1195, RFC2328, and RFC3209 are normative references. Even RFC6241 and RFC7223 may not be normative. Well, RFC6241 is not cited at all so it should be removed anyway (ah, bad for my h-index). - Make sure idnits is happy. I have asked the YANG doctors to comment on section 3.5. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Thu Oct 1 20:02:07 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EFDB1AC401 for ; Thu, 1 Oct 2015 20:02:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -98.455 X-Spam-Level: X-Spam-Status: No, score=-98.455 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, J_CHICKENPOX_74=0.6, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dZBBy4EVKb0i for ; Thu, 1 Oct 2015 20:02:04 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 364541AC3FF for ; Thu, 1 Oct 2015 20:02:04 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: "'Juergen Schoenwaelder'" , References: <20151001233038.GC29135@elstar.local> In-Reply-To: <20151001233038.GC29135@elstar.local> Date: Thu, 1 Oct 2015 23:01:52 -0400 Message-ID: <008701d0fcbe$b0621c70$11265550$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQJIOnOOh0a34mp8OFw/IPbY8TChr51o7cLA Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: "'Alexander Clemm \(alex\)'" , "'Eric Voit \(evoit\)'" Subject: Re: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 03:02:05 -0000 Juergen: Thank you for the quick review. The authors will revise this draft so look for it's announcement. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Thursday, October 01, 2015 7:31 PM To: i2rs@ietf.org Subject: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt A few notes from a quick read of this I-D: - There are multiple places where the text says network.yang but really means ietf-network.yang. The same for network-topology.yang and ietf-network-topology.yang. - The 'organization' and 'contact' are TBD or WILL-BE-DEFINED-LATER. I think this needs to be filled in now. - There is probably a need to add some copyright etc. text to the module descriptions. - Instead of putting I-D names into reference clauses, please insert instructions for the RFC editor so that the editor knows which things need to be replaced with RFC numbers. - The description of the typedef link-id says 'The identifier may be opaque.' What does that mean? It is an inet:uri after all. If two systems populate a link-id, how are they going to come up with the same identifier? Is the SHOULD realistic to achieve? The same comment applies to the typedef tp-id. - I am not sure whether the security considerations are sufficient. I think it would be fair to point out that topology information is most likely information that requires proper protection. See also section 3.4 of RFC6087 which points to the template: http://trac.tools.ietf.org/area/ops/trac/wiki/yang-security-guidelines - Reference 6021 has been obsoleted by RFC 6991. - Reference 6241 is cited but not in the references section. - The IANA considerations section is missing. You need to do IANA registrations of the YANG module name and the namespace URN. - RFC 2119 terms are used but not 'imported'. - There are references without citations: [yang-json], [restconf]. - I do not really understand why RFC1195, RFC2328, and RFC3209 are normative references. Even RFC6241 and RFC7223 may not be normative. Well, RFC6241 is not cited at all so it should be removed anyway (ah, bad for my h-index). - Make sure idnits is happy. I have asked the YANG doctors to comment on section 3.5. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Fri Oct 2 06:52:15 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E37481B2B8F; Fri, 2 Oct 2015 06:52:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jo_VFWLS7RGi; Fri, 2 Oct 2015 06:52:12 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 056E41B2B95; Fri, 2 Oct 2015 06:52:12 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: X-Test-IDTracker: no X-IETF-IDTracker: 6.4.1 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20151002135212.12540.86886.idtracker@ietfa.amsl.com> Date: Fri, 02 Oct 2015 06:52:12 -0700 Archived-At: Cc: i2rs@ietf.org Subject: [i2rs] I-D Action: draft-mglt-i2rs-security-environment-reqs-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 13:52:14 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Interface to the Routing System Working Group of the IETF. Title : I2RS Environment Security Requirements Authors : Daniel Migault Joel Halpern Susan Hares Filename : draft-mglt-i2rs-security-environment-reqs-01.txt Pages : 19 Date : 2015-10-02 Abstract: This document provides environment security requirements for the I2RS architecture. Environment security requirements are independent of the protocol used for I2RS. As a result, the requirements provided in this document are intended to provide good security practise so I2RS can be securely deployed and operated. These security requirements are designated as environment security requirements as opposed to the protocol security requirements described in [I-D.ietf-i2rs-protocol-security-requirements]. The reason to have separate document is that protocol security requirements are intended to help the design of the I2RS protocol whether the environment requirements are rather intended for deployment or implementations. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-reqs/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-01 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-mglt-i2rs-security-environment-reqs-01 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Fri Oct 2 07:04:33 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E150C1A00F5 for ; Fri, 2 Oct 2015 07:04:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oE1w2qyxx-w9 for ; Fri, 2 Oct 2015 07:04:30 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE6181A000D for ; Fri, 2 Oct 2015 07:04:30 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Fri, 2 Oct 2015 10:04:21 -0400 Message-ID: <008f01d0fd1b$3cd5e720$b681b560$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdD9GfpjRkbj7UmZS3+FBd/TyvBmyA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Daniel Migault' , 'Joel Halpern' Subject: [i2rs] draft-mglt-i2rs-security-environment-reqs-01.txt - 1 Week WG Adoption Review (10/1-10/8) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 14:04:32 -0000 Hi all:=20 The chairs feel draft-mglt-i2rs-security-environment-reqs-01.txt answer = questions regarding the security environment for I2RS as by the IETF = Security directorate and the IESG. We plan to adopt this draft, but we = would like to get your feedback. This is a 1 week WG Adoption call for = the WG to review this document and make comments on the adoption.=20 The authors have tried to address all comments made during the August. = Please send comments to the list.=20 The draft is at:=20 https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-req= s/ Sue Hares and Jeff Haas=20 -----Original Message----- From: internet-drafts@ietf.org [mailto:internet-drafts@ietf.org]=20 Sent: Friday, October 02, 2015 9:52 AM To: Susan Hares; Joel Halpern; Joel M. Halpern; Daniel Migault; Daniel = Migault; Susan Hares Subject: New Version Notification for = draft-mglt-i2rs-security-environment-reqs-01.txt A new version of I-D, draft-mglt-i2rs-security-environment-reqs-01.txt has been successfully submitted by Daniel Migault and posted to the IETF = repository. Name: draft-mglt-i2rs-security-environment-reqs Revision: 01 Title: I2RS Environment Security Requirements Document date: 2015-10-02 Group: i2rs Pages: 19 URL: = https://www.ietf.org/internet-drafts/draft-mglt-i2rs-security-environment= -reqs-01.txt Status: = https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-req= s/ Htmlized: = https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-01 Diff: = https://www.ietf.org/rfcdiff?url2=3Ddraft-mglt-i2rs-security-environment-= reqs-01 Abstract: This document provides environment security requirements for the I2RS architecture. Environment security requirements are independent of the protocol used for I2RS. As a result, the requirements provided in this document are intended to provide good security practise so I2RS can be securely deployed and operated. These security requirements are designated as environment security requirements as opposed to the protocol security requirements described in [I-D.ietf-i2rs-protocol-security-requirements]. The reason to have separate document is that protocol security requirements are intended to help the design of the I2RS protocol whether the environment requirements are rather intended for deployment or implementations. = =20 Please note that it may take a couple of minutes from the time of = submission until the htmlized version and diff are available at = tools.ietf.org. The IETF Secretariat From nobody Fri Oct 2 07:36:27 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B8BD1B2BBD for ; Fri, 2 Oct 2015 07:36:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.201 X-Spam-Level: X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wKSctT3teJbz for ; Fri, 2 Oct 2015 07:36:22 -0700 (PDT) Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 237FC1B2BBA for ; Fri, 2 Oct 2015 07:36:22 -0700 (PDT) X-AuditID: c6180641-f792c6d00000686a-4a-560e2aa69bed Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 33.FB.26730.6AA2E065; Fri, 2 Oct 2015 08:56:38 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Fri, 2 Oct 2015 10:36:20 -0400 From: Daniel Migault To: "i2rs@ietf.org" Thread-Topic: New Version Notification for draft-mglt-i2rs-security-environment-reqs-01.txt Thread-Index: AQHQ/RmS29rRqxOyx0mIQaUebK5xqZ5YOZPA Date: Fri, 2 Oct 2015 14:36:20 +0000 Message-ID: <2DD56D786E600F45AC6BDE7DA4E8A8C11216B6D0@eusaamb107.ericsson.se> References: <20151002135212.12540.65.idtracker@ietfa.amsl.com> In-Reply-To: <20151002135212.12540.65.idtracker@ietfa.amsl.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.9] Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrHLMWRmVeSWpSXmKPExsUyuXRPoO4yLb4wg0VPlSzWzfjAYvHnzSsW ByaPJUt+MnnMfn2dNYApissmJTUnsyy1SN8ugSvj0ao2loIrCxkrus+uZW5gPDCXsYuRk0NC wERi/e8LTBC2mMSFe+vZuhi5OIQEjjJK7Ok9yALhLGOUmNYwiR2kik3ASKLtUD+YLSKgLHHw Zy9rFyMHB7OAt8Tl1gCQsLBAjMSym0/YQcIiArESUydnQlQbScyb/Z8NJMwioCKx8n0uSJhX wFfi/+5WZhBbSMBO4uq6CWwgNqeAvcTJBb9ZQWxGoNO+n1oDdiazgLjErSfzoU4WkFiy5zwz hC0q8fLxP1YIW1FiX/90dojDNCXW79KHaFWUmNL9kB1iraDEyZlPWCYwis1CMnUWQscsJB2z kHQsYGRZxchRWpxalptuZLiJERghxyTYHHcwLvhkeYhRgINRiYd3QQlvmBBrYllxZe4hRmkO FiVx3nkz7ocKCaQnlqRmp6YWpBbFF5XmpBYfYmTi4JRqYPS67nVMoKlx/eT7hrzbWJYIqSo8 +vPnGOdLDXkBt/iIojbxzN/X+Ct55vFo3J2x+9A8rfjHbCac4YqXfNYumnlgickxHpetN6+7 RMf/v9Fwrz6/4tSCtz+/zNv9KizTdPP7lKNsvOKTP69brvjp+9TjBSZHZT9z9M7wVDxm7OR8 KmuKg/PS5TlKLMUZiYZazEXFiQCvGzRwcQIAAA== Archived-At: Cc: Joel Halpern , Susan Hares Subject: [i2rs] FW: New Version Notification for draft-mglt-i2rs-security-environment-reqs-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 14:36:25 -0000 SGksIA0KDQpQbGVhc2UgZmluZCB0aGUgbmV3IHZlcnNpb24gZm9yIHRoZSBkcmFmdC1tZ2x0LWky cnMtc2VjdXJpdHktZW52aXJvbm1lbnQtcmVxcy4gWzFdLiBUaGUgdmVyc2lvbiBoYXMgY29uc2lk ZXJlZCB0aGUgY29tbWVudHMgd2UgcmVjZWl2ZWQgb24gdGhlIE1MLiBUaGFuayB5b3UgZm9yIHN1 Ym1pdHRpbmcgdGhlbS4gSGVyZSBpcyBhIHN1bW1hcnkgb2Ygd2hhdCBoYXMgYmVlbiBhZGRyZXNz ZWQuDQoNCkkpIEFkZHJlc3NpbmcgQ29tbWVudHMgZnJvbSBSdXNzIEhvdXNsZXkNCklJKSBBZGRy ZXNzaW5nIENvbW1lbnRzIGZyb20gTGluZGEgRHVuZGFyDQpJSUkpIEFkZHJlc3NpbmcgdGhlIFJF UTMgRGlzY3Vzc2lvbiANCklWKSBBZGRyZXNzaW5nIENvbW1lbnRzIGZyb20gSmVmZnJleSBIYWFz DQoNCkJSLCANCkRhbmllbA0KDQpbMV0gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvaW50ZXJuZXQtZHJh ZnRzL2RyYWZ0LW1nbHQtaTJycy1zZWN1cml0eS1lbnZpcm9ubWVudC1yZXFzLTAxLnR4dA0KDQol JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlIA0KJSUlIEkpIEFkZHJlc3NpbmcgY29tbWVu dHMgZnJvbSBSdXNzIEhvdXNsZXk6ICUlJQ0KJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl JQ0KDQpJbiBTZWN0aW9uIDEsIHRoZSBmaXJzdCBzZW50ZW5jZSBzYXlzOiAiVGhpcyBkb2N1bWVu dCBhZGRyZXNzZXMNCnNlY3VyaXR5IGNvbnNpZGVyYXRpb25zIGZvciB0aGUgSTJSUyBhcmNoaXRl Y3R1cmUuIiAgVGhpcyBkb2VzIG5vdA0Kc2VlbSBsaWtlIHRoZSByaWdodCB3YXkgdG8gYmVnaW4g dGhpcyBkb2N1bWVudC4gIFRoaXMgZG9jdW1lbnQgc2VlbXMNCnRvIGNvbnRhaW4gcmVxdWlyZW1l bnRzIG9uIGFuIGltcGxlbWVudGF0aW9uIG9yIGRlcGxveW1lbnQuICBUaGV5IGFyZQ0Kbm90IHBy b3RvY29sIHJlcXVpcmVtZW50cywgd2hpY2ggaXMgd2hhdCBJIGV4cGVjdGVkIGZyb20gdGhlIGRy YWZ0DQpmaWxlIG5hbWUuICBUaGlzIGNvbnRleHQgbmVlZHMgdG8gYmUgc2V0IGluIHRoZSBBYnN0 cmFjdCBhbmQgdGhlDQpmaXJzdCBwYXJhZ3JhcGggb2YgdGhlIEludHJvZHVjdGlvbi4NCg0KTUdM VDogVGhhbmsgeW91IGZvciB0aGUgZmVlZCBiYWNrLiBXZSBhZGRyZXNzZWQgdGhpcyBjb21tZW50 IGJ5IHN0YXJ0aW5nIHRoZSBpbnRyb2R1Y3Rpb24gKFNlY3Rpb24gMSkgd2l0aCB0aGUgZm9sbG93 aW5nIHNlbnRlbmNlcyA6DQpUaGlzIGRvY3VtZW50IHByb3ZpZGVzIGVudmlyb25tZW50IHNlY3Vy aXR5IHJlcXVpcmVtZW50cyBmb3IgdGhlIEkyUlMgYXJjaGl0ZWN0dXJlLiBFbnZpcm9ubWVudCBz ZWN1cml0eSByZXF1aXJlbWVudHMgYXJlIGluZGVwZW5kZW50IG9mIHRoZSBwcm90b2NvbCB1c2Vk IGZvciBJMlJTLiBBcyBhIHJlc3VsdCwgdGhlIHJlcXVpcmVtZW50cyBwcm92aWRlZCBpbiB0aGlz IGRvY3VtZW50IGFyZSBpbnRlbmRlZCB0byBwcm92aWRlIGdvb2Qgc2VjdXJpdHkgcHJhY3Rpc2Ug c28gSTJSUyBjYW4gYmUgc2VjdXJlbHkgZGVwbG95ZWQgYW5kIG9wZXJhdGVkLg0KDQoNClNlY3Rp b24gNC4xIHRhbGtzIGFib3V0IHRoZSBJMlJTIEFBQSBhcmNoaXRlY3R1cmUsIGJ1dCBpdCBkb2Vz IG5vdA0KY292ZXIgYXV0aGVudGljYXRpb24sIGF1dGhvcml6YXRpb24sIGFuZCBhY2NvdW50aW5n LiAgVGhlIHNlY3Rpb24NCnNlZW1zIHRvIGJlIHRhbGtpbmcgYWJvdXQgcm9sZXMsIHByaXZpbGVn ZXMsIGFuZCByb2xlLWJhc2VkIGFjY2Vzcw0KY29udHJvbC4gIE1heWJlIHRoZSB0aXRsZSBvZiB0 aGUgc2VjdGlvbiBzaG91bGQgYmUgY2hhbmdlZC4NCg0KTUdMVCAgVGhlIHRpdGxlIGhhcyBiZWVu IGNoYW5nZWQgdG8gIkkyUlMgQWNjZXNzIENvbnRyb2wgZm9yIHJvdXRpbmcgc3lzdGVtIHJlc291 cmNlcyINCkFBQSBoYXMgYmVlbiByZXBsYWNlZCBieSBBY2Nlc3MgQ29udHJvbC4gV2UgYWxzbyBj b21wbGV0ZWx5IHJlLXdyaXRlIHRoZSBzZWN0aW9uLiANCg0KSW4gU2VjdGlvbiA0LjIsIFJFUSAx NywgSSBmaW5kIHRoZSB1c2Ugb2YgIm9yaWdpbiIgdW5jbGVhci4gIFRoZQ0Kb3JpZ2luIGlzIHRo ZSBJMlJTIENsaWVudCwgbm90IHRoZSBhcHBsaWNhdGlvbiwgcmlnaHQ/DQoNCk1HTFQ6IFJFUSAx NyBjb3JyZXNwb25kcyB0byBSRVEgMTYgb2YgdGhlIGRyYWZ0LW1nbHQtc2VjdXJpdHktZW52aXJv bm1lbnQtcmVxcy0wMC4gSXQgaXMgdW5jbGVhci4gSSByZW1vdmVkIHRoZSB0ZXJtIG9yaWdpbiBh bmQgZGlzdGluZ3Vpc2ggdHdvIGNhc2VzIG9uZSB3aGVuIHRoZSBhY2Nlc3MgY29udHJvbCBpcyBt YWRlIGZvciB0aGUgSTJSUyBDbGllbnQgYW5kIG9uZSBmb3IgdGhlIGFwcGxpY2F0aW9uLiBUaGUg dGV4dCBvZiB0aGUgd2hvbGUgc2VjdGlvbiBoYXMgYmVlbiB1cGRhdGVkIGFuZCBob3BlZnVsbHkg Y2xhcmlmaWVkLiBUaGUgdGVybSBvcmlnaW4gYW5kIGNvbXBvbmVudCBoYXZlIGJlZW4gcmVtb3Zl ZCBhbmQgcmVwbGFjZWQgZXhwbGljaXRseSBieSBBcHBsaWNhdGlvbiwgSTJSUyBDbGllbnQgb3Ig STJSUyBBZ2VudCBvciBpZGVudGl0eS4gDQoNCkluIFNlY3Rpb24gNC4yLCBSRVEgMTksIEkgZmlu ZCB0aGUgdXNlIG9mICJjb21wb25lbnQiIHVuY2xlYXIuICBUaGUNCmNvbXBvbmVudCBpcyB0aGUg STJSUyBDbGllbnQsIG5vdCB0aGUgYXBwbGljYXRpb24sIHJpZ2h0Pw0KDQpNR0xUOiBjb21wb25l bnQgaXMgdW5jbGVhciBhbmQgaGFzIGJlZW4gcmVtb3ZlZC4NCg0KSW4gc2VjdGlvbiA0LjMsIDFz dCBwYXJhZ3JhcGgsIEkgdGhpbmsgdGhpcyB3b3VsZCBiZSBtb3JlIGNsZWFyIHdpdGhvdXQNCnRo ZSB1c2Ugb2YgImNvbXBvbmVudCIuICBUaGF0IGlzLCB0aGUgSTJSUyBjbGllbnQgaXMgcmVzcG9u c2libGUgZm9yDQphdXRoZW50aWNhdGlvbiBvZiB0aGUgYXBwbGljYXRpb25zLCBtYW5hZ2luZyB0 aGUgcHJpdmlsZWdlcyBmb3IgdGhlDQphcHBsaWNhdGlvbnMsIGFuZCBlbmZvcmNpbmcgYWNjZXNz IGNvbnRyb2wgdG8gcmVzb3VyY2VzIGJ5IHRoZQ0KYXBwbGljYXRpb25zLg0KDQpNR0xUOiBjb21w b25lbnQgaXMgdW5jbGVhciBhbmQgaXQgaGFzIGJlZW4gcmVtb3ZlZC4NCg0KSSBkbyBub3QgdW5k ZXJzdGFuZCBTZWN0aW9uIDQuNC4gIElmIGFuIEkyUlMgQ2xpZW50IGF1dGhlbnRpY2F0ZXMgdG8N CkkyUlMgQWdlbnQgMSBhbmQgMiwgaXQgaXMgcG9zc2libGUgdGhhdCB0aGVzZSBhZ2VudHMgd2ls bCBncmFudA0KZGlmZmVyZW50IHByaXZpbGVnZXMgdG8gdGhpcyBjbGllbnQuICBJcyBhIHNlY3Vy aXR5IGRvbWFpbiBhIHNldCBvZg0KYWdlbnRzIHRoYXQgYXJlIGV4cGVjdGVkICBncmFudCB0aGUg c2FtZSBwcml2aWxlZ2VzIHRvIHRoaXMgY2xpZW50Pw0KV2hhdCBkb2VzIGF2YWlsYWJpbGl0eSBo YXZlIHRvIGRvIHdpdGggdGhlIGRlZmluaXRpb24gb2YgYSBzZWN1cml0eQ0KZG9tYWluPyAgTWF5 YmUgdGhlc2UgdHdvIHRvcGljcyBzaG91bGQgYmUgaW4gc2VwYXJhdGUgc2VjdGlvbnMuICBEb1MN CmlzIGFsc28gdGFsa2VkIGFib3V0IGluIFNlY3Rpb24gNS4yOyBJIHRoaW5rIHRoYXQgaXQgd291 bGQgaGVscCB0aGUNCnJlYWRlciBpZiBhbGwgb2YgdGhlIGF2YWlsYWJpbGl0eSBkaXNjdXNzaW9u cyBhcmUgaW4gb25lIHBsYWNlLg0KDQpNR0xUOiBUaGlzIHNlY3Rpb24gaXMgdG9vIHJlZHVuZGFu dCB3aXRoIEktRC5oYXJlcy1pMnJzLWF1dGgtdHJhbnMuIA0KVGhlIG1haW4gbWVzc2FnZSB3YXMg dGhhdCBsb2NhbCBwb2xpY2llcyBlbmZvcmNlbWVudCBpcyBub3Qgc3VmZmljaWVudCwgYW5kIGNv bW11bmljYXRpb25zIGJldHdlZW4gcG9pbnRzIHNob3VsZCBiZSBjb25zaWRlcmVkIHNlY3VyZWQu IFRoaXMgaGFzIGJlZW4gYWRkZWQgaW4gdGhlIEFjY2VzcyBDb250cm9sIGFyY2hpdGVjdHVyZSBz dWIgc2VjdGlvbi4gSW4gYWRkaXRpb24sIHdlIGFkZGVkIGhvdyB0cmFuc3BvcnQgYW5kIGFjY2Vz cyBjb250cm9sIGludGVyYWN0IGluIHRoZSBhY2Nlc3MgY29udHJvbCBzZWN0aW9uLiANCiANCklu IFNlY3Rpb24gNC4yLCBSRVEgMjAsIEkgdGhpbmsgdGhlIHdvcmRpbmcgbmVlZHMgdG8gYmUgY2xh cmlmaWVkIHRvDQppbmRpY2F0ZSB0aGF0IEkyUlMgQ2xpZW50cyBjYW5lIHN1cHBvcnQgbXVsdGlw bGUgYXBwbGljYXRpb25zIGF0IHRoZQ0Kc2FtZSB0aW1lLCBhbmQgZWFjaCBvZiB0aGVtIG5lZWRz IHRvIGJlIGF1dGhlbnRpY2F0ZWQuDQoNCk1HTFQ6IFdlIGV4cGxpY2l0bHkgc3BlY2lmeSB0aGUg Y2FzZSBvZiBtdWx0aXBsZSBhcHBsaWNhdGlvbnMuDQoNCg0KSW4gU2VjdGlvbiA1LjEsIFJFUSAy OSwgSXQgaXMgdW5jbGVhciB0byBtZSB3aGF0IHBhcnQgb2YgdGhlIHN5c3RlbSBpcw0KcGVyZm9y bWluZyB0aGlzIG1vbml0b3JpbmcuICBXaGVuIGFuIGVycm9yIGlzIGRldGVjdGVkLCB3aGF0IHBh cnQgb2YgdGhlDQpzeXN0ZW0gdGFrZXMgY29ycmVjdGl2ZSBhY3Rpb25zPw0KDQpNR0xUOiBUaGUg YWdlbnQgYW5kIGNsaWVudCBhcmUgZXhwZWN0ZWQgdG8gbW9uaXRvciwgbG9nLCBhbmQgZXZlbnR1 YWxseSBzZW5kIGFsZXJ0cy4gVGhlIG1hbmFnZW1lbnQgcGxhbmUgaXMgcmVzcG9uc2libGUgaW4g Y29sbGVjdGluZyBhbmQgdGFraW5nIHRoZSBhcHByb3ByaWF0ZWQgZGVjaXNpb25zIGxpa2UgdXBk YXRpbmcgQWNjZXNzIENvbnRyb2wgcG9saWNpZXMsIHJlY29uZmlndXJpbmcgcm91dGluZyBlbGVt ZW50cy4uLikNCg0KSW4gU2VjdGlvbiA0LjI6IHMvT24gdGhlIGhhbmQvT24gdGhlIG90aGVyIGhh bmQvDQoNCiUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUNCiUlJSBJSSkgQWRkcmVzc2lu ZyBDb21tZW50cyBmcm9tIExpbmRhIER1bmRhciAlJSUNCiUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl JSUlJSUlJSUNCg0KDQotICAgICAgICAgIENvbW11bmljYXRpb24gY2hhbm5lbCBiZXR3ZWVuIEky UlMgY2xpZW50IGFuZCBBZ2VudCAoYW5kIHRoZSBjaGFubmVsIGJldHdlZW4gSTJSUyBjbGllbnQg YW5kIGFwcGxpY2F0aW9ucyk6IFRoZSBjaGFubmVsIGNhbiBiZQ0KbyAgIFZpYSBwaHlzaWNhbCBQ cml2YXRlIG5ldHdvcmsgKGUuZy4gd2l0aGluIGEgc2VjdXJlZCBkaXJlY3QgY29ubmVjdCB3aXRo aW4gb25lIHNpdGUpLA0KbyAgIHdpdGhpbiBvbmUgYWRtaW5pc3RyYXRpdmUgZG9tYWluLCAgdmlh IHZpcnR1YWwgcHJpdmF0ZSBuZXR3b3JrDQpvICAgU2VjdXJlZCBjb25uZWN0aW9uLCBzdWNoIGFz IFRMUyBvciBJUFNlYw0KbyAgIFB1YmxpYyBpbnRlcm5ldA0KbyAgIC4uDQoNCk1HTFQ6IFRoYW5r IGZvciB0aGUgY2xhcmlmaWNhdGlvbi4gIEkgdGhpbmsgdGhhdCBvdXIgUkVRMSBjYXRjaGVzIHRo ZXNlIGFzcGVjdHMgYXMgYSB3YXkgdG8gaXNvbGF0ZSB0aGUgSTJSUyBwbGFuZSBmcm9tIG90aGVy LiBGb3IgY29tbXVuaWNhdGlvbnMgdGhlbXNlbHZlcywgdGhpcyB2ZXJzaW9uIG1vc3RseSByZWRp cmVjdHMgdG8gaGFyZXMtc2VjdXJ0aXR5ICBJLUQuaGFyZXMtaTJycy1hdXRoLXRyYW5zLiBQbGVh c2UgbGV0IG1lIGtub3cgaWYgeW91IHRoaW5rIHdlIGRvIG5vdCBhZGRyZXNzIHlvdXIgcHVycG9z ZS4NCg0KLSAgICAgICAgICBBdXRoZW50aWNhdGlvbiAmIEF1dGhvcml6YXRpb24NCg0KbyAgIHRo ZSBhdXRoZW50aWNhdGlvbiAmIGF1dGhvcml6YXRpb24gcmVxdWlyZW1lbnQgZm9yIGRpZmZlcmVu dCBjb21tdW5pY2F0aW9uIGNoYW5uZWxzIGNhbiBiZSBkaWZmZXJlbnQuIFRoZXJlZm9yZSwgc2hv dWxkIGhhdmUgc2VwYXJhdGUgc2VjdGlvbnMgdG8gYWRkcmVzcyBzcGVjaWZpYyByZXF1aXJlbWVu dCAgZm9yIGVhY2ggY29tbXVuaWNhdGlvbiBjaGFubmVscyBiZXR3ZWVuIEkyUlMgYWdlbnQgPC0+ IGNsaWVudHMgKGFuZCBjbGllbnQgPC0+IGFwcGxpY2F0aW9ucykNCg0KTUdMVDogDQpUaGFuayB5 b3UgZm9yIHRoZSBjb21tZW50LiBXZSBoYXZlIHJlLXdyaXR0ZW4gdGhlIHNlY3Rpb24gNCBhbmQg SSBob3BlIHRoZSBjdXJyZW50IHNlY3Rpb24gNCBvbiBhY2Nlc3MgY29udHJvbCBjb25zaWRlcnMg dGhlc2UgYXNwZWN0cyB3aXRoIHRoZSBmb2xsb3dpbmcgc2VjdGlvbnM6DQogICAgIDQuMS4gIEky UlMgQWNjZXNzIENvbnRyb2wgYXJjaGl0ZWN0dXJlICAuIC4gLiAuIC4gLiAuIC4gLiAuIC4gLiAg IDgNCiAgICAgNC4yLiAgSTJSUyBBZ2VudCBBY2Nlc3MgQ29udHJvbCBwb2xpY2llcyAgLiAuIC4g LiAuIC4gLiAuIC4gLiAuICAxMg0KICAgICA0LjMuICBJMlJTIENsaWVudCBBY2Nlc3MgQ29udHJv bCBwb2xpY2llcyAuIC4gLiAuIC4gLiAuIC4gLiAuIC4gIDEzDQogICAgIDQuNC4gIEFwcGxpY2F0 aW9uIGFuZCBBY2Nlc3MgQ29udHJvbCBwb2xpY2llcyAuIC4gLiAuIC4gLiAuIC4gLiAgMTQNCg0K VGhlIGN1cnJlbnQgU2VjdGlvbiA0IG9mIHRoZSBkcmFmdCBhbHJlYWR5IGhhcyB2ZXJ5IGdvb2Qg ZGVzY3JpcHRpb24gb24gdGhlIHN1YmplY3QuIEkgdGhpbmsgNC40LjEgYW5kIDQuNDIgY2FuIGJl IHNlcGFyYXRlZCBvdXQgb2YgdGhlIHNlY3Rpb24uDQoNCk1HTFQ6IFRoYW5rIHlvdSBmb3IgcG9p bnRpbmcgb3V0IHRoZSBzcGxpdC4gdGhlIHNlY3Rpb24gNC40IGhhcyBiZWVuIHJlbW92ZWQgYW5k IG91dHNvdXJjZWQgdG8gdGhlIEkyUlMgQWNjZXNzIENvbnRyb2wgYW5kIGluIHRoZSBkcmFmdC1p ZXRmLWFyZXMtcHJvdG9jb2wgc2VjdXJpdHkgcmVxdWlyZW1lbnRzIGRyYWZ0Lg0KDQotICAgICAg ICAgIEVuY3J5cHRpb24gZm9yIHRoZSBhY3R1YWwgY29udGVudCBiZXR3ZWVuIENsaWVudCBhbmQg QWdlbnQNCg0KTUdMVDogU2ltaWxhcmx5LCB3ZSBoYXZlIG1vdmVkIHRvIHRoZSAgSTJSUyBBY2Nl c3MgQ29udHJvbCBhbmQgaW4gdGhlIGRyYWZ0LWlldGYtYXJlcy1wcm90b2NvbCBzZWN1cml0eSBy ZXF1aXJlbWVudHMNCg0KLSAgICAgICAgICBEb1MgRGVzaWduIHJlcXVpcmVtZW50IChjdXJyZW50 bHkgaW4gU2VjdGlvbiA1LjIuMSkNCi0gICAgICAgICAgTWFuYWdlbWVudCBvZiBjb25mbGljdCB3 aXRoIG90aGVyIHBsYW5lIChlLmcuIHRoZSBtYW5hZ2VtZW50IHBsYW5lLCBtdWx0aS1oZWFkZWQg Y29udHJvbCwgd2hpY2ggaGFzIGJlZW4gZGlzY3Vzc2VkIGV4dGVuc2l2ZWx5IGluIGVwaGVtZXJh bCBkcmFmdCkNCg0KTUdMVDogVGhlIHJlZmVyZW5jZSB0byB0aGUgZHJhZnQgaGFzIGJlZW4gYWRk ZWQuIEhvd2V2ZXIsIHRoZSByZWNvbW1lbmRhdGlvbnMgd2VyZSBtb3N0bHkgcG9pbnRpbmcgdG8g dGhlIHRleHQgZnJvbSB0aGUgaTJycyBhcmNoaXRlY3R1cmUgZG9jdW1lbnQuDQoNCg0KSSB0aGlu ayB0aGUgZHJhZnQgc2hvdWxkIGJlIG9yZ2FuaXplZCBmcm9tIHRoZSBhc3BlY3RzIG9mIHRoZSBz ZWN1cml0eSB0byBJMlJTIGFzIHN1Z2dlc3RlZCBhYm92ZS4gSGVyZSBhcmUgc29tZSBkZXRhaWxl ZCBxdWVzdGlvbnMgYW5kIGNvbW1lbnRzIHRvIHRoZSByZXF1aXJlbWVudHMgbGlzdGVkIGluIHRo ZSBkb2N1bWVudDoNCg0KU2VjdGlvbiAxOg0KDQpUaGUgc2Vjb25kIHBhcmFncmFwaCBzdGF0ZWQg dGhlIHNlY3VyaXR5IHJlY29tbWVuZGF0aW9ucyBtdXN0IMOi4oKsxZNzcGVjaWZ5aW5nIHdoZXJl IHNlY3VyaXR5IGZ1bmN0aW9ucyBtYXkgYmUgaG9zdGVkw6LigqzCnS4gRmlyc3Qgb2YgYWxsIEkg ZG9uw6LigqzihKJ0IHNlZSB0aGUgZHJhZnQgYWRkcmVzcyB0aGlzIGFzcGVjdC4gU2Vjb25kLCBJ IHRoaW5rICAgw6LigqzFk3doZXJlIHNlY3VyaXR5IGZ1bmN0aW9ucyBhcmUgaG9zdGVkw6LigqzC nSBpcyBvcnRob2dvbmFsIHRvIMOi4oKsxZNJMlJTIHNlY3VyaXR5w6LigqzCnSAuDQoNCk1HTFQ6 IEkgYWdyZWUgd2l0aCB5b3VyIGNvbW1lbnQgYW5kIHdlIGhhdmUgcmVtb3ZlZCB0aGUgdGV4dCBm cm9tIHRoZSBzZWN0aW9uLg0KICANClNlY3Rpb24gMzoNCg0Kd2hhdCBkb2VzIGlzb2xhdGluZyB0 d28gcGxhbmVzIG1lYW4/IGRvZXMgaXQgbWVhbiB0aGV5IGhhdmUgZGlmZmVyZW50IHNlY3VyaXR5 IHJlcXVpcmVtZW50L2lzc3Vlcz8gT3IgZG9lcyBpdCBtZWFuIHRoZXkgbmVlZCBkaWZmZXJlbnQg cHJvdG9jb2xzPw0KDQpNR0xUOiBFYWNoIHBsYW5lIGhhcyBhIHNwZWNpZmljIHNjb3BlIG9mIGZ1 bmN0aW9uLiAgDQoNCldoYXQgYXJlIHRoZSBrZXkgZGlmZmVyZW5jZXMgd2l0aCByZWdhcmQgdG8g dGhlIHNlY3VyaXR5IHJlcXVpcmVtZW50cyBmb3IgIEkyUlMgcGxhbmUgYW5kIGZvciBtYW5hZ2Vt ZW50IHBsYW5lPyAgU2VjdGlvbiAzLjEgZGVzY3JpYmVzIHRoZSBpbnRlcmFjdGlvbiBiZXR3ZWVu IEkyUlMgcGxhbmUgYW5kIG1hbmFnZW1lbnQgcGxhbmUuIEJ1dCBJIHNlZSB0aGUgc2VjdXJpdHkg cmVxdWlyZW1lbnQgZm9yIHRoZSBtYW5hZ2VtZW50IHBsYW5lIGlzIHNpbWlsYXIgdG8gSTJSUyBw bGFuZSAuIElmIHlvdSB0aGluayB0aGF0IHRoZXkgYXJlIHZlcnkgZGlmZmVyZW50LCBjYW4geW91 IGVsYWJvcmF0ZSBtb3JlPw0KDQpNR0xUOiAgVGhhbmtzIGZvciB0aGUgcmVtYXJrLiBIZXJlIGlz IHRoZSB0ZXh0IHdlIGFkZGVkLiBGZWVsIGZyZWUgdG8gdXMga25vdyBpcyB5b3UgdGhpbmsgaXQg aXMgbm90IGNsZWFyIGVub3VnaC4gDQoiVGhlIEkyUlMgcGxhbmUgcHVycG9zZSBpcyB0byBwcm92 aWRlIGEgc3RhbmRhcmQgcHJvZ3JhbW1hdGljIGludGVyZmFjZSBvZiB0aGUgcm91dGluZyBzeXN0 ZW0gcmVzb3VyY2VzIHRvIG5ldHdvcmsgb3JpZW50ZWQgYXBwbGljYXRpb25zLiBDb250cm9sIHBs YW5lIGFuZCBmb3J3YXJkaW5nIHBsYW5lcyBhcmUgcmVsYXRlZCB0byByb3V0aW5nIHByb3RvY29s cywgYW5kIEkyUlMgaXMgYmFzZWQgb24gdG9wIG9mIHRob3NlLiBUaGUgbWFuYWdlbWVudCBwbGFu ZSBpcyB1c3VhbGx5IHZlbmRvciBzcGVjaWZpYywgcHJvdmlkZXMgYSBicm9hZGVyIGNvbnRyb2wg b3ZlciB0aGUgbmV0d29ya2luZyBlcXVpcG1lbnQgc3VjaCBhcyBzeXN0ZW0gc2VydmljZS4gR2l2 ZW4gaXRzIGFzc29jaWF0ZWQgcHJpdmlsZWdlcyBpdCBpcyBleHBlY3RlZCB0byBiZSByZXNlcnZl ZCB0byBoaWdobHkgdHJ1c3RlZCB1c2VycyBsaWtlIG5ldHdvcmsgYWRtaW5pc3RyYXRvcnMuIg0K DQoNClNlY3Rpb24gMy40IGhhcyB0aXRsZSDDouKCrMWTUmVjb21tZW5kYXRpb25zw6LigqzCnSwg YnV0IHRoZSBjb250ZW50IGFyZSBhbGwgcmVxdWlyZW1lbnRzLiBXaHkgbm90IG5hbWUgdGhlIHNl Y3Rpb24gw6LigqzFk1JlcXVpcmVtZW50w6LigqzCnT8NCk1HTFQ6IEkgcHJlZmVyICJSZWNvbW1l bmRhdGlvbiIgYXQgbGVhc3QgZm9yIHRoaXMgc2VjdGlvbiwgYXMgdGhlIHdheSB0aGV5IGFyZSBp bXBsZW1lbnRlZCBhbmQgZW5mb3JjZSB2YXJ5IHdpZGVseSBhY2NvcmRpbmcgdG8gdGhlIGVudmly b25tZW50LiBIb3dldmVyLCBJIGFtIG9wZW4gZm9yIGRpc2N1c3Npb24sIGFuZCBpdCBjb3VsZCBi ZSBtb3ZlZCB0byBSZXF1aXJlbWVudHMgaW4gdGhlIGZ1dHVyZS4gDQogDQpSRVEgMjogRG9lcyBp dCB0aGF0IGEgZGlmZmVyZW50IElQIGFkZHJlc3MgdGhhbiB0aGUgb25lIHVzZWQgYnkgdGhlIG1h bmFnZW1lbnQgc3lzdGVtPw0KDQpNR0xUOiBZZXMsIHdlIHJlY29tbWVuZCB0aGF0IGhhdmluZyBh IGRlZGljYXRlZCBJUCBhZGRyZXNzIG9yIGRlZGljYXRlZCBOSUMgdG8gZW5mb3JjZSBpc29sYXRp b24uICANCg0KSG93IGlzIFJFUSAyMiBkaWZmZXJlbnQgZnJvbSBSRVEgMjE/DQoNCk1HTFQ6IEFn cmVlLCB0aGV5IGFyZSB2ZXJ5IGNsb3NlZC4gV2UgaGF2ZSBvdXRzb3VyY2VkIHRoZXNlIHJlcXVp cmVtZW50cyB0byB0aGUgdHJhbnNwb3J0IHJlcXVpcmVtZW50cy4NCg0KUkVRIDI3IGlzIGhhcmQg dG8gZW5mb3JjZS4gSG93IGFib3V0IHNheSBzb21ldGhpbmcgbGlrZSAic2hvdWxkbid0IHNlbmQg YW55IGluZm9ybWF0aW9uIGJleW9uZCB3aGF0IGhhdmUgYmVlbiBkZWZpbmVkIGJ5IHRoZSBJMlJT IGRhdGEgbW9kZWwiPw0KDQpNR0xUOiBBZ3JlZS4gVGhpcyBpcyBtdWNoIGJldHRlci4gSG93ZXZl ciwgd2UgaGF2ZSBvdXRzb3VyY2VkIHRoaXMgcmVxdWlyZW1lbnRzIHRvIHRoZSB0cmFuc3BvcnQg cmVxdWlyZW1lbnRzLiANCiANClJFUSAzMDogc2ltcGx5IGNvbnRyb2xsaW5nIHRoZSByZXNvdXJj ZSBjYW4gaGFyZGx5IHByZXZlbnQgRG9TLiBNYWxpY2lvdXMgY2xpZW50IGNhbiBvY2N1cHkgdGhl IHJlc291cmNlIHdoaWxlIHRoZSB2YWxpZCBvbmUgY2FuJ3QgYWNjZXNzLg0KTUdMVDoNClRoaXMg aXMgdHJ1ZSwgaG93ZXZlciwgd2hhdCBJIG1lYW50IGhlcmUgd2FzIHRvIGNvbnRyb2wgcmVzb3Vy Y2Ugc28gb25lIHRlbmFudCBkb2VzIG5vdCBvdmVyIGNvbnN1bWUgcmVzb3VyY2VzLiAgDQoNCiAl JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlDQolJSUgSUlJKSBBZGRyZXNzaW5nIHRoZSBSRVEzIERp c2N1c3Npb24gJSUlDQolJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ0KDQpCYXNlZCBvbiB0aGUg ZGlzY3Vzc2lvbiB3aXRoIFRob21hcyBOYWRlYXUsIEp1ZXJnZW4gU2Nob2Vud2FlbGRlciwNCiAg IEplZmZyZXkgSGFhcywgQWxpYSBBdGxhcyBSRVEgMyBoYXMgYmVlbiByZW1vdmVkLiAgDQoNCiAi VGhlIEkyUlMgQ2xpZW50DQogICBTSE9VTEQgYmUgYWJsZSB0byBsb2cgdGhlIGFjdGl2aXR5IG9m IGVhY2ggb2YgdGhlIEFwcGxpY2F0aW9ucy4NCiAgIFRoZXNlIGFjdGl2aXRpZXMgU0hPVUxEIGFs c28gYmUgY2hlY2tlZCBhZ2FpbnN0IHRoZSBJMlJTIEFBQSwgaW4NCiAgIG9yZGVyIHRvIGNoZWNr IHRoZSBJMlJTIENsaWVudCBBQUEgaXMgYXBwcm9wcmlhdGVseSBpbXBsZW1lbnRlZC4iDQoNCiUl JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUNCiUlJSBJVikgQWRkcmVzc2luZyBDb21tZW50 cyBmcm9tIEplZmZyZXkgSGFhcyAlJSUNCiUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUN Cg0KSSBoYXZlIHNvbWUgY29udHJhcnkgdGhvdWdodHMgb24gdGhlIEFBQSBzZWN0aW9uIG9mIHRo aXMgZG9jdW1lbnQuDQoNCk1HTFQ6IFRoZSBBQUEgc2VjdGlvbiBoYXMgY29tcGxldGVseSBiZSBy ZS13cml0dGVuLiANCg0KU2VjdGlvbiA0LjEgdHJpZXMgdG8gZGVzY3JpYmUgcmVxdWlyZW1lbnRz IHdoZXJlaW4gdGhlIEkyUlMgQ2xpZW50cyBtYXkNCnJlcXVlc3QgZm9yIHN1YnNldHMgb2YgQUFB IHBvbGljeSB0byBiZSBleHBvcnRlZCB0byB0aGUgQ2xpZW50IHNvIHRoYXQgdGhlDQpjbGllbnQg bWF5IGVuZm9yY2UgdGhlbS4gIFdoaWxlIHRoaXMgc2VlbXMgbGlrZSBhIG5pY2Ugd2F5IHRvIHNj YWxlIHRoZQ0Kb3BlcmF0aW9ucywgaW4gc29tZSBjYXNlcyBkaXNjbG9zaW5nIHRob3NlIHBvbGlj aWVzIChldmVuIGlmIHdlIGZpbmQgYSBnb29kDQp3YXkgdG8gZW5jb2RlIHRoZSBBQUEgdmFsaWRh dGlvbiBpbiBhIGdlbmVyaWMgZW5vdWdoIHdheSB0byBkaXN0cmlidXRlKSBtYXkNCmFjY2lkZW50 YWxseSBkaXNjbG9zZSBpbmZvcm1hdGlvbiB0aGF0IGlzIG90aGVyd2lzZSBpbnRlbmRlZCB0byBi ZSBzZWN1cmUuDQoNCk1HTFQ6IFRoYW5rcyBmb3IgcG9pbnRpbmcgb3V0IHRoaXMgaXNzdWUuIElu Zm9ybWF0aW9uIGxlYWthZ2UgaGFzIGJlZW4gYWRkZWQgaW4gdGhlIGRvY3VtZW50IGFzIHNvbWV0 aGluZyB0byBiYWxhbmNlIHdpdGggYSBkaXN0cmlidXRlZCBhY2Nlc3MgY29udHJvbCBzeXN0ZW0u DQoNCkkgd291bGQgc2VlayBjb21tZW50IGZyb20gdGhlIHNlY3VyaXR5IGRpcmVjdG9yYXRlLCBi dXQgSSBzdXNwZWN0IHdlIGRvbid0DQp3YW50IHRvIGRvIHRoaXMuDQoNCkJ1dCBpbiBzZWN0aW9u IDQuNCwgd2UgdHJ5IHRvIGRpc2N1c3MgYXZhaWxhYmlsaXR5LiAgVGhlIGZpcnN0IHNlbnRlbmNl DQppbW1lZGlhdGVseSBzYXlzICJlbmZvcmNlbWVudCBzaG91bGQgbm90IHJlbWFpbiBsb2NhbCIs IHdoaWxlIG9uZSB3YXkgdG8NCmVuYWJsZSBzZWN1cml0eSBpbiBzb21lIGVudmlyb25tZW50cyBp cyB0byBkaXN0cmlidXRlIGFuZCBzeW5jaHJvbml6ZSBwb2xpY3kNCnRvIGJlIGVuZm9yY2VkIGxv Y2FsbHkuDQoNCkl0IHRoZW4gZ29lcyBvbiB0byB0YWxrIGFib3V0IGdlbmVyYWwgYXZhaWxhYmls aXR5IG1lY2hhbmlzbXMgYW5kIHRoZW4gd2UNCmZ1cnRoZXIgZGl2ZSBpbnRvIHNlY3VyaXR5IGFn YWluc3QgRG9TLg0KDQpNR0xUOiBJIGFncmVlIHdpdGggdGhlIGNvbW1lbnQuIFRoZSBzZWN0aW9u IDQuNCBoYXMgYmVlbiByZW1vdmVkIGFuZCBhbGwgRG9TIHNwZWNpZmljIGNvbnNpZGVyYXRpb24g aGFzIGJlZW4ga2VlcHQgaW4gYSBzcGVjaWZpYyBzZWN0aW9uIHRvIG1ha2UgdGhlIGRvY3VtZW50 IG1vcmUgY29oZXJlbnQuDQo0LjQuICBJMlJTIEFBQSBTZWN1cml0eSBEb21haW4gIC4gLiAuIC4g LiAuIC4gLiAuIC4gLiAuIC4gLiAuIC4gIDEyDQogICAgICAgNC40LjEuICBBdmFpbGFibGUgSTJS UyBDb21tdW5pY2F0aW9uIENoYW5uZWwgIC4gLiAuIC4gLiAuIC4gLiAgMTINCiAgICAgICA0LjQu Mi4gIFRydXN0ZWQgSTJSUyBDb21tdW5pY2F0aW9ucyBDaGFubmVsIC4gLiAuIC4gLiAuIC4gLiAu ICAxNA0KSGF2ZSBiZWVuIHJlbW92ZWQuDQogDQpJIGJlbGlldmUgd2UgbWF5IGJlIGJvaWxpbmcg dGhlIG9jZWFuIGEgYml0IHRvIHRyeSB0byBnbyBpbnRvIHRvbyBtYW55DQpkZXRhaWxzIGFib3V0 IHRoZSBkZXNpZ24gb2Ygc2VjdXJlIEFBQSBzeXN0ZW1zLiAgSXQgc2VlbXMgYSBiaXQgb3V0IG9m IHNjb3BlDQpmb3IgSTJSUyB0byBkbyBzdWNoIHdvcms7IHdlIHNob3VsZCBkZWZlciB0byB3b3Jr IGRvbmUgZWxzZXdoZXJlIG9uIHRoZQ0KdG9waWMsIGlmIGl0IGV4aXN0cy4gIElmIGl0IGRvZXNu J3QgZXhpc3QsIEknbSBub3Qgc3VyZSB3ZSBzaG91bGQgZG8gaXQuDQoNCldoYXQgaXMgcmlnaHQg Zm9yIHVzIHRvIHBvaW50IG91dCBpcywgIklmIHdlIHVzZSBhIHJlbW90ZSBBQUEgbWVjaGFuaXNt LCBpdA0KbXVzdCBiZSByb2J1c3QgaW4gaG9zdGlsZSBlbnZpcm9ubWVudHMiLiAgRXhwYW5kIHRo YXQgYXMgeW91IHdpbGwsIGJ1dCBiZWluZw0KdG9vIHByb3NjcmlwdGl2ZSBpcyBub3Qgb3VyIGpv Yi4NCg0KTUdMVDogSSBhZ3JlZSB3aXRoIHRoZSBjb21tZW50LiBJIGhvcGUgdGhlIG5ldyB2ZXJz aW9uIG9mIHRoZSBzZWN0aW9uIGFkZHJlc3MgeW91ciBjb21tZW50Lg0KDQotLS0tLU9yaWdpbmFs IE1lc3NhZ2UtLS0tLQ0KRnJvbTogaW50ZXJuZXQtZHJhZnRzQGlldGYub3JnIFttYWlsdG86aW50 ZXJuZXQtZHJhZnRzQGlldGYub3JnXSANClNlbnQ6IEZyaWRheSwgT2N0b2JlciAwMiwgMjAxNSA5 OjUyIEFNDQpUbzogU3VzYW4gSGFyZXM7IEpvZWwgSGFscGVybjsgSm9lbCBIYWxwZXJuOyBEYW5p ZWwgTWlnYXVsdDsgRGFuaWVsIE1pZ2F1bHQ7IFN1c2FuIEhhcmVzDQpTdWJqZWN0OiBOZXcgVmVy c2lvbiBOb3RpZmljYXRpb24gZm9yIGRyYWZ0LW1nbHQtaTJycy1zZWN1cml0eS1lbnZpcm9ubWVu dC1yZXFzLTAxLnR4dA0KDQoNCkEgbmV3IHZlcnNpb24gb2YgSS1ELCBkcmFmdC1tZ2x0LWkycnMt c2VjdXJpdHktZW52aXJvbm1lbnQtcmVxcy0wMS50eHQNCmhhcyBiZWVuIHN1Y2Nlc3NmdWxseSBz dWJtaXR0ZWQgYnkgRGFuaWVsIE1pZ2F1bHQgYW5kIHBvc3RlZCB0byB0aGUgSUVURiByZXBvc2l0 b3J5Lg0KDQpOYW1lOgkJZHJhZnQtbWdsdC1pMnJzLXNlY3VyaXR5LWVudmlyb25tZW50LXJlcXMN ClJldmlzaW9uOgkwMQ0KVGl0bGU6CQlJMlJTIEVudmlyb25tZW50IFNlY3VyaXR5IFJlcXVpcmVt ZW50cw0KRG9jdW1lbnQgZGF0ZToJMjAxNS0xMC0wMg0KR3JvdXA6CQlpMnJzDQpQYWdlczoJCTE5 DQpVUkw6ICAgICAgICAgICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvaW50ZXJuZXQtZHJhZnRzL2Ry YWZ0LW1nbHQtaTJycy1zZWN1cml0eS1lbnZpcm9ubWVudC1yZXFzLTAxLnR4dA0KU3RhdHVzOiAg ICAgICAgIGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LW1nbHQtaTJycy1z ZWN1cml0eS1lbnZpcm9ubWVudC1yZXFzLw0KSHRtbGl6ZWQ6ICAgICAgIGh0dHBzOi8vdG9vbHMu aWV0Zi5vcmcvaHRtbC9kcmFmdC1tZ2x0LWkycnMtc2VjdXJpdHktZW52aXJvbm1lbnQtcmVxcy0w MQ0KRGlmZjogICAgICAgICAgIGh0dHBzOi8vd3d3LmlldGYub3JnL3JmY2RpZmY/dXJsMj1kcmFm dC1tZ2x0LWkycnMtc2VjdXJpdHktZW52aXJvbm1lbnQtcmVxcy0wMQ0KDQpBYnN0cmFjdDoNCiAg IFRoaXMgZG9jdW1lbnQgcHJvdmlkZXMgZW52aXJvbm1lbnQgc2VjdXJpdHkgcmVxdWlyZW1lbnRz IGZvciB0aGUgSTJSUw0KICAgYXJjaGl0ZWN0dXJlLiAgRW52aXJvbm1lbnQgc2VjdXJpdHkgcmVx dWlyZW1lbnRzIGFyZSBpbmRlcGVuZGVudCBvZg0KICAgdGhlIHByb3RvY29sIHVzZWQgZm9yIEky UlMuICBBcyBhIHJlc3VsdCwgdGhlIHJlcXVpcmVtZW50cyBwcm92aWRlZA0KICAgaW4gdGhpcyBk b2N1bWVudCBhcmUgaW50ZW5kZWQgdG8gcHJvdmlkZSBnb29kIHNlY3VyaXR5IHByYWN0aXNlIHNv DQogICBJMlJTIGNhbiBiZSBzZWN1cmVseSBkZXBsb3llZCBhbmQgb3BlcmF0ZWQuDQoNCiAgIFRo ZXNlIHNlY3VyaXR5IHJlcXVpcmVtZW50cyBhcmUgZGVzaWduYXRlZCBhcyBlbnZpcm9ubWVudCBz ZWN1cml0eQ0KICAgcmVxdWlyZW1lbnRzIGFzIG9wcG9zZWQgdG8gdGhlIHByb3RvY29sIHNlY3Vy aXR5IHJlcXVpcmVtZW50cw0KICAgZGVzY3JpYmVkIGluIFtJLUQuaWV0Zi1pMnJzLXByb3RvY29s LXNlY3VyaXR5LXJlcXVpcmVtZW50c10uICBUaGUNCiAgIHJlYXNvbiB0byBoYXZlIHNlcGFyYXRl IGRvY3VtZW50IGlzIHRoYXQgcHJvdG9jb2wgc2VjdXJpdHkNCiAgIHJlcXVpcmVtZW50cyBhcmUg aW50ZW5kZWQgdG8gaGVscCB0aGUgZGVzaWduIG9mIHRoZSBJMlJTIHByb3RvY29sDQogICB3aGV0 aGVyIHRoZSBlbnZpcm9ubWVudCByZXF1aXJlbWVudHMgYXJlIHJhdGhlciBpbnRlbmRlZCBmb3IN CiAgIGRlcGxveW1lbnQgb3IgaW1wbGVtZW50YXRpb25zLg0KDQogICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgDQoNCg0KUGxlYXNlIG5vdGUgdGhhdCBpdCBtYXkgdGFrZSBhIGNvdXBsZSBvZiBtaW51 dGVzIGZyb20gdGhlIHRpbWUgb2Ygc3VibWlzc2lvbiB1bnRpbCB0aGUgaHRtbGl6ZWQgdmVyc2lv biBhbmQgZGlmZiBhcmUgYXZhaWxhYmxlIGF0IHRvb2xzLmlldGYub3JnLg0KDQpUaGUgSUVURiBT ZWNyZXRhcmlhdA0KDQo= From nobody Fri Oct 2 07:46:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BFF61B2BD4; Fri, 2 Oct 2015 07:45:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.122 X-Spam-Level: * X-Spam-Status: No, score=1.122 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MANY_SPAN_IN_TEXT=2.399, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ju-iIHgPqWrx; Fri, 2 Oct 2015 07:45:54 -0700 (PDT) Received: from mail-wi0-x229.google.com (mail-wi0-x229.google.com [IPv6:2a00:1450:400c:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2AE71A6F61; Fri, 2 Oct 2015 07:45:53 -0700 (PDT) Received: by wiclk2 with SMTP id lk2so37260071wic.0; Fri, 02 Oct 2015 07:45:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=SSLBZ680a2iYMcPAcULsKrPBxsMQWwVm5tuMf9ymr5Q=; b=rFj6SAkyfLQ4eEIYsAqqoKkvpPWgU3ICAO50x1IpoEALAiUXg8KURNHeZYS0Cs9IM3 4TpLm2AnAy6Pjlps9QItjoEft96cBX8tHrOjoVlRwPjFYXi0NIAbWIuhsLf+iFYBsJ2w MuWukFUr27tusxalWtTZOtRr2obg1ID+3GeagG/Kgyx7W4FMK2ocYT/52TrodJqkYtDQ XehHOD1bBQbLq0TAnTFwmC0wGUkya8cvmJwFomndH9RfLXhuMOYRfE7PTrcvHbo4aZcY XNEYHbGEzfxv5ZnBPromPcKAMyNi0lluV9AyWYObATUk2VAEIpIHs99LPXtW0vyl3oya KlTw== MIME-Version: 1.0 X-Received: by 10.180.23.134 with SMTP id m6mr5096215wif.32.1443797152387; Fri, 02 Oct 2015 07:45:52 -0700 (PDT) Sender: mglt.ietf@gmail.com Received: by 10.194.88.98 with HTTP; Fri, 2 Oct 2015 07:45:52 -0700 (PDT) In-Reply-To: <004201d0e5e0$280537d0$780fa770$@ndzh.com> References: <005101d0e4d8$fb07ddd0$f1179970$@ndzh.com> <4A95BA014132FF49AE685FAB4B9F17F657D1D986@dfweml701-chm> <004201d0e5e0$280537d0$780fa770$@ndzh.com> Date: Fri, 2 Oct 2015 10:45:52 -0400 X-Google-Sender-Auth: bN38larIUzZAsmeLrnW6H_91mMA Message-ID: From: Daniel Migault To: Susan Hares Content-Type: multipart/alternative; boundary=e89a8f6430cc655a690521203808 Archived-At: Cc: Jeffrey Haas , i2rs@ietf.org, Netconf , Linda Dunbar Subject: Re: [i2rs] 1 week extension to WG Adoption call for draft-mglt-i2rs-security-environments X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 14:45:57 -0000 --e89a8f6430cc655a690521203808 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi Linda, Thank you for your feed back. We considered them - with all other feed backs we receievd. We beleive the new version address all of them. Feel free to let us know if we missed something. Here is a small recap of the modifications performed to address your comments. BR, The co-authors Comments / Responses for Linda's comments: - Communication channel between I2RS client and Agent (and the channel between I2RS client and applications): The channel can be o Via physical Private network (e.g. within a secured direct connect within one site), o within one administrative domain, via virtual private network o Secured connection, such as TLS or IPSec o Public internet o .. MGLT: Thank for the clarification. I think that our REQ1 catches these aspects as a way to isolate the I2RS plane from other. For communications themselves, this version mostly redirects to hares-securtity I-D.hares-i2rs-auth-trans. Please let me know if you think we do not address your purpose. - Authentication & Authorization o the authentication & authorization requirement for different communication channels can be different. Therefore, should have separate sections to address specific requirement for each communication channels between I2RS agent <-> clients (and client <-> applications) MGLT: Thank you for the comment. We have re-written the section 4 and I hope the current section 4 on access control considers these aspects with the following sections: 4.1. I2RS Access Control architecture . . . . . . . . . . . . 8 4.2. I2RS Agent Access Control policies . . . . . . . . . . . 12 4.3. I2RS Client Access Control policies . . . . . . . . . . . 13 4.4. Application and Access Control policies . . . . . . . . . 14 The current Section 4 of the draft already has very good description on the subject. I think 4.4.1 and 4.42 can be separated out of the section. MGLT: Thank you for pointing out the split. the section 4.4 has been removed and outsourced to the I2RS Access Control and in the draft-ietf-ares-protocol security requirements draft. - Encryption for the actual content between Client and Agent MGLT: Similarly, we have moved to the I2RS Access Control and in the draft-ietf-ares-protocol security requirements - DoS Design requirement (currently in Section 5.2.1) - Management of conflict with other plane (e.g. the management plane, multi-headed control, which has been discussed extensively in ephemeral draft) MGLT: The reference to the draft has been added. However, the recommendations were mostly pointing to the text from the i2rs architecture document. I think the draft should be organized from the aspects of the security to I2RS as suggested above. Here are some detailed questions and comments to the requirements listed in the document: Section 1: The second paragraph stated the security recommendations must =C3=A2=E2=82= =AC=C5=93specifying where security functions may be hosted=C3=A2=E2=82=AC=C2=9D. First of all I= don=C3=A2=E2=82=AC=E2=84=A2t see the draft address this aspect. Second, I think =C3=A2=E2=82=AC=C5=93where sec= urity functions are hosted=C3=A2=E2=82=AC=C2=9D is orthogonal to =C3=A2=E2=82=AC=C5=93I2RS = security=C3=A2=E2=82=AC=C2=9D . MGLT: I agree with your comment and we have removed the text from the section. Section 3: what does isolating two planes mean? does it mean they have different security requirement/issues? Or does it mean they need different protocols? MGLT: Each plane has a specific scope of function. What are the key differences with regard to the security requirements for = I2RS plane and for management plane? Section 3.1 describes the interaction between I2RS plane and management plane. But I see the security requirement for the management plane is similar to I2RS plane . If you think that they are very different, can you elaborate more? MGLT: Thanks for the remark. Here is the text we added. Feel free to us know is you think it is not clear enough. "The I2RS plane purpose is to provide a standard programmatic interface of the routing system resources to network oriented applications. Control plane and forwarding planes are related to routing protocols, and I2RS is based on top of those. The management plane is usually vendor specific, provides a broader control over the networking equipment such as system service. Given its associated privileges it is expected to be reserved to highly trusted users like network administrators." Section 3.4 has title =C3=A2=E2=82=AC=C5=93Recommendations=C3=A2=E2=82=AC= =C2=9D, but the content are all requirements. Why not name the section =C3=A2=E2=82=AC=C5=93Requirement=C3= =A2=E2=82=AC=C2=9D? MGLT: I prefer "Recommendation" at least for this section, as the way they are implemented and enforce vary widely according to the environment. However, I am open for discussion, and it could be moved to Requirements in the future. REQ 2: Does it that a different IP address than the one used by the management system? MGLT: Yes, we recommend that having a dedicated IP address or dedicated NIC to enforce isolation. How is REQ 22 different from REQ 21? MGLT: Agree, they are very closed. We have outsourced these requirements to the transport requirements. REQ 27 is hard to enforce. How about say something like "shouldn't send any information beyond what have been defined by the I2RS data model"? MGLT: Agree. This is much better. However, we have outsourced this requirements to the transport requirements. REQ 30: simply controlling the resource can hardly prevent DoS. Malicious client can occupy the resource while the valid one can't access. MGLT: This is true, however, what I meant here was to control resource so one tenant does not over consume resources. On Wed, Sep 2, 2015 at 8:33 PM, Susan Hares wrote: > Linda > > > > We will include closed environments in the revised document. > > > > Sue > > > > *From:* i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Linda Dunbar > *Sent:* Wednesday, September 02, 2015 12:54 PM > *To:* Susan Hares; i2rs@ietf.org > *Cc:* 'Jeffrey Haas'; 'Netconf' > *Subject:* Re: [i2rs] 1 week extension to WG Adoption call for > draft-mglt-i2rs-security-environments > > > > Can the authors address my comments and the suggested changes to add a > section on security threats and the associated requirements with Closed > Environment? > > > > Closed environment deployment can easily give people a sense of secure > because the links between I2RS Client and I2RS Agent are guided by a > physical =E2=80=9CWall=E2=80=9D. The false sense of =E2=80=9CSecure=E2= =80=9D is actually more dangerous > because it can easily make the deployment miss the crucial security > procedure. > > > > Therefore, I think it is important to have a dedicated section on securit= y > threats and requirement for the Closed Environment. > > > > Attached is my suggested text. > > > > Linda > > > > *From:* i2rs [mailto:i2rs-bounces@ietf.org ] *On > Behalf Of *Susan Hares > *Sent:* Tuesday, September 01, 2015 12:10 PM > *To:* i2rs@ietf.org > *Cc:* 'Jeffrey Haas'; 'Netconf' > *Subject:* [i2rs] 1 week extension to WG Adoption call for > draft-mglt-i2rs-security-environments > > > > This is a 1 week extension to the WG adoption call for > draft-mglt-i2rs-security. Due error in the initial call email, the exact > text to review was unclear ( > https://mailarchive.ietf.org/arch/msg/i2rs/wwv1o8_mwurB05dN4D2yjr9tNFg). > > > > In reviewing the email, it appears that the authors have agree to change > or delete most of the concerns except for combining this draft with > draft-hares-i2rs-auth-trans-04.txt. The chairs have decided to adopt bo= th > drafts as WG drafts, and make a subsequent WG calls to determine if the > drafts should be combined. > > > > This draft is at: > > > > https://www.ietf.org/id/draft-mglt-i2rs-security-environment-reqs-00.txt > > > > Daniel has indicated several changes on the list. If you would like to > see a revised draft for further comments, please indicate this on the lis= t. > > > > Sue Hares and Jeff Haas > > I2RS co-chairs > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > --e89a8f6430cc655a690521203808 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi Linda,

Thank you for your = feed back. We considered them - with all other feed backs we receievd. We b= eleive the new version address all of them. Feel free to let us know if we = missed something. Here is a small recap of the modifications performed to a= ddress your comments.

BR,
The co-authors

Comments / Responses for Linda's comments:

-=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 Communication channel between I2RS client and Agent (and the channel between I2RS client and applications): The channel can be

o=C2=A0=C2=A0 Via phy= sical Private network (e.g. within a secured direct connect within one site),

o=C2=A0=C2=A0 within = one administrative domain,=C2=A0 via vi= rtual private network

o=C2=A0=C2=A0 Secured connection, such as TLS or IPSec

o=C2=A0=C2=A0 Public = internet

o=C2=A0=C2=A0 ..

=C2=A0

MGLT: Thank for the clarification.=C2=A0 I think that our REQ1 catches these aspects as a way to isolate the I2RS plane from other. For communications themselve= s, this version mostly redirects to hares-securtity=C2=A0 I-D.hares-i2rs-auth-trans. Please let me know if you think we do not address your purpose.

=C2=A0

-=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 Authentication & Authorization

=C2=A0

o=C2=A0=C2=A0 the authentication & authorization requirement for different communication channels can be different. Therefore, should have separate sections to addr= ess specific requirement=C2=A0 for each communication channels between I2RS agent <-> clients (and client <-> applications)

=C2=A0

MGLT: Thank you for the comment. We have re-written the secti= on 4 and I hope the current section 4 on access control considers these aspect= s with the following sections:

=C2=A0=C2=A0=C2=A0=C2=A0= 4.1.=C2=A0 I2RS Access Cont= rol architecture=C2=A0 . . . . . . = . . . . . .=C2=A0=C2=A0 8

=C2=A0=C2=A0=C2=A0=C2=A0 4.2.=C2=A0 I2RS Agent Access Co= ntrol policies=C2=A0 . . . . . . . = . . . .=C2=A0 12

=C2=A0=C2=A0=C2=A0=C2=A0 4.3.=C2=A0 I2RS Client Access C= ontrol policies . . . . . . . . . . .=C2=A0 13

=C2=A0=C2=A0=C2=A0 =C2=A04.4.=C2=A0 Application and Access Control policies . . . . . . . . .=C2=A0 14

=C2=A0

The current Section 4 of the draft already has very good description on the subject. I think 4.4.1 and 4.42 can be separated out of = the section.

=C2=A0

MGLT: Thank you for pointing out the split. the section 4.4 has been removed and outsourced to the I2RS Access Control and in the draft-ietf-ares-protocol security requirements draft.

=C2=A0

-=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 Encryption for the actual content between Client and Agent

=C2=A0

MGLT: Similarly, we have moved to the=C2=A0 I2RS Access Control and in the draft-ietf-ares-protocol security requirements

=C2=A0

-=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 DoS Design requirement (currently in Section 5.2.1)

-=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0 Management of conflict with other plane (e.g. the management plane, multi-headed control, which has been discussed extensively in ephemeral dra= ft)

=C2=A0

MGLT: The reference to the draft has been added. However, the recommendations were mostly pointing to the text from the i2rs architec= ture document.

=C2=A0

=C2=A0

I think the draft should be organized from the aspects of the security to I2RS as suggested above. Here are some detailed questions a= nd comments to the requirements listed in the document:

=C2=A0

Section 1:

=C2=A0

The second paragraph stated the security recommendations must =C3=A2=E2=82=AC=C5=93specifying where security functions may be hosted= =C3=A2=E2=82=AC=C2=9D. = First of all I don=C3=A2=E2=82= =AC=E2=84=A2t see the draft address this aspect. Second, I think=C2=A0=C2=A0 =C3=A2=E2=82=AC=C5=93w= here security functions are hosted=C3=A2=E2=82=AC=C2=9D is orthogonal to =C3=A2= =E2=82=AC=C5=93I2RS security=C3=A2=E2=82=AC=C2=9D .

=C2=A0

MGLT: I agree with your comment and we have removed the text from the section.

=C2=A0

Section 3:

=C2=A0

what does isolating two planes mean? does it mean they have different security requirement/issues? Or does it mean they need diffe= rent protocols?

=C2=A0

MGLT: Each plane has a specific scope of function.=C2=A0

=C2=A0

What are the key differences with regard to the security requirements for=C2=A0 I2RS plane a= nd for management plane?=C2=A0 Section 3.1= describes the interaction between I2RS plane and management plane. But I see the secu= rity requirement for the management plane is similar to I2RS plane . If you thin= k that they are very different, can you elaborate more?

=C2=A0

MGLT:=C2=A0 Thanks fo= r the remark. Here is the text we added. Feel free to us know is you think it= is not clear enough.

"The I2RS plane purpose is to provide a standard programmatic interface of the routing system resources to network oriented applications. Control plane and forwarding planes are related to routing protocols, and I2RS is based on top of those. The management plane is usual= ly vendor specific, provides a broader control over the networking equipment s= uch as system service. Given its associated privileges it is expected to be reserved to highly trusted users like network administrators."

=C2=A0

=C2=A0

Section 3.4 has title =C3=A2=E2=82=AC=C5=93Recommendations=C3= =A2=E2=82=AC=C2=9D, but= the content are all requirements. Why not name the section =C3=A2=E2=82=AC=C5=93Requirement=C3=A2=E2=82=AC=C2=9D?

MGLT: I prefer "Recommendation" at least for this section, as the way they are implemented and enforce vary widely accor= ding to the environment. However, I am open for discussion, and it could be move= d to Requirements in the future.

=C2=A0

REQ 2: Does it that a different IP address than the one used by the management system?

=C2=A0

MGLT: Yes, we recommend that having a dedicated IP address or dedicated NIC to enforce isolation.=C2=A0

=C2=A0

How is REQ 22 different from REQ 21?

=C2=A0

MGLT: Agree, they are very closed. We have outsourced these requirements to the transport requirements.

=C2=A0

REQ 27 is hard to enforce. How about say something like "shouldn't send any information beyond what have been defined by t= he I2RS data model"?

=C2=A0

MGLT: Agree. This is much better. However, we have outsourced this requirements to the transport requirements.

=C2=A0

REQ 30: simply controlling the resource can hardly prevent DoS. Malicious client can occupy the resource while the valid one c= an't access.

MGLT:

This is true, however, what I meant here was to control resource so one tenant does not over consume resources.=C2=A0



On Wed, Sep 2, 2015 at 8:33 PM,= Susan Hares <shares@ndzh.com> wrote:

Linda

<co-author hat on&= gt;

We will include closed environments in the revised document. =

<= /u>=C2=A0

Sue

=C2=A0

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Linda Dunbar
Sent: Wednesday, September 02, 201= 5 12:54 PM
To: Susan Hares; i2rs@ietf.org
Cc: 'Jeffrey Haas'; '= Netconf'
Subject: Re: [i2rs] 1 week extension to WG Adoption = call for draft-mglt-i2rs-security-environments

=C2=A0<= /p>

Can the authors add= ress my comments and the suggested changes to add a section on security thr= eats and the associated requirements =C2=A0with Closed Environment?<= u>

=C2=A0

Closed environment deployment can easily give people a sense of secure = because the links between I2RS Client and I2RS Agent are guided by a physic= al =E2=80=9CWall=E2=80=9D.=C2=A0 The false sense of =E2=80=9CSecure=E2=80= =9D is actually more dangerous because it can easily make the deployment mi= ss the crucial security procedure.

=C2=A0

Therefore, I think it is imp= ortant to have a dedicated section on security threats and requirement for = the Closed Environment.

=C2=A0

Attached is my suggested text. <= u>

=C2=A0

Linda

=C2=A0

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, September 01, 2015 1= 2:10 PM
To: i2= rs@ietf.org
Cc: 'Jeffrey Haas'; 'Netconf'
= Subject: [i2rs] 1 week extension to WG Adoption call for draft-mglt-= i2rs-security-environments

=C2=A0

This is a 1 week = extension to the WG adoption call for draft-mglt-i2rs-security.=C2=A0 Due e= rror in the initial call email, the exact text to review was unclear ( https://mailarchive.ietf.org/arch/msg/i2rs/wwv1o8_mwu= rB05dN4D2yjr9tNFg).

=C2= =A0

In reviewing the email, it appears tha= t the authors have agree to change or delete most of the concerns except fo= r combining this draft with draft-hares-i2rs-auth-trans-04.txt. =C2=A0=C2= =A0The chairs have decided to adopt both drafts as WG drafts, and make a su= bsequent WG calls to determine if the drafts should be combined. =

=C2=A0

This draft is at: =C2=A0

=C2=A0<= u>

https:/= /www.ietf.org/id/draft-mglt-i2rs-security-environment-reqs-00.txt

=C2=A0

Daniel has indicated several changes on the list.=C2=A0 If you would= like to see a revised draft for further comments, please indicate this on = the list.

=C2=A0

=

Sue Hares and Jeff Haas

I2RS co-chairs

=C2= =A0= =C2=A0


_________= ______________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


--e89a8f6430cc655a690521203808-- From nobody Fri Oct 2 07:46:50 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A42A1B2BCD for ; Fri, 2 Oct 2015 07:46:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.277 X-Spam-Level: X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5a66agtj8jSo for ; Fri, 2 Oct 2015 07:46:47 -0700 (PDT) Received: from mail-wi0-x234.google.com (mail-wi0-x234.google.com [IPv6:2a00:1450:400c:c05::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A07A1B2BC1 for ; Fri, 2 Oct 2015 07:46:47 -0700 (PDT) Received: by wiclk2 with SMTP id lk2so37298622wic.0 for ; Fri, 02 Oct 2015 07:46:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=ExI+Rpgp1KquhbEkqT8taJK4gq8w0qonUUviXmA7RWc=; b=DE9se0yJSZd0n+CnWnUVe98X1FCF5nWkFzOw7r9TVNwZnFM9WnLZl7wG5BkreaorVO rk3aDJToCFPtVnuS4tQh5lBjrnZPLKxOe/8mNCTo+a5cUvFThT8GOcDMm7lKlERFnV8B Zblez+tVlv7uSNeyaXSn9saTobmdrFrvegZyGMTHKekf9yz/jvUL74Lds9vZNOZWm6jd SwE0rYkoHN+SqMgVxSre/PfMU+eV3rhFr0qqGMFSuZHYI5E5nienNeZmzMs3Pd08/Gna ivYeKLAc9+Wh1MTyDWcbi7ZEfrw3cRA/83wfp92lXnln/QqnZaHwCjlgmNo2aYNk3vVZ jR1w== MIME-Version: 1.0 X-Received: by 10.180.23.134 with SMTP id m6mr5100846wif.32.1443797205792; Fri, 02 Oct 2015 07:46:45 -0700 (PDT) Sender: mglt.ietf@gmail.com Received: by 10.194.88.98 with HTTP; Fri, 2 Oct 2015 07:46:45 -0700 (PDT) In-Reply-To: References: <20150827203209.GB19039@pfrc.org> <01cc01d0e10a$7a0d29f0$6e277dd0$@ndzh.com> <20150828070748.GB89759@elstar.local> <1896B2E9-4E6B-4575-B589-C640C549E7FF@lucidvision.com> Date: Fri, 2 Oct 2015 10:46:45 -0400 X-Google-Sender-Auth: nbNzJDrNEKjYiJoZ5WgrVWJ1D5o Message-ID: From: Daniel Migault To: Nadeau Thomas Content-Type: multipart/alternative; boundary=e89a8f6430cc943d900521203b1d Archived-At: Cc: Jeffrey Haas , i2rs@ietf.org, Juergen Schoenwaelder , Susan Hares Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs, REQ 3 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 14:46:49 -0000 --e89a8f6430cc943d900521203b1d Content-Type: text/plain; charset=UTF-8 Hi, Thank you for raising this issue. I confirm the new version has removed this requirements. BR, Daniel On Fri, Aug 28, 2015 at 9:58 PM, Daniel Migault wrote: > Hi, > > This has been removed. I agree that if that if it is not implementable, we > should not have it (even as a recommendation), Thanks for the feed back. I > am catching up with all received comments. > > BR, > Daniel > > On Fri, Aug 28, 2015 at 9:42 AM, Nadeau Thomas > wrote: > >> +1 >> >> > On Aug 28, 2015:3:07 AM, at 3:07 AM, Juergen Schoenwaelder < >> j.schoenwaelder@jacobs-university.de> wrote: >> > >> > On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote: >> >> Jeff: >> >> >> >> I agree it is a goal rather than an absolute. My first discussions >> with >> >> Daniel pointed this out. Do you think moving it back to >> >> >> >> >> >> REQ 3: The I2RS Agent validates data to try to insure that >> >> injecting the Information does not create a deadlock with any >> other >> >> system >> >> or a routing loop or prevent the control plane from converging. >> >> (This is a goal for the system, and it should keep track of when >> >> Injecting information does cause deadlocks, routing loops, or >> >> retards the routing convergence process.). >> >> >> > >> > I already pointed out on July 21 that this requirement is not >> > implementable. Adding hand-waving text to it does not help, so >> > I am in favour of removing it. >> > >> > /js >> > >> > -- >> > Juergen Schoenwaelder Jacobs University Bremen gGmbH >> > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany >> > Fax: +49 421 200 3103 >> > >> > _______________________________________________ >> > i2rs mailing list >> > i2rs@ietf.org >> > https://www.ietf.org/mailman/listinfo/i2rs >> >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs >> > > --e89a8f6430cc943d900521203b1d Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi,

Thank you for raising thi= s issue. I confirm the new version has removed this requirements.

BR,
Daniel

On Fri, Aug 28, 2015 at 9:58 PM, Daniel Migault <daniel.migault@ericsson.com> wrote:
Hi,

This has been removed.= I agree that if that if it is not implementable, we should not have it (ev= en as a recommendation), Thanks for the feed back. I am catching up with al= l received comments.

BR,
Daniel

On Fri, Aug 28, 2015 at 9:42 AM, Nadeau Thomas <tnadeau= @lucidvision.com> wrote:
+1=

> On Aug 28, 2015:3:07 AM, at 3:07 AM, Juergen Schoenwaelder <j.schoen= waelder@jacobs-university.de> wrote:
>
> On Thu, Aug 27, 2015 at 04:53:50PM -0400, Susan Hares wrote:
>> Jeff:
>>
>> I agree it is a goal rather than an absolute.=C2=A0 My first discu= ssions with
>> Daniel pointed this out.=C2=A0 Do you think moving it back to
>>
>>
>>=C2=A0 =C2=A0REQ 3:=C2=A0 The I2RS Agent validates data to try to i= nsure that
>>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0injecting the Information does no= t create a deadlock with any other
>> system
>>=C2=A0 =C2=A0 =C2=A0 =C2=A0 or a routing loop or prevent the contro= l plane from converging.
>>=C2=A0 =C2=A0 =C2=A0 =C2=A0(This is a goal for the system, and it s= hould keep track of when
>>=C2=A0 =C2=A0 =C2=A0 =C2=A0 Injecting information does cause deadlo= cks, routing loops, or
>>=C2=A0 =C2=A0 =C2=A0 =C2=A0 retards the routing convergence process= .).
>>
>
> I already pointed out on July 21 that this requirement is not
> implementable. Adding hand-waving text to it does not help, so
> I am in favour of removing it.
>
> /js
>
> --
> Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs U= niversity Bremen gGmbH
> Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0C= ampus Ring 1 | 28759 Bremen | Germany
> Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0<http://www.jacobs-university.de/>
>
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


--e89a8f6430cc943d900521203b1d-- From nobody Fri Oct 2 07:49:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 519C21B2BC8 for ; Fri, 2 Oct 2015 07:49:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.277 X-Spam-Level: X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r6QCDjzBRe_X for ; Fri, 2 Oct 2015 07:49:14 -0700 (PDT) Received: from mail-wi0-x229.google.com (mail-wi0-x229.google.com [IPv6:2a00:1450:400c:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 660871A6F05 for ; Fri, 2 Oct 2015 07:49:14 -0700 (PDT) Received: by wicfx3 with SMTP id fx3so34325489wic.0 for ; Fri, 02 Oct 2015 07:49:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=CtMVfLsGboXCaE7vQE8ttfUjMP2gZmbUfZuK6wHQDTo=; b=aUXTS+ozdf1iplrF/8KM7Fjz/B/ZI0RWqz8V1PDc/yLZ11s9cUf7zKUsXgoruSO5Xa M9ayAE1qsmSESq8/3Vlux+ZKQfz675fSGhbhTU90unzHnbq75K7PN7iDf/SttrpIqFeU 7IYOPx2p0chob4yPxgKGUiByLqTuyH0V9dtkcGasOp91SwBYCFNFEWkzYzX1xDYqikPd 8II4JiAgF8O9Bv/RGP9wE5uI/aDh47PVg6NMKZK2TWX0Ixey6nWf6W6scbY9Qzj4VPXn QOu8JWIoVY+v+gaToJ08BpRLsu+5DHUYDIMOz23UJ4lVzsrznVk9FT+Q88yR19ktIgHD atmg== MIME-Version: 1.0 X-Received: by 10.194.80.71 with SMTP id p7mr15865651wjx.83.1443797353005; Fri, 02 Oct 2015 07:49:13 -0700 (PDT) Sender: mglt.ietf@gmail.com Received: by 10.194.88.98 with HTTP; Fri, 2 Oct 2015 07:49:12 -0700 (PDT) In-Reply-To: <20150827213344.GF19039@pfrc.org> References: <20150827213344.GF19039@pfrc.org> Date: Fri, 2 Oct 2015 10:49:12 -0400 X-Google-Sender-Auth: wQOZwG5ng2sqToUGz8UNcZn9xJs Message-ID: From: Daniel Migault To: Jeffrey Haas Content-Type: multipart/alternative; boundary=047d7bb04da25a8d370521204471 Archived-At: Cc: i2rs@ietf.org Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs-00 Thoughts on AAA X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 14:49:17 -0000 --047d7bb04da25a8d370521204471 Content-Type: text/plain; charset=UTF-8 Hi Jeffrey, Thank you for your feed back. We considered them - with all other feed backs we received. We believe the new version address all of them. Feel free to let us know if we missed something. Here is a small recap of the modifications performed to address your comments. BR, The co-authors I have some contrary thoughts on the AAA section of this document. MGLT: The AAA section has completely be re-written. Section 4.1 tries to describe requirements wherein the I2RS Clients may request for subsets of AAA policy to be exported to the Client so that the client may enforce them. While this seems like a nice way to scale the operations, in some cases disclosing those policies (even if we find a good way to encode the AAA validation in a generic enough way to distribute) may accidentally disclose information that is otherwise intended to be secure. MGLT: Thanks for pointing out this issue. Information leakage has been added in the document as something to balance with a distributed access control system. I would seek comment from the security directorate, but I suspect we don't want to do this. But in section 4.4, we try to discuss availability. The first sentence immediately says "enforcement should not remain local", while one way to enable security in some environments is to distribute and synchronize policy to be enforced locally. It then goes on to talk about general availability mechanisms and then we further dive into security against DoS. MGLT: I agree with the comment. The section 4.4 has been removed and all DoS specific consideration has been keept in a specific section to make the document more coherent. 4.4. I2RS AAA Security Domain . . . . . . . . . . . . . . . . 12 4.4.1. Available I2RS Communication Channel . . . . . . . . 12 4.4.2. Trusted I2RS Communications Channel . . . . . . . . . 14 Have been removed. I believe we may be boiling the ocean a bit to try to go into too many details about the design of secure AAA systems. It seems a bit out of scope for I2RS to do such work; we should defer to work done elsewhere on the topic, if it exists. If it doesn't exist, I'm not sure we should do it. What is right for us to point out is, "If we use a remote AAA mechanism, it must be robust in hostile environments". Expand that as you will, but being too proscriptive is not our job. MGLT: I agree with the comment. I hope the new version of the section address your comment. On Thu, Aug 27, 2015 at 5:33 PM, Jeffrey Haas wrote: > I have some contrary thoughts on the AAA section of this document. > > Section 4.1 tries to describe requirements wherein the I2RS Clients may > request for subsets of AAA policy to be exported to the Client so that the > client may enforce them. While this seems like a nice way to scale the > operations, in some cases disclosing those policies (even if we find a good > way to encode the AAA validation in a generic enough way to distribute) may > accidentally disclose information that is otherwise intended to be secure. > > I would seek comment from the security directorate, but I suspect we don't > want to do this. > > But in section 4.4, we try to discuss availability. The first sentence > immediately says "enforcement should not remain local", while one way to > enable security in some environments is to distribute and synchronize > policy > to be enforced locally. > > It then goes on to talk about general availability mechanisms and then we > further dive into security against DoS. > > I believe we may be boiling the ocean a bit to try to go into too many > details about the design of secure AAA systems. It seems a bit out of > scope > for I2RS to do such work; we should defer to work done elsewhere on the > topic, if it exists. If it doesn't exist, I'm not sure we should do it. > > What is right for us to point out is, "If we use a remote AAA mechanism, it > must be robust in hostile environments". Expand that as you will, but > being > too proscriptive is not our job. > > -- Jeff > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > --047d7bb04da25a8d370521204471 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi Jeffrey,

Thank you for your feed back. We consi= dered them - with all other feed backs we received. We believe the new vers= ion address all of them. Feel free to let us know if we missed something. H= ere is a small recap of the modifications performed to address your comment= s.

BR,
The co-authors

I have some contrary thoughts on the= AAA section of this document.

MGLT: The AAA section has completely = be re-written.

Section 4.1 tries to describe requirements wherein t= he I2RS Clients may request for subsets of AAA policy to be exported to the= Client so that the client may enforce them.=C2=A0 While this seems like a = nice way to scale the operations, in some cases disclosing those policies (= even if we find a good way to encode the AAA validation in a generic enough= way to distribute) may accidentally disclose information that is otherwise= intended to be secure.

MGLT: Thanks for pointing out this issue. In= formation leakage has been added in the document as something to balance wi= th a distributed access control system.

I would seek comment from th= e security directorate, but I suspect we don't want to do this.

= But in section 4.4, we try to discuss availability.=C2=A0 The first sentenc= e immediately says "enforcement should not remain local", while o= ne way to enable security in some environments is to distribute and synchro= nize policy to be enforced locally.

It then goes on to talk about ge= neral availability mechanisms and then we further dive into security agains= t DoS.

MGLT: I agree with the comment. The section 4.4 has been remo= ved and all DoS specific consideration has been keept in a specific section= to make the document more coherent.
4.4.=C2=A0 I2RS AAA Security Domain= =C2=A0 . . . . . . . . . . . . . . . .=C2=A0 12
=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0 4.4.1.=C2=A0 Available I2RS Communication Channel=C2=A0 . . . = . . . . .=C2=A0 12
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 4.4.2.=C2=A0 Tru= sted I2RS Communications Channel . . . . . . . . .=C2=A0 14 Have been remov= ed.
=C2=A0
I believe we may be boiling the ocean a bit to try to go i= nto too many details about the design of secure AAA systems.=C2=A0 It seems= a bit out of scope for I2RS to do such work; we should defer to work done = elsewhere on the topic, if it exists.=C2=A0 If it doesn't exist, I'= m not sure we should do it.

What is right for us to point out is, &q= uot;If we use a remote AAA mechanism, it must be robust in hostile environm= ents".=C2=A0 Expand that as you will, but being too proscriptive is no= t our job.

MGLT: I agree with the comment. I hope the new version of= the section address your comment.



On Thu, Aug 27, 2015 at 5:33 PM, Jeffrey= Haas <jhaas@pfrc.org> wrote:
I have some contrary thoughts on the AAA section of this document.

Section 4.1 tries to describe requirements wherein the I2RS Clients may
request for subsets of AAA policy to be exported to the Client so that the<= br> client may enforce them.=C2=A0 While this seems like a nice way to scale th= e
operations, in some cases disclosing those policies (even if we find a good=
way to encode the AAA validation in a generic enough way to distribute) may=
accidentally disclose information that is otherwise intended to be secure.<= br>
I would seek comment from the security directorate, but I suspect we don= 9;t
want to do this.

But in section 4.4, we try to discuss availability.=C2=A0 The first sentenc= e
immediately says "enforcement should not remain local", while one= way to
enable security in some environments is to distribute and synchronize polic= y
to be enforced locally.

It then goes on to talk about general availability mechanisms and then we further dive into security against DoS.

I believe we may be boiling the ocean a bit to try to go into too many
details about the design of secure AAA systems.=C2=A0 It seems a bit out of= scope
for I2RS to do such work; we should defer to work done elsewhere on the
topic, if it exists.=C2=A0 If it doesn't exist, I'm not sure we sho= uld do it.

What is right for us to point out is, "If we use a remote AAA mechanis= m, it
must be robust in hostile environments".=C2=A0 Expand that as you will= , but being
too proscriptive is not our job.

-- Jeff

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--047d7bb04da25a8d370521204471-- From nobody Fri Oct 2 12:09:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB6BD1A6FBC; Fri, 2 Oct 2015 12:08:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HSY2AUEWbMQH; Fri, 2 Oct 2015 12:08:56 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 949831A6F63; Fri, 2 Oct 2015 12:08:56 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: X-Test-IDTracker: no X-IETF-IDTracker: 6.4.1 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> Date: Fri, 02 Oct 2015 12:08:56 -0700 Archived-At: Cc: i2rs@ietf.org Subject: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 02 Oct 2015 19:08:57 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Interface to the Routing System Working Group of the IETF. Title : Requirements for Subscription to YANG Datastores Authors : Eric Voit Alexander Clemm Alberto Gonzalez Prieto Filename : draft-ietf-i2rs-pub-sub-requirements-03.txt Pages : 17 Date : 2015-09-28 Abstract: This document provides requirements for a service that allows client applications to subscribe to updates of a YANG datastore. Based on criteria negotiated as part of a subscription, updates will be pushed to targeted recipients. Such a capability eliminates the need for periodic polling of YANG datastores by applications and fills a functional gap in existing YANG transports (i.e. Netconf and Restconf). Such a service can be summarized as a "pub/sub" service for YANG datastore updates. Beyond a set of basic requirements for the service, various refinements are addressed. These refinements include: periodicity of object updates, filtering out of objects underneath a requested a subtree, and delivery QoS guarantees. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-ietf-i2rs-pub-sub-requirements-03 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-pub-sub-requirements-03 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Mon Oct 5 06:58:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 182911ACDF1 for ; Mon, 5 Oct 2015 06:58:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.902 X-Spam-Level: X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZIBGF7g_Ac0i for ; Mon, 5 Oct 2015 06:58:35 -0700 (PDT) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0133.outbound.protection.outlook.com [207.46.100.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73F421ACDE6 for ; Mon, 5 Oct 2015 06:58:35 -0700 (PDT) Received: from BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) by BLUPR0501MB1713.namprd05.prod.outlook.com (10.163.120.16) with Microsoft SMTP Server (TLS) id 15.1.286.20; Mon, 5 Oct 2015 13:58:33 +0000 Received: from BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) by BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) with mapi id 15.01.0286.019; Mon, 5 Oct 2015 13:58:33 +0000 From: "Jeffrey (Zhaohui) Zhang" To: "i2rs@ietf.org" Thread-Topic: RIB Info/Data model questions: nexthop-id Thread-Index: AdD/dCtXKfJtuMrwR0qqTgDiDr9MgA== Date: Mon, 5 Oct 2015 13:58:32 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; BLUPR0501MB1713; 5:B9+SgDb8T5uI5JlMpGryLw+L40heRTTDRPMst4hjr4g/lAZcxYZaAYFNe0YwDA0yQnPRLsuQu7cPaRQCHfWVtyySvfgcJtrAdnwn+GZEsLWeQC5mCdb8mrTQ8dvNMmZLluv00zgOiG7qTZfHz69kxQ==; 24:KxVn29QJkQke1ozwVbWbnPPIXWorPqRHpxAPGd237YNzw3zm7T6Ce9CSo7TM45n5X99wVxwDkD+W6MBRKYnNOJ22CkPPabr56X4vOhP2sK8=; 20:4cMXo10T/3yt61OQnO6OIoFMDkMApL1QDkWYIMlVebRS7TBWnJjjMec21Eex7xHbS14JEL2tfmp6N1jpgCM3Xw== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR0501MB1713; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(5005006)(520078)(8121501046)(3002001); SRVR:BLUPR0501MB1713; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0501MB1713; x-forefront-prvs: 07200C0526 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(189002)(199003)(11100500001)(2351001)(46102003)(102836002)(50986999)(66066001)(5001830100001)(62966003)(54356999)(77156002)(68736005)(64706001)(87936001)(77096005)(101416001)(5001860100001)(86362001)(33656002)(10400500002)(5001960100002)(229853001)(76576001)(4001540100001)(81156007)(97736004)(110136002)(189998001)(122556002)(105586002)(5002640100001)(74316001)(92566002)(5007970100001)(5008740100001)(2900100001)(40100003)(450100001)(2501003)(5004730100002)(5003600100002)(99286002)(107886002)(106356001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB1713; H:BLUPR0501MB1715.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Oct 2015 13:58:32.8891 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB1713 Archived-At: Subject: [i2rs] RIB Info/Data model questions: nexthop-id X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 13:58:38 -0000 Hi, Both the RIB info and data model mentions nexthop-id, but neither specifies= who manages/assigns the ID. Can the specs point that out? It seems that it could be both ways - the IDs could be allocated by routers= (servers) or could be allocated by clients. Different ID spaces would be u= sed depending on who allocates the IDs. Related to the above, a specific question on the data model: grouping nexthop { leaf nexthop-id { mandatory true; type uint32; } choice nexthop-type { ... case nexthop-protection { list nexthop-protection-list { key "nexthop-protection-id";=20 leaf nexthop-protection-id { mandatory true; type uint32; } leaf nexthop-preference { ... } leaf nexthop { mandatory true; type nexthop-ref; } } } Here a nexthop-protection is a list. Being a list it requires a key and we = defined this uint32 nexthop-protection-id, which I assume the controller ne= eds to assign and both the controller and the router needs to remember. The= list entry has a member "nexthop" which is a nexthop-ref, which is a nexth= op-id: typedef nexthop-ref { type leafref { path "/i2rs-rib:routing-instance/i2rs-rib:rib-list" + "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:nexthop-id"; } } So - why can't we use the nexthop-id itself as the key? Thanks. Jeffrey From nobody Mon Oct 5 09:59:20 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F04821AD324 for ; Mon, 5 Oct 2015 09:59:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -13.49 X-Spam-Level: X-Spam-Status: No, score=-13.49 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MISSING_HEADERS=1.021, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qZW_P3KXCY5W for ; Mon, 5 Oct 2015 09:59:17 -0700 (PDT) Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 030691AD2C0 for ; Mon, 5 Oct 2015 09:59:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4482; q=dns/txt; s=iport; t=1444064357; x=1445273957; h=subject:references:cc:from:message-id:date:mime-version: in-reply-to:content-transfer-encoding; bh=Nv6Y+y9HQn1Blejw6zcWEHdcFSWDouTzlCeVbb9e4Yk=; b=IMTspEMhB0xWg04x6gwfYokkuXlBkaJ5Ab+XFinzUHmMDD8q90JgbKoP VQPV0SDmD/GdXdVjjwEkMlfbLP0a1V155afiAEBFZvsifweTOnpR5FykU kcoEdK2R0FbbILlHfmUtDaZ6CTHLjtVZroaGeU0dPWQFHDwVUo1fQ4tlp c=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AQAgAVrBJW/5hdJa1XB4MnVG6qLpNmAQ2BWhcMhXcCKIEMOBQBAQEBAQEBgQqEHAkBAQQBAQE1NgoBEAsYCQMBCAoPCQMCAQIBFTATBgIBAYVugjwNvTcBAQEBAQEBAQIBAQEBAQEchnOEfoRFSAcKgm6BNAEElXyFF4gAgVZHg3GDACOSMh8BAUKCER2BcCIzhnYHHIEmAQEF X-IronPort-AV: E=Sophos;i="5.17,639,1437436800"; d="scan'208";a="38142199" Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-3.cisco.com with ESMTP; 05 Oct 2015 16:59:15 +0000 Received: from [10.117.46.164] (rtp-jclarke-8913.cisco.com [10.117.46.164]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id t95GxFTK032029 for ; Mon, 5 Oct 2015 16:59:15 GMT References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> Cc: i2rs@ietf.org From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <5612AC63.4020000@cisco.com> Date: Mon, 5 Oct 2015 12:59:15 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 16:59:19 -0000 I'm reading through the latest draft, and I have a few questions/comments. In section 3, could the Subscription Service be an external broker? Said another way, it reads like the Subscription Service is/could be an external entity. Is that the case, or will this always be a component of the Publisher? In section 4.2.2 regarding negotiation, it states that when negotiating QoS, if the Subscription Service is unable to meet the request, it must, "include in its decline a set of criteria that would have been acceptable when the Subscription Request was made." This got me thinking about future state. That is, let's say that as of now I negotiate that I can do reaction time of T. But in an hour, due to other things (maybe higher-priority work) I can only do T plus some factor, X. The requirements in section 4.2.1 state that a Subscription Service can terminate a Subscription at any time. And as I read on, Section 4.2.3 describes what happens in the case of a "breach of contract." Perhaps that paragraph needs to folded in to the Negotiation section: "When a Subscription Service is not able to send updates per its subscription contract, the Subscription must notify subscribers and put the subscription into a state of indicating the Subscription was suspended by the service. When able to resume service, subscribers need to be notified as well. If unable to resume service, the Subscription Service may terminate the subscription and notify Subscribers accordingly." In section 4.2.5, is it needed to say that the mutual authn that exists between Subscriber and Subscription Service take into account the Publisher? That is, as a Subscriber I would want to ensure that a given Subscription Service is actually providing data from a known, trusted Publisher. I don't see any mention of Publishers in this section, and I would think there should be some in the case where the Subscription Service could be a broker. I like the fact that you have section 4.2.8. It goes to the idea of built-in serviceability. When you say, "fetch" is it envisioned that this data is exposed through another Subscription Service, or will there be other mechanisms to get at this? Joe On 10/2/15 15:08, internet-drafts@ietf.org wrote: > > A New Internet-Draft is available from the on-line Internet-Drafts directories. > This draft is a work item of the Interface to the Routing System Working Group of the IETF. > > Title : Requirements for Subscription to YANG Datastores > Authors : Eric Voit > Alexander Clemm > Alberto Gonzalez Prieto > Filename : draft-ietf-i2rs-pub-sub-requirements-03.txt > Pages : 17 > Date : 2015-09-28 > > Abstract: > This document provides requirements for a service that allows client > applications to subscribe to updates of a YANG datastore. Based on > criteria negotiated as part of a subscription, updates will be pushed > to targeted recipients. Such a capability eliminates the need for > periodic polling of YANG datastores by applications and fills a > functional gap in existing YANG transports (i.e. Netconf and > Restconf). Such a service can be summarized as a "pub/sub" service > for YANG datastore updates. Beyond a set of basic requirements for > the service, various refinements are addressed. These refinements > include: periodicity of object updates, filtering out of objects > underneath a requested a subtree, and delivery QoS guarantees. > > > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > There's also a htmlized version available at: > https://tools.ietf.org/html/draft-ietf-i2rs-pub-sub-requirements-03 > > A diff from the previous version is available at: > https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-pub-sub-requirements-03 > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Mon Oct 5 14:22:23 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65B7C1B504C for ; Mon, 5 Oct 2015 14:22:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lu7Du85iTOBx for ; Mon, 5 Oct 2015 14:22:20 -0700 (PDT) Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 67FCD1B504E for ; Mon, 5 Oct 2015 14:22:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5751; q=dns/txt; s=iport; t=1444080140; x=1445289740; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=bWlor6GsE8bPhEeHMidHBAN3x+FlIJpvHLhOKlyar6M=; b=SuZOzk70KfwU3vmCd64spABNH9CPed7fjNNZZgD4OLMapwkxGSxrOSiA rmB8oHHXcROOvTy4iZQZAStI3KQ6QUZt1VyisAHIt26b9GRbnkklLJ3C8 +h9723cdpsr9A757fsQyCxWHMyaBXlelO7wNAKeDQbME019UP3VnaLD8q Y=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0ACAgAQ6RJW/4oNJK1XB4MnVF8PBr4OAQ2BWhcKhXkCgTg4FAEBAQEBAQGBCoQkAQEBBAEBATc0BAcMBAIBCBUDDAEICRAnCyUCBA4FCIgmDb4VAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4ZzhH6ERR0rBwqEIgWVfAGFFod5gV1Hg3GDI5IxAR8BAUKCER2BVHGGdgccAR+BBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,640,1437436800"; d="scan'208";a="37842813" Received: from alln-core-5.cisco.com ([173.36.13.138]) by rcdn-iport-2.cisco.com with ESMTP; 05 Oct 2015 21:22:19 +0000 Received: from XCH-ALN-012.cisco.com (xch-aln-012.cisco.com [173.36.7.22]) by alln-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t95LMJxf027546 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for ; Mon, 5 Oct 2015 21:22:19 GMT Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-ALN-012.cisco.com (173.36.7.22) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 5 Oct 2015 16:22:18 -0500 Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1104.000; Mon, 5 Oct 2015 16:22:18 -0500 From: "Eric Voit (evoit)" To: "Joe Clarke (jclarke)" Thread-Topic: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt Thread-Index: AQHQ/48ycRaP9v1R9kGT1i8lPJG2IJ5dW4kw Date: Mon, 5 Oct 2015 21:22:18 +0000 Message-ID: References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> In-Reply-To: <5612AC63.4020000@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.118.56.228] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 21:22:22 -0000 Hi Joe, -----Original Message----- From: i2rs, October 05, 2015 12:59 PM I'm reading through the latest draft, and I have a few questions/comments. In section 3, could the Subscription Service be an external broker?=20 Said another way, it reads like the Subscription Service is/could be an ext= ernal entity. Is that the case, or will this always be a component of the = Publisher? I don't know of any reason why the Subscription Service must be a co= mponent of the Publisher. In section 4.2.2 regarding negotiation, it states that when negotiating QoS= , if the Subscription Service is unable to meet the request, it must, "incl= ude in its decline a set of criteria that would have been acceptable when t= he Subscription Request was made." This got me thinking about future state. That is, let's say that as of now= I negotiate that I can do reaction time of T. But in an hour, due to othe= r things (maybe higher-priority work) I can only do T plus some factor, X. = The requirements in section 4.2.1 state that a Subscription Service can te= rminate a Subscription at any time. And as I read on, Section 4.2.3 describes what happens in the case of a "br= each of contract." Perhaps that paragraph needs to folded in to the Negoti= ation section: "When a Subscription Service is not able to send updates per its subscription contract, the Subscription must notify subscribers and put the subscription into a state of indicating the Subscription was suspended by the service. When able to resume service, subscribers need to be notified as well. If unable to resume service, the Subscription Service may terminate the subscription and notify Subscribers accordingly." Yes, this is paragraph 3 of Section 4.2.3. I think you are suggest= ing we make more robust error/informational codes for a Suspended subscript= ion, including giving parameters which might work to un-suspend. The Subs= criber could then attempt a "Modify Subscription" which would then have a c= hance to bring things back to "Active". The hard part is knowing when to = send these parameters when a suspension is very temporary due to short duri= ng overload conditions. This will be especially difficult as many subscrip= tions could be suspended (and modifications synchronized) at the same time = due to an transient overload event. In section 4.2.5, is it needed to say that the mutual authn that exists bet= ween Subscriber and Subscription Service take into account the Publisher? = That is, as a Subscriber I would want to ensure that a given Subscription S= ervice is actually providing data from a known, trusted Publisher. I don't= see any mention of Publishers in this section, and I would think there sho= uld be some in the case where the Subscription Service could be a broker. This could be as simple as " Publisher and Subscription Service mus= t maintain a secure relationship". I have no problem adding that. I like the fact that you have section 4.2.8. It goes to the idea of built-= in serviceability. When you say, "fetch" is it envisioned that this data i= s exposed through another Subscription Service, or will there be other mech= anisms to get at this? Why would this need to be a different Subscription Service? I envis= ioned the same one. Eric Joe On 10/2/15 15:08, internet-drafts@ietf.org wrote: > > A New Internet-Draft is available from the on-line Internet-Drafts direct= ories. > This draft is a work item of the Interface to the Routing System Workin= g Group of the IETF. > > Title : Requirements for Subscription to YANG Datastor= es > Authors : Eric Voit > Alexander Clemm > Alberto Gonzalez Prieto > Filename : draft-ietf-i2rs-pub-sub-requirements-03.txt > Pages : 17 > Date : 2015-09-28 > > Abstract: > This document provides requirements for a service that allows client > applications to subscribe to updates of a YANG datastore. Based on > criteria negotiated as part of a subscription, updates will be pushed > to targeted recipients. Such a capability eliminates the need for > periodic polling of YANG datastores by applications and fills a > functional gap in existing YANG transports (i.e. Netconf and > Restconf). Such a service can be summarized as a "pub/sub" service > for YANG datastore updates. Beyond a set of basic requirements for > the service, various refinements are addressed. These refinements > include: periodicity of object updates, filtering out of objects > underneath a requested a subtree, and delivery QoS guarantees. > > > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > There's also a htmlized version available at: > https://tools.ietf.org/html/draft-ietf-i2rs-pub-sub-requirements-03 > > A diff from the previous version is available at: > https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-i2rs-pub-sub-requirements > -03 > > > Please note that it may take a couple of minutes from the time of=20 > submission until the htmlized version and diff are available at tools.iet= f.org. > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 5 14:27:35 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED1EB1B5069 for ; Mon, 5 Oct 2015 14:27:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gXRzj26yl36b for ; Mon, 5 Oct 2015 14:27:32 -0700 (PDT) Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC9E31B506D for ; Mon, 5 Oct 2015 14:27:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3811; q=dns/txt; s=iport; t=1444080450; x=1445290050; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=iPzwSqGlyIbAm2TfGpSbh6D/IPP9bWTHzH4RAiShvOI=; b=g7f+FsLIMhXUelDkhri7SlcO0CCk8VcdxC1RbzmC8rWljDVQBR6cVNdh CQpcNQqwh/ome6BMXlxUt/w5FvgRNQiuU3j3rtWEHKG6UuA40JzbR1aVs +/Dyx1nke5tA+L//e0pg4HFFkcXzEuPOXOKtFfaV89zc1A2rakCAjSGBf U=; X-IronPort-AV: E=Sophos;i="5.17,640,1437436800"; d="scan'208";a="38541153" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 05 Oct 2015 21:27:30 +0000 Received: from [10.117.46.164] (rtp-jclarke-8913.cisco.com [10.117.46.164]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t95LRTUa016355; Mon, 5 Oct 2015 21:27:29 GMT To: "Eric Voit (evoit)" References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <5612EB41.60902@cisco.com> Date: Mon, 5 Oct 2015 17:27:29 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 21:27:34 -0000 On 10/5/15 17:22, Eric Voit (evoit) wrote: > > In section 3, could the Subscription Service be an external broker? > Said another way, it reads like the Subscription Service is/could be an external entity. Is that the case, or will this always be a component of the Publisher? > I don't know of any reason why the Subscription Service must be a component of the Publisher. Nor do I. I just asked the question to justify some of my other comments. > > In section 4.2.2 regarding negotiation, it states that when negotiating QoS, if the Subscription Service is unable to meet the request, it must, "include in its decline a set of criteria that would have been acceptable when the Subscription Request was made." > > This got me thinking about future state. That is, let's say that as of now I negotiate that I can do reaction time of T. But in an hour, due to other things (maybe higher-priority work) I can only do T plus some factor, X. The requirements in section 4.2.1 state that a Subscription Service can terminate a Subscription at any time. > > And as I read on, Section 4.2.3 describes what happens in the case of a "breach of contract." Perhaps that paragraph needs to folded in to the Negotiation section: > > "When a Subscription Service is not able to send updates per its > subscription contract, the Subscription must notify subscribers and > put the subscription into a state of indicating the Subscription was > suspended by the service. When able to resume service, subscribers > need to be notified as well. If unable to resume service, the > Subscription Service may terminate the subscription and notify > Subscribers accordingly." > Yes, this is paragraph 3 of Section 4.2.3. I think you are suggesting we make more robust error/informational codes for a Suspended subscription, including giving parameters which might work to un-suspend. The Subscriber could then attempt a "Modify Subscription" which would then have a chance to bring things back to "Active". The hard part is knowing when to send these parameters when a suspension is very temporary due to short during overload conditions. This will be especially difficult as many subscriptions could be suspended (and modifications synchronized) at the same time due to an transient overload event. That would be ideal, but at its simplest, I am suggesting some of the wording in section 4.2.3 make it into the Negotiation section to be clear what would happen if negotiated attributes are no longer able to be maintained. > > In section 4.2.5, is it needed to say that the mutual authn that exists between Subscriber and Subscription Service take into account the Publisher? That is, as a Subscriber I would want to ensure that a given Subscription Service is actually providing data from a known, trusted Publisher. I don't see any mention of Publishers in this section, and I would think there should be some in the case where the Subscription Service could be a broker. > This could be as simple as " Publisher and Subscription Service must maintain a secure relationship". I have no problem adding that. Works for me. I just think that aspect of secure interactions needs to be called out. > > I like the fact that you have section 4.2.8. It goes to the idea of built-in serviceability. When you say, "fetch" is it envisioned that this data is exposed through another Subscription Service, or will there be other mechanisms to get at this? > Why would this need to be a different Subscription Service? I envisioned the same one. So did I. I didn't think it was clear given the word "fetch." Perhaps you should state that these data must be available via the subscription service. Joe From nobody Mon Oct 5 14:39:46 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 348641B508A for ; Mon, 5 Oct 2015 14:39:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.602 X-Spam-Level: X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sf1KIqd3Y2a0 for ; Mon, 5 Oct 2015 14:39:43 -0700 (PDT) Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAF271B5083 for ; Mon, 5 Oct 2015 14:39:43 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 8E70E74178E; Mon, 5 Oct 2015 14:39:43 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 246761C034F; Mon, 5 Oct 2015 14:39:43 -0700 (PDT) To: "Eric Voit (evoit)" , "Joe Clarke (jclarke)" References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> From: "Joel M. Halpern" Message-ID: <5612EE1E.8030609@joelhalpern.com> Date: Mon, 5 Oct 2015 17:39:42 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 21:39:45 -0000 I think I am missing something in the discussion of this first point about separation. While lots of implementation strategies are possible, the communication pattern I would anticipate for I2RS is that an I2RS client is communicating with an I2RS Agent who handles some piece(s) of information. The client would send its subscription to that agent. The client would expect the information resulting from its subscription to come back on a communications channel from the same entity. So unless we add a lot of extra mechanisms to the protocol, I don't see how the effective manager of the subscription service for I2RS can be separate from the effective producer as seen by I2RS. You can have brokers who accept subscriptions from multiple parties, subscribe on their own behalf to the I2RS agent, and then fan the results out to other parties. But that would seem to represent a (legitimate) reuse of the subscription mechanism in a different context. Yours, Joel On 10/5/15 5:22 PM, Eric Voit (evoit) wrote: > Hi Joe, > > -----Original Message----- > From: i2rs, October 05, 2015 12:59 PM > > I'm reading through the latest draft, and I have a few questions/comments. > > In section 3, could the Subscription Service be an external broker? > Said another way, it reads like the Subscription Service is/could be an external entity. Is that the case, or will this always be a component of the Publisher? > I don't know of any reason why the Subscription Service must be a component of the Publisher. From nobody Mon Oct 5 14:52:13 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 451D31A00B1 for ; Mon, 5 Oct 2015 14:52:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Tf9RPEnwaLc for ; Mon, 5 Oct 2015 14:52:11 -0700 (PDT) Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06B461A1B05 for ; Mon, 5 Oct 2015 14:52:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2135; q=dns/txt; s=iport; t=1444081930; x=1445291530; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=bTDwhJlj0weBeuP250PvLB1awveV/IfJWqow/4ziqDI=; b=gZC54FVObUG6pCXFcQxjWXu7mTiMVUUYrnVfQaDl4LDMWBrNuvX9UYmg of9l09zWFYAXkyfwGWR6cGBfY5y1fAtBajMQC5SD7JD1TgbRiLjvVoXj+ TnZjXSJL8zeWhkAhEEcEnE3OofymmMvhE+y56yK1plN0lvDVl597Ge3z6 o=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DwAQDp7xJW/5xdJa1egyeBSL4OAQ2BWoNEglYCgTk4FAEBAQEBAQGBCoQkAQEBAwE6PwUHBAIBCBUDDAEREDIlAgQBDQ2IHgi+HAEBAQEBAQEBAQEBAQEBAQEBAQEBAReGc4R+hGIrBwKEKgWVfgGND5trAR8BAUKCER2BVIgqgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,640,1437436800"; d="scan'208";a="38220912" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-3.cisco.com with ESMTP; 05 Oct 2015 21:52:10 +0000 Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t95LqAtL009053 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 5 Oct 2015 21:52:10 GMT Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 5 Oct 2015 16:52:09 -0500 Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1104.000; Mon, 5 Oct 2015 16:52:09 -0500 From: "Eric Voit (evoit)" To: "Joel M. Halpern" , "Joe Clarke (jclarke)" Thread-Topic: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt Thread-Index: AQHQ/48ycRaP9v1R9kGT1i8lPJG2IJ5dW4kwgABl2gD//6zv4A== Date: Mon, 5 Oct 2015 21:52:09 +0000 Message-ID: <82993ee9bf67495da7958e188282377a@XCH-ALN-013.cisco.com> References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> <5612EE1E.8030609@joelhalpern.com> In-Reply-To: <5612EE1E.8030609@joelhalpern.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.118.56.228] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 21:52:12 -0000 > From: Joel M. Halpern, October 05, 2015 5:40 PM >=20 > I think I am missing something in the discussion of this first point abou= t > separation. > While lots of implementation strategies are possible, the communication > pattern I would anticipate for I2RS is that an I2RS client is communicati= ng with > an I2RS Agent who handles some piece(s) of information. The client would= send > its subscription to that agent. The client would expect the information = resulting > from its subscription to come back on a communications channel from the s= ame > entity. >=20 > So unless we add a lot of extra mechanisms to the protocol, I don't see h= ow the > effective manager of the subscription service for I2RS can be separate fr= om the > effective producer as seen by I2RS. I agree with you. I was trying to convey that I see no reason that the Re= quirements for the Subscription Service cannot be augmented (not changed) t= o allow for additional internal interface specifications. =20 In this case, both incremental requirements and protocols would be needed. = There certainly wouldn't be one protocol. I have no desire to pursue this= myself. Others might. > You can have brokers who accept subscriptions from multiple parties, subs= cribe > on their own behalf to the I2RS agent, and then fan the results out to ot= her > parties. But that would seem to represent a > (legitimate) reuse of the subscription mechanism in a different context. Yes. Eric > Yours, > Joel >=20 > On 10/5/15 5:22 PM, Eric Voit (evoit) wrote: > > Hi Joe, > > > > -----Original Message----- > > From: i2rs, October 05, 2015 12:59 PM > > > > I'm reading through the latest draft, and I have a few questions/commen= ts. > > > > In section 3, could the Subscription Service be an external broker? > > Said another way, it reads like the Subscription Service is/could be an= external > entity. Is that the case, or will this always be a component of the Publ= isher? > > I don't know of any reason why the Subscription Service must be = a > component of the Publisher. From nobody Mon Oct 5 15:16:19 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B8A71A6F03 for ; Mon, 5 Oct 2015 15:16:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0nPajcjL0G63 for ; Mon, 5 Oct 2015 15:16:15 -0700 (PDT) Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4EF2D1A6F05 for ; Mon, 5 Oct 2015 15:16:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5033; q=dns/txt; s=iport; t=1444083373; x=1445292973; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=MIIlzLJC132DtU68ist3maYtkgHVCxgbp1oxP7JyvKg=; b=CcM8QAS15jQ7H1ibndNl5GDkF5TQERs+nMY5WO9mlitLaC/CUXrh8csi B8Ftp7c0q/4UK9l/csq4ngp+Wb/9gLHw5brD9/MUGL6huzyPvVny4noR0 rfZicqpj22ClcORJQHR2FUhpIG3BLZZuRRknH/fciLPF3nK9GlB/calNG U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DwAQBt9hJW/5hdJa1XB4MngTMVvg4BDYFahhoCgTo4FAEBAQEBAQGBCoQkAQEBAwE6OAcFCwIBCBUDDQgJEDIlAgQODYgeCL4mAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4ZzhH6ERUgHCoQiBYc0hwSHRgGND4Fdh1yJbYhFAR8BAUKCER2BVIdnBxwBH4EGAQEB X-IronPort-AV: E=Sophos;i="5.17,640,1437436800"; d="scan'208";a="194290229" Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Oct 2015 22:16:12 +0000 Received: from XCH-RCD-012.cisco.com (xch-rcd-012.cisco.com [173.37.102.22]) by rcdn-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id t95MGCSv018129 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for ; Mon, 5 Oct 2015 22:16:12 GMT Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-RCD-012.cisco.com (173.37.102.22) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 5 Oct 2015 17:16:11 -0500 Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1104.000; Mon, 5 Oct 2015 17:16:11 -0500 From: "Eric Voit (evoit)" To: "Joe Clarke (jclarke)" Thread-Topic: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt Thread-Index: AQHQ/48ycRaP9v1R9kGT1i8lPJG2IJ5dW4kwgABicID//67cEA== Date: Mon, 5 Oct 2015 22:16:11 +0000 Message-ID: <72b2ab0f1e1a449983aee81503564aec@XCH-ALN-013.cisco.com> References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> <5612EB41.60902@cisco.com> In-Reply-To: <5612EB41.60902@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.118.56.228] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2015 22:16:17 -0000 > From: Joe Clarke, October 05, 2015 5:27 PM >=20 > On 10/5/15 17:22, Eric Voit (evoit) wrote: >=20 > > > > In section 3, could the Subscription Service be an external broker? > > Said another way, it reads like the Subscription Service is/could be an= external > entity. Is that the case, or will this always be a component of the Publ= isher? > > I don't know of any reason why the Subscription Service must be = a > component of the Publisher. >=20 > Nor do I. I just asked the question to justify some of my other comments= . >=20 > > > > In section 4.2.2 regarding negotiation, it states that when negotiating= QoS, if > the Subscription Service is unable to meet the request, it must, "include= in its > decline a set of criteria that would have been acceptable when the Subscr= iption > Request was made." > > > > This got me thinking about future state. That is, let's say that as of= now I > negotiate that I can do reaction time of T. But in an hour, due to other= things > (maybe higher-priority work) I can only do T plus some factor, X. The > requirements in section 4.2.1 state that a Subscription Service can termi= nate a > Subscription at any time. > > > > And as I read on, Section 4.2.3 describes what happens in the case of a= "breach > of contract." Perhaps that paragraph needs to folded in to the Negotiati= on > section: > > > > "When a Subscription Service is not able to send updates per its > > subscription contract, the Subscription must notify subscribers an= d > > put the subscription into a state of indicating the Subscription w= as > > suspended by the service. When able to resume service, subscriber= s > > need to be notified as well. If unable to resume service, the > > Subscription Service may terminate the subscription and notify > > Subscribers accordingly." > > Yes, this is paragraph 3 of Section 4.2.3. I think you are sug= gesting we > make more robust error/informational codes for a Suspended subscription, > including giving parameters which might work to un-suspend. The Subscri= ber > could then attempt a "Modify Subscription" which would then have a chance= to > bring things back to "Active". The hard part is knowing when to send th= ese > parameters when a suspension is very temporary due to short during overlo= ad > conditions. This will be especially difficult as many subscriptions coul= d be > suspended (and modifications synchronized) at the same time due to an > transient overload event. >=20 > That would be ideal, but at its simplest, I am suggesting some of the wor= ding in > section 4.2.3 make it into the Negotiation section to be clear what would > happen if negotiated attributes are no longer able to be maintained. There will be multiple ways that a Subscription Update could fail to get pu= shed. Examples could be based on Bandwidth, CPU, or flow control reasons. = Or it could be that someone put a huge set of data under a subtree which w= asn't there during the establishment of the original subscription. I woul= dn't want to prohibit the sending of parameters which might result in a suc= cessful reinstatement on the subscription. But I wouldn't mandate it eithe= r. My suggestion is that there is the option to send suggested parameters. Bu= t that we don't mandate this, nor which parameters may be sent. =20 > > > > In section 4.2.5, is it needed to say that the mutual authn that exists= between > Subscriber and Subscription Service take into account the Publisher? Tha= t is, as a > Subscriber I would want to ensure that a given Subscription Service is ac= tually > providing data from a known, trusted Publisher. I don't see any mention = of > Publishers in this section, and I would think there should be some in the= case > where the Subscription Service could be a broker. > > This could be as simple as " Publisher and Subscription Service= must > maintain a secure relationship". I have no problem adding that. >=20 > Works for me. I just think that aspect of secure interactions needs to b= e called > out. > > > > I like the fact that you have section 4.2.8. It goes to the idea of bu= ilt-in > serviceability. When you say, "fetch" is it envisioned that this data is= exposed > through another Subscription Service, or will there be other mechanisms t= o get > at this? > > Why would this need to be a different Subscription Service? I > envisioned the same one. >=20 > So did I. I didn't think it was clear given the word "fetch." Perhaps y= ou should > state that these data must be available via the subscription service. "It must be possible to fetch a list and status of all Subscription Request= s made over a period of time to a Subscription Service. If a Subscriptio= n failed to establish or has been suspended, reasons must be provided. Exa= mple reasons might include: " Eric =20 > Joe From nobody Tue Oct 6 06:04:44 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C86AC1A9240 for ; Tue, 6 Oct 2015 06:04:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aTRLro9u2J3F for ; Tue, 6 Oct 2015 06:04:41 -0700 (PDT) Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C7201A923B for ; Tue, 6 Oct 2015 06:04:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2890; q=dns/txt; s=iport; t=1444136682; x=1445346282; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=T6We48BUL/umeWZdrPKVP9MJFroIFXil+57b+hYIDgU=; b=AgoxfqOnAUeJcjVEUFKQggqEpjYKso0hfVhYk5i0sh8nPREYMfkTz/D5 A842Z16qKm1fOJGIXJxEKdv8pwQVM+hsaneWzi5cgfsJE2KVfQlrxeOSU jN2D+/bzVZfs4c6dP3JRxAJG573ekqzlz7WquWpAOD+cVh0MqaSgzW9HU U=; X-IronPort-AV: E=Sophos;i="5.17,644,1437436800"; d="scan'208";a="195063691" Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 06 Oct 2015 13:04:37 +0000 Received: from [10.150.6.135] ([10.150.6.135]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id t96D4aj0027876; Tue, 6 Oct 2015 13:04:36 GMT To: "Eric Voit (evoit)" References: <20151002190856.30194.1040.idtracker@ietfa.amsl.com> <5612AC63.4020000@cisco.com> <5612EB41.60902@cisco.com> <72b2ab0f1e1a449983aee81503564aec@XCH-ALN-013.cisco.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <5613C6E3.9030401@cisco.com> Date: Tue, 6 Oct 2015 09:04:35 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <72b2ab0f1e1a449983aee81503564aec@XCH-ALN-013.cisco.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-pub-sub-requirements-03.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Oct 2015 13:04:42 -0000 On 10/5/15 18:16, Eric Voit (evoit) wrote: >>> And as I read on, Section 4.2.3 describes what happens in the case of a "breach >> of contract." Perhaps that paragraph needs to folded in to the Negotiation >> section: >>> >>> "When a Subscription Service is not able to send updates per its >>> subscription contract, the Subscription must notify subscribers and >>> put the subscription into a state of indicating the Subscription was >>> suspended by the service. When able to resume service, subscribers >>> need to be notified as well. If unable to resume service, the >>> Subscription Service may terminate the subscription and notify >>> Subscribers accordingly." >>> Yes, this is paragraph 3 of Section 4.2.3. I think you are suggesting we >> make more robust error/informational codes for a Suspended subscription, >> including giving parameters which might work to un-suspend. The Subscriber >> could then attempt a "Modify Subscription" which would then have a chance to >> bring things back to "Active". The hard part is knowing when to send these >> parameters when a suspension is very temporary due to short during overload >> conditions. This will be especially difficult as many subscriptions could be >> suspended (and modifications synchronized) at the same time due to an >> transient overload event. >> >> That would be ideal, but at its simplest, I am suggesting some of the wording in >> section 4.2.3 make it into the Negotiation section to be clear what would >> happen if negotiated attributes are no longer able to be maintained. > > There will be multiple ways that a Subscription Update could fail to get pushed. Examples could be based on Bandwidth, CPU, or flow control reasons. Or it could be that someone put a huge set of data under a subtree which wasn't there during the establishment of the original subscription. I wouldn't want to prohibit the sending of parameters which might result in a successful reinstatement on the subscription. But I wouldn't mandate it either. > > My suggestion is that there is the option to send suggested parameters. But that we don't mandate this, nor which parameters may be sent. Agreed. >> So did I. I didn't think it was clear given the word "fetch." Perhaps you should >> state that these data must be available via the subscription service. > > "It must be possible to fetch a list and status of all Subscription Requests made over a period of time to a Subscription Service. If a Subscription failed to establish or has been suspended, reasons must be provided. Example reasons might include:" Sure, that sounds better, but my contention here was the make explicit that "fetch" meant to make these data available via the Subscription Service itself. That is, define how one would fetch these data. Joe From nobody Tue Oct 6 16:13:07 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C994D1B41E7 for ; Tue, 6 Oct 2015 16:13:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zbDVXPjVBQiN for ; Tue, 6 Oct 2015 16:13:04 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59D9F1B41E6 for ; Tue, 6 Oct 2015 16:13:04 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Tue, 6 Oct 2015 19:13:01 -0400 Message-ID: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_004B_01D1006B.055D0D20" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEAjHSQQVpQYgeMS5C7bKcSD40Mdg== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Kent Watsen' , 'Andy Bierman' Subject: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 06 Oct 2015 23:13:06 -0000 This is a multipart message in MIME format. ------=_NextPart_000_004B_01D1006B.055D0D20 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit I2RS Interim 10/7/2015 1) Agenda Bashing [10:00 - 10:05 ] 2) I2RS Protocol Requirements Summary [10:05 - 10:15] 3) Discussion of Requirements [10:15-30] 4) I2RS Protocol Strawman [10:25 - 10:45] 5) Discussion of I2RS Protocol [10:45-11:00] 7) I2RS Hackathon [11:00 - 11:15] 8) I2RS FB-RIB [11:15 - 11:30] Next I2RS Meeting 10/7/2015 I2RS Interim 10/7 Wednesday, October 7, 2015 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs Join WebEx meeting https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db Meeting number: 649 136 221 Meeting password: kent.andy.proto Join by phone 1-877-668-4493 Call-in toll free number (US/Canada) 1-650-479-3208 Call-in toll number (US/Canada) Access code: 649 136 221 Toll-free calling restrictions ------=_NextPart_000_004B_01D1006B.055D0D20 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

 

I2RS Interim = 10/7/2015

 

1) Agenda Bashing [10:00 - 10:05 ]

2) I2RS Protocol Requirements Summary =

   [10:05 - = 10:15]

3) Discussion of Requirements = [10:15-30]

4) I2RS Protocol Strawman = [10:25 - 10:45]

5) Discussion of I2RS = Protocol [10:45-11:00]

7) I2RS = Hackathon [11:00 - 11:15]

8) I2RS = FB-RIB [11:15 - 11:30]

 

 

Next I2RS = Meeting 10/7/2015

I2RS Interim 10/7 =

Wednesday, October 7, 2015 =

10:00 am  |  Eastern = Daylight Time (New York, GMT-04:00)  |  2 hrs =

 

 

Join WebEx = meeting

https://ietf.webex.com/ietf/j.php?MTID=3Dm1e24725f4e564= 6061f21baae1c6a87db

 

Meeting = number:            649 = 136 221

Meeting = password:         = kent.andy.proto

 

Join by = phone

1-877-668-4493 Call-in toll = free number (US/Canada)

1-650-479-3208 Call-in toll number = (US/Canada)

Access code: 649 136 = 221

Toll-free calling = restrictions

 

 

 

 

------=_NextPart_000_004B_01D1006B.055D0D20-- From nobody Tue Oct 6 17:16:26 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58FBA1B2AC2 for ; Tue, 6 Oct 2015 17:16:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.155 X-Spam-Level: X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0fPf20lToEMI for ; Tue, 6 Oct 2015 17:16:23 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0F761B2BA3 for ; Tue, 6 Oct 2015 17:16:22 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Tue, 6 Oct 2015 20:16:21 -0400 Message-ID: <007301d10095$65bb8410$31328c30$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0074_01D10073.DEAB6AB0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEAk2BU9yZ2WnJ8TuuGrQLrVu1BdA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 00:16:24 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0074_01D10073.DEAB6AB0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requiremen ts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares ------=_NextPart_000_0074_01D10073.DEAB6AB0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

This = begins a 2 week WG LC on the following requirement documents for I2RS: =

 

draft-ietf-i2rs-ephemeral-state-02.txt =  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section = is blank and this will be discussed at the 10/17/2015 = interim.

We will discuss whether this = section should be kept or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-= security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirement= s/

 

draft-ietf-i2rs-traceability-03.txt

ht= tp://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/

 

Sue = Hares

 

------=_NextPart_000_0074_01D10073.DEAB6AB0-- From nobody Tue Oct 6 17:36:20 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1F9F1B2F9C for ; Tue, 6 Oct 2015 17:36:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -96.354 X-Spam-Level: X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrbJt8u_5hQ4 for ; Tue, 6 Oct 2015 17:36:17 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92E351B2F8C for ; Tue, 6 Oct 2015 17:36:17 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Tue, 6 Oct 2015 20:36:08 -0400 Message-ID: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_009B_01D10076.A3F3A650" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEAlyAxuYWhD++/Qk2AqdHuY4uxjA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Nitin Bahadur' , sriganesh.kini@ericsson.com Subject: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 00:36:18 -0000 This is a multipart message in MIME format. ------=_NextPart_000_009B_01D10076.A3F3A650 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit This begins a 2 week WG LC on draft-ietf-i2rs-rib-info-model-07.txt. You can obtain the document by going to: http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/ The question you should consider: 1) Does this RIB info-model work will for read query and write query for small number of routes (1-10 routes)? 2) Does this RIB info-model work for a large number of routes 100,000 routes? 3) Is the next-hop methodology support everything you wish in the I2RS RIB? 4) The default mode for I2RS transport is a secure encrypted transport. Does this information model need to have any portion of the model available over an insecure transport? Sue Hares ------=_NextPart_000_009B_01D10076.A3F3A650 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

This = begins a 2 week WG LC on draft-ietf-i2rs-rib-info-model-07.txt. =   You can obtain the document by going to:

= http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/<= /o:p>

 

The question you should consider:

 

1)      = Does this RIB info-model work will for read = query and write query for small number of routes (1-10 = routes)?

2)      = Does this RIB info-model work for a large number = of routes 100,000 routes? 

3)      = Is the next-hop methodology support everything = you wish in the I2RS RIB?

4)      = The default mode for I2RS transport is a secure = encrypted transport.  Does this information model need to have any = portion of the model available over an insecure transport? =

 

Sue Hares

------=_NextPart_000_009B_01D10076.A3F3A650-- From nobody Tue Oct 6 17:40:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E4651B2E6E for ; Tue, 6 Oct 2015 17:40:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.155 X-Spam-Level: X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RhWNrX2ch1a5 for ; Tue, 6 Oct 2015 17:40:39 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 480B51B2EBF for ; Tue, 6 Oct 2015 17:40:39 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Tue, 6 Oct 2015 20:40:38 -0400 Message-ID: <00b301d10098$ca041830$5e0c4890$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_00B4_01D10077.42F3FED0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEAmJW9CSgwDIRARfaakEbFr6dh7w== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] draft-mglt-i2rs-security-environment-reqs-01.txt - Is adopted X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 00:40:40 -0000 This is a multipart message in MIME format. ------=_NextPart_000_00B4_01D10077.42F3FED0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Since we have not had any comments on the adoption of draft-mglt-i2rs-security-environment-req-01.txt, this draft is adopted as a WG draft. The authors should submit this as draft-iet-i2rs-security-environment-req-00.txt. Sue Hares and Jeff Haas ------=_NextPart_000_00B4_01D10077.42F3FED0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Since we = have not had any comments on the adoption of = draft-mglt-i2rs-security-environment-req-01.txt, this draft is adopted = as a WG draft.  The authors should submit this as = draft-iet-i2rs-security-environment-req-00.txt.

 

Sue Hares = and Jeff Haas

------=_NextPart_000_00B4_01D10077.42F3FED0-- From nobody Tue Oct 6 23:44:39 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1B9C1B2AF6 for ; Tue, 6 Oct 2015 23:44:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rW6T24s2UChJ for ; Tue, 6 Oct 2015 23:44:35 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BE661B2AF5 for ; Tue, 6 Oct 2015 23:44:35 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id A59EE6FA; Wed, 7 Oct 2015 08:44:33 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id g1NxXPXeQVS6; Wed, 7 Oct 2015 08:44:33 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Wed, 7 Oct 2015 08:44:32 +0200 (CEST) Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id CE82320053; Wed, 7 Oct 2015 08:44:32 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id iJ7bhvP80ljP; Wed, 7 Oct 2015 08:44:32 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 29BA72004E; Wed, 7 Oct 2015 08:44:31 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 3DBCF37AD24B; Wed, 7 Oct 2015 08:44:29 +0200 (CEST) Date: Wed, 7 Oct 2015 08:44:28 +0200 From: Juergen Schoenwaelder To: Susan Hares Message-ID: <20151007064428.GA51566@elstar.local> Mail-Followup-To: Susan Hares , i2rs@ietf.org, 'Jeffrey Haas' , 'Alia Atlas' References: <007301d10095$65bb8410$31328c30$@ndzh.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <007301d10095$65bb8410$31328c30$@ndzh.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: 'Jeffrey Haas' , i2rs@ietf.org, 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 06:44:38 -0000 On Tue, Oct 06, 2015 at 08:16:21PM -0400, Susan Hares wrote: > This begins a 2 week WG LC on the following requirement documents for I2RS: > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interim. > > We will discuss whether this section should be kept or removed. > Note: I2RS protocol design team is working to complete this set of minimal changes. Has the design team produced any output that I can read to understand how the changes to NETCONF and YANG are supposed to work? /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Wed Oct 7 01:03:54 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E80501AC3B5 for ; Wed, 7 Oct 2015 01:03:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Giw4kLV8SMOO for ; Wed, 7 Oct 2015 01:03:51 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 722B41AC42D for ; Wed, 7 Oct 2015 01:03:51 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: "'Juergen Schoenwaelder'" References: <007301d10095$65bb8410$31328c30$@ndzh.com> <20151007064428.GA51566@elstar.local> In-Reply-To: <20151007064428.GA51566@elstar.local> Date: Wed, 7 Oct 2015 04:03:46 -0400 Message-ID: <003201d100d6$b1ca94e0$155fbea0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQFcUMQzbHuRSZnaJ/N5epYSlx5LtQJX/G5rnzZLoUA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , i2rs@ietf.org, 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 08:03:53 -0000 Juergen: Not the official design team from NETCONF/I2RS. An initial strawman ideas from Andy and Kent will be presented today at I2RS Interim. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Wednesday, October 07, 2015 2:44 AM To: Susan Hares Cc: 'Jeffrey Haas'; i2rs@ietf.org; 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - On Tue, Oct 06, 2015 at 08:16:21PM -0400, Susan Hares wrote: > This begins a 2 week WG LC on the following requirement documents for I2RS: > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interim. > > We will discuss whether this section should be kept or removed. > Note: I2RS protocol design team is working to complete this set of minimal changes. Has the design team produced any output that I can read to understand how the changes to NETCONF and YANG are supposed to work? /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Wed Oct 7 05:01:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61B791B2E8C for ; Wed, 7 Oct 2015 05:01:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.654 X-Spam-Level: X-Spam-Status: No, score=-97.654 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ChS85deX4rLK for ; Wed, 7 Oct 2015 05:01:04 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D018C1B2E80 for ; Wed, 7 Oct 2015 05:01:03 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: "'Jeffrey \(Zhaohui\) Zhang'" , References: In-Reply-To: Date: Wed, 7 Oct 2015 08:01:02 -0400 Message-ID: <002701d100f7$d6b17050$841450f0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0028_01D100D6.4FA21A40" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQD0N/GpKv18NqpfD0Yo1ida7PTLX6AZdPdw Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: Re: [i2rs] RIB Info/Data model questions: nexthop-id X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 12:01:08 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0028_01D100D6.4FA21A40 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Jeffrey: to start this discussion going, I would like to provide you with the answer that was given when the I2RS RIB Information Model was designed. . All I2RS RIB information is intended config (see ietf-chairs-netmod-opstate-reqs-01 or ietf-openconfig-netmod-opstat for the definition of intended config), . nexthop-id is assigned by the I2RS client, and inserted into the I2RS agent, . the I2RS agent installs the I2RS RIB ephemeral state, and provides back status (installed, not installed). nexthop id allows for all types of next hops (chains, inet-v4, inet-v6, mac-address, interface tunnels) to be indicated with a single id that can be directly accessed. This allows these different types of next-hop to be directly referenced with the nexthop-id. As to protection, Let's base our discussion on I2RS RIB IM p. 19 (see below) The protection id - identifies of preference, nexthop-id. Preference ID identifies the tuple. You might have multiple tuples with a nexthop-id. Protection-id 1: preference=10, nexthop-id=1 Protection-id 2: preference = 2, nexthop-id=1 Protection-id 3: preference=1, nexthop-id = 1 Protection-id 4: preference =1, nexthop-id=2 I do not understand how the protection-id should be linked by nexthop. Sue ====================== I2RS RIB IM p. 19 for your reference: ---------------------------- ::= <1> <2> ) Derived as follows: ::= ::= ( ( )...) ::= ( ( )) ::= (( ( )) ::= (<1> (<2> )) Traffic can be load-balanced among multiple primary nexthops and a single backup. In such a case, the nexthop will look like: ::= (<1> ( ( ( ) ...)) <2> ) -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) Zhang Sent: Monday, October 05, 2015 9:59 AM To: i2rs@ietf.org Subject: [i2rs] RIB Info/Data model questions: nexthop-id Hi, Both the RIB info and data model mentions nexthop-id, but neither specifies who manages/assigns the ID. Can the specs point that out? It seems that it could be both ways - the IDs could be allocated by routers (servers) or could be allocated by clients. Different ID spaces would be used depending on who allocates the IDs. Related to the above, a specific question on the data model: grouping nexthop { leaf nexthop-id { mandatory true; type uint32; } choice nexthop-type { ... case nexthop-protection { list nexthop-protection-list { key "nexthop-protection-id"; leaf nexthop-protection-id { mandatory true; type uint32; } leaf nexthop-preference { ... } leaf nexthop { mandatory true; type nexthop-ref; } } } Here a nexthop-protection is a list. Being a list it requires a key and we defined this uint32 nexthop-protection-id, which I assume the controller needs to assign and both the controller and the router needs to remember. The list entry has a member "nexthop" which is a nexthop-ref, which is a nexthop-id: typedef nexthop-ref { type leafref { path "/i2rs-rib:routing-instance/i2rs-rib:rib-list" + "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:nexthop-id"; } } So - why can't we use the nexthop-id itself as the key? Thanks. Jeffrey _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs ------=_NextPart_000_0028_01D100D6.4FA21A40 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Jeffrey:

 

to = start this discussion going, I would like to provide you with the answer = that was given when the I2RS RIB Information Model was = designed.

 

·         = All I2RS RIB information is intended = config (see ietf-chairs-netmod-opstate-reqs-01 or = ietf-openconfig-netmod-opstat for the definition of intended config), =

·         = nexthop-id is assigned by the I2RS = client, and inserted into the I2RS agent,

·         = the I2RS agent installs the I2RS RIB = ephemeral state, and provides back status (installed, not installed). =

 

nexthop id  allows for all types of next hops = (chains, inet-v4, inet-v6, mac-address, interface tunnels) to be = indicated  with a single id that can be directly accessed.  = This allows these different types of next-hop to be directly referenced = with the nexthop-id.

 

As to = protection,  Let’s base our discussion on I2RS RIB IM p. 19 = (see below)

 

The = protection id – identifies of preference, nexthop-id.  = Preference ID identifies the tuple.   You might have multiple = tuples with a nexthop-id. 

 

Protection-id 1:  preference=3D10, = nexthop-id=3D1

Protection-id 2: =  preference =3D 2, nexthop-id=3D1

Protection-id 3:  preference=3D1, nexthop-id = =3D 1

Protection-id 4: preference = =3D1, nexthop-id=3D2

 

I do = not understand how the protection-id should be linked by nexthop. =

 

Sue

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D

I2RS RIB IM p. 19 for = your reference:

----------------------------

 

<nexthop> ::=3D <NEXTHOP_PROTECTION> = <1> <interface-primary>

         &= nbsp;           &n= bsp;           &nb= sp; <2> <interface-backup>)

 

Derived as follows:

 

<nexthop> ::=3D =
<nexthop-protection>
<nexthop> ::=3D <NEXTHOP_PROTECTION> =
(<NEXTHOP_PREFERENCE> <nexthop>
        &nb=
sp;        =
     (<NEXTHOP_PREFERENCE> =
<nexthop>)...)
<nexthop> ::=3D <NEXTHOP_PROTECTION> =
(<NEXTHOP_PREFERENCE> <nexthop>
        &nb=
sp;           &nbs=
p; (<NEXTHOP_PREFERENCE> =
<nexthop>))
<nexthop> ::=3D <NEXTHOP_PROTECTION> =
((<NEXTHOP_PREFERENCE> =
<nexthop-base>
        &nb=
sp;         =
    (<NEXTHOP_PREFERENCE> =
<nexthop-base>))
<nexthop> ::=3D <NEXTHOP_PROTECTION> =
(<1> <interface-primary>
        &nb=
sp;           &nbs=
p; (<2> <interface-backup>))

 

Traffic =
can be load-balanced among multiple primary nexthops and =
a
single backup.  In such a case, the nexthop =
will look like:
 
   <nexthop> ::=3D =
<NEXTHOP_PROTECTION> (<1>
        &nb=
sp;        =
(<NEXTHOP_LOAD_BALANCE>
        &nb=
sp;         =
(<NEXTHOP_LB_WEIGHT> =
<nexthop-base>
        &nb=
sp;         =
(<NEXTHOP_LB_WEIGHT> <nexthop-base>) =
...))
        &nb=
sp;          <2> =
<nexthop-base>)

 

 

-----Original Message-----
From: i2rs = [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) = Zhang
Sent: Monday, October 05, 2015 9:59 AM
To: = i2rs@ietf.org
Subject: [i2rs] RIB Info/Data model questions: = nexthop-id

 

Hi,

 

Both = the RIB info and data model mentions nexthop-id, but neither specifies = who manages/assigns the ID. Can the specs point that = out?

 

It seems that it could be both ways - the IDs could = be allocated by routers (servers) or could be allocated by clients. = Different ID spaces would be used depending on who allocates the = IDs.

 

Related to the above, a specific question on the = data model:

 

  = grouping nexthop {

    leaf nexthop-id = {

      = mandatory true;

      type = uint32;

    = }

    choice = nexthop-type {

       = ...

       case = nexthop-protection {

        list = nexthop-protection-list {

        &nbs= p;   key "nexthop-protection-id";

        &nbs= p;   leaf nexthop-protection-id {

        &nbs= p;     mandatory true;

        &nbs= p;     type uint32;

        &nbs= p;   }

        &nbs= p;  leaf nexthop-preference {

        &nbs= p;    ...

        &nbs= p;  }

        &nbs= p;  leaf nexthop {

        &nbs= p;    mandatory true;

        &nbs= p;    type nexthop-ref;

         =   }

        = }

      = }

 

Here a nexthop-protection is a list. Being a list = it requires a key and we defined this uint32 nexthop-protection-id, = which I assume the controller needs to assign and both the controller = and the router needs to remember. The list entry has a member = "nexthop" which is a nexthop-ref, which is a = nexthop-id:

 

  = typedef nexthop-ref {

    type leafref {

      path  = "/i2rs-rib:routing-instance/i2rs-rib:rib-list" = +

        &nbs= p;   = "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:nexthop-id";

    = }

  }

 

So - = why can't we use the nexthop-id itself as the key?

 

Thanks.

 

Jeffrey

 

_______________________________________________=

i2rs mailing list

i2rs@ietf.org<= o:p>

https://www.ietf.org/mail= man/listinfo/i2rs

------=_NextPart_000_0028_01D100D6.4FA21A40-- From nobody Wed Oct 7 05:51:10 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C96F21A033A for ; Wed, 7 Oct 2015 05:50:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i0a6g6lfCebl for ; Wed, 7 Oct 2015 05:50:47 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0141.outbound.protection.outlook.com [65.55.169.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C3021A02BE for ; Wed, 7 Oct 2015 05:50:46 -0700 (PDT) Received: from CY1PR0501MB1722.namprd05.prod.outlook.com (10.163.140.16) by CY1PR0501MB1449.namprd05.prod.outlook.com (10.160.148.155) with Microsoft SMTP Server (TLS) id 15.1.286.20; Wed, 7 Oct 2015 12:50:45 +0000 Received: from CY1PR0501MB1721.namprd05.prod.outlook.com (10.163.140.158) by CY1PR0501MB1722.namprd05.prod.outlook.com (10.163.140.16) with Microsoft SMTP Server (TLS) id 15.1.293.16; Wed, 7 Oct 2015 12:50:43 +0000 Received: from CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) by CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) with mapi id 15.01.0293.007; Wed, 7 Oct 2015 12:50:43 +0000 From: "Jeffrey (Zhaohui) Zhang" To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] RIB Info/Data model questions: nexthop-id Thread-Index: AdD/dCtXKfJtuMrwR0qqTgDiDr9MgABg6rMAAAGF52A= Date: Wed, 7 Oct 2015 12:50:43 +0000 Message-ID: References: <002701d100f7$d6b17050$841450f0$@ndzh.com> In-Reply-To: <002701d100f7$d6b17050$841450f0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; CY1PR0501MB1722; 5:dAAkikGwibqmAzvXGy1xcb7lRh8iwKgeS5HClHRSiKNjRxhyCUE5ZQ9JvwC39O9r1kyhacOcdp12oCS/ZwLRHB60VBwYuTj+iq9njwmEUf7IA3Wte4qZCxR6DS1QMycFCd7FaJ1tev854Yp7SDGnXQ==; 24:8xIoL8/qtegl/0B84om0/gYji7lB31f3mlfnrRn/rsBm74BmiiZYmsMKXuLoUGQH4OjoE/zrFL0faBsYZBR4XzR9BLkTzXXXG8ZgZhO50QA=; 20:IgrGuluCItcDTzM3BEAc23+NOrJfTMPdb9C5NbHSXgvT5Hg5XiZ6i+uVritJ+/1iHVw05dyHlRXrbM+H3faozg== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR0501MB1722; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(520078)(5005006)(3002001); SRVR:CY1PR0501MB1722; BCL:0; PCL:0; RULEID:; SRVR:CY1PR0501MB1722; x-forefront-prvs: 0722981D2A x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(13464003)(199003)(189002)(377454003)(50986999)(2501003)(10400500002)(87936001)(64706001)(107886002)(5001960100002)(101416001)(66066001)(40100003)(16236675004)(77096005)(33656002)(76576001)(19625215002)(5002640100001)(74316001)(11100500001)(54356999)(76176999)(2950100001)(2900100001)(189998001)(5004730100002)(19300405004)(97736004)(5007970100001)(5001770100001)(81156007)(5008740100001)(86362001)(15975445007)(19617315012)(102836002)(122556002)(46102003)(19580405001)(5003600100002)(92566002)(105586002)(99286002)(106356001)(19580395003)(19609705001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR0501MB1722; H:CY1PR0501MB1721.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_CY1PR0501MB1721DD274D7CDA2A1A9DF88CD4360CY1PR0501MB1721_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2015 12:50:43.4575 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0501MB1722 X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB1449; 2:xFRU7FNgFBf6CIIkOdLAAT+DHKazwVtOMI4+KklLXVlgZsWc1e+tWFsQoUtsB3XmGhPruISa1B4S4KvloplZ9jIMwG4NIBBY2zBbaxyjYvqW0/kgnC+evALbqrpM5zjgTNy0ze17kJN8cdC61Cn26NHgdT1QnlfFhGr73uKeDw4=; 23:xu7lg3ArV8vG1oK6vkNE3crohmnWXXm/u89r4+kgdqlLEKIM9CoZkD3oZnb7xsqwsG1tTDZiZfJv16rSN6Fe/02OC0MY+8Fbboh1h7iq5migaXFxq0DDOle7qXrRyx+bLv8tEohi7fqppiaRwKxIqxxnPkp9R97pEuOYGzpIktDvlZ5VL/uDIbSAetAxmd2z X-OriginatorOrg: juniper.net Archived-At: Subject: Re: [i2rs] RIB Info/Data model questions: nexthop-id X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 12:50:52 -0000 --_000_CY1PR0501MB1721DD274D7CDA2A1A9DF88CD4360CY1PR0501MB1721_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Sue, Before I posted the questions, I searched "nexthop-id" in the IM draft and = did not find anything definition; then this morning I found the following: Nexthops can be identified by an identifier to create a level of indirection. The identifier is set by the RIB manager and returned to the external entity on request. Is the above "identifier" the same as "nexthop-id"? If yes, then it conflic= ts with your text below? Jeffrey From: Susan Hares [mailto:shares@ndzh.com] Sent: Wednesday, October 07, 2015 8:01 AM To: Jeffrey (Zhaohui) Zhang ; i2rs@ietf.org Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id Jeffrey: to start this discussion going, I would like to provide you with the answer= that was given when the I2RS RIB Information Model was designed. * All I2RS RIB information is intended config (see ietf-chairs-netmo= d-opstate-reqs-01 or ietf-openconfig-netmod-opstat for the definition of in= tended config), * nexthop-id is assigned by the I2RS client, and inserted into the I= 2RS agent, * the I2RS agent installs the I2RS RIB ephemeral state, and provides= back status (installed, not installed). nexthop id allows for all types of next hops (chains, inet-v4, inet-v6, ma= c-address, interface tunnels) to be indicated with a single id that can be= directly accessed. This allows these different types of next-hop to be di= rectly referenced with the nexthop-id. As to protection, Let's base our discussion on I2RS RIB IM p. 19 (see belo= w) The protection id - identifies of preference, nexthop-id. Preference ID id= entifies the tuple. You might have multiple tuples with a nexthop-id. Protection-id 1: preference=3D10, nexthop-id=3D1 Protection-id 2: preference =3D 2, nexthop-id=3D1 Protection-id 3: preference=3D1, nexthop-id =3D 1 Protection-id 4: preference =3D1, nexthop-id=3D2 I do not understand how the protection-id should be linked by nexthop. Sue =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D I2RS RIB IM p. 19 for your reference: ---------------------------- ::=3D <1> <2> ) Derived as follows: ::=3D ::=3D ( ( )...) ::=3D ( ( )) ::=3D (( ( )) ::=3D (<1> (<2> )) Traffic can be load-balanced among multiple primary nexthops and a single backup. In such a case, the nexthop will look like: ::=3D (<1> ( ( ( ) ...)) <2> ) -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) Zh= ang Sent: Monday, October 05, 2015 9:59 AM To: i2rs@ietf.org Subject: [i2rs] RIB Info/Data model questions: nexthop-id Hi, Both the RIB info and data model mentions nexthop-id, but neither specifies= who manages/assigns the ID. Can the specs point that out? It seems that it could be both ways - the IDs could be allocated by routers= (servers) or could be allocated by clients. Different ID spaces would be u= sed depending on who allocates the IDs. Related to the above, a specific question on the data model: grouping nexthop { leaf nexthop-id { mandatory true; type uint32; } choice nexthop-type { ... case nexthop-protection { list nexthop-protection-list { key "nexthop-protection-id"; leaf nexthop-protection-id { mandatory true; type uint32; } leaf nexthop-preference { ... } leaf nexthop { mandatory true; type nexthop-ref; } } } Here a nexthop-protection is a list. Being a list it requires a key and we = defined this uint32 nexthop-protection-id, which I assume the controller ne= eds to assign and both the controller and the router needs to remember. The= list entry has a member "nexthop" which is a nexthop-ref, which is a nexth= op-id: typedef nexthop-ref { type leafref { path "/i2rs-rib:routing-instance/i2rs-rib:rib-list" + "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:nexthop-id"; } } So - why can't we use the nexthop-id itself as the key? Thanks. Jeffrey _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs --_000_CY1PR0501MB1721DD274D7CDA2A1A9DF88CD4360CY1PR0501MB1721_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Sue,

 

Before I posted the qu= estions, I searched “nexthop-id” in the IM draft and did not fi= nd anything definition; then this morning I found the following:=

 

   Nexthops can be identified by an = identifier to create a level of

   indirection.  The identifier= is set by the RIB manager and returned

   to the external entity on request= .

 

Is the above “identifier” the same as “nexthop-id&#= 8221;? If yes, then it conflicts with your text below?

 

Jeffrey

 

From: Susan Hares [mailto:shares@ndzh.com] Sent: Wednesday, October 07, 2015 8:01 AM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net>; i2rs@ietf.or= g
Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id

 

Jeffrey:

 

to start this discussion going, I would like to p= rovide you with the answer that was given when the I2RS RIB Information Mod= el was designed.

 

·        All I2RS RIB information is intended config = (see ietf-chairs-netmod-opstate-reqs-01 or ietf-openconfig-netmod-opstat fo= r the definition of intended config),

·        nexthop-id is assigned by the I2RS client, a= nd inserted into the I2RS agent,

·        the I2RS agent installs the I2RS RIB ephemer= al state, and provides back status (installed, not installed).

 

nexthop id  allows for all types of next hop= s (chains, inet-v4, inet-v6, mac-address, interface tunnels) to be indicate= d  with a single id that can be directly accessed.  This allows t= hese different types of next-hop to be directly referenced with the nexthop-id.

 

As to protection,  Let’s base our disc= ussion on I2RS RIB IM p. 19 (see below)

 

The protection id – identifies of preferenc= e, nexthop-id.  Preference ID identifies the tuple.   You mi= ght have multiple tuples with a nexthop-id. 

 

Protection-id 1:  preference=3D10, nexthop-i= d=3D1

Protection-id 2:  preference =3D 2, nexthop-= id=3D1

Protection-id 3:  preference=3D1, nexthop-id= =3D 1

Protection-id 4: preference =3D1, nexthop-id=3D2 =

 

I do not understand how the protection-id should = be linked by nexthop.

 

Sue

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D

I2RS RIB IM p. 19 for your reference: =

----------------------------

 

<nexthop= > ::=3D <NEXTHOP_PROTECTION> <1> <interface-primary>

  = ;            &n= bsp;            = ;        <2> <interface-backup&= gt;)

 

Derived as follows:

 

<nex=
thop> ::=3D <nexthop-protection>
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<NEXTHOP_PREFERENCE> <n=
exthop>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop>)...)
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<NEXTHOP_PREFERENCE> <n=
exthop>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop>))
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> ((<NEXTHOP_PREFERENCE> <=
nexthop-base>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop-base>))
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<1> <interface-primary&=
gt;
 &=
nbsp;           &nbs=
p;        (<2> <interface-backu=
p>))

 

Traffic=
 can be load-balanced among multiple primary nexthops and a
single =
backup.  In such a case, the nexthop will look like:=
&n=
bsp;
 &=
nbsp; <nexthop> ::=3D <NEXTHOP_PROTECTION> (<1>
 &=
nbsp;           &nbs=
p;   (<NEXTHOP_LOAD_BALANCE>
 &=
nbsp;           &nbs=
p;    (<NEXTHOP_LB_WEIGHT> <nexthop-base>
 &=
nbsp;           &nbs=
p;    (<NEXTHOP_LB_WEIGHT> <nexthop-base>) ...))=
 &=
nbsp;           &nbs=
p;     <2> <nexthop-base>)

 

 

-----Original Message-----
From: i2rs [
mailto:i2rs-bounces@ie= tf.org] On Behalf Of Jeffrey (Zhaohui) Zhang
Sent: Monday, October 05, 2015 9:59 AM
To: i2rs@ietf.org
Subject: [i2rs] RIB Info/Data model questions: nexthop-id

 

Hi,

 

Both the RIB info and data model mentions nexthop= -id, but neither specifies who manages/assigns the ID. Can the specs point = that out?

 

It seems that it could be both ways - the IDs cou= ld be allocated by routers (servers) or could be allocated by clients. Diff= erent ID spaces would be used depending on who allocates the IDs.

 

Related to the above, a specific question on the = data model:

 

  grouping nexthop {

    leaf nexthop-id {

      mandatory true;

      type uint32;<= /o:p>

    }

    choice nexthop-type {

       ...

       case nexthop= -protection {

        list n= exthop-protection-list {

        &= nbsp;   key "nexthop-protection-id";

        &= nbsp;   leaf nexthop-protection-id {

        &= nbsp;     mandatory true;

        &= nbsp;     type uint32;

        &= nbsp;   }

        &= nbsp;  leaf nexthop-preference {

        &= nbsp;    ...

        &= nbsp;  }

        &= nbsp;  leaf nexthop {

        &= nbsp;    mandatory true;

        &= nbsp;    type nexthop-ref;

         =   }

        }=

      }

 

Here a nexthop-protection is a list. Being a list= it requires a key and we defined this uint32 nexthop-protection-id, which = I assume the controller needs to assign and both the controller and the rou= ter needs to remember. The list entry has a member "nexthop" which is a nexthop-ref, which is a nextho= p-id:

 

  typedef nexthop-ref {

    type leafref {

      path  "/= i2rs-rib:routing-instance/i2rs-rib:rib-list" +

        &= nbsp;   "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:next= hop-id";

    }

  }

 

So - why can't we use the nexthop-id itself as th= e key?

 

Thanks.

 

Jeffrey

 

_______________________________________________

i2rs mailing list

i2rs@ietf.org

https://www.iet= f.org/mailman/listinfo/i2rs

--_000_CY1PR0501MB1721DD274D7CDA2A1A9DF88CD4360CY1PR0501MB1721_-- From nobody Wed Oct 7 08:19:48 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A052F1AC3F6; Wed, 7 Oct 2015 08:19:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UfKbNtyeHhZG; Wed, 7 Oct 2015 08:19:32 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7CA9E1AC3EF; Wed, 7 Oct 2015 08:19:32 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: X-Test-IDTracker: no X-IETF-IDTracker: 6.4.1 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20151007151932.22487.25820.idtracker@ietfa.amsl.com> Date: Wed, 07 Oct 2015 08:19:32 -0700 Archived-At: Cc: i2rs@ietf.org Subject: [i2rs] I-D Action: draft-ietf-i2rs-security-environment-reqs-00.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 15:19:33 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Interface to the Routing System Working Group of the IETF. Title : I2RS Environment Security Requirements Authors : Daniel Migault Joel Halpern Susan Hares Filename : draft-ietf-i2rs-security-environment-reqs-00.txt Pages : 19 Date : 2015-10-07 Abstract: This document provides environment security requirements for the I2RS architecture. Environment security requirements are independent of the protocol used for I2RS. As a result, the requirements provided in this document are intended to provide good security practise so I2RS can be securely deployed and operated. These security requirements are designated as environment security requirements as opposed to the protocol security requirements. The reason to have separate document is that protocol security requirements are intended to help the design of the I2RS protocol whether the environment requirements are rather intended for deployment or implementations. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-i2rs-security-environment-reqs/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-ietf-i2rs-security-environment-reqs-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Wed Oct 7 08:43:07 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 687071AC427 for ; Wed, 7 Oct 2015 08:42:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sMBCHn6K-eZy for ; Wed, 7 Oct 2015 08:42:53 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75A421AC42E for ; Wed, 7 Oct 2015 08:42:52 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml403-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CCE60878; Wed, 07 Oct 2015 15:42:50 +0000 (GMT) Received: from DFWEML704-CHM.china.huawei.com (10.193.5.141) by lhreml403-hub.china.huawei.com (10.201.5.217) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 7 Oct 2015 16:42:47 +0100 Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml704-chm ([10.193.5.141]) with mapi id 14.03.0235.001; Wed, 7 Oct 2015 08:42:46 -0700 From: Linda Dunbar To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - Thread-Index: AdEAk2BU9yZ2WnJ8TuuGrQLrVu1BdAAg2rUQ Date: Wed, 7 Oct 2015 15:42:45 +0000 Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D68874@dfweml701-chm> References: <007301d10095$65bb8410$31328c30$@ndzh.com> In-Reply-To: <007301d10095$65bb8410$31328c30$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.47.133.40] Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D68874dfweml701chm_" MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 15:42:55 -0000 --_000_4A95BA014132FF49AE685FAB4B9F17F657D68874dfweml701chm_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Support. Linda From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:16 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requireme= nts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares --_000_4A95BA014132FF49AE685FAB4B9F17F657D68874dfweml701chm_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Support.

 

Linda

 

From: i2rs [ma= ilto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015)= -

 

This begins a 2 week WG LC on the following requirem= ent documents for I2RS:

 

draft-ietf-i2rs-ephemeral-state-02.txt  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ep= hemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section is blank and this will be discussed at = the 10/17/2015 interim.

We will discuss whether this section should be kept = or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.tx= t

http://datatracker.ietf.org/doc/dra= ft-ietf-i2rs-protocol-security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2= rs-pub-sub-requirements/

 

draft-ietf-i2rs-traceability-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2rs-trace= ability/

 

Sue Hares

 

--_000_4A95BA014132FF49AE685FAB4B9F17F657D68874dfweml701chm_-- From nobody Wed Oct 7 08:43:41 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE3CD1AC42F for ; Wed, 7 Oct 2015 08:43:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.21 X-Spam-Level: X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0KbgiDK3BQjc for ; Wed, 7 Oct 2015 08:43:27 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 210B81AC415 for ; Wed, 7 Oct 2015 08:43:26 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CCE60930; Wed, 07 Oct 2015 15:43:21 +0000 (GMT) Received: from DFWEML705-CHM.china.huawei.com (10.193.5.142) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 7 Oct 2015 16:43:21 +0100 Received: from DFWEML701-CHM.china.huawei.com ([10.193.5.50]) by dfweml705-chm ([10.193.5.142]) with mapi id 14.03.0235.001; Wed, 7 Oct 2015 08:43:11 -0700 From: Linda Dunbar To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) Thread-Index: AdEAlyAxuYWhD++/Qk2AqdHuY4uxjAAf7pWg Date: Wed, 7 Oct 2015 15:43:11 +0000 Message-ID: <4A95BA014132FF49AE685FAB4B9F17F657D6888C@dfweml701-chm> References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.47.133.40] Content-Type: multipart/alternative; boundary="_000_4A95BA014132FF49AE685FAB4B9F17F657D6888Cdfweml701chm_" MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: 'Nitin Bahadur' , "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 15:43:29 -0000 --_000_4A95BA014132FF49AE685FAB4B9F17F657D6888Cdfweml701chm_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Support, Linda From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:36 PM To: i2rs@ietf.org Cc: 'Nitin Bahadur'; sriganesh.kini@ericsson.com Subject: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/= 20/2015) This begins a 2 week WG LC on draft-ietf-i2rs-rib-info-model-07.txt. You = can obtain the document by going to: http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/ The question you should consider: 1) Does this RIB info-model work will for read query and write query f= or small number of routes (1-10 routes)? 2) Does this RIB info-model work for a large number of routes 100,000 = routes? 3) Is the next-hop methodology support everything you wish in the I2RS= RIB? 4) The default mode for I2RS transport is a secure encrypted transport= . Does this information model need to have any portion of the model availa= ble over an insecure transport? Sue Hares --_000_4A95BA014132FF49AE685FAB4B9F17F657D6888Cdfweml701chm_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Support,

 

Linda

 

From: i2rs [ma= ilto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 7:36 PM
To: i2rs@ietf.org
Cc: 'Nitin Bahadur'; sriganesh.kini@ericsson.com
Subject: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6= to 10/20/2015)

 

This begins a 2 week WG LC on draft-ietf-i2rs-rib-in= fo-model-07.txt.   You can obtain the document by going to:

http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib= -info-model/

 

The question you should consider:

 

1)      Does this RIB info-model work will for read query a= nd write query for small number of routes (1-10 routes)?

2)      Does this RIB info-model work for a large number of= routes 100,000 routes? 

3)      Is the next-hop methodology support everything you = wish in the I2RS RIB?

4)      The default mode for I2RS transport is a secure enc= rypted transport.  Does this information model need to have any portio= n of the model available over an insecure transport?

 

Sue Hares

--_000_4A95BA014132FF49AE685FAB4B9F17F657D6888Cdfweml701chm_-- From nobody Wed Oct 7 08:59:40 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE88F1ACCE5 for ; Wed, 7 Oct 2015 08:59:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YQAyKcMXc-qm for ; Wed, 7 Oct 2015 08:59:20 -0700 (PDT) Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1bon0737.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::1:737]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99AC61ACCE6 for ; Wed, 7 Oct 2015 08:59:17 -0700 (PDT) Received: from CY1PR0501MB1721.namprd05.prod.outlook.com (10.163.140.158) by CY1PR0501MB1724.namprd05.prod.outlook.com (10.163.140.18) with Microsoft SMTP Server (TLS) id 15.1.293.16; Wed, 7 Oct 2015 15:58:57 +0000 Received: from CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) by CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) with mapi id 15.01.0293.007; Wed, 7 Oct 2015 15:58:57 +0000 From: "Jeffrey (Zhaohui) Zhang" To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) Thread-Index: AdEAlyAxuYWhD++/Qk2AqdHuY4uxjAAbQ4EQ Date: Wed, 7 Oct 2015 15:58:57 +0000 Message-ID: References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; CY1PR0501MB1724; 5:8js58R8qsllqtxl+RFQFqqsi914Ur5FR5xnum5CckWqTk7dE+1XOoB6Vz5oSly04GekxdJBojxCTKHJtujI1GzHfq1w2zIMI6wAAlngsiJwETs4GxCIrRlWSThYgcIpEHl/7ITKxHpE2dmYcTZOgAA==; 24:WHsGi/TS7gWQHG1cnFDi6D3cICeD4wrMaN54o8NibwZEIadJP4JZv/CMBODSUfHPrKqki+FZQ8xXMxbonUp8gLk8pW0XewLQYrXf9stYhKA=; 20:nJDm6hyq1yMuOryoUBvG2tJ+bYaVolIk8I7I/M3CPVBjLLS54QTuKQXujLVxcbmRJEL0tWYvdNTG3EZzrJADYQ== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR0501MB1724; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(5005006)(520078)(8121501046)(3002001); SRVR:CY1PR0501MB1724; BCL:0; PCL:0; RULEID:; SRVR:CY1PR0501MB1724; x-forefront-prvs: 0722981D2A x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(199003)(377454003)(189002)(479174004)(5423002)(74316001)(5001770100001)(40100003)(5008740100001)(81156007)(66066001)(86362001)(77096005)(97736004)(11100500001)(64706001)(99286002)(76176999)(101416001)(92566002)(15975445007)(2501003)(54356999)(50986999)(105586002)(5002640100001)(33656002)(19300405004)(189998001)(16236675004)(102836002)(5001960100002)(5004730100002)(19580405001)(10400500002)(106356001)(87936001)(19580395003)(5007970100001)(19617315012)(76576001)(5003600100002)(19625215002)(230783001)(2900100001)(2950100001)(122556002)(46102003)(19609705001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR0501MB1724; H:CY1PR0501MB1721.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_CY1PR0501MB1721BE96BF56DD4FF93F5462D4360CY1PR0501MB1721_" MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2015 15:58:57.1288 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0501MB1724 Archived-At: Cc: 'Nitin Bahadur' , "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 15:59:25 -0000 --_000_CY1PR0501MB1721BE96BF56DD4FF93F5462D4360CY1PR0501MB1721_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I have following questions/comments. I'll have a separate email on Sue's qu= estion 3). When writing an object to a RIB, the external entity SHOULD try to write all dependencies of the object prior to sending that object. The data-model MUST support requesting identifiers for nexthops and collecting the identifiers back in the response. Apparently this is different from Sue's understanding (see other email thre= ad "RE: [i2rs] RIB Info/Data model questions: nexthop-id", so this needs to= be straightened out. The RIB data-model SHOULD support a way to optionally receive a nexthop identifier for a given nexthop. Earlier it says "MUST" and now it's "SHOULD". 2.4.3. Nexthop content At the lowest level, a nexthop can be one of: o identifier: This is an identifier returned by the network device representing another nexthop or another nexthop chain. "or another nexthop chain" should be removed. "another nexthop" covers ever= ything. o tunnel encap: This can be an encap representing an IP tunnel or MPLS tunnel or others as defined in this document. An optional egress interface can be specified to indicate which interface to send the packet out on. The egress interface is useful when the network device contains Ethernet interfaces and one needs to perform address resolution for the IP packet. I don't think an egress interface should be part of the tunnel encap. The e= gress interface and optionally a nbr address should be in a separate chain = member. 2.4.3's title is "nexthop content" but it focuses on nexthops at the "lowes= t level". 2.4.4 is about "special nexthops" and that should be folded into = 2.4.3 (since special nexthops are at the "lowest level"). ::=3D ( | | | | ) ::=3D | | | | We have two rules for here. They are equivalent and one should be r= emoved. ::=3D | | Is there a real need for routes? What's the real difference between <= src> and routes? ::=3D | ::=3D ... ::=3D | When would you use "chain_name"? What's the difference/relationship between= and nexthop-identifier? ::=3D | | | | ( ( | )) | ( ) | ( []) | | ) The above model makes it that even the very basic nexthops are defined thro= ugh nexthop-chain - unnecessary twist and it leads to unnatural representat= ion when it comes to the data model (e.g. the chain is a list and each list= entry has a client-assigned ID as key). As section 2.4.2 alluded to, all the above "nexthop-chain-member" are just = basic nexthops shoulder to shoulder with "nexthop-special". Therefore, the = following model would be more natural? ::=3D | | <-- new | | ::=3D | | | ... | ::=3D ... ----------------------------- ::=3D ( ...) ::=3D ( [] [] []) | ( []) is part of - so does not make sense= ? ----------------------------- A backup can also have another backup. In such a case, the list will look like: ::=3D (<1> <2> <3> ) Unless it meant "A PRIMAY can also have another backup", shouldn't the abov= e be the following? :: =3D (<1> <2> (<1> <2> )) Jeffrey From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 8:36 PM To: i2rs@ietf.org Cc: 'Nitin Bahadur' ; sriganesh.kini@ericsson.com Subject: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/= 20/2015) This begins a 2 week WG LC on draft-ietf-i2rs-rib-info-model-07.txt. You = can obtain the document by going to: http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/ The question you should consider: 1) Does this RIB info-model work will for read query and write query f= or small number of routes (1-10 routes)? 2) Does this RIB info-model work for a large number of routes 100,000 = routes? 3) Is the next-hop methodology support everything you wish in the I2RS= RIB? 4) The default mode for I2RS transport is a secure encrypted transport= . Does this information model need to have any portion of the model availa= ble over an insecure transport? Sue Hares --_000_CY1PR0501MB1721BE96BF56DD4FF93F5462D4360CY1PR0501MB1721_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I have following quest= ions/comments. I’ll have a separate email on Sue’s question 3).=

 

   When writing an object to a RIB, the= external entity SHOULD try to

   write all dependencies of the object= prior to sending that object.

   The data-model MUST support requesti= ng identifiers for nexthops and

   collecting the identifiers back in t= he response.

 

Apparently this is different from Sue’s under= standing (see other email thread “RE: [i2rs] RIB Info/Data model questions: nexthop-id”, so this needs to be straightened out.<= o:p>

 

   The RIB data-model SHOULD support

   a way to optionally receive a nextho= p identifier for a given nexthop.

 

Earlier it says = 220;MUST” and now it’s “SHOULD”.<= /p>

 

2.4.3.  Nexthop content

 

   At the lowest level, a nexthop can b= e one of:

   o  identifier: This is an ident= ifier returned by the network device

      representing anoth= er nexthop or another nexthop chain.

 

“or another nexthop chain” should be re= moved. “another nexthop” covers everything.

 

   o  tunnel encap: This can be an= encap representing an IP tunnel or

      MPLS tunnel or oth= ers as defined in this document.  An optional

      egress interface c= an be specified to indicate which interface to

      send the packet ou= t on.  The egress interface is useful when the

      network device con= tains Ethernet interfaces and one needs to

      perform address re= solution for the IP packet.

 

I don’t think an egress interface should be p= art of the tunnel encap. The egress interface and optionally a nbr address should be in a separate chain member.

 

2.4.3’s title is “nexthop content”= ; but it focuses on nexthops at the “lowest level”. 2.4.4 is ab= out “special nexthops” and that should be folded into 2.4.3 (since= special nexthops are at the “lowest level”).=

 

       <match>= ; ::=3D <route-type> (<ipv4-route> | <ipv6-route> | <m= pls-route> |

        &= nbsp;           &nbs= p;      <mac-route> | <interface-route>= ;)

       <match>= ; ::=3D <IPV4> <ipv4-route> | <IPV6> <ipv6-route> |=

        &= nbsp;    <MPLS> <MPLS_LABEL> | <IEEE_MAC> = <MAC_ADDRESS> |

        &= nbsp;    <INTERFACE> <INTERFACE_IDENTIFIER>=

 

We have two rules for <match> here. They are = equivalent and one should be removed.

 

       <ip-route= -type> ::=3D <SRC> | <DEST> | <DEST_SRC>

 

Is there a real need for <src> routes? What&#= 8217;s the real difference between <src> and <dest> routes?

 

    <nexthop-base> ::=3D <= ;nexthop-special> | <nexthop-chain>

 

 

    <nexthop-chain> ::=3D &l= t;nexthop-chain-member> ...

    <nexthop-chain-identifier&g= t; ::=3D <NEXTHOP_CHAIN_NAME> |

        &= nbsp;           &nbs= p;           <NEXTHOP_= CHAIN_ID>

 

When would you use "chain_name"? What's t= he difference/relationship between <NEXTHOP_CHAIN_ID> and nexthop-identifier?

 

    <nexthop-chain-member> := :=3D <nexthop-chain-member-identifier> |

        &= nbsp;       <EGRESS_INTERFACE> |

        &= nbsp;       <ipv4-address> | <ipv6-a= ddress> |

        &= nbsp;       (<EGRESS_INTERFACE> (<ip= v4-address> | <ipv6-address>)) |

        &= nbsp;       (<EGRESS_INTERFACE> <IEE= E_MAC_ADDRESS>) |

        &= nbsp;       (<tunnel-encap> [<EGRESS= _INTERFACE>]) |

        &= nbsp;       <logical-tunnel> |

        &= nbsp;       <RIB_NAME>)

 

The above model mak= es it that even the very basic nexthops are defined through nexthop-chain &= #8211; unnecessary twist and it leads to unnatural representation when it comes to the data model (e.g. the chain is a list a= nd each list entry has a client-assigned ID as key).

 

As section 2.4.2 al= luded to, all the above “nexthop-chain-member” are just basic n= exthops shoulder to shoulder with “nexthop-special”. Therefore, the following model would be more natural?

 

  <nexthop&= gt; ::=3D <nexthop-base> |

   &= nbsp;            <= ;nexthop-chain> |      <-- new

   &= nbsp;            <= ;nexthop-replicate> |

   &= nbsp;            <= ;nexthop-lb> |

   &= nbsp;            <= ;nexthop-protection>

 

  <nexthop-= base> ::=3D <nexthop-special> |

   &= nbsp;           &nbs= p;     <nexthop-identifier> |

   &= nbsp;           &nbs= p;     <egress-interface> |

   &= nbsp;           &nbs= p;     …

   &= nbsp;           &nbs= p;     <logical-tunnel> |

   &= nbsp;           &nbs= p;     <RIB_NAME>

 

  <nexthop-= chain> ::=3D <nexthop>…

 

-----------------------------

 

<mpls-header> ::=3D (<mpls-label-operati= on> ...)

<mpls-label-operation> ::=3D (<MPLS_PUSH= > <MPLS_LABEL> [<S_BIT>]

        &= nbsp;           &nbs= p;       [<TOS_VALUE>] [<TTL_VALUE&g= t;]) |

        &= nbsp;           &nbs= p;       (<MPLS_POP> [<TTL_ACTION>= ;])

 

<mpls-header>= is part of <tunnel-encap> - so <MPLS_POP> does not make sense?=

 

-----------------------------

 

   A backup can also have another backu= p.  In such a case, the list will

   look like:

 

   <nexthop> ::=3D <NEXTHOP_PR= OTECTION> (<1> <nexthop>

        &= nbsp;        <2> <nexthop> &= lt;3> <nexthop>)

 

Unless it meant “A PRIMAY can also have anoth= er backup”, shouldn’t the above be the following?

 

      <nexthop> :: = =3D <NEXTHOP_PROTECTION> (<1> <nexthhop> <2> <NE= XTHOP_PROTECTION>(<1> <nexthop> <2> <nexhop>))

 

Jeffrey

 

From: i2rs [mailto:i2rs-bounces@ietf.org] = On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 8:36 PM
To: i2rs@ietf.org
Cc: 'Nitin Bahadur' <nitin_bahadur@yahoo.com>; sriganesh.kini@= ericsson.com
Subject: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6= to 10/20/2015)

 

This begins a 2 week WG LC on draft-ietf-i2rs-rib-in= fo-model-07.txt.   You can obtain the document by going to:

http://datatracker.ietf.org/doc/draft-ietf-i2rs-rib= -info-model/

 

The question you should consider:

 

1)      Does this RIB info-model work will for read query a= nd write query for small number of routes (1-10 routes)?

2)      Does this RIB info-model work for a large number of= routes 100,000 routes? 

3)      Is the next-hop methodology support everything you = wish in the I2RS RIB?

4)      The default mode for I2RS transport is a secure enc= rypted transport.  Does this information model need to have any portio= n of the model available over an insecure transport?

 

Sue Hares

--_000_CY1PR0501MB1721BE96BF56DD4FF93F5462D4360CY1PR0501MB1721_-- From nobody Wed Oct 7 12:55:05 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D8651AD1C3 for ; Wed, 7 Oct 2015 12:55:03 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2PA8jMdrpk67 for ; Wed, 7 Oct 2015 12:54:58 -0700 (PDT) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0133.outbound.protection.outlook.com [207.46.100.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 818341AD1EE for ; Wed, 7 Oct 2015 12:54:58 -0700 (PDT) Received: from CY1PR0501MB1721.namprd05.prod.outlook.com (10.163.140.158) by CY1PR0501MB1723.namprd05.prod.outlook.com (10.163.140.17) with Microsoft SMTP Server (TLS) id 15.1.293.16; Wed, 7 Oct 2015 19:54:56 +0000 Received: from CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) by CY1PR0501MB1721.namprd05.prod.outlook.com ([10.163.140.158]) with mapi id 15.01.0293.007; Wed, 7 Oct 2015 19:54:56 +0000 From: "Jeffrey (Zhaohui) Zhang" To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] RIB Info/Data model questions: nexthop-id Thread-Index: AdD/dCtXKfJtuMrwR0qqTgDiDr9MgABg6rMAAAGF52AACQ8NUA== Date: Wed, 7 Oct 2015 19:54:55 +0000 Message-ID: References: <002701d100f7$d6b17050$841450f0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; CY1PR0501MB1723; 5:3yyHylqOtxWOSFkXp7zBAscs3FyuMr9i8iyBs+Yp5VIjjdmq0wBcunwjFKk6BLkbi/PErXvWIDbS76fZ961pVfA7t0IjoRfRA+65ZkS0txGOZxAVEvnT84X0oD7yeG9dKnPs8+GPS/fcP7hgp9YssA==; 24:6lCBOlBf2bM6Quj0yEpuOxT+C2dxoVqcwjRDM8dueloMgXlj7QJc6EVGDQCqliJEdXzOVooY0kfJnm9sZT7v5DsMIfJYJ2qmrOxnggvYMoM=; 20:gH9J89itRzG22G19dTjgUkGsvkesnakma+Et8pmgDNMcfSoAdKTVvllttbiIxxbF1MQaHO6LCSR6IIn4dXd0jA== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR0501MB1723; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(520078)(5005006)(3002001); SRVR:CY1PR0501MB1723; BCL:0; PCL:0; RULEID:; SRVR:CY1PR0501MB1723; x-forefront-prvs: 0722981D2A x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(377454003)(13464003)(189002)(199003)(86362001)(15975445007)(106356001)(189998001)(87936001)(19300405004)(19625215002)(77096005)(99286002)(66066001)(102836002)(64706001)(11100500001)(33656002)(5001960100002)(10400500002)(19609705001)(5008740100001)(2501003)(19617315012)(107886002)(46102003)(40100003)(5007970100001)(19580405001)(19580395003)(122556002)(92566002)(97736004)(81156007)(50986999)(5004730100002)(105586002)(5002640100001)(2900100001)(74316001)(54356999)(5003600100002)(76176999)(76576001)(101416001)(16236675004)(5001770100001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR0501MB1723; H:CY1PR0501MB1721.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_CY1PR0501MB17218F513C79041679E35F5BD4360CY1PR0501MB1721_" MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Oct 2015 19:54:56.0322 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0501MB1723 Archived-At: Subject: Re: [i2rs] RIB Info/Data model questions: nexthop-id X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2015 19:55:03 -0000 --_000_CY1PR0501MB17218F513C79041679E35F5BD4360CY1PR0501MB1721_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Sue, > The protection id - identifies of preference, nexthop-id. Preference ID = identifies the tuple. You might have multiple tuples with a nexthop-id. > > Protection-id 1: preference=3D10, nexthop-id=3D1 > Protection-id 2: preference =3D 2, nexthop-id=3D1 > Protection-id 3: preference=3D1, nexthop-id =3D 1 > Protection-id 4: preference =3D1, nexthop-id=3D2 Why would we have the first three tuples with the same nexthop-id? Assuming that each tuple has a different nexthop-id. For nexthop-lb, nextho= p-protection, and nexthop-replicate, the order of each tuple would not matt= er (ordered-by-system). Why bother using an additional protection/lb/replic= ate-id as the key? Using a client-assigned ID as the protection/lb/replicate-id means a router= will have to store it, and be able find the tuple given that ID. I'd rathe= r using the nexthop-id for the purpose? Jeffrey From: Jeffrey (Zhaohui) Zhang Sent: Wednesday, October 07, 2015 8:51 AM To: 'Susan Hares' ; i2rs@ietf.org Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id Hi Sue, Before I posted the questions, I searched "nexthop-id" in the IM draft and = did not find anything definition; then this morning I found the following: Nexthops can be identified by an identifier to create a level of indirection. The identifier is set by the RIB manager and returned to the external entity on request. Is the above "identifier" the same as "nexthop-id"? If yes, then it conflic= ts with your text below? Jeffrey From: Susan Hares [mailto:shares@ndzh.com] Sent: Wednesday, October 07, 2015 8:01 AM To: Jeffrey (Zhaohui) Zhang >= ; i2rs@ietf.org Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id Jeffrey: to start this discussion going, I would like to provide you with the answer= that was given when the I2RS RIB Information Model was designed. * All I2RS RIB information is intended config (see ietf-chairs-netmo= d-opstate-reqs-01 or ietf-openconfig-netmod-opstat for the definition of in= tended config), * nexthop-id is assigned by the I2RS client, and inserted into the I= 2RS agent, * the I2RS agent installs the I2RS RIB ephemeral state, and provides= back status (installed, not installed). nexthop id allows for all types of next hops (chains, inet-v4, inet-v6, ma= c-address, interface tunnels) to be indicated with a single id that can be= directly accessed. This allows these different types of next-hop to be di= rectly referenced with the nexthop-id. As to protection, Let's base our discussion on I2RS RIB IM p. 19 (see belo= w) The protection id - identifies of preference, nexthop-id. Preference ID id= entifies the tuple. You might have multiple tuples with a nexthop-id. Protection-id 1: preference=3D10, nexthop-id=3D1 Protection-id 2: preference =3D 2, nexthop-id=3D1 Protection-id 3: preference=3D1, nexthop-id =3D 1 Protection-id 4: preference =3D1, nexthop-id=3D2 I do not understand how the protection-id should be linked by nexthop. Sue =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D I2RS RIB IM p. 19 for your reference: ---------------------------- ::=3D <1> <2> ) Derived as follows: ::=3D ::=3D ( ( )...) ::=3D ( ( )) ::=3D (( ( )) ::=3D (<1> (<2> )) Traffic can be load-balanced among multiple primary nexthops and a single backup. In such a case, the nexthop will look like: ::=3D (<1> ( ( ( ) ...)) <2> ) -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Jeffrey (Zhaohui) Zh= ang Sent: Monday, October 05, 2015 9:59 AM To: i2rs@ietf.org Subject: [i2rs] RIB Info/Data model questions: nexthop-id Hi, Both the RIB info and data model mentions nexthop-id, but neither specifies= who manages/assigns the ID. Can the specs point that out? It seems that it could be both ways - the IDs could be allocated by routers= (servers) or could be allocated by clients. Different ID spaces would be u= sed depending on who allocates the IDs. Related to the above, a specific question on the data model: grouping nexthop { leaf nexthop-id { mandatory true; type uint32; } choice nexthop-type { ... case nexthop-protection { list nexthop-protection-list { key "nexthop-protection-id"; leaf nexthop-protection-id { mandatory true; type uint32; } leaf nexthop-preference { ... } leaf nexthop { mandatory true; type nexthop-ref; } } } Here a nexthop-protection is a list. Being a list it requires a key and we = defined this uint32 nexthop-protection-id, which I assume the controller ne= eds to assign and both the controller and the router needs to remember. The= list entry has a member "nexthop" which is a nexthop-ref, which is a nexth= op-id: typedef nexthop-ref { type leafref { path "/i2rs-rib:routing-instance/i2rs-rib:rib-list" + "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:nexthop-id"; } } So - why can't we use the nexthop-id itself as the key? Thanks. Jeffrey _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs --_000_CY1PR0501MB17218F513C79041679E35F5BD4360CY1PR0501MB1721_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Sue,=

 

> The protection i= d – identifies of preference, nexthop-id.  Preference ID identif= ies the tuple.   You might have multiple tuples with a nexthop-id= . 

> 

> Protection-id 1:  preference=3D10, next= hop-id=3D1

> Protection-id 2:  preference =3D 2, nex= thop-id=3D1

> Protection-id 3:  preference=3D1, nexth= op-id =3D 1

> Protection-id 4: preference =3D1, nexthop-id= =3D2

 

Why would we have t= he first three tuples with the same nexthop-id?

 

Assuming that each = tuple has a different nexthop-id. For nexthop-lb, nexthop-protection, and n= exthop-replicate, the order of each tuple would not matter (ordered-by-system). Why bother using an additional= protection/lb/replicate-id as the key?

 

Using a client-assi= gned ID as the protection/lb/replicate-id means a router will have to store= it, and be able find the tuple given that ID. I’d rather using the nexthop-id for the purpose?=

 

Jeffrey<= /span>

 

From: Jeffrey (Zhaohui) Zhang
Sent: Wednesday, October 07, 2015 8:51 AM
To: 'Susan Hares' <shares@ndzh.com>; i2rs@ietf.org
Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id

 

Hi Sue,

 

Before I posted the qu= estions, I searched “nexthop-id” in the IM draft and did not fi= nd anything definition; then this morning I found the following:=

 

   Nexthops can be identified by an = identifier to create a level of

   indirection.  The identifier= is set by the RIB manager and returned

   to the external entity on request= .

 

Is the above “id= entifier” the same as “nexthop-id”? If yes, then it confl= icts with your text below?

 

Jeffrey

 

From: Susan Hares [mailto:shares@ndzh.com]
Sent: Wednesday, October 07, 2015 8:01 AM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net>; i2rs@ietf.org
Subject: RE: [i2rs] RIB Info/Data model questions: nexthop-id

 

Jeffrey:

 

to start this discussion going, I would like to p= rovide you with the answer that was given when the I2RS RIB Information Mod= el was designed.

 

·        All I2RS RIB information is intended config = (see ietf-chairs-netmod-opstate-reqs-01 or ietf-openconfig-netmod-opstat fo= r the definition of intended config),

·        nexthop-id is assigned by the I2RS client, a= nd inserted into the I2RS agent,

·        the I2RS agent installs the I2RS RIB ephemer= al state, and provides back status (installed, not installed).

 

nexthop id  allows for all types of next hop= s (chains, inet-v4, inet-v6, mac-address, interface tunnels) to be indicate= d  with a single id that can be directly accessed.  This allows t= hese different types of next-hop to be directly referenced with the nexthop-id.

 

As to protection,  Let’s base our disc= ussion on I2RS RIB IM p. 19 (see below)

 

The protection id – identifies of preferenc= e, nexthop-id.  Preference ID identifies the tuple.   You mi= ght have multiple tuples with a nexthop-id. 

 

Protection-id 1:  preference=3D10, nexthop-i= d=3D1

Protection-id 2:  preference =3D 2, nexthop-= id=3D1

Protection-id 3:  preference=3D1, nexthop-id= =3D 1

Protection-id 4: preference =3D1, nexthop-id=3D2 =

 

I do not understand how the protection-id should = be linked by nexthop.

 

Sue

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D

I2RS RIB IM p. 19 for your reference: =

----------------------------

 

<nexthop= > ::=3D <NEXTHOP_PROTECTION> <1> <interface-primary>

  = ;            &n= bsp;            = ;        <2> <interface-backup&= gt;)

 

Derived as follows:

 

<nex=
thop> ::=3D <nexthop-protection>
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<NEXTHOP_PREFERENCE> <n=
exthop>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop>)...)
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<NEXTHOP_PREFERENCE> <n=
exthop>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop>))
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> ((<NEXTHOP_PREFERENCE> <=
nexthop-base>
 &=
nbsp;           &nbs=
p;        (<NEXTHOP_PREFERENCE> &l=
t;nexthop-base>))
<nex=
thop> ::=3D <NEXTHOP_PROTECTION> (<1> <interface-primary&=
gt;
 &=
nbsp;           &nbs=
p;        (<2> <interface-backu=
p>))

 

Traffic=
 can be load-balanced among multiple primary nexthops and a
single =
backup.  In such a case, the nexthop will look like:=
&n=
bsp;
 &=
nbsp; <nexthop> ::=3D <NEXTHOP_PROTECTION> (<1>
 &=
nbsp;           &nbs=
p;   (<NEXTHOP_LOAD_BALANCE>
 &=
nbsp;           &nbs=
p;    (<NEXTHOP_LB_WEIGHT> <nexthop-base>
 &=
nbsp;           &nbs=
p;    (<NEXTHOP_LB_WEIGHT> <nexthop-base>) ...))=
 &=
nbsp;           &nbs=
p;     <2> <nexthop-base>)

 

 

-----Original Message-----
From: i2rs [mailto:i2rs-bounces@ie= tf.org] On Behalf Of Jeffrey (Zhaohui) Zhang
Sent: Monday, October 05, 2015 9:59 AM
To: i2rs@ietf.org
Subject: [i2rs] RIB Info/Data model questions: nexthop-id

 

Hi,

 

Both the RIB info and data model mentions nexthop= -id, but neither specifies who manages/assigns the ID. Can the specs point = that out?

 

It seems that it could be both ways - the IDs cou= ld be allocated by routers (servers) or could be allocated by clients. Diff= erent ID spaces would be used depending on who allocates the IDs.

 

Related to the above, a specific question on the = data model:

 

  grouping nexthop {

    leaf nexthop-id {

      mandatory true;

      type uint32;<= /o:p>

    }

    choice nexthop-type {

       ...

       case nexthop= -protection {

        list n= exthop-protection-list {

        &= nbsp;   key "nexthop-protection-id";

        &= nbsp;   leaf nexthop-protection-id {

        &= nbsp;     mandatory true;

        &= nbsp;     type uint32;

        &= nbsp;   }

        &= nbsp;  leaf nexthop-preference {

        &= nbsp;    ...

        &= nbsp;  }

        &= nbsp;  leaf nexthop {

        &= nbsp;    mandatory true;

        &= nbsp;    type nexthop-ref;

         =   }

        }=

      }

 

Here a nexthop-protection is a list. Being a list= it requires a key and we defined this uint32 nexthop-protection-id, which = I assume the controller needs to assign and both the controller and the rou= ter needs to remember. The list entry has a member "nexthop" which is a nexthop-ref, which is a nextho= p-id:

 

  typedef nexthop-ref {

    type leafref {

      path  "/= i2rs-rib:routing-instance/i2rs-rib:rib-list" +

        &= nbsp;   "/i2rs-rib:route-list/i2rs-rib:nexthop/i2rs-rib:next= hop-id";

    }

  }

 

So - why can't we use the nexthop-id itself as th= e key?

 

Thanks.

 

Jeffrey

 

_______________________________________________

i2rs mailing list

i2rs@ietf.org

https://www.iet= f.org/mailman/listinfo/i2rs

--_000_CY1PR0501MB17218F513C79041679E35F5BD4360CY1PR0501MB1721_-- From nobody Wed Oct 7 17:04:52 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57FFD1A890F for ; Wed, 7 Oct 2015 17:04:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.707 X-Spam-Level: X-Spam-Status: No, score=-2.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x9UurOJpmW0Z for ; Wed, 7 Oct 2015 17:04:49 -0700 (PDT) Received: from nm21-vm7.bullet.mail.gq1.yahoo.com (nm21-vm7.bullet.mail.gq1.yahoo.com [98.136.217.54]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E99811A893C for ; Wed, 7 Oct 2015 17:04:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1444262688; bh=vfDap4M/BtibyuGtcsC5Ol/6nDuVyOvH/IKmVAlAiR0=; h=Date:Subject:From:To:CC:References:In-Reply-To:From:Subject; b=ZO1Heg8C0Z7lWupBmHaZXHihdCWNFebUzouVkZf2WYhRjZphtmy6e6y5anaOpZa0+c1Xd3aSY65VAFZtY2bThpk97Ojdmo/rVn+grgzDd0M+cnXlFnNFQJBr6nsBbfMJf7vQRC15c7pbY3fu/gEa2lmfHPsZCJA28WHcm9H6sgv0DOuGHhgiZZAFVHjIfxr9N34yllpZGwg3Nfiz06Bc2L42c1qk3KyJtlwtBBVkbJm66gRbLQY6fEN+t9R2wewjRfotqvIYXs5OUQjYvkf8Utu5HG1j1izMP/qEMniifNpgcGyRk8U9zwk4qZ3ncYK3iazBZjtBYE8W2Uu6S2MDEg== Received: from [216.39.60.180] by nm21.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:04:48 -0000 Received: from [98.136.164.74] by tm16.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:04:48 -0000 Received: from [127.0.0.1] by smtp236.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:04:48 -0000 X-Yahoo-Newman-Id: 363865.92203.bm@smtp236.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: uW9vHAgVM1m1jAjhXpssCc3atk9vATvwxMQcN6JnSb080Uh wK8SS.aosF3MZb4tzSrnINTUmHOxlpnpx21jvLM7hCxc7X3tu72TPE9jglvX Eb6lHPu5d2RRNDTG69Tzdy2Y9eRN20NMyk8QjM2u912IuAKPNSX53HIzZFjr LiQpRPAhjjTf6fjq6RRNIUKFM8PKXCEUMCUD8WUybwRrf9bkjPAiAigWU8Ta 5X_KfhLHFv.3X1axvl7_x09Cyw_hBjnRX1h4sBaEe_B9SGWMqm59cFy_eoMz F2q0As0IoJHojGunhGTfeyMHBLvnyRn0GY3Y56DGJLBdZUcGSy_7tQfwKZXl M0SXnVuufFn9gxDMka1fGgds675dZDHeDXgP1p9.LZKvkCbnR1UyY353OexU yaHKjpIhboa1_SsrsoLDkILB_4AeUaCmUItx5P8IjqjsgEQT4qb1aUD9bUkT nOxK0eT8LZnY2I7nCviK2A2rmCC1CaTTelCW5SQM6A4pmJjryhd5GVatZWiQ dfOoBJGzpbXuCALk4IuDFRs16tVq1LfnMHO48vThA X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Wed, 07 Oct 2015 17:04:42 -0700 From: Nitin Bahadur To: Susan Hares , "'Jeffrey (Zhaohui) Zhang'" Message-ID: Thread-Topic: [i2rs] RIB Info/Data model questions: nexthop-id References: <002701d100f7$d6b17050$841450f0$@ndzh.com> In-Reply-To: <002701d100f7$d6b17050$841450f0$@ndzh.com> Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3527082287_47591179" Archived-At: Cc: i2rs@ietf.org Subject: Re: [i2rs] RIB Info/Data model questions: nexthop-id X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 00:04:51 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3527082287_47591179 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable The IM draft was written with the intent as in the draft. In other words, the space is private to the I2RS agent. The agent allocates nexthop-id and returns that to the Client. The client can use that as a convenience. The client itself can maintain a global ID space across all agents if it desires. But that is outside the scope of the IM draft. > Nexthops can be identified by an identifier to create a level of indirection. The identifier is set by the RIB manager and returned to the external entity on request. =20 > Is the above =B3identifier=B2 the same as =B3nexthop-id=B2? If yes, then it confl= icts with your text below? From: Susan Hares Date: Wednesday, October 7, 2015 at 5:01 AM To: "'Jeffrey (Zhaohui) Zhang'" , Subject: Re: [i2rs] RIB Info/Data model questions: nexthop-id Jeffrey:=20 =20 to start this discussion going, I would like to provide you with the answer that was given when the I2RS RIB Information Model was designed. =20 =B7 All I2RS RIB information is intended config (see ietf-chairs-netmod-opstate-reqs-01 or ietf-openconfig-netmod-opstat for the definition of intended config), =B7 nexthop-id is assigned by the I2RS client, and inserted into the I2RS agent,=20 =B7 the I2RS agent installs the I2RS RIB ephemeral state, and provide= s back status (installed, not installed). =20 nexthop id allows for all types of next hops (chains, inet-v4, inet-v6, mac-address, interface tunnels) to be indicated with a single id that can be directly accessed. This allows these different types of next-hop to be directly referenced with the nexthop-id. =20 --B_3527082287_47591179 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable

The IM draft w= as written with the intent as in the draft. In other words, the <nexthop-= id> space is private to the I2RS agent. The agent allocates nexthop-id an= d returns that to the Client. The client can use that as a convenience. The = client itself can maintain a global ID space across all agents if it desires= . But that is outside the scope of the IM draft.

= > Nexthops can= be identified by an identifier to create a level of

   indirection.  = The identifier is set by the RIB manager and returned

<= p class=3D"MsoNormal" style=3D"font-family: Calibri, sans-serif;">   to the external en= tity on request.

 

> Is the above &= #8220;identifier” the same as “nexthop-id”? If yes, then i= t conflicts with your text below?


From: Susan Hares <shares@ndzh.com>
Date: Wednesday, October 7, 2015 at 5:01 AM
= To: "'Jeffrey (Zhaohui) Zhang'" <zzhang@juniper.net>, <i2rs@ietf= .org>
Subject: Re: [i2rs] R= IB Info/Data model questions: nexthop-id

Jeffrey:

 

to st= art this discussion going, I would like to provide you with the answer that = was given when the I2RS RIB Information Model was designed.

 

=B7    &nbs= p;    All I2RS RIB informa= tion is intended config (see ietf-chairs-netmod-opstate-reqs-01 or ietf-open= config-netmod-opstat for the definition of intended config),

=

=B7         <= !--[endif]-->nexthop-id is assigned by the I2RS client, and inserted into th= e I2RS agent,

=B7       =   the I2RS agent installs the I2RS R= IB ephemeral state, and provides back status (installed, not installed).

 

nexthop id  allows for all types of next hops (chains, inet-v4, in= et-v6, mac-address, interface tunnels) to be indicated  with a single i= d that can be directly accessed.  This allows these different types of = next-hop to be directly referenced with the nexthop-id.

 

--B_3527082287_47591179-- From nobody Wed Oct 7 17:08:23 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 974761ACDCF for ; Wed, 7 Oct 2015 17:08:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.707 X-Spam-Level: X-Spam-Status: No, score=-2.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hYEcd2uQsnKA for ; Wed, 7 Oct 2015 17:08:16 -0700 (PDT) Received: from nm15-vm6.bullet.mail.gq1.yahoo.com (nm15-vm6.bullet.mail.gq1.yahoo.com [98.137.176.78]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75D0A1ACDA9 for ; Wed, 7 Oct 2015 17:08:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1444262895; bh=JtAxobisWafEWAGUl18gAi2X5RZWpLoK479c5qQz3oM=; h=Date:Subject:From:To:CC:References:In-Reply-To:From:Subject; b=do3ap5MC31Bv8y8ifT9di3fNUbuaLwBfSyB8x25W+ytiOU3VvasY86OhxIBvFyYMZPp5VW8zPvfgCQy2I8fbz5mJ6oQ1R+4ChnPBplsk4rLMdfZKkGB4mCp+CuXjSK3G73MuJCG30z01RgCVyyvzbAcam0dzzXAImIyX6zOs34asZ6OSc95SajqY+4nhkYwUuM70k+pbhukeZc5xpWlxw/ktYynQh+D0Nnq91fi+PY9ccPgSoo+NDmXh0ca68JfWR55jZSfrVzs2iMYCWxXQJd+99J9OAOWOKvnxiC4lpxkwORANva03rREQorLIDgTBDL57x37Y4oVuuTA6fkqtkg== Received: from [98.137.12.58] by nm15.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:08:15 -0000 Received: from [208.71.42.195] by tm3.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:08:15 -0000 Received: from [127.0.0.1] by smtp206.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 00:08:15 -0000 X-Yahoo-Newman-Id: 922941.13537.bm@smtp206.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: hqYTQSAVM1lR_gnMFzQcMvOOaPtI5j3OmCIbEPOUjpMUv8f FWjw7ixJ3JqM5SoTZTPB7M1NtiHyhHUbj2aU6rehnCSJcNi2StAgzpOXtkca ZY9Da4Jg.7X.CD_KRRSa3H8uXeY2YusgsKrzka3tI_AQEEH9OZ48DQQfpCZc Hj58M3mxQQceIOw9m8ri3Au8rp7ao_mKja07aoUAI4AyTFpSW0iAzOorXDqT sIqP9uwddyBQnLKdCJy2fD9N.ekxDlNWyz7msA2YCcvPJ.sBL3k9hmnrY5vx m67JLOrzoSsdDa2vOKc_I2Ny3a7MS_oYjWMtQXzpJoKn3FzB862L1VdUCE4R 4aObmpTi9ACRI53t2cPPAE_8j2ZHhuYk2KYNvyix0w8A.NN_zsDIDaAoNk9V hWPJchpuKFmuaiGpT.iMPCNCQ3IDcUsKjmvukuK4YMTn1kQwEst6ZFOwSKCh Ro3_ew5qbnCGgUyUkF8Tw6.L.1PPcoS1JXqT4VqsX4ylCH4V1OMaASybzzAb E_qgNAY7MYhm9uCtYHATOeSqiSdouhd_V1_0xAg-- X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Wed, 07 Oct 2015 17:08:04 -0700 From: Nitin Bahadur To: "Jeffrey (Zhaohui) Zhang" , Susan Hares , "i2rs@ietf.org" Message-ID: Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3527082494_47647458" Archived-At: Cc: "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 00:08:21 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3527082494_47647458 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable Hi Jeffrey, Thanks for combing through this. I=B9ve addressed the discrepancies. See NB> below. > I have following questions/comments. I=B9ll have a separate email on Sue=B9s question 3). =20 When writing an object to a RIB, the external entity SHOULD try to write all dependencies of the object prior to sending that object. The data-model MUST support requesting identifiers for nexthops and collecting the identifiers back in the response. =20 Apparently this is different from Sue=B9s understanding (see other email thread =B3RE: [i2rs] RIB Info/Data model questions: nexthop-id=B2, so this need= s to be straightened out. NB> I sent my interpretation in a separate email. =20 The RIB data-model SHOULD support a way to optionally receive a nexthop identifier for a given nexthop. Earlier it says =B3MUST=B2 and now it=B9s =B3SHOULD=B2. NB> Will make it SHOULD in both places. =20 =20 2.4.3. Nexthop content =20 At the lowest level, a nexthop can be one of: o identifier: This is an identifier returned by the network device representing another nexthop or another nexthop chain. =20 =B3or another nexthop chain=B2 should be removed. =B3another nexthop=B2 covers everything. =20 NB> Fixed. o tunnel encap: This can be an encap representing an IP tunnel or MPLS tunnel or others as defined in this document. An optional egress interface can be specified to indicate which interface to send the packet out on. The egress interface is useful when the network device contains Ethernet interfaces and one needs to perform address resolution for the IP packet. =20 I don=B9t think an egress interface should be part of the tunnel encap. The egress interface and optionally a nbr address should be in a separate chain member. NB> The egress interface is =B3not=B2 part of the tunnel encap definition. Tunnel-encap is defined as: ::=3D ( ) | ( ) | ( ) | ( ) | ( ) | ( ) What the above paragraph is referring to is the below statement in the grammar: :: =8A ( []) | The goal here was to clearly specify what combination of options make sense= . =20 2.4.3=B9s title is =B3nexthop content=B2 but it focuses on nexthops at the =B3lowes= t level=B2. 2.4.4 is about =B3special nexthops=B2 and that should be folded into 2.4.3 (since special nexthops are at the =B3lowest level=B2). NB> Even though special nexthops are at the lowest level, I feel it is important to call out what the special nexthops are. I don=B9t think it changes the content or organization of the draft if it is in a separate sub-section. =20 ::=3D ( | | | | ) ::=3D | | | | =20 We have two rules for here. They are equivalent and one should be removed. NB> Yeah. This is a bug introduced in version -06 of the draft. I=B9ll remove the first match condition. =20 ::=3D | | =20 Is there a real need for routes? What=B9s the real difference between and routes? =20 NB> Source routes are useful for source-based routing. For example, route all packets coming from 10.0.0.1/16 to somewhere. Dest routes are regular routes based on where the packet is intended for. DEST_SRC routes are a combination of the two. ::=3D | =20 =20 ::=3D ... ::=3D | =20 When would you use "chain_name"? What's the difference/relationship between and nexthop-identifier? =20 NB> Removed CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the same thing. Nexthop-identifier (as referenced in Section 4) is really something like a that identifies a particular . I have changed =B3nexthop-identifier=B2 to =B3nexthop identifier=B2 to remove confusion that it is a special term. is something that identifies = a . ::=3D ... ::=3D | | | | ( ( | )) | ( ) | ( []) | | ) =20 The above model makes it that even the very basic nexthops are defined through nexthop-chain =AD unnecessary twist and it leads to unnatural representation when it comes to the data model (e.g. the chain is a list an= d each list entry has a client-assigned ID as key). =20 As section 2.4.2 alluded to, all the above =B3nexthop-chain-member=B2 are just basic nexthops shoulder to shoulder with =B3nexthop-special=B2. Therefore, the following model would be more natural? =20 ::=3D | | <-- new | | =20 ::=3D | | | =8A | =20 ::=3D =8A =20 NB> I=B9ll address this in a separate email. ----------------------------- =20 ::=3D ( ...) ::=3D ( [] [] []) | ( []) =20 is part of - so does not make sense= ? =20 NB> There was no easy place to put the POP operation. One option would have been to define . ----------------------------- =20 A backup can also have another backup. In such a case, the list will look like: =20 ::=3D (<1> <2> <3> ) =20 Unless it meant =B3A PRIMAY can also have another backup=B2, shouldn=B9t the abov= e be the following? =20 :: =3D (<1> <2> (<1> <2> )) NB> Yes=8AFixed. =20 Thanks Nitin --B_3527082494_47647458 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable
Hi Jeffrey,

   Thanks for combing through this. I̵= 7;ve addressed the discrepancies. See NB> below.

=

> I have following questions/comments. I’ll have a separate emai= l on Sue’s question 3).

 

=    When writing an object to a RIB, the external entity SHOULD try= to

   write all dependencie= s of the object prior to sending that object.

   The data-model MUST support requesting identifiers for = nexthops and

   collecting t= he identifiers back in the response.

<= o:p> 

Apparently this is different from S= ue’s understanding (see other email thread “RE: [i2rs] RIB Info/= Data model questions: nexthop-id”, so this needs to be straightened out.<= /span>


NB> I sent= my interpretation in a separate email.  

 

   The RI= B data-model SHOULD support

 &nbs= p; a way to optionally receive a nexthop identifier for a given nexthop.



Earlier it says “MUST” and now it’s R= 20;SHOULD”.


NB> Will make it SHOULD in both places.
 

=  

2.4.3.  Nexthop content

 

=    At the lowest level, a nexthop can be one of:

   o  identifier: This is an identifier = returned by the network device

 &= nbsp;    representing another nexthop or another nexthop chai= n.

 

“or another nexthop chain” should be removed. “anot= her nexthop” covers everything.

 

NB> Fixed.<= /div>

   o  tunnel encap: This can be an encap rep= resenting an IP tunnel or

  =     MPLS tunnel or others as defined in this document.  = An optional

    &n= bsp; egress interface can be specified to indicate which interface to

      send the pack= et out on.  The egress interface is useful when the

      network device contains Et= hernet interfaces and one needs to

&nb= sp;     perform address resolution for the IP packet.

 


NB> The egress interface is R= 20;not” part of the tunnel encap definition. Tunnel-encap is defined a= s:

<tunnel-encap> ::=3D (<IPV4&= gt; <ipv4-header>) | 
         = ;          (<IPV6> <ipv6-header>) |
                   = (<MPLS> <mpls-header>) | 
      &n= bsp;            (<GRE> <gre-header>= ;) |
                 = ;  (<VXLAN> <vxlan-header>) | 
   =                (<NVGRE> <n= vgre-header>)

What the above parag= raph is referring to is the below statement in the grammar:
&l= t;nexthop-chain-member> :: …
      &nb= sp;                     &n= bsp;                     &= nbsp;(<tunnel-encap> [<EGRESS_INTERFACE>]) |

<= /div>

The goal here was to clearly= specify what combination of options make sense.


 

=

2.4.3’s title is “nexthop content” but it focuses= on nexthops at the “lowest level”. 2.4.4 is about “special nexthops” and that should be folded into 2.4.3 (since= special nexthops are at the “lowest level”).


NB> Even though special next= hops are at the lowest level, I feel it is important to call out what the sp= ecial nexthops are. I don’t think it changes the content or organizati= on of the draft if it is in a separate sub-section.

=

 

       <match> ::=3D <route-type&g= t; (<ipv4-route> | <ipv6-route> | <mpls-route> |

        = ;            &nb= sp;      <mac-route> | <interface-route>= ;)

      = ; <match> ::=3D <IPV4> <ipv4-route> | <IPV6> <ipv6-= route> |

    &n= bsp;        <MPLS> <MPLS_LABEL&g= t; | <IEEE_MAC> <MAC_ADDRESS> |

           &nbs= p; <INTERFACE> <INTERFACE_IDENTIFIER>

 

We have two rules for <mat= ch> here. They are equivalent and one should be removed.

=

NB> Yeah. This is a bug introduced = in version -06 of the draft. I’ll remove the first match condition.


 

       <ip-route-type> ::=3D= <SRC> | <DEST> | <DEST_SRC>

 

Is there a real need for = <src> routes? What’s the real difference between <src> and= <dest> routes?

&nbs= p;

NB> Source routes are usefu= l for source-based routing. For example, route all packets coming from 10.0.= 0.1/16 to somewhere. Dest routes are regular routes based on where the packe= t is intended for. DEST_SRC routes are a combination of the two.

    <nexthop-base> ::=3D <nexthop-special> | = <nexthop-chain>

 

 

&n= bsp;   <nexthop-chain> ::=3D <nexthop-chain-member> ...<= o:p>

    <nexthop-chain-i= dentifier> ::=3D <NEXTHOP_CHAIN_NAME> |

           &= nbsp;            = ;        <NEXTHOP_CHAIN_ID>

 

When would you use "chain_name"? What's the difference/relationship between= <NEXTHOP_CHAIN_ID> and nexthop-identifier?

&nbs= p;

NB>  Removed CHAIN_NAM= E. CHAIN_NAME and CHAIN_ID were one= and the same thing. Nexthop-identifier (as referenced in Section 4) is real= ly something like a <NEXTHOP_IDENTIFIER> that identifies a particular = <nexthop>. I have changed “nexthop-identifier” to “n= exthop identifier” to remove confusion that it is a special term. <= NEXTHOP_CHAIN_ID> is someth= ing that identifies a <nexthop-chain>.

<= br>

    <nexthop-chain-member> ::=3D <nexthop-chain-memb= er-identifier> |

   =              <= ;EGRESS_INTERFACE> |

  &n= bsp;            = <ipv4-address> | <ipv6-address> |

           &= nbsp;    (<EGRESS_INTERFACE> (<ipv4-address> | &l= t;ipv6-address>)) |

  &nb= sp;             = (<EGRESS_INTERFACE> <IEEE_MAC_ADDRESS>) |

          =       (<tunnel-encap> [<EGRESS_INTERFACE&g= t;]) |

     &= nbsp;          <logical-tunn= el> |

     = ;           <RIB_NAME&g= t;)

 

The above model makes it that even the= very basic nexthops are defined through nexthop-chain – unnecessary t= wist and it leads to unnatural representation when it comes to the data model (e.g. the chain is a list a= nd each list entry has a client-assigned ID as key).

 

As section 2.4.2 alluded= to, all the above “nexthop-chain-member” are just basic nexthop= s shoulder to shoulder with “nexthop-special”. Therefore, the following model would be more natural?

 =

  <nexthop>= ; ::=3D <nexthop-base> |

        &nb= sp;       <nexthop-chain> |  &= nbsp;   <-- new

        &nb= sp;       <nexthop-replicate> |

  =             &nbs= p; <nexthop-lb> |

         &n= bsp;      <nexthop-protection>

 <= /span>

  <next= hop-base> ::=3D <nexthop-special> |

      &= nbsp;            = ;  <nexthop-identifier> |

       &= nbsp;            = ; <egress-interface> |

        &nb= sp;            …= ;

&n= bsp;            =         <logical-tunnel> |

  =             &nbs= p;      <RIB_NAME>

 

  <nexthop-chain>= ; ::=3D <nexthop>…

 

NB> I’ll address t= his in a separate email.

-----------------------------

 

=

<mpls-header> ::=3D (<mpls-label-operation> ...)<= /o:p>

<mpls-label-operation> ::=3D (<MPLS_= PUSH> <MPLS_LABEL> [<S_BIT>]

           &nbs= p;            &n= bsp;   [<TOS_VALUE>] [<TTL_VALUE>]) |

         =             &nbs= p;      (<MPLS_POP> [<TTL_ACTION>])

 

<mpls-header> is part of <tunnel-enc= ap> - so <MPLS_POP> does not make sense?

 

NB= > There was no easy place to put the POP operation. One option would have= been to define <tunnel-decap>.

---------------------= --------

 

   A backup can also have another backup.  In= such a case, the list will

 &nbs= p; look like:

 

   <nexthop> ::=3D <NEXTHOP_PROTECTION= > (<1> <nexthop>

 =             &nbs= p;   <2> <nexthop> <3> <nexthop>)

 

<= span style=3D"font-family: Calibri, sans-serif; color: rgb(31, 78, 121);">Unle= ss it meant “A PRIMAY can also have another backup”, shouldnR= 17;t the above be the following?

<= o:p> 

    &nbs= p; <nexthop> :: =3D <NEXTHOP_PROTECTION> (<1> <nexthhop&g= t; <2> <NEXTHOP_PROTECTION>(<1> <nexthop> <2> <nexhop>))

NB> Yes…Fixed.

 

=

Thanks
Nitin
--B_3527082494_47647458-- From nobody Wed Oct 7 23:55:01 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 706131B321D for ; Wed, 7 Oct 2015 23:54:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Etb3Q8_N0WGH for ; Wed, 7 Oct 2015 23:54:51 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 325B21B321C for ; Wed, 7 Oct 2015 23:54:51 -0700 (PDT) Received: from localhost (unknown [173.38.220.38]) by mail.tail-f.com (Postfix) with ESMTPSA id 8CB151AE0099; Thu, 8 Oct 2015 08:54:49 +0200 (CEST) Date: Thu, 08 Oct 2015 08:54:48 +0200 (CEST) Message-Id: <20151008.085448.838467418663018728.mbj@tail-f.com> To: shares@ndzh.com From: Martin Bjorklund In-Reply-To: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> References: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> X-Mailer: Mew version 6.5 on Emacs 23.4 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, i2rs@ietf.org, kwatsen@juniper.net, andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 06:54:56 -0000 Hi, Was this WebEX recorded? If so, where can I find it? /martin "Susan Hares" wrote: > > > I2RS Interim 10/7/2015 > > > > 1) Agenda Bashing [10:00 - 10:05 ] > > 2) I2RS Protocol Requirements Summary > > [10:05 - 10:15] > > 3) Discussion of Requirements [10:15-30] > > 4) I2RS Protocol Strawman [10:25 - 10:45] > > 5) Discussion of I2RS Protocol [10:45-11:00] > > 7) I2RS Hackathon [11:00 - 11:15] > > 8) I2RS FB-RIB [11:15 - 11:30] > > > > > > Next I2RS Meeting 10/7/2015 > > I2RS Interim 10/7 > > Wednesday, October 7, 2015 > > 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs > > > > > > Join WebEx meeting > > https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db > > > > Meeting number: 649 136 221 > > Meeting password: kent.andy.proto > > > > Join by phone > > 1-877-668-4493 Call-in toll free number (US/Canada) > > 1-650-479-3208 Call-in toll number (US/Canada) > > Access code: 649 136 221 > > Toll-free calling restrictions > > > > > > > > > From nobody Thu Oct 8 02:56:40 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ADC501A9147 for ; Thu, 8 Oct 2015 02:56:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gmolyf_5I8fj for ; Thu, 8 Oct 2015 02:56:34 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0102.outbound.protection.outlook.com [65.55.169.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E32F1A9172 for ; Thu, 8 Oct 2015 02:56:34 -0700 (PDT) Received: from BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) by BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) with Microsoft SMTP Server (TLS) id 15.1.293.16; Thu, 8 Oct 2015 09:56:32 +0000 Received: from BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) by BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) with mapi id 15.01.0293.007; Thu, 8 Oct 2015 09:56:32 +0000 From: "Jeffrey (Zhaohui) Zhang" To: Nitin Bahadur , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) Thread-Index: AQHRAV1xbH4/3JeXf0eN6huQqeymy55hVMkQ Date: Thu, 8 Oct 2015 09:56:31 +0000 Message-ID: References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; BLUPR0501MB1715; 5:Ud6pvqlkVpN3UHh1/YUhyzwY/VAS6h+B/3LzXPgtdBJhCmc6lYcIzDeWlSSAn4BpBXpJkXQL899QCiuqR7HnshNrXnbHiJUNKpZTqi4KMA/r8NGGGxpTC0khK/QD8EXgdceP/OqZWHzc6ckyb//lfg==; 24:8qr4i2xjjqMyOuXZUiGfmuZl2MDcqaXMCv3Fes8KPc41aLwfXR7CYFif6s8VokCXtIza6zzwBSEtE3gaBzPt7dLLZkE7C3gjGK+y8UQDCYQ=; 20:74Q9HzSaBcFj+CB3ugf3tCEirbmlGWK1MUzp6IVMYewdBoe2qgfldaPxRXLOMXSjVxS2USgq3tcGQmoBHARYNw== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR0501MB1715; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(5005006)(8121501046)(3002001); SRVR:BLUPR0501MB1715; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0501MB1715; x-forefront-prvs: 0723A02764 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(6009001)(51444003)(5423002)(199003)(189002)(54356999)(66066001)(74316001)(64706001)(40100003)(10400500002)(50986999)(19609705001)(2521001)(92566002)(76176999)(19625215002)(5001960100002)(122556002)(19580395003)(230783001)(5007970100001)(101416001)(5003600100002)(105586002)(76576001)(5004730100002)(99286002)(33656002)(81156007)(97736004)(5001770100001)(106116001)(2950100001)(2900100001)(106356001)(77096005)(102836002)(15975445007)(46102003)(16236675004)(87936001)(5008740100001)(86362001)(19300405004)(11100500001)(2501003)(5002640100001)(189998001)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB1715; H:BLUPR0501MB1715.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_BLUPR0501MB171525DABE9547D3BF515DF5D4350BLUPR0501MB1715_" MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Oct 2015 09:56:31.3532 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB1715 Archived-At: Cc: "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 09:56:39 -0000 --_000_BLUPR0501MB171525DABE9547D3BF515DF5D4350BLUPR0501MB1715_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Nitin, Please see zzh> below. o tunnel encap: This can be an encap representing an IP tunnel or MPLS tunnel or others as defined in this document. An optional egress interface can be specified to indicate which interface to send the packet out on. The egress interface is useful when the network device contains Ethernet interfaces and one needs to perform address resolution for the IP packet. I don't think an egress interface should be part of the tunnel encap. The e= gress interface and optionally a nbr address should be in a separate chain = member. NB> What the above paragraph is referring to is the below statement in the = grammar: :: ... ( []) | The goal here was to clearly specify what combination of options make sense= . Zzh> The same comment still applies. A chain is a list of chain-members; a= chain-member could be an [
]; so from the gramm= ar pov, should not be there. If you want to specify what= combination of options make sense, how do you say (and many others) does not make sense? ::=3D | ::=3D ... ::=3D | When would you use "chain_name"? What's the difference/relationship between= and nexthop-identifier? NB> Removed CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the same thin= g. Nexthop-identifier (as referenced in Section 4) is really something like= a that identifies a particular . I have chan= ged "nexthop-identifier" to "nexthop identifier" to remove confusion that i= t is a special term. is something that identifies a . Zzh> Can you clarify "nexthop-identifier ... is ... like a ". is not defined in the spec. If you say " is nexthop identifier as referenced in section 4" then it's = clear :) Zzh> I don't understand why you say " is something that i= dentifies a ". is part of the following, = so why would it identify a chain (vs. a chain member) . ::=3D ... ::=3D | ::=3D | ------------------------ ::=3D ( ...) ::=3D ( [] [] []) | ( []) is part of - so does not make sense= ? NB> There was no easy place to put the POP operation. One option would have= been to define . Zzh> I think that option is better. --_000_BLUPR0501MB171525DABE9547D3BF515DF5D4350BLUPR0501MB1715_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Nitin,

 

Please see zzh> bel= ow.

 

 

&n= bsp;

   o  = tunnel encap: This can be an encap representing an IP tunnel or<= /span>

   &nb= sp;  MPLS tunnel or others as defined in this document.  An optio= nal

   &nb= sp;  egress interface can be specified to indicate which interface to<= o:p>

   &nb= sp;  send the packet out on.  The egress interface is useful when= the

   &nb= sp;  network device contains Ethernet interfaces and one needs to=

   &nb= sp;  perform address resolution for the IP packet.

 

I don’t think an egress interface should be p= art of the tunnel encap. The egress interface and optionally a nbr address = should be in a separate chain member.

&n= bsp;

NB> What the above paragraph is referring to is the below statement in the gram= mar:

<nex= thop-chain-member> :: …

  =                      = ;                     &nb= sp;      (<tunnel-encap> [<EGRESS_INTERFACE>]) |=

&n= bsp;

The goal here was to clearly specify what combination of options = make sense.

&n= bsp;

 Zzh> The same comment still applies. A cha= in is a list of chain-members; a chain-member could be an <egress-interface> [<address>]; so from the grammar pov, &l= t;egress-interface> should not be there. If you want to specify what com= bination of options make sense, how do you say <logical-tunnel><ri= b_name> (and many others) does not make sense?

 

&n= bsp;

    &l= t;nexthop-base> ::=3D <nexthop-special> | <nexthop-chain>

 

 

    &l= t;nexthop-chain> ::=3D <nexthop-chain-member> ...

    &l= t;nexthop-chain-identifier> ::=3D <NEXTHOP_CHAIN_NAME> |

   &nb= sp;            =             &nb= sp;   <NEXTHOP_CHAIN_ID>

 

When would you use "chain_name"? What's t= he difference/relationship between <NEXTHOP_CHAIN_ID> and nexthop-ide= ntifier?

 

NB> =  Removed CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the s= ame thing. Nexthop-identifier (as referenced in Section 4) is really someth= ing like a <NEXTHOP_IDENTIFIER> that identifies a particular <nexthop>. I have changed “nexthop-identifierR= 21; to “nexthop identifier” to remove confusion that it is a sp= ecial term. <NEXTHOP_CHAIN_ID> is something that identifi= es a <nexthop-chain>.

 

Zzh> Can you clarif= y “nexthop-identifier … is … like a <NEXTHOP_IDENTIFIE= R>”. <NEXTHOP_IDENTIFIER> is not defined in the spec. If&nbs= p; you say “<NEXTHOP_IDENTIFIER> is nexthop identifier as referenced = in section 4” then it’s clear J

Zzh> I don’t = understand why you say “<NEXTHOP_CHAIN_ID> is something that identifies a <nexthop-chain>”. <N= EXTHOP_CHAIN_ID> is part of the following, so why would it identify a ch= ain (vs. a chain member) .

 

<nexthop-chain> ::=3D <nexthop-chain-= member> ...

<nexthop-chain-identifier> ::=3D <NEX= THOP_CHAIN_NAME> |

       &nbs= p;            &= nbsp;           <NEXTH= OP_CHAIN_ID>

<nexthop-chain-member> ::=3D <nexthop= -chain-member-identifier> |

 

 =

----------------------= --

&n= bsp;

<mpls-header> := :=3D (<mpls-label-operation> ...)

<mpls-label-operat= ion> ::=3D (<MPLS_PUSH> <MPLS_LABEL> [<S_BIT>]

   &nb= sp;            =             [<TOS= _VALUE>] [<TTL_VALUE>]) |

   &nb= sp;            =             (<MPL= S_POP> [<TTL_ACTION>])

 

<mpls-header>= is part of <tunnel-encap> - so <MPLS_POP> does not make sense?=

 

NB> = There was no easy place to put the POP operation. One option would have bee= n to define <tunnel-decap>.

&n= bsp;

Zzh> I think that option is better.

&n= bsp;

--_000_BLUPR0501MB171525DABE9547D3BF515DF5D4350BLUPR0501MB1715_-- From nobody Thu Oct 8 06:55:37 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B46D91B3417 for ; Thu, 8 Oct 2015 06:55:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MPu_AFdT2lho for ; Thu, 8 Oct 2015 06:55:32 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31EF41B3419 for ; Thu, 8 Oct 2015 06:55:20 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: "'Martin Bjorklund'" References: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> <20151008.085448.838467418663018728.mbj@tail-f.com> In-Reply-To: <20151008.085448.838467418663018728.mbj@tail-f.com> Date: Thu, 8 Oct 2015 09:55:14 -0400 Message-ID: <00bd01d101d0$f5bc78d0$e1356a70$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHCHNW4W5OiwrMgaRQXRIpsvzvqkAJwsRGWnmvinuA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, i2rs@ietf.org, kwatsen@juniper.net, andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 13:55:33 -0000 Martin: I will send out webex id and notes this morning. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund Sent: Thursday, October 08, 2015 2:55 AM To: shares@ndzh.com Cc: jhaas@pfrc.org; i2rs@ietf.org; kwatsen@juniper.net; andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting Hi, Was this WebEX recorded? If so, where can I find it? /martin "Susan Hares" wrote: > > > I2RS Interim 10/7/2015 > > > > 1) Agenda Bashing [10:00 - 10:05 ] > > 2) I2RS Protocol Requirements Summary > > [10:05 - 10:15] > > 3) Discussion of Requirements [10:15-30] > > 4) I2RS Protocol Strawman [10:25 - 10:45] > > 5) Discussion of I2RS Protocol [10:45-11:00] > > 7) I2RS Hackathon [11:00 - 11:15] > > 8) I2RS FB-RIB [11:15 - 11:30] > > > > > > Next I2RS Meeting 10/7/2015 > > I2RS Interim 10/7 > > Wednesday, October 7, 2015 > > 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs > > > > > > Join WebEx meeting > > https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db > > > > Meeting number: 649 136 221 > > Meeting password: kent.andy.proto > > > > Join by phone > > 1-877-668-4493 Call-in toll free number (US/Canada) > > 1-650-479-3208 Call-in toll number (US/Canada) > > Access code: 649 136 221 > > Toll-free calling restrictions > > > > > > > > > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Thu Oct 8 09:47:31 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAC301A92AB for ; Thu, 8 Oct 2015 09:47:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vZLdGjBztER2 for ; Thu, 8 Oct 2015 09:47:28 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78D071A9253 for ; Thu, 8 Oct 2015 09:47:27 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Thu, 8 Oct 2015 12:47:27 -0400 Message-ID: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0235_01D101C7.7D569140" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEB5+DLM5h+BqpqTSycX0eoPofscA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 16:47:30 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0235_01D101C7.7D569140 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit I2RS WG: I missed an important part of the WG LC. Each author of each document should indicate whether they have any IPR on the requirements. Sue Hares From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:16 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requiremen ts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares ------=_NextPart_000_0235_01D101C7.7D569140 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I2RS WG:

 

I missed an important = part of the WG LC.  Each author of each document should indicate = whether they have any IPR on the requirements.

 

Sue Hares =

 

From:= = i2rs [mailto:i2rs-bounces@ietf.org] = On Behalf Of Susan Hares
Sent: Tuesday, October 06, = 2015 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey = Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement = documents (10/6 to 10/20/2015) -

 

This begins = a 2 week WG LC on the following requirement documents for I2RS: =

 

draft-ietf-i2rs-ephemeral-state-02.txt =  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section = is blank and this will be discussed at the 10/17/2015 = interim.

We will discuss whether this = section should be kept or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-= security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirement= s/

 

draft-ietf-i2rs-traceability-03.txt

ht= tp://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/

 

Sue = Hares

 

------=_NextPart_000_0235_01D101C7.7D569140-- From nobody Thu Oct 8 09:50:01 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25CB91A9300 for ; Thu, 8 Oct 2015 09:50:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z1Iw7fffHriV for ; Thu, 8 Oct 2015 09:49:58 -0700 (PDT) Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61E0E1A92DD for ; Thu, 8 Oct 2015 09:49:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1770; q=dns/txt; s=iport; t=1444322998; x=1445532598; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=1hRt/fOUGdCZGyM7mFbrl4EPpsY6QPBRNMSdkMKWygs=; b=iJ9LlImL1EeACWeYhjxn2vnhalc+yDSsFlEygB/Rr0XVTYC0pudlUl44 6dEYWKqWDIB0vgqUxo4UgSOznVSoDbIzX51h/48Q0eIxy8cHCN7qFb8Bo +5d5XxegnrHRYKfUyjFtN8EYQ00QNmrCNNKBzG97qtGGlXHevzXchdAP7 s=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BuAgBXnhZW/4UNJK1egydUbga9QgENgVoXDIJwggp/AoFMOBQBAQEBAQEBgQqEJgEBAQMBAQEBNzQLBQsCAQgOAwQBAQEeCQcnCxQJCAEBBA4FiCYIDcMtAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4ZzghCCboRaMweDGoEUBZYKAYUXiACCIJlZAR8BAUKCRIE+cYZmgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,655,1437436800"; d="scan'208";a="35654926" Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-4.cisco.com with ESMTP; 08 Oct 2015 16:49:57 +0000 Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id t98Gnvhe010803 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 8 Oct 2015 16:49:57 GMT Received: from xch-aln-009.cisco.com (173.36.7.19) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 8 Oct 2015 11:49:56 -0500 Received: from xch-aln-009.cisco.com ([173.36.7.19]) by XCH-ALN-009.cisco.com ([173.36.7.19]) with mapi id 15.00.1104.000; Thu, 8 Oct 2015 11:49:56 -0500 From: "Gonzalo Salgueiro (gsalguei)" To: Susan Hares Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure Thread-Index: AdEB5+DLM5h+BqpqTSycX0eoPofscAAK2bYA Date: Thu, 8 Oct 2015 16:49:56 +0000 Message-ID: <90C28D4B-412E-4545-8BF3-2CDBF09A6FFE@cisco.com> References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.150.6.67] Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: Jeffrey Haas , "i2rs@ietf.org" , Alia Atlas Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 16:50:00 -0000 Sue -=20 In reference to: draft-ietf-i2rs-traceability-03.txt=20 http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ I have no IPR to declare nor do I know of any related IPR that is undeclare= d. Cheers, Gonzalo > On Oct 8, 2015, at 12:47 PM, Susan Hares wrote: >=20 > I2RS WG:=20 > =20 > I missed an important part of the WG LC. Each author of each document sh= ould indicate whether they have any IPR on the requirements. > =20 > Sue Hares=20 > =20 > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares > Sent: Tuesday, October 06, 2015 7:16 PM > To: i2rs@ietf.org > Cc: 'Jeffrey Haas'; 'Alia Atlas' > Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - > =20 > This begins a 2 week WG LC on the following requirement documents for I2R= S:=20 > =20 > draft-ietf-i2rs-ephemeral-state-02.txt =20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > =20 > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. =20 > This section is blank and this will be discussed at the 10/17/2015 interi= m. > We will discuss whether this section should be kept or removed. =20 > =20 > draft-ietf-i2rs-protocol-security-requirements-01.txt=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-require= ments/ > =20 > draft-ietf-i2rs-pub-sub-requirements-03.txt=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > =20 > draft-ietf-i2rs-traceability-03.txt=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ > =20 > Sue Hares=20 > =20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Thu Oct 8 09:51:39 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC1A81A92B3 for ; Thu, 8 Oct 2015 09:51:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f2Ng5ccajzGb for ; Thu, 8 Oct 2015 09:51:36 -0700 (PDT) Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1C0D1A924B for ; Thu, 8 Oct 2015 09:51:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1570; q=dns/txt; s=iport; t=1444323096; x=1445532696; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=642TCpuhD1XFI0ZTT7OuO7o0dtAHZzlrwKrvcQbjWek=; b=dkQ2nyw5J3g/66TyoxqoUqKVsCAqaJ4WvkMflB2nFmbbPmRqfUhUt0i0 pZ8wBjB+4d5DSvVxcvcXNSNRAJE70EUoWDPHkoZcEXHY//CBuZsiYikyf hULIyWw3IQTxHiBP7bgTMhsSjWCGBNG3PA9ubZxlFwavJg6ihVOxtoxbe E=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BuAgDQnhZW/4wNJK1egydUbr1IAQ2BWhcMgnCCCn8CgUw4FAEBAQEBAQGBCoQmAQEBAwEBAQE1NgoBEAsOAwQBAQEJFggHCQMCAQIBFR8JCAYBDAYCAQGIIggNwy4BAQEBAQEBAQEBAQEBAQEBAQEBAQEXhnOEfoUNB4QuAQSWCoUYiACCIIZzkmcfAQFCgkSBWiIzh2wBAQE X-IronPort-AV: E=Sophos;i="5.17,655,1437436800"; d="scan'208";a="195301081" Received: from alln-core-7.cisco.com ([173.36.13.140]) by alln-iport-4.cisco.com with ESMTP; 08 Oct 2015 16:51:33 +0000 Received: from [10.150.6.200] ([10.150.6.200]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t98GpWVs019832; Thu, 8 Oct 2015 16:51:33 GMT To: Susan Hares , i2rs@ietf.org References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <56169F15.6020105@cisco.com> Date: Thu, 8 Oct 2015 12:51:33 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 16:51:37 -0000 On 10/8/15 12:47, Susan Hares wrote: > I2RS WG: > > I missed an important part of the WG LC. Each author of each document > should indicate whether they have any IPR on the requirements. We have no IPR covering traceability to declare, nor do I know of any related IPR in this area. Joe > > Sue Hares > > *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares > *Sent:* Tuesday, October 06, 2015 7:16 PM > *To:* i2rs@ietf.org > *Cc:* 'Jeffrey Haas'; 'Alia Atlas' > *Subject:* [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - > > This begins a 2 week WG LC on the following requirement documents for I2RS: > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interim. > > We will discuss whether this section should be kept or removed. > > draft-ietf-i2rs-protocol-security-requirements-01.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements/ > > draft-ietf-i2rs-pub-sub-requirements-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > draft-ietf-i2rs-traceability-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ > > Sue Hares > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 8 10:18:48 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9AA231B2BB4 for ; Thu, 8 Oct 2015 10:18:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n4UG8wPeLcSr for ; Thu, 8 Oct 2015 10:18:45 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2656A1B2BB2 for ; Thu, 8 Oct 2015 10:18:45 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Date: Thu, 8 Oct 2015 13:18:46 -0400 Message-ID: <02a301d101ed$642d6ab0$2c884010$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_02A4_01D101CB.DD1D7860" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQFIGx6hPQHUicuqf8n4SjUvdjMaXJ9zoxpQ Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:18:46 -0000 This is a multipart message in MIME format. ------=_NextPart_000_02A4_01D101CB.DD1D7860 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit As co-author of: draft-ietf-i2rs-ephemeral-state-02.txt draft-ietf-i2rs-protocol-security-requirements-01.txt I do not know of an IPR related to these drafts. Sue From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 08, 2015 12:47 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure I2RS WG: I missed an important part of the WG LC. Each author of each document should indicate whether they have any IPR on the requirements. Sue Hares From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:16 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requiremen ts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares ------=_NextPart_000_02A4_01D101CB.DD1D7860 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

As co-author of:

 

draft-ietf-i2rs-ephemeral-state-02.txt =  

draft-ietf-i2rs-protocol-security-requirements-01.txt =

 

I do not know of an IPR = related to these drafts.

 

Sue =

 

From:= = i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan = Hares
Sent: Thursday, October 08, 2015 12:47 PM
To: = i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia = Atlas'
Subject: Re: [i2rs] WG LC for requirement documents = (10/6 to 10/20/2015) - IPR = disclosure

 

I2RS WG:

 

I missed an important = part of the WG LC.  Each author of each document should indicate = whether they have any IPR on the requirements.

 

Sue Hares =

 

From:= = i2rs [mailto:i2rs-bounces@ietf.org] = On Behalf Of Susan Hares
Sent: Tuesday, October 06, = 2015 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey = Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement = documents (10/6 to 10/20/2015) -

 

This begins = a 2 week WG LC on the following requirement documents for I2RS: =

 

draft-ietf-i2rs-ephemeral-state-02.txt =  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section = is blank and this will be discussed at the 10/17/2015 = interim.

We will discuss whether this = section should be kept or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-= security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirement= s/

 

draft-ietf-i2rs-traceability-03.txt

ht= tp://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/

 

Sue = Hares

 

------=_NextPart_000_02A4_01D101CB.DD1D7860-- From nobody Thu Oct 8 10:28:52 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB5501B2BBF for ; Thu, 8 Oct 2015 10:28:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.007 X-Spam-Level: X-Spam-Status: No, score=-2.007 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KaB5G-96IQ91 for ; Thu, 8 Oct 2015 10:28:49 -0700 (PDT) Received: from nm10-vm3.bullet.mail.gq1.yahoo.com (nm10-vm3.bullet.mail.gq1.yahoo.com [98.136.218.94]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A941B1AD08F for ; Thu, 8 Oct 2015 10:28:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1444325329; bh=IyLwGNISHxkNXTAnynLdp8tz3vzNNqi353Rv8+YZ0pE=; h=Date:Subject:From:To:CC:References:In-Reply-To:From:Subject; b=QEf9ttxz/t5i7BHrHfAXmxmxY5hj9nSveDHIOlmrZt82bZnWi/xDSt9w4pL67oyCv2llmeEV7eZN4ak0ua3sY0G7GWDZCjA/LgtFOupu1hPLh08KPEvsvp1fazLwK3SmQ66nRuqwbBXBwpEvYD5bbaUyXm46OCHISCujKTLDnl8i/IrHDWUfb2MCaBFRt7wK3MooYeLJvdeZl5+gt6B/wJf91n1MazJoDRr+ptOUtXSSDa832Xy7KTw1EZanDDu7Wlvez860v1bFObm8jfzO7GOZ+1pqz09OC73cYy9W0uNsaXihAWD8E3il+RhgCKCmp2FZSvkWqr/FsZy2SozIjg== Received: from [98.137.12.174] by nm10.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:28:49 -0000 Received: from [208.71.42.202] by tm13.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:28:49 -0000 Received: from [127.0.0.1] by smtp213.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:28:49 -0000 X-Yahoo-Newman-Id: 108764.40018.bm@smtp213.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: 1a5zGioVM1k_4NC86wnIJ9mgGW612fTAsutN_NZ.ONOuZO8 0V5D9MYrnyTgojavMWURd75jxQLUiwps8j2_FT8qOw4bfjtZtML_oNZk8iFg WxmYPOn2ujZNvYL1WRbM16fcPi7XdGEZ7gq8eA812gy56WSPHWf6hsJIpNp5 faW9XsdOH6N8ZEZmjd2ocdSR8_S0eayopNo4yExMaxB2tds_8TiojoyPv8aE Oertzih1VJQncdm7udyq5H48QUI_S.pUvYBtrudRc.cOjGyYGcyv23FD2ICa KNk9oeWaIAqs0SN6yFG49UhZmeb7iZsU78SPCQnpXsup5MajywFFEdrUmIG7 wsxwOO2T7fh_Zy0969QWcr4D.qoTt3KkAhdgcIyZNJfk8v003AO_pxjFVFVJ 5ffKFgUnDxSb_NWJGXGjVLGPPkexIe7WYRQo4xIxSPNAhDRmhJWB14kI.dyh sSUIXs9qniBchVpZFyBTsrDVb85.NHdKnNxEDHJqmHy.agxaYiUFNpVzMrfe juVi_xSOQx3OusjlB25U7wjc.DSBxe5FFRYOaEP0- X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Thu, 08 Oct 2015 10:28:45 -0700 From: Nitin Bahadur To: Susan Hares , Message-ID: Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> <02a301d101ed$642d6ab0$2c884010$@ndzh.com> In-Reply-To: <02a301d101ed$642d6ab0$2c884010$@ndzh.com> Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3527144930_48243224" Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:28:51 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3527144930_48243224 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit As author of draft-ietf-i2rs-rib-info-model-07, I am not aware of an IPR filed by me, my current employer or my past-employer (when I was employed with them). Thanks Nitin From: Susan Hares Date: Thursday, October 8, 2015 at 10:18 AM To: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure As co-author of: draft-ietf-i2rs-ephemeral-state-02.txt draft-ietf-i2rs-protocol-security-requirements-01.txt I do not know of an IPR related to these drafts. Sue --B_3527144930_48243224 Content-type: text/html; charset="US-ASCII" Content-transfer-encoding: quoted-printable

As author of&n= bsp;draft-ietf-i2rs-rib-info-model-07, I am not aware of an IPR filed by me,= my current employer or my past-employer (when I was employed with them).

Thanks
Nitin

From: Susan Hares <shares@ndzh.com>
Date: = Thursday, October 8, 2015 at 10:18 AM
To:= <i2rs@ietf.org>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, 'Alia Atlas' <akatlas@gmail.com>
Subje= ct: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) = - IPR disclosure

As co-author of:

 

draft-ietf-i2rs-ephemeral-state-02.txt  

draft-ietf-i2rs-protocol-security-requirem= ents-01.txt

=  

I do not know of an IPR related to these drafts.

 

Sue

--B_3527144930_48243224-- From nobody Thu Oct 8 10:37:06 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B6111B2C62 for ; Thu, 8 Oct 2015 10:37:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hexwMZX9ehCx for ; Thu, 8 Oct 2015 10:37:02 -0700 (PDT) Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B9811B2C73 for ; Thu, 8 Oct 2015 10:37:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9152; q=dns/txt; s=iport; t=1444325822; x=1445535422; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=k844UhvLaDOegnIGH95jPIFOF66pCaJ8aEoEGe1BWD8=; b=Oyhjh8WNL6gSSXn8dNW/jpgLdS2eYx43QPe5l33fQrcLNjzNiJSCvmHX LXnJC73ct/ur9X7R7Io9oBVMtIp5BxJVeffbihVwQyMnLsS3a5Z/a3mdV eHjMxLpj/1gNWWil/2Q0QNVyuUEYeqSisksNkquNqEhwoSNMwcD66ftMT I=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0B7AgBYqBZW/40NJK1eglpNVG4GrECRAgENgVojgnCCCn8CgU44FAEBAQEBAQGBCoQmAQEBBC1MEAIBCA4DBAEBCx0HIREUCQgBAQQBDQUIiBEDEg29fw2FIAEBAQEBAQEBAQEBAQEBAQEBAQEBAReLcYJQggwxBgGDGoEUBZYKAYUXhgyEFJIRh0kRDgEBQoJEgT5xhmaBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,655,1437436800"; d="scan'208,217";a="195383972" Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 08 Oct 2015 17:37:01 +0000 Received: from XCH-RCD-014.cisco.com (xch-rcd-014.cisco.com [173.37.102.24]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id t98Hb1kG001345 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 8 Oct 2015 17:37:01 GMT Received: from xch-rcd-014.cisco.com (173.37.102.24) by XCH-RCD-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 8 Oct 2015 12:37:00 -0500 Received: from xhc-rcd-x07.cisco.com (173.37.183.81) by xch-rcd-014.cisco.com (173.37.102.24) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Thu, 8 Oct 2015 12:37:00 -0500 Received: from xmb-rcd-x05.cisco.com ([169.254.15.194]) by xhc-rcd-x07.cisco.com ([173.37.183.81]) with mapi id 14.03.0248.002; Thu, 8 Oct 2015 12:37:00 -0500 From: "Alexander Clemm (alex)" To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure Thread-Index: AdEB5+DLM5h+BqpqTSycX0eoPofscAAB5dAA Date: Thu, 8 Oct 2015 17:37:00 +0000 Message-ID: References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [173.37.102.27] Content-Type: multipart/alternative; boundary="_000_DBC595ED2346914F9F81D17DD5C32B572823513Axmbrcdx05ciscoc_" MIME-Version: 1.0 Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:37:05 -0000 --_000_DBC595ED2346914F9F81D17DD5C32B572823513Axmbrcdx05ciscoc_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Sue, as coauthor of draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR = regarding what's in the draft. Thanks --- Alex From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 08, 2015 9:47 AM To: i2rs@ietf.org Cc: 'Jeffrey Haas' ; 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - = IPR disclosure I2RS WG: I missed an important part of the WG LC. Each author of each document shou= ld indicate whether they have any IPR on the requirements. Sue Hares From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:16 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requireme= nts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares --_000_DBC595ED2346914F9F81D17DD5C32B572823513Axmbrcdx05ciscoc_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi Sue,

 

as coauthor of = draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR regarding what&= #8217;s in the draft.

 

Thanks

--- Alex

From: i2rs [mailto:i2rs-bounces@ietf.org] = On Behalf Of Susan Hares
Sent: Thursday, October 08, 2015 9:47 AM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>; 'Alia Atlas' <akatlas@= gmail.com>
Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2= 015) - IPR disclosure

 

I2RS WG:

 

I missed an important = part of the WG LC.  Each author of each document should indicate wheth= er they have any IPR on the requirements.

 

Sue Hares <= /span>

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015)= -

 

This begins a 2 week WG LC on the following requirem= ent documents for I2RS:

 

draft-ietf-i2rs-ephemeral-state-02.txt  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ep= hemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section is blank and this will be discussed at = the 10/17/2015 interim.

We will discuss whether this section should be kept = or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.tx= t

http://datatracker.ietf.org/doc/dra= ft-ietf-i2rs-protocol-security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2= rs-pub-sub-requirements/

 

draft-ietf-i2rs-traceability-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2rs-trace= ability/

 

Sue Hares

 

--_000_DBC595ED2346914F9F81D17DD5C32B572823513Axmbrcdx05ciscoc_-- From nobody Thu Oct 8 10:37:40 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67D961B2C62 for ; Thu, 8 Oct 2015 10:37:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.602 X-Spam-Level: X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kPz1jaWAb-DV for ; Thu, 8 Oct 2015 10:37:38 -0700 (PDT) Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 983141B2C79 for ; Thu, 8 Oct 2015 10:37:37 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 77E2B980052; Thu, 8 Oct 2015 10:37:37 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id E866A980064; Thu, 8 Oct 2015 10:37:36 -0700 (PDT) To: Susan Hares , i2rs@ietf.org References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> From: "Joel M. Halpern" Message-ID: <5616A9DF.5020004@joelhalpern.com> Date: Thu, 8 Oct 2015 13:37:35 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:37:39 -0000 I do not know of any undeclared IPR on any of these documents. Yours, Joel M. Halpern On 10/8/15 12:47 PM, Susan Hares wrote: > I2RS WG: > > I missed an important part of the WG LC. Each author of each document > should indicate whether they have any IPR on the requirements. > > Sue Hares > > *From:*i2rs [mailto:i2rs-bounces@ietf.org] *On Behalf Of *Susan Hares > *Sent:* Tuesday, October 06, 2015 7:16 PM > *To:* i2rs@ietf.org > *Cc:* 'Jeffrey Haas'; 'Alia Atlas' > *Subject:* [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - > > This begins a 2 week WG LC on the following requirement documents for I2RS: > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interim. > > We will discuss whether this section should be kept or removed. > > draft-ietf-i2rs-protocol-security-requirements-01.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements/ > > draft-ietf-i2rs-pub-sub-requirements-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > draft-ietf-i2rs-traceability-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ > > Sue Hares > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 8 10:41:34 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB10A1B2C99 for ; Thu, 8 Oct 2015 10:41:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ADsubd3Wn18i for ; Thu, 8 Oct 2015 10:41:31 -0700 (PDT) Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB7951B2C93 for ; Thu, 8 Oct 2015 10:41:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12036; q=dns/txt; s=iport; t=1444326090; x=1445535690; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=AHsiBK7DuaLeinBCoMwzcs/66vucJ/uOFwvtF9xypkw=; b=EJaoPyovzoVYnGkVrZjQhIm+oh57CZt2YZ+0mGUgstRM+MXgaJPpngZx d6uh2iad7LnRMcAzDBOhS/QZJ5qNdRfDvNXQs0AiAAxkaCsl41Hh/5rS9 3MjyyvNaUXwa9YCOUvJ/NmqrD9B4Lva6AvCvGHEiKyFxfsByR9eIWODib 4=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0B7AgC5qRZW/5pdJa1eglpNVG4GrECRAgENgVojgnCCCn8CgU44FAEBAQEBAQGBCoQmAQEBBC1MEAIBCBEDAQEBKAchERQJCAEBBAENBYgZAxINvgYNhSIBAQEBAQEBAQEBAQEBAQEBAQEBAQEXi3GCUIIsEQYBhC4FlgoBhReGDIF0giCSEYdJEQ4BAUKCRIE+cYZmgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,655,1437436800"; d="scan'208,217";a="195719536" Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-6.cisco.com with ESMTP; 08 Oct 2015 17:41:30 +0000 Received: from XCH-ALN-008.cisco.com (xch-aln-008.cisco.com [173.36.7.18]) by rcdn-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t98HfUc5031147 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 8 Oct 2015 17:41:30 GMT Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 8 Oct 2015 12:41:29 -0500 Received: from xhc-rcd-x04.cisco.com (173.37.183.78) by xch-aln-008.cisco.com (173.36.7.18) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Thu, 8 Oct 2015 12:41:29 -0500 Received: from xmb-rcd-x14.cisco.com ([169.254.4.39]) by xhc-rcd-x04.cisco.com ([173.37.183.78]) with mapi id 14.03.0248.002; Thu, 8 Oct 2015 12:41:29 -0500 From: "Alberto Gonzalez Prieto (albertgo)" To: "Alexander Clemm (alex)" , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure Thread-Index: AdEB5+DLM5h+BqpqTSycX0eoPofscAAB5dAA///gqgA= Date: Thu, 8 Oct 2015 17:41:28 +0000 Message-ID: References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.5.5.150821 x-originating-ip: [64.101.220.141] Content-Type: multipart/alternative; boundary="_000_D23BF8BC4F4DDalbertgociscocom_" MIME-Version: 1.0 Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:41:33 -0000 --_000_D23BF8BC4F4DDalbertgociscocom_ Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Hi Sue, as coauthor of draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR = regarding what=92s in the draft. Thanks, Alberto From: i2rs > on behalf = of "Alexander Clemm (alex)" > Date: Thursday, October 8, 2015 at 10:37 AM To: Susan Hares >, "i2rs@ietf.org" > Cc: 'Jeffrey Haas' >, 'Alia Atlas' > Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - = IPR disclosure Hi Sue, as coauthor of draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR = regarding what=92s in the draft. Thanks --- Alex From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 08, 2015 9:47 AM To: i2rs@ietf.org Cc: 'Jeffrey Haas' >; 'Alia Atlas' > Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - = IPR disclosure I2RS WG: I missed an important part of the WG LC. Each author of each document shou= ld indicate whether they have any IPR on the requirements. Sue Hares From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Tuesday, October 06, 2015 7:16 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - This begins a 2 week WG LC on the following requirement documents for I2RS: draft-ietf-i2rs-ephemeral-state-02.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ Note: I2RS ephemeral state has a section on minimal NETCONF Changes. This section is blank and this will be discussed at the 10/17/2015 interim. We will discuss whether this section should be kept or removed. draft-ietf-i2rs-protocol-security-requirements-01.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requireme= nts/ draft-ietf-i2rs-pub-sub-requirements-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ draft-ietf-i2rs-traceability-03.txt http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ Sue Hares --_000_D23BF8BC4F4DDalbertgociscocom_ Content-Type: text/html; charset="Windows-1252" Content-ID: Content-Transfer-Encoding: quoted-printable

Hi Sue,

 

as coauthor of draft-ietf-i2rs-pub-sub-requirem= ents, I am not aware of IPR regarding what=92s in the draft.

 

Thanks,


Alberto


From: i2rs <i2rs-bounces@ietf.org> on behalf of "Alexa= nder Clemm (alex)" <alex@cisco.co= m>
Date: Thursday, October 8, 2015 at = 10:37 AM
To: Susan Hares <shares@ndzh.com>, "i2rs@ietf.org" <i2rs@= ietf.org>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] WG LC for requi= rement documents (10/6 to 10/20/2015) - IPR disclosure

Hi Sue,

 

as coauthor of = draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR regarding what= =92s in the draft.

 

Thanks

--- Alex

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 08, 2015 9:47 AM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas' <jhaas@pfrc.= org>; 'Alia Atlas' <akatlas@= gmail.com>
Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2= 015) - IPR disclosure

 

I2RS WG:

 

I missed an important = part of the WG LC.  Each author of each document should indicate wheth= er they have any IPR on the requirements.

 

Sue Hares <= /span>

 

From: i2rs [mai= lto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015)= -

 

This begins a 2 week WG LC on the following requirem= ent documents for I2RS:

 

draft-ietf-i2rs-ephemeral-state-02.txt  

http://datatracker.ietf.org/doc/draft-ietf-i2rs-ep= hemeral-state/

 

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes. 

This section is blank and this will be discussed at = the 10/17/2015 interim.

We will discuss whether this section should be kept = or removed.   

 

draft-ietf-i2rs-protocol-security-requirements-01.tx= t

http://datatracker.ietf.org/doc/dra= ft-ietf-i2rs-protocol-security-requirements/

 

draft-ietf-i2rs-pub-sub-requirements-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2= rs-pub-sub-requirements/

 

draft-ietf-i2rs-traceability-03.txt

http://datatracker.ietf.org/doc/draft-ietf-i2rs-trace= ability/

 

Sue Hares

 

--_000_D23BF8BC4F4DDalbertgociscocom_-- From nobody Thu Oct 8 10:47:33 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92F051A1A87 for ; Thu, 8 Oct 2015 10:47:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.707 X-Spam-Level: X-Spam-Status: No, score=-2.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I4I8AgnXGBqC for ; Thu, 8 Oct 2015 10:47:29 -0700 (PDT) Received: from nm19-vm8.bullet.mail.gq1.yahoo.com (nm19-vm8.bullet.mail.gq1.yahoo.com [98.136.217.31]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 565681B2CB2 for ; Thu, 8 Oct 2015 10:47:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1444326444; bh=3trlqKzKdUvsJN7IfrRVX+EWRkuGkpPd2jdR3UYNSIk=; h=Date:Subject:From:To:CC:References:In-Reply-To:From:Subject; b=EtmpCW9/TeoRa9mxHjFkzbT4NPndaqwxavkC7rtld1bEle7fCt+pXEjVzwcCWJkdOnwYUIChjU086o3dlL91Y0bYidxl0rhZfhOQRtNtwxX8ntMn+9PkDVql/3C0ZoL7APPQ63grSuypBujgYQRfZ8WuQ32Wha7fbtblfTneTHzHXQ/MsP1WV7WUeB8Io5jrKJBMzrOWw301HPVjEQwEkW74hOyDJejIssZxEcJTbPZeU86Kxx0mNctI9mX2VzgINVbZJpYIjBuG6ncccPPj6MrvW7G+5Njkvv+fVdXD18QLFgHEOZvD6LHdCsTvRlAgwNuEktviMhBMzkCUWtdGCQ== Received: from [216.39.60.183] by nm19.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:47:24 -0000 Received: from [98.136.164.68] by tm19.bullet.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:47:24 -0000 Received: from [127.0.0.1] by smtp230.mail.gq1.yahoo.com with NNFMP; 08 Oct 2015 17:47:24 -0000 X-Yahoo-Newman-Id: 821958.85507.bm@smtp230.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: nPjUHmQVM1lXUirr50eIFfh8ZIh2K4D8eFoN6Zrhlxc3KSK hu_sG4QsMKPOVVbMlSQ4tIISsZ71WrFpw6Sbebgl27vV30puIHQpZcZhCwdu dnEH9NHc6i.zuJQNa5ob.o56GXM0URK1Z..WbUuWqT_8Rnjm23_UGlbRZOsy a_IyHNKNfiwun18pe10H2OD166Glbh5jNvO4Xey3A82Nds7z.doWFWp7Coqp c1QerTFuc3v2JU9UktsAGOdmXbgOrwdjfFqT8xCzcNvpE0P35wRzGS.IWgaG bDwDuL05pW.qs8lrLWz7B2GTBdjDlkQk_GnqxGTSqIIP8ZV082KrLzsivctp zIZVk1b5mfnlqC98XRAFzKCMHcMDcyE2tDoaW_m_sKBLRJZ1GVpsOeFuSpWk W_UQPPPoDTC7HUifY52kOzhcJg1XV0QPyXWEs3ZjZvXcTWbbUxLfdvwNzld1 RgXCaxb45ThdWCHDSok8jmSCKWevLzpfboAyeNLLnKiB1Z_HadDNZVYykWpo aa9N1EWCwuiToswhBXBeZn.n3gY3Op_BQL1fuyXA- X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Thu, 08 Oct 2015 10:47:16 -0700 From: Nitin Bahadur To: "Jeffrey (Zhaohui) Zhang" , "i2rs@ietf.org" Message-ID: Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3527146045_48309416" Archived-At: Cc: "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 17:47:32 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3527146045_48309416 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable When would you use "chain_name"? What's the difference/relationship between and nexthop-identifier? =20 NB> Removed CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the same thing. Nexthop-identifier (as referenced in Section 4) is really something like a that identifies a particular . I have changed =B3nexthop-identifier=B2 to =B3nexthop identifier=B2 to remove confusion that it is a special term. is something that identifies = a . =20 Zzh> Can you clarify =B3nexthop-identifier =8A is =8A like a =B2. is not defined in the spec. If you say =B3 is nexthop identifier as referenced in sectio= n 4=B2 then it=B9s clear J I left the reference and definition of to the data-model draft. There is nothing in the grammar that references it, so defining it did not make sense. Section 2.4.3 has: identifier: This is an identifier returned by the network device representing another nexthop or another nexthop chain. Section 4 has: routes that use a nexthop that is identified by a nexthop identifier should be unaffected when the contents of that nexthop changes. So I=B9m not clear where to define/reference these terminals. I=B9m hoping the data-model does a good job at incorporating this :) Zzh> I don=B9t understand why you say =B3 is something that identifies a =B2. is part of the following, so why would it identify a chain (vs. a chain member) . =20 ::=3D ... ::=3D | ::=3D | I=B9m unclear what your concern is or how you would like it re-worded. The wa= y I see it, a NEXTHOP_CHAIN_ID is the ID for a chain. And a NEXTHOP_CHAIN_MEMBER_ID (not defined or referenced) should be the ID for a chain-member. ------------------------ =20 ::=3D ( ...) ::=3D ( [] [] []) | ( []) =20 is part of - so does not make sense= ? =20 NB> There was no easy place to put the POP operation. One option would have been to define . =20 Zzh> I think that option is better. The macro issue IMO is do we need to support a tunnel-decap for all kinds o= f tunnels. If yes, then it makes sense to make changes all over the draft to support this. If not, then it looks like a big hammer to me. I=B9m fine with whatever the WG wants. Thanks Nitin --B_3527146045_48309416 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable

When wo= uld you use "chain_name"? What's the difference/relationship between <NEX= THOP_CHAIN_ID> and nexthop-identifier?

 =

NB>  Removed CHAIN_NAME. CHAIN_NAME an= d CHAIN_ID were one and the same thing. Nexthop-identifier (as reference= d in Section 4) is really something like a <NEXTHOP_IDENTIFIER> that i= dentifies a particular <nexthop>. I have changed “nexthop-identifierR= 21; to “nexthop identifier” to remove confusion that it is a spe= cial term. <NEXTHOP_CHAIN_ID> is something that identifies= a <nexthop-chain>.

 

Zzh> Can you clarify “nexthop-identifier … is …= like a <NEXTHOP_IDENTIFIER>”. <NEXTHOP_IDENTIFIER> is not= defined in the spec. If  you say “<NEXTHOP_IDENTIFIER> is nexthop identifier as referenced = in section 4” then it’s clear J

<= /div>

I left the reference and definition of <NEXTHOP_IDENTIFIER&g= t; to the data-model draft. There is nothing in the grammar that references = it, so defining it did not make sense. Section 2.4.3 has:

identifier: This is an identifier returned by the network device

      representing another nexthop or= another nexthop chain.


Section 4 has:

routes that use a nexthop that is identified by a nexthop&= nbsp;identifier sho= uld be

   unaffected when the contents of that ne= xthop changes.



So I’m not clear where to define= /reference these terminals. I’m hoping the data-model does a good job = at incorporating this :)

<= div class=3D"WordSection1">

Zzh&g= t; I don’t understand why you say “<NEXTHOP_CHAIN_ID> is something that = identifies a <nexthop-chain>”. <NEXT= HOP_CHAIN_ID> is part of the following, so why would it identify a chain = (vs. a chain member) .

 

<nexthop-ch= ain> ::=3D <nexthop-chain-member> ...

<nexthop-chain-identifier> ::=3D <NEXTHOP_CHAIN_NAME> |

      &nb= sp;            &= nbsp;            <= NEXTHOP_CHAIN_ID>

<nexthop-chai= n-member> ::=3D <nexthop-chain-member-identifier> | 


I’m unclear what your = concern is or how you would like it re-worded. The way I see it, a NEXTHOP_<= span style=3D"font-style: italic;">CHAIN_ID  is the ID for a chain= . And a NEXTHOP_CHAIN_MEMBER= _ID (not defined or referenced) should be the ID for a chain-member.


--------------= ----------

 

<= p class=3D"MsoPlainText"><mpls-header> ::=3D (&l= t;mpls-label-operation> ...)

<mpls-label-operation> ::=3D (<MPLS_PUSH&g= t; <MPLS_LABEL> [<S_BIT>]

       &= nbsp;            = ;        [<TOS_VALUE>] [<TTL_VAL= UE>]) |

           &nbs= p;            &n= bsp;   (<MPLS_POP> [<TTL_ACTION>])

 =

<mpls-header> = is part of <tunnel-encap> - so <MPLS_POP> does not make sense?

 

NB> There was= no easy place to put the POP operation. One option would have been to defin= e <tunnel-decap>.

 

Zzh> I think that option is better.


The macro issue = IMO is do we need to support a tunnel-decap for all kinds of tunnels. If yes= , then it makes sense to make changes all over the draft to support thi= s. If not, then it looks like a big hammer to me. I’m fine with w= hatever the WG wants.

Thanks
<= div>Nitin
--B_3527146045_48309416-- From nobody Thu Oct 8 11:48:02 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A22BA1A914B for ; Thu, 8 Oct 2015 11:48:01 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.901 X-Spam-Level: X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M1_fUBouII_L for ; Thu, 8 Oct 2015 11:47:57 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0148.outbound.protection.outlook.com [65.55.169.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED7D71A9145 for ; Thu, 8 Oct 2015 11:47:56 -0700 (PDT) Received: from BLUPR0501MB1713.namprd05.prod.outlook.com (10.163.120.16) by BLUPR0501MB1027.namprd05.prod.outlook.com (10.160.34.141) with Microsoft SMTP Server (TLS) id 15.1.293.16; Thu, 8 Oct 2015 18:47:55 +0000 Received: from BLUPR0501MB1715.namprd05.prod.outlook.com (10.163.120.18) by BLUPR0501MB1713.namprd05.prod.outlook.com (10.163.120.16) with Microsoft SMTP Server (TLS) id 15.1.293.16; Thu, 8 Oct 2015 18:47:54 +0000 Received: from BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) by BLUPR0501MB1715.namprd05.prod.outlook.com ([10.163.120.18]) with mapi id 15.01.0293.007; Thu, 8 Oct 2015 18:47:53 +0000 From: "Jeffrey (Zhaohui) Zhang" To: Nitin Bahadur , "i2rs@ietf.org" Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) Thread-Index: AQHRAV1xbH4/3JeXf0eN6huQqeymy55hVMkQgACLOQCAAAXPMA== Date: Thu, 8 Oct 2015 18:47:53 +0000 Message-ID: References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=zzhang@juniper.net; x-originating-ip: [66.129.241.11] x-microsoft-exchange-diagnostics: 1; BLUPR0501MB1713; 5:3rOxk62g4pjaYL6ofutgBfjP6nxIlm3ZnwNiIyXG/xhV2WoK2DdpQvuihA2pCcb42SsNpaX8Ci3wJwT6Jt8RV04ah5YgLsYlAyMw8z+czfsT3rgixIXu9fx12QwBBD/wmj1/FegeverF+XvuoWd1JA==; 24:drCsRcamiceqFeJnLgdmuM6DwKsgnaCno9wYLHXfcHtRwl5G1GX5N1MCyyvXAg2kctMl89Y+B+/jDXUH/tGQiHfL3faDLRY1dklkbZOXTVI=; 20:NkewMKRsGZ+g4zg/XdvadBSMd4tBmhidkI3iFgQ/p3hEgBuLA0c58rmoDU1Aq0AQtqhlyCrjozoYzYpYxC+Q3Q== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BLUPR0501MB1713; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(108003899814671); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(5005006)(8121501046)(3002001); SRVR:BLUPR0501MB1713; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0501MB1713; x-forefront-prvs: 0723A02764 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(51444003)(377454003)(31014005)(57704003)(199003)(5423002)(189002)(479174004)(19580405001)(19609705001)(66066001)(33656002)(5002640100001)(105586002)(77096005)(5008740100001)(19580395003)(92566002)(76576001)(19300405004)(2501003)(76176999)(40100003)(50986999)(106116001)(54356999)(2521001)(230783001)(46102003)(102836002)(19625215002)(101416001)(15975445007)(189998001)(122556002)(106356001)(64706001)(5007970100001)(5004730100002)(16236675004)(74316001)(93886004)(10400500002)(99286002)(2950100001)(86362001)(87936001)(2900100001)(81156007)(5003600100002)(5001770100001)(5001960100002)(97736004); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB1713; H:BLUPR0501MB1715.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: multipart/alternative; boundary="_000_BLUPR0501MB17159D3A23CF6DCF348B9287D4350BLUPR0501MB1715_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Oct 2015 18:47:53.7950 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB1713 X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB1027; 2:dYMxSP9Jrx/Y78fRD+HBgStzv8o70fCa4iZLVMcyc9qfVvu0JUtgB2JoefAxlK2DwrArAvL3i1ucEhz08a0iWfWmngWUHwEJCRu5aBvWbrzpaNOsj6n95rlNG/LQ5xwTkOES+HtBRoQn4sJuo+kQ/7DfHDnCZwhVgBfuvVCrcvc=; 23:08GIVsIYdTape1e4t9a38YmfyUnI4I9/1glycn/BUhgaqGm80C46jrYjydB2VwLOMSNIkY80YrpPB1/KhwZTgSUGbHRsJOvgkgJgtK2YVfY3amVB2AjOPq7C3Ts+dqtyW1E4YUPngB+wRaApHhv2Pjh20kBuXUc6a8FXhbjJYro7RG+BSPV/mpnhdzlWM5+P X-OriginatorOrg: juniper.net Archived-At: Cc: "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 18:48:01 -0000 --_000_BLUPR0501MB17159D3A23CF6DCF348B9287D4350BLUPR0501MB1715_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Nitin, For the first issue, I think you're saying that is the= "nexthop identifier". Now it's clear. For the second issue, I did get and mixed up in the info model, but that's because the fo= llowing from data model, which is confusing at least if not incorrect: grouping nexthop-chain-member { <-- member here description "One nexthop content for a route."; leaf nexthop-chain-id{ <-- chain here type uint32; mandatory true; } Still, what's the difference/relationship between the following? - and nexthop-identifier for the chain nexthop? That's m= y original question. - and nextop-identifier for the chain member? For the third issue, precisely because we don't have tunnel decap for other= tunnels, why having a label pop for MPLS :) BTW, a nit: A modify-able object is one whose contents can be changed without having to change objects that depend on it and without affecting any data forwarding. When you change the nexthop content, the data forwarding will definitely be= affected - it's what you want. The "and without affecting any data forward= ing" should be removed - what you want to emphasize is that you don't have = to change the objects that depend on it (and the text does do that already)= . Jeffrey From: Nitin Bahadur [mailto:nitin_bahadur@yahoo.com] Sent: Thursday, October 08, 2015 1:47 PM To: Jeffrey (Zhaohui) Zhang ; i2rs@ietf.org Cc: sriganesh.kini@ericsson.com Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to= 10/20/2015) When would you use "chain_name"? What's the difference/relationship between= and nexthop-identifier? NB> Removed CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the same thin= g. Nexthop-identifier (as referenced in Section 4) is really something like= a that identifies a particular . I have chan= ged "nexthop-identifier" to "nexthop identifier" to remove confusion that i= t is a special term. is something that identifies a . Zzh> Can you clarify "nexthop-identifier ... is ... like a ". is not defined in the spec. If you say " is nexthop identifier as referenced in section 4" then it's = clear :) I left the reference and definition of to the data-mod= el draft. There is nothing in the grammar that references it, so defining i= t did not make sense. Section 2.4.3 has: identifier: This is an identifier returned by the network device representing another nexthop or another nexthop chain. Section 4 has: routes that use a nexthop that is identified by a nexthop identifier should= be unaffected when the contents of that nexthop changes. So I'm not clear where to define/reference these terminals. I'm hoping the = data-model does a good job at incorporating this :) Zzh> I don't understand why you say " is something that i= dentifies a ". is part of the following, = so why would it identify a chain (vs. a chain member) . ::=3D ... ::=3D | ::=3D | I'm unclear what your concern is or how you would like it re-worded. The wa= y I see it, a NEXTHOP_CHAIN_ID is the ID for a chain. And a NEXTHOP_CHAIN_= MEMBER_ID (not defined or referenced) should be the ID for a chain-member. ------------------------ ::=3D ( ...) ::=3D ( [] [] []) | ( []) is part of - so does not make sense= ? NB> There was no easy place to put the POP operation. One option would have= been to define . Zzh> I think that option is better. The macro issue IMO is do we need to support a tunnel-decap for all kinds o= f tunnels. If yes, then it makes sense to make changes all over the draft t= o support this. If not, then it looks like a big hammer to me. I'm fine wit= h whatever the WG wants. Thanks Nitin --_000_BLUPR0501MB17159D3A23CF6DCF348B9287D4350BLUPR0501MB1715_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Nitin,

 

For the first issue, I= think you’re saying that <NEXTHOP_IDENTIFIER> is the “ne= xthop identifier”. Now it’s clear.

 

For the second issue, I did get <n=
exthop-chain-identifier> and <nexthop-chain-member-identifier> mixed up in the info model, but that’s because the following from da=
ta model, which is confusing at least if not incorrect:

  grouping nexthop-chain-member { &n= bsp; &= szlig; member here

    description

      "One nexth= op content for a route.";

    leaf nexthop-chain-id{ = ;         &= szlig; chain here

      type uint32;

      mandatory true;=

    }

 
Still, what’s the difference/relationship between=
 the following?
 
- <NEXTHOP_CHAIN_ID> and ne=
xthop-identifier for the chain nexthop? That’s my original question.<=
o:p>
- <NEXTHOP_CHAIN_MEMBER_ID>=
 and nextop-identifier for the chain member?
 
For the third issue, precisely because we don’t h=
ave tunnel decap for other tunnels, why having a label pop for MPLS =
J
 
BTW, a nit:
 

   A modify-able object is one whose= contents can be changed without

   having to change objects that dep= end on it and without affecting any

   data forwarding.

 
When you change the nexthop content, the data forwardin=
g will definitely be affected – it’s what you want. The “=
and without affecting any data forwarding” should be removed – =
what you want to emphasize is that you don’t have to change the objec=
ts that depend on it (and the text does do that already).=
 
Jeffrey

 

From: Nitin Bahadur [mailto:nitin_bahadur@yah= oo.com]
Sent: Thursday, October 08, 2015 1:47 PM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net>; i2rs@ietf.or= g
Cc: sriganesh.kini@ericsson.com
Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (= 10/6 to 10/20/2015)

 

&n= bsp;

When would you use "chain_nam= e"? What's the difference/relationship between <NEXTHOP_CHAIN_ID>= ; and nexthop-identifier?

 

NB>  Removed = CHAIN_NAME. CHAIN_NAME and CHAIN_ID were one and the same thing. Nex= thop-identifier (as referenced in Section 4) is really something like a <NEXTHOP_IDENTIFIER> that identifies a parti= cular <nexthop>. I have changed “nexthop-identifier” to &= #8220;nexthop identifier” to remove confusion that it is a special te= rm. <NEXTHOP_CHAIN_ID> is something that identifies a <= ;nexthop-chain>.

 

Zzh> Can you clarify “nexth= op-identifier … is … like a <NEXTHOP_IDENTIFIER>”. = <NEXTHOP_IDENTIFIER> is not defined in the spec. If  you say = 220;<NEXTHOP_IDENTIFIER> is nexthop identifier as referenced in section 4” then it’s cl= ear J

&n= bsp;

I left the reference and= definition of <NEXTHOP_IDENTIFIER> to the data-model draft. There is= nothing in the grammar that references it, so defining it did not make sen= se. Section 2.4.3 has:<= o:p>

&n= bsp;

id= entifier: This is an identifier returned by the networ= k device

      = representing another nexthop or another nexthop chain.

&n= bsp;

Section 4 has:

&n= bsp;

routes that use a nex= thop that is identified by a nexthop identifier should be

   unaffect= ed when the contents of that nexthop changes.

 

&n= bsp;

So I’m not clear w= here to define/reference these terminals. I’m hoping the data-model d= oes a good job at incorporating this :)

&n= bsp;

Zzh> I don’t understand why= you say “<NEX= THOP_CHAIN_ID> is something that identifies a <nexthop-ch= ain>”. <NEXTHOP_CHAIN_ID> is part of th= e following, so why would it identify a chain (vs. a chain member) .=

 

<nexthop-chain> ::=3D <nexthop-chain-member> ...=

<nexthop-chain-identifier> ::=3D <NEXTHOP_CHAIN_NAM= E> |

          =             &nb= sp;         <NEXTHOP_CHAIN_ID>= ;

<nexthop-chain-member> ::=3D <nexthop-chain-member-= identifier> | =

&n= bsp;

I’= ;m unclear what your concern is or how you would like it re-worded. The way= I see it, a NEXTHOP_CHAIN_ID  is the ID for a chain. And a NEX= THOP_CHAIN_MEMBER_ID (not defined or referenced) should be the ID for a chain-member.

&n= bsp;

&n= bsp;

------------------------

 

<mpls-header> ::=3D (<mpls-= label-operation> ...)

<mpls-label-operation> ::=3D (= <MPLS_PUSH> <MPLS_LABEL> [<S_BIT>]

      =             &nb= sp;         [<TOS_VALUE>] [&l= t;TTL_VALUE>]) |

      =             &nb= sp;         (<MPLS_POP> [<= TTL_ACTION>])

 

<mpls-header> is part of <= ;tunnel-encap> - so <MPLS_POP> does not make sense?

 

NB> There was no e= asy place to put the POP operation. One option would have been to define &l= t;tunnel-decap>.

 

Zzh> I think that option is bet= ter.

&n= bsp;

The macro issue IMO is do we need to support a tunne= l-decap for all kinds of tunnels. If yes, then it makes sense to make chang= es all over the draft to support this. If not, then it looks like a bi= g hammer to me. I’m fine with whatever the WG wants.

 

Thanks

Nitin

--_000_BLUPR0501MB17159D3A23CF6DCF348B9287D4350BLUPR0501MB1715_-- From nobody Thu Oct 8 13:15:16 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D10111ACD0B for ; Thu, 8 Oct 2015 13:15:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.2 X-Spam-Level: X-Spam-Status: No, score=-3.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1ud_FmCNIM6v for ; Thu, 8 Oct 2015 13:15:11 -0700 (PDT) Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41DD41ACD18 for ; Thu, 8 Oct 2015 13:15:11 -0700 (PDT) X-AuditID: c6180641-f792c6d00000686a-ac-561662bd80df Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id E7.96.26730.DB266165; Thu, 8 Oct 2015 14:34:05 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Thu, 8 Oct 2015 16:15:09 -0400 From: Xufeng Liu To: Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQFbBFrA Date: Thu, 8 Oct 2015 20:15:08 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> In-Reply-To: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.9] Content-Type: multipart/alternative; boundary="_000_AAB1CC9C17CBA440BDFA169056B93B9E127BE37Deusaamb107erics_" MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupjkeLIzCtJLcpLzFFi42KZXLonUHdvkliYwfs5xhafHl5itlg34wOL xf6Db1kt/rx5xeLA4rFz1l12jyVLfjJ5zH59ndXjcu9W1gCWKC6blNSczLLUIn27BK6MpS/b WQouTmWseHFyJXMD441mxi5GTg4JAROJpbtWQNliEhfurWfrYuTiEBI4yijRsOgrE4SzjFFi 7+sPrF2MHBxsAloSl586gjSICDhJvGvYxQ5iMwu4Sly8OY0NxBYWMJd4f/cJM0SNhcTNLytZ IWwjibYlF8CWsQioSKzdcB3M5hXwlZh9ZwsTiC0kYCbxZctksJmcQHNW77oJFmcEOu77qTVM ELvEJW49mc8EcbSAxJI955khbFGJl4//sULYihL7+qdD3ZYvcX/CaRaIXYISJ2c+YZnAKDoL yahZSMpmISmDiOtJ3Jg6hQ3C1pZYtvA1M4StKzHj3yEWZPEFjOyrGDlKi1PLctONDDcxAiPw mASb4w7GBZ8sDzEKcDAq8fAmsImFCbEmlhVX5h5ilOZgURLnnTfjfqiQQHpiSWp2ampBalF8 UWlOavEhRiYOTqkGxk79LfZz17NlnFG/N3ERJ++Reb1T+v9P1GPYLCpQ/ld0rstNh7NCC/QX PJtZMXGKSmS6sXfX1xs7vRTs7D+7Xzvt8vjy6vrpWy95Obl4S8dbJ86zP3v33ozvLXNP3y4I nHvnY9IEydWyOorubrfr5FW5Lz0+6WynfV3F9MHDnsApd9g/dq+uUFNiKc5INNRiLipOBADx WqzDoQIAAA== Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 20:15:15 -0000 --_000_AAB1CC9C17CBA440BDFA169056B93B9E127BE37Deusaamb107erics_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Hi Folks, The following is an update on the ongoing I2RS<=3D>TE Topology alignment di= scussion (between the authors of the TE Topology model and Alex). The issues / solutions that are currently being discussed are: I2RS Generic Network Topology Model (draft-ietf-yang-network-topo): 1. Some groupings in ietf-network.yang and ietf-network-topology.yang = cannot be used in augmenting module because of missing name spaces, such as= "path "/network/network-id" at line 42 of ietf-network.yang. Solution: Proposed fixes have been sent to Alex to verify. 2. "leaf network-ref" in ietf-network-topology.yang:169, 220, is causi= ng pyang validation errors. Solution: Alex will check the errors. 3. Can the group of schedule attributes be moved from ietf-te-topology= .yang to ietf-network-topology.yang? Solution: We agreed to keep them in ietf-te-topology.yang. 4. How to support state branch in augmenting module? Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes. 5. Should "server-provided" flag be used to block user operation on re= ad-only entities? Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose. 6. Should I2RS Generic Network Topology model have a top-level contain= er? The benefit of doing so is to provide an augmentation target node to de= fine attributes global to all networks. Solution: I2RS Generic Network Topology module authors will consider making= "/networks" as the top level container. L3 Topology Model (draft-ietf-i2rs-yang-l3-topology) 1. L3 Topology Model should have references to TE Topology model, so t= hat the related TE information can be properly retrieved, when L3 topology = and TE topology are congruent. Solution: L3 Topology Model authors will need to update the model and draft= to include these. L2 Topology Model (draft-ietf-i2rs-yang-l2-topology) 1. L2 Topology Model should have references to TE Topology model, so t= hat the related TE information can be properly retrieved, when L2 topology = and TE topology are congruent. Solution: This needs to be discussed with L2 Topology Model authors. Regards, - Xufeng (on behalf of the authors of the TE Topology Model) From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 01, 2015 6:42 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for Topology (10/1 to 10/14) This begins a 2 week WG Last call (10/1 to 10/14) draft-ietf-yang-network-topo - modeling draft http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ draft-ietf-i2rs-yang-l3-topology - L3 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ draft-ietf-i2rs-yang-l2-topology - L2 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topology/ Implementation status: This an OpenDaylight (ODL) implementation of the L3 topology and general mo= del. It is likely the L2 topology model will be supported in future ODL im= plementations. Jeff and I would appreciate anyone who has implementations= of these topology models to provide details on list or offlist to the chai= rs. Sue Hares --_000_AAB1CC9C17CBA440BDFA169056B93B9E127BE37Deusaamb107erics_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

Hi Folks,

 

The following is an up= date on the ongoing I2RS=F3TE Topology alignment discu= ssion (between the authors of the TE Topology model and Alex).

 

The issues / solutions= that are currently being discussed are:

 

I2RS Generic Network T= opology Model (draft-ietf-yang-network-topo):

1.&n= bsp;     Some groupings= in ietf-network.yang and ietf-network-topology.yang cannot be used in augm= enting module because of missing name spaces, such as “path "/ne= twork/network-id" at line 42 of ietf-network.yang.
Solution: Proposed fixes have been sent to Alex to verify.

 

2.&n= bsp;     “leaf ne= twork-ref” in ietf-network-topology.yang:169, 220, is causing pyang v= alidation errors.
Solution: Alex will check the errors.

3.&n= bsp;     Can the group = of schedule attributes be moved from ietf-te-topology.yang to ietf-network-= topology.yang?
Solution: We agreed to keep them in ietf-te-topology.yang.

4.&n= bsp;     How to support= state branch in augmenting module?
Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes.

5.&n= bsp;     Should “= server-provided” flag be used to block user operation on read-only en= tities?
Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose.

6.&n= bsp;     Should I2RS Ge= neric Network Topology model have a top-level container? The benefit of doi= ng so is to provide an augmentation target node to define attributes global= to all networks.
Solution: I2RS Generic Network Topology module authors will consider making= “/networks” as the top level container.

 

L3 Topology Model (draft-ietf-i2rs-yang-l3-topology)

1.&n= bsp;     L3 Topology Mo= del should have references to TE Topology model, so that the related TE inf= ormation can be properly retrieved, when L3 topology and TE topology are co= ngruent.
Solution: L3 Topology Model authors will need to update the model and draft= to include these.

 

L2 Topology Model (draft-ietf-i2rs-yang-l2-topology)

1.&n= bsp;     L2 Topology Mo= del should have references to TE Topology model, so that the related TE inf= ormation can be properly retrieved, when L2 topology and TE topology are co= ngruent.
Solution: This needs to be discussed with L2 Topology Model authors.

 

Regards,

- Xufeng (on behalf of= the authors of the TE Topology Model)

 

From: i2rs [ma= ilto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 01, 2015 6:42 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for Topology (10/1 to 10/14)
=

 

This begins a 2 week WG Last call (10/1 to 10/14)

 

draft-ietf-yang-network-topo – modeling draft =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-= yang-network-topo/

 

draft-ietf-i2rs-yang-l3-topology – L3 topology=

http://datatracker.ietf.org/doc/draft-ietf-i2rs-y= ang-l3-topology/

 

draft-ietf-i2rs-yang-l2-topology – L2 topology=

http://datatracker.ietf.org/doc/draft-iet= f-i2rs-yang-l2-network-topology/

 

Implementation status:

 

This an OpenDaylight (ODL) implementation of the L3 = topology and general model.  It is likely the L2 topology model will b= e supported in future ODL implementations.   Jeff and I would app= reciate anyone who has implementations of these topology models to provide details on list or offlist to the chairs.

 

Sue Hares  

--_000_AAB1CC9C17CBA440BDFA169056B93B9E127BE37Deusaamb107erics_-- From nobody Thu Oct 8 15:36:48 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83A4E1B2E04 for ; Thu, 8 Oct 2015 15:36:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R57HsJwNHukD for ; Thu, 8 Oct 2015 15:36:46 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4D171B2DF7 for ; Thu, 8 Oct 2015 15:36:45 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: "'Martin Bjorklund'" References: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> <20151008.085448.838467418663018728.mbj@tail-f.com> <00bd01d101d0$f5bc78d0$e1356a70$@ndzh.com> In-Reply-To: <00bd01d101d0$f5bc78d0$e1356a70$@ndzh.com> Date: Thu, 8 Oct 2015 18:36:39 -0400 Message-ID: <037b01d10219$ccc9cbf0$665d63d0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHCHNW4W5OiwrMgaRQXRIpsvzvqkAJwsRGWAgVAyWKeW/JLoA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, i2rs@ietf.org, kwatsen@juniper.net, andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Oct 2015 22:36:47 -0000 Martin and all: The recording streaming recording is at: I2RS Interim 10/7-20151007 1405-1 Wednesday, October 7, 2015 11:39 am | Eastern Daylight Time (New York, GMT-04:00) PLAY RECORDING (1 hr 31 min) https://ietf.webex.com/ietf/ldr.php?RCID=c7a470c3bec3a9ed4db8a379e273716d I will send notes to the list later tonight. Sue Hares -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 08, 2015 9:55 AM To: 'Martin Bjorklund' Cc: jhaas@pfrc.org; i2rs@ietf.org; kwatsen@juniper.net; andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting Martin: I will send out webex id and notes this morning. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund Sent: Thursday, October 08, 2015 2:55 AM To: shares@ndzh.com Cc: jhaas@pfrc.org; i2rs@ietf.org; kwatsen@juniper.net; andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting Hi, Was this WebEX recorded? If so, where can I find it? /martin "Susan Hares" wrote: > > > I2RS Interim 10/7/2015 > > > > 1) Agenda Bashing [10:00 - 10:05 ] > > 2) I2RS Protocol Requirements Summary > > [10:05 - 10:15] > > 3) Discussion of Requirements [10:15-30] > > 4) I2RS Protocol Strawman [10:25 - 10:45] > > 5) Discussion of I2RS Protocol [10:45-11:00] > > 7) I2RS Hackathon [11:00 - 11:15] > > 8) I2RS FB-RIB [11:15 - 11:30] > > > > > > Next I2RS Meeting 10/7/2015 > > I2RS Interim 10/7 > > Wednesday, October 7, 2015 > > 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs > > > > > > Join WebEx meeting > > https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db > > > > Meeting number: 649 136 221 > > Meeting password: kent.andy.proto > > > > Join by phone > > 1-877-668-4493 Call-in toll free number (US/Canada) > > 1-650-479-3208 Call-in toll number (US/Canada) > > Access code: 649 136 221 > > Toll-free calling restrictions > > > > > > > > > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Thu Oct 8 17:36:34 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7B051B2E89 for ; Thu, 8 Oct 2015 17:36:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.277 X-Spam-Level: X-Spam-Status: No, score=-1.277 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HxoiCyRcWyD0 for ; Thu, 8 Oct 2015 17:36:30 -0700 (PDT) Received: from mail-wi0-x235.google.com (mail-wi0-x235.google.com [IPv6:2a00:1450:400c:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 873471B2E88 for ; Thu, 8 Oct 2015 17:36:29 -0700 (PDT) Received: by wicfx3 with SMTP id fx3so46366557wic.0 for ; Thu, 08 Oct 2015 17:36:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=GcKNKBelKUz0LvqTgbj+UW5DGrt73fCmjsMSg4Y1kio=; b=jduAqBK7KSggXhmMtRvYscvv+xSu/cNbsBiZYyvvMRtymjgpFBmWr525ygy+nQUUWS nyUFcwfvMQm0iXTBQMY0ZF/O9b6R4rlWd1fDWRZioX2gaGMc4aVepTmuUl3YYLBDZM6Z JGrKPyLxfCopyo3jmqLqiEzfM5a/LLNvrp6OM3E3a+gTGPN8p92kIACHHmLRqNzwxLAV hvBvqnHemyn5kSQ6USke3QRkivOHGzoLSLSwKjkJYeG6Hr6YYPqt7Uz6rVk4XHH0bRhz lFs18g71C08AmIZQH5siW2yf/7gftffq0/D/wjscZrgY5QDDDTnSnM9mFw4grZj7uVYA X/wA== MIME-Version: 1.0 X-Received: by 10.194.76.237 with SMTP id n13mr11891287wjw.128.1444350988145; Thu, 08 Oct 2015 17:36:28 -0700 (PDT) Sender: mglt.ietf@gmail.com Received: by 10.194.88.98 with HTTP; Thu, 8 Oct 2015 17:36:28 -0700 (PDT) In-Reply-To: References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Date: Thu, 8 Oct 2015 20:36:28 -0400 X-Google-Sender-Auth: -PkEeEK_I7vNIQvmdBH5xJMwTvw Message-ID: From: Daniel Migault To: "Alberto Gonzalez Prieto (albertgo)" Content-Type: multipart/alternative; boundary=047d7bfcef749458320521a12bf1 Archived-At: Cc: Jeffrey Haas , "i2rs@ietf.org" , "Alexander Clemm \(alex\)" , Susan Hares , Alia Atlas Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 00:36:31 -0000 --047d7bfcef749458320521a12bf1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Hi, As a co-author of draft-ietf-i2rs-protocol-security-requirements-01.txt I am not aware of any IPR regarding this draft. BR, Daniel On Thu, Oct 8, 2015 at 1:41 PM, Alberto Gonzalez Prieto (albertgo) < albertgo@cisco.com> wrote: > Hi Sue, > > > > as coauthor of draft-ietf-i2rs-pub-sub-requirements, I am not aware of IP= R > regarding what=E2=80=99s in the draft. > > > > Thanks, > > > Alberto > > From: i2rs on behalf of "Alexander Clemm (alex)" = < > alex@cisco.com> > Date: Thursday, October 8, 2015 at 10:37 AM > To: Susan Hares , "i2rs@ietf.org" > Cc: 'Jeffrey Haas' , 'Alia Atlas' > > Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) > - IPR disclosure > > Hi Sue, > > > > as coauthor of draft-ietf-i2rs-pub-sub-requirements, I am not aware of > IPR regarding what=E2=80=99s in the draft. > > > > Thanks > > --- Alex > > *From:* i2rs [mailto:i2rs-bounces@ietf.org ] *On > Behalf Of *Susan Hares > *Sent:* Thursday, October 08, 2015 9:47 AM > *To:* i2rs@ietf.org > *Cc:* 'Jeffrey Haas' ; 'Alia Atlas' > *Subject:* Re: [i2rs] WG LC for requirement documents (10/6 to > 10/20/2015) - IPR disclosure > > > > I2RS WG: > > > > I missed an important part of the WG LC. Each author of each document > should indicate whether they have any IPR on the requirements. > > > > Sue Hares > > > > *From:* i2rs [mailto:i2rs-bounces@ietf.org ] *On > Behalf Of *Susan Hares > *Sent:* Tuesday, October 06, 2015 7:16 PM > *To:* i2rs@ietf.org > *Cc:* 'Jeffrey Haas'; 'Alia Atlas' > *Subject:* [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - > > > > This begins a 2 week WG LC on the following requirement documents for > I2RS: > > > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interi= m. > > We will discuss whether this section should be kept or removed. > > > > draft-ietf-i2rs-protocol-security-requirements-01.txt > > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-require= ments/ > > > > draft-ietf-i2rs-pub-sub-requirements-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > > > draft-ietf-i2rs-traceability-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ > > > > Sue Hares > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > --047d7bfcef749458320521a12bf1 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi,=C2=A0

As a co-author of=C2=A0draft-ietf-i2r= s-protocol-security-requirements-01.txt I am not aware of any IPR regarding = this draft.

BR,=C2=A0
Daniel

On Thu, Oct 8= , 2015 at 1:41 PM, Alberto Gonzalez Prieto (albertgo) <= ;albertgo@cisco.com= > wrote:

Hi Sue,

=C2=A0

as coauthor of=C2=A0draft-ietf-i2rs-pub-sub-requirem= ents, I am not aware of IPR regarding what=E2=80=99s in the draft.

=C2=A0

Thanks,


Alberto


From: i2rs <i2rs-bounces@ietf.org> on beh= alf of "Alexander Clemm (alex)" <alex@cisco.com>
Date: Thursday, October 8, 2015 at = 10:37 AM
To: Susan Hares <shares@ndzh.com>, "i2rs@ietf.org" <i2rs@ietf.org>
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>, = 9;Alia Atlas' <akatlas@gmail.com>

Subject: Re: [i2rs] WG LC for requi= rement documents (10/6 to 10/20/2015) - IPR disclosure

Hi Sue,<= /span>

=C2=A0

as coauthor of = draft-ietf-i2rs-pub-sub-requirements, I am not aware of IPR regarding what= =E2=80=99s in the draft.

=C2=A0

Thanks

--- Alex=

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 08, 2015 9:47 AM
To: i2rs@ietf.org=
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>; 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2= 015) - IPR disclosure

=C2=A0

I2RS WG:

=C2=A0

I missed an important = part of the WG LC.=C2=A0 Each author of each document should indicate wheth= er they have any IPR on the requirements.

=C2=A0

Sue Hares

=C2=A0

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, October 06, 2015 7:16 PM
To: i2rs@ietf.org=
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015)= -

=C2=A0

This begins a 2 week WG LC on the following requirem= ent documents for I2RS:

=C2=A0

draft-ietf-i2rs-ephemeral-state-02.txt =C2=A0=

http://datatracker.ietf.org/doc/= draft-ietf-i2rs-ephemeral-state/

=C2=A0

Note: I2RS ephemeral state has a section on minimal = NETCONF Changes.=C2=A0

This section is blank and this will be discussed at = the 10/17/2015 interim.

We will discuss whether this section should be kept = or removed. =C2=A0=C2=A0

=C2=A0

draft-ietf-i2rs-protocol-security-requirements-01.tx= t

http://datatracke= r.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements/

=C2=A0

draft-ietf-i2rs-pub-sub-requirements-03.txt <= u>

http://datatracker.ietf.org= /doc/draft-ietf-i2rs-pub-sub-requirements/

=C2=A0

draft-ietf-i2rs-traceability-03.txt

http://datatracker.ietf.org/doc/dra= ft-ietf-i2rs-traceability/

=C2=A0

Sue Hares

=C2=A0


_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs


--047d7bfcef749458320521a12bf1-- From nobody Thu Oct 8 19:20:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CADB1ACE19; Thu, 8 Oct 2015 19:20:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.76 X-Spam-Level: X-Spam-Status: No, score=-0.76 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yQZ2haX90mLM; Thu, 8 Oct 2015 19:20:31 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73F5F1ACDC6; Thu, 8 Oct 2015 19:20:30 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml406-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BYN99301; Fri, 09 Oct 2015 02:20:26 +0000 (GMT) Received: from SZXEMA413-HUB.china.huawei.com (10.82.72.72) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 9 Oct 2015 03:20:25 +0100 Received: from SZXEMA512-MBS.china.huawei.com ([169.254.8.78]) by SZXEMA413-HUB.china.huawei.com ([10.82.72.72]) with mapi id 14.03.0235.001; Fri, 9 Oct 2015 10:20:19 +0800 From: "Zhangxian (Xian)" To: Xufeng Liu , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQFbBFrAAAxNSnA= Date: Fri, 9 Oct 2015 02:20:19 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> In-Reply-To: Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.66.104.209] Content-Type: multipart/alternative; boundary="_000_C636AF2FA540124E9B9ACB5A6BECCE6B54ACDD33SZXEMA512MBSchi_" MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: 'Jeffrey Haas' , TEAS WG , 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 02:20:36 -0000 --_000_C636AF2FA540124E9B9ACB5A6BECCE6B54ACDD33SZXEMA512MBSchi_ Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: base64 SGksIFh1ZmVuZywgQWxleCwNCg0KVGhhbmsgeW91IGZvciB0YWtpbmcgdGhlIGVmZm9ydCB0byB3 b3JrIHRvd2FyZCBnZXR0aW5nIGFsaWduZWQgYXMgZGlzY3Vzc2VkIGluIGxhc3QgbWVldGluZy4g ICBJIGhhdmUgc29tZSBjb21tZW50cyBvbiBzb21lIG9mIHRoZSBjb25jbHVzaW9ucy4NCg0KQ291 bGQgeW91IHNoYXJlIGEgYml0IG1vcmUgb24gcmVhc29ucyBiZWhpbmQgUG9pbnQgMyBjb25jbHVz aW9uPw0KDQpGb3IgcG9pbnRzIDQgYW5kIDUsIEkgdGhpbmsgdGhleSBhcmUgcmVsYXRlZC4gTXkg dW5kZXJzdGFuZGluZyBpcyB0aGF0IGZvciBpZXRmLW5ldHdvcmssIGl0IGRvZXMgbm90IGZvbGxv dyB0aGUgbWV0aG9kIHRha2VuIGJ5IFlBTkcgbW9kdWxlcyBzdWNoIGFzIGlldGYtaW50ZXJmYWNl IGFuZCBpZXRmLXRlLXRvcG9sb2d5LCBpbiB3aGljaCBlYWNoIKhDcncgbGVhZiB3aWxsIGhhdmUg YSBjb3JyZXNwb25kaW5nIKhDcm8gbGVhZi4gSW5zdGVhZCwgaXQgY2hvb3NlIHRvIHVzZSB0aGUg obBzZXJ2ZXItcHJvdmlkZWShsSBhdHRyaWJ1dGUgdG8gc2F5IHdoZXRoZXIgYWxsIHRoZSBsZWFm cyBpbiB0aGUgbW9kdWxlIGlzIGNvbmZpZ3VyYWJsZSBvciBzdGF0ZS4gSSBhbSBub3Qgc3VyZSBJ IHVuZGVyc3RhbmQgdGhlIGNvbmNsdXNpb24gb2YgdGhlc2UgdHdvIHBvaW50cy4gRG8geW91IGFn cmVlIHRoYXQgYm90aCBtZXRob2RzIGFyZSBhY2NlcHRhYmxlPw0KDQpPbmUgbGFzdCBjb21tZW50 IG9uIHBvaW50IDY6IGlzIHRoaXMgZm9yIGZ1dHVyZS1wcm9vZm5lc3Mgb3IgeW91IGhhdmUgYWxy ZWFkeSBoYXZlIHNvbWUgYXR0cmlidXRlcyBpbiBtaW5kIHRoYXQgY2FuIGFwcGx5IHRvIGFsbCBu ZXR3b3Jrcz8NCg0KVGhhbmsgeW91LA0KWGlhbg0KDQpGcm9tOiBpMnJzIFttYWlsdG86aTJycy1i b3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgWHVmZW5nIExpdQ0KU2VudDogMjAxNcTqMTDU wjnI1SA0OjE1DQpUbzogU3VzYW4gSGFyZXM7IGkycnNAaWV0Zi5vcmcNCkNjOiAnSmVmZnJleSBI YWFzJzsgJ0FsaWEgQXRsYXMnDQpTdWJqZWN0OiBSZTogW2kycnNdIFdHIExDIGZvciBUb3BvbG9n eSAoMTAvMSB0byAxMC8xNCkNCg0KSGkgRm9sa3MsDQoNClRoZSBmb2xsb3dpbmcgaXMgYW4gdXBk YXRlIG9uIHRoZSBvbmdvaW5nIEkyUlM8PT5URSBUb3BvbG9neSBhbGlnbm1lbnQgZGlzY3Vzc2lv biAoYmV0d2VlbiB0aGUgYXV0aG9ycyBvZiB0aGUgVEUgVG9wb2xvZ3kgbW9kZWwgYW5kIEFsZXgp Lg0KDQpUaGUgaXNzdWVzIC8gc29sdXRpb25zIHRoYXQgYXJlIGN1cnJlbnRseSBiZWluZyBkaXNj dXNzZWQgYXJlOg0KDQpJMlJTIEdlbmVyaWMgTmV0d29yayBUb3BvbG9neSBNb2RlbCAoZHJhZnQt aWV0Zi15YW5nLW5ldHdvcmstdG9wbyk6DQoNCjEuICAgICAgU29tZSBncm91cGluZ3MgaW4gaWV0 Zi1uZXR3b3JrLnlhbmcgYW5kIGlldGYtbmV0d29yay10b3BvbG9neS55YW5nIGNhbm5vdCBiZSB1 c2VkIGluIGF1Z21lbnRpbmcgbW9kdWxlIGJlY2F1c2Ugb2YgbWlzc2luZyBuYW1lIHNwYWNlcywg c3VjaCBhcyChsHBhdGggIi9uZXR3b3JrL25ldHdvcmstaWQiIGF0IGxpbmUgNDIgb2YgaWV0Zi1u ZXR3b3JrLnlhbmcuDQpTb2x1dGlvbjogUHJvcG9zZWQgZml4ZXMgaGF2ZSBiZWVuIHNlbnQgdG8g QWxleCB0byB2ZXJpZnkuDQoNCg0KDQoyLiAgICAgIKGwbGVhZiBuZXR3b3JrLXJlZqGxIGluIGll dGYtbmV0d29yay10b3BvbG9neS55YW5nOjE2OSwgMjIwLCBpcyBjYXVzaW5nIHB5YW5nIHZhbGlk YXRpb24gZXJyb3JzLg0KU29sdXRpb246IEFsZXggd2lsbCBjaGVjayB0aGUgZXJyb3JzLg0KDQoN Cg0KMy4gICAgICBDYW4gdGhlIGdyb3VwIG9mIHNjaGVkdWxlIGF0dHJpYnV0ZXMgYmUgbW92ZWQg ZnJvbSBpZXRmLXRlLXRvcG9sb2d5LnlhbmcgdG8gaWV0Zi1uZXR3b3JrLXRvcG9sb2d5Lnlhbmc/ DQpTb2x1dGlvbjogV2UgYWdyZWVkIHRvIGtlZXAgdGhlbSBpbiBpZXRmLXRlLXRvcG9sb2d5Lnlh bmcuDQoNCg0KDQo0LiAgICAgIEhvdyB0byBzdXBwb3J0IHN0YXRlIGJyYW5jaCBpbiBhdWdtZW50 aW5nIG1vZHVsZT8NClNvbHV0aW9uOiBLZWVwIGJhc2UgbW9kZWwgaWV0Zi1uZXR3b3JrLXRvcG9s b2d5LnlhbmcgYXMgaXMuIEluIHRoZSBhdWdtZW50aW5nIG1vZHVsZSwgZm9yIGVhY2ggZW50aXR5 IGxpa2UgdG9wb2xvZ3ksIG5vZGUgYW5kIGxpbmssIGNyZWF0ZSBhIGNvbmZpZyBjb250YWluZXIg Zm9yIGNvbmZpZ3VyYXRpb24gYXR0cmlidXRlcyBhbmQgYSBzdGF0ZSBjb250YWluZXIgZm9yIG9w ZXJhdGlvbmFsIHN0YXRlIGF0dHJpYnV0ZXMuDQoNCg0KDQo1LiAgICAgIFNob3VsZCChsHNlcnZl ci1wcm92aWRlZKGxIGZsYWcgYmUgdXNlZCB0byBibG9jayB1c2VyIG9wZXJhdGlvbiBvbiByZWFk LW9ubHkgZW50aXRpZXM/DQpTb2x1dGlvbjogS2VlcCBiYXNlIG1vZGVsIGlldGYtbmV0d29yay10 b3BvbG9neS55YW5nIGFzIGlzLiBURSB0b3BvbG9neSB3aWxsIHVzZSBvdGhlciBtZWFucyB0byBh Y2hpZXZlIHN1Y2ggYSBwdXJwb3NlLg0KDQoNCg0KNi4gICAgICBTaG91bGQgSTJSUyBHZW5lcmlj IE5ldHdvcmsgVG9wb2xvZ3kgbW9kZWwgaGF2ZSBhIHRvcC1sZXZlbCBjb250YWluZXI/IFRoZSBi ZW5lZml0IG9mIGRvaW5nIHNvIGlzIHRvIHByb3ZpZGUgYW4gYXVnbWVudGF0aW9uIHRhcmdldCBu b2RlIHRvIGRlZmluZSBhdHRyaWJ1dGVzIGdsb2JhbCB0byBhbGwgbmV0d29ya3MuDQpTb2x1dGlv bjogSTJSUyBHZW5lcmljIE5ldHdvcmsgVG9wb2xvZ3kgbW9kdWxlIGF1dGhvcnMgd2lsbCBjb25z aWRlciBtYWtpbmcgobAvbmV0d29ya3OhsSBhcyB0aGUgdG9wIGxldmVsIGNvbnRhaW5lci4NCg0K TDMgVG9wb2xvZ3kgTW9kZWwgKGRyYWZ0LWlldGYtaTJycy15YW5nLWwzLXRvcG9sb2d5KQ0KDQox LiAgICAgIEwzIFRvcG9sb2d5IE1vZGVsIHNob3VsZCBoYXZlIHJlZmVyZW5jZXMgdG8gVEUgVG9w b2xvZ3kgbW9kZWwsIHNvIHRoYXQgdGhlIHJlbGF0ZWQgVEUgaW5mb3JtYXRpb24gY2FuIGJlIHBy b3Blcmx5IHJldHJpZXZlZCwgd2hlbiBMMyB0b3BvbG9neSBhbmQgVEUgdG9wb2xvZ3kgYXJlIGNv bmdydWVudC4NClNvbHV0aW9uOiBMMyBUb3BvbG9neSBNb2RlbCBhdXRob3JzIHdpbGwgbmVlZCB0 byB1cGRhdGUgdGhlIG1vZGVsIGFuZCBkcmFmdCB0byBpbmNsdWRlIHRoZXNlLg0KDQpMMiBUb3Bv bG9neSBNb2RlbCAoZHJhZnQtaWV0Zi1pMnJzLXlhbmctbDItdG9wb2xvZ3kpDQoNCjEuICAgICAg TDIgVG9wb2xvZ3kgTW9kZWwgc2hvdWxkIGhhdmUgcmVmZXJlbmNlcyB0byBURSBUb3BvbG9neSBt b2RlbCwgc28gdGhhdCB0aGUgcmVsYXRlZCBURSBpbmZvcm1hdGlvbiBjYW4gYmUgcHJvcGVybHkg cmV0cmlldmVkLCB3aGVuIEwyIHRvcG9sb2d5IGFuZCBURSB0b3BvbG9neSBhcmUgY29uZ3J1ZW50 Lg0KU29sdXRpb246IFRoaXMgbmVlZHMgdG8gYmUgZGlzY3Vzc2VkIHdpdGggTDIgVG9wb2xvZ3kg TW9kZWwgYXV0aG9ycy4NCg0KUmVnYXJkcywNCi0gWHVmZW5nIChvbiBiZWhhbGYgb2YgdGhlIGF1 dGhvcnMgb2YgdGhlIFRFIFRvcG9sb2d5IE1vZGVsKQ0KDQpGcm9tOiBpMnJzIFttYWlsdG86aTJy cy1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgU3VzYW4gSGFyZXMNClNlbnQ6IFRodXJz ZGF5LCBPY3RvYmVyIDAxLCAyMDE1IDY6NDIgUE0NClRvOiBpMnJzQGlldGYub3JnDQpDYzogJ0pl ZmZyZXkgSGFhcyc7ICdBbGlhIEF0bGFzJw0KU3ViamVjdDogW2kycnNdIFdHIExDIGZvciBUb3Bv bG9neSAoMTAvMSB0byAxMC8xNCkNCg0KVGhpcyBiZWdpbnMgYSAyIHdlZWsgV0cgTGFzdCBjYWxs ICgxMC8xIHRvIDEwLzE0KQ0KDQpkcmFmdC1pZXRmLXlhbmctbmV0d29yay10b3BvIKhDIG1vZGVs aW5nIGRyYWZ0DQpodHRwOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtaTJy cy15YW5nLW5ldHdvcmstdG9wby8NCg0KZHJhZnQtaWV0Zi1pMnJzLXlhbmctbDMtdG9wb2xvZ3kg qEMgTDMgdG9wb2xvZ3kNCmh0dHA6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0 Zi1pMnJzLXlhbmctbDMtdG9wb2xvZ3kvDQoNCmRyYWZ0LWlldGYtaTJycy15YW5nLWwyLXRvcG9s b2d5IKhDIEwyIHRvcG9sb2d5DQpodHRwOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0 LWlldGYtaTJycy15YW5nLWwyLW5ldHdvcmstdG9wb2xvZ3kvDQoNCkltcGxlbWVudGF0aW9uIHN0 YXR1czoNCg0KVGhpcyBhbiBPcGVuRGF5bGlnaHQgKE9ETCkgaW1wbGVtZW50YXRpb24gb2YgdGhl IEwzIHRvcG9sb2d5IGFuZCBnZW5lcmFsIG1vZGVsLiAgSXQgaXMgbGlrZWx5IHRoZSBMMiB0b3Bv bG9neSBtb2RlbCB3aWxsIGJlIHN1cHBvcnRlZCBpbiBmdXR1cmUgT0RMIGltcGxlbWVudGF0aW9u cy4gICBKZWZmIGFuZCBJIHdvdWxkIGFwcHJlY2lhdGUgYW55b25lIHdobyBoYXMgaW1wbGVtZW50 YXRpb25zIG9mIHRoZXNlIHRvcG9sb2d5IG1vZGVscyB0byBwcm92aWRlIGRldGFpbHMgb24gbGlz dCBvciBvZmZsaXN0IHRvIHRoZSBjaGFpcnMuDQoNClN1ZSBIYXJlcw0K --_000_C636AF2FA540124E9B9ACB5A6BECCE6B54ACDD33SZXEMA512MBSchi_ Content-Type: text/html; charset="gb2312" Content-Transfer-Encoding: quoted-printable

Hi, Xufeng, Alex,

 

Thank you for taking the effort to work toward getting= aligned as discussed in last meeting.   I have some comments on = some of the conclusions.

 

Could you share a bit more on reasons behind Point 3 c= onclusion?

 

For points 4 and 5, I think they are related. My under= standing is that for ietf-network, it does not follow the method taken by Y= ANG modules such as ietf-interface and ietf-te-topology, in which each =A8Crw leaf will have a corresponding =A8Cro leaf. Instead, = it choose to use the =A1=B0server-provided=A1=B1 attribute to say whether a= ll the leafs in the module is configurable or state. I am not sure I unders= tand the conclusion of these two points. Do you agree that both methods are acceptable?

 

One last comment on point 6: is this for future-proofn= ess or you have already have some attributes in mind that can apply to all = networks?

 

Thank you,

Xian

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Xufeng Liu
Sent: 2015
=C4=EA10=D4=C29=C8= =D5 4:15
To: Susan Hares; i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi Folk= s,

 <= /span>

The fol= lowing is an update on the ongoing I2RS=A8=AETE Topology alignment discussion (between the authors of the TE Topology model and Alex).

 <= /span>

The iss= ues / solutions that are currently being discussed are:

 <= /span>

I2RS Ge= neric Network Topology Model (draft-ietf-yang-n= etwork-topo):

1. &nbs= p;    Some groupings in ietf-network.yang and ietf-network-topology.yang cannot = be used in augmenting module because of missing name spaces, such as =A1=B0= path "/network/network-id" at line 42 of ietf-network.yang.
Solution: Proposed fixes have been sent to Alex to verify.

=  

2. &nbs= p;    =A1=B0leaf network-ref=A1=B1 in ietf-network-topology.yang:169, 220, is ca= using pyang validation errors.
Solution: Alex will check the errors.


3. &nbs= p;    Can the group of schedule attributes be moved from ietf-te-topology.yang t= o ietf-network-topology.yang?
Solution: We agreed to keep them in ietf-te-topology.yang.


4. &nbs= p;    How to support state branch in augmenting module?
Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes.


5. &nbs= p;    Should =A1=B0server-provided=A1=B1 flag be used to block user operation on= read-only entities?
Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose.


6. &nbs= p;    Should I2RS Generic Network Topology model have a top-level container? The= benefit of doing so is to provide an augmentation target node to define at= tributes global to all networks.
Solution: I2RS Generic Network Topology module authors will consider making= =A1=B0/networks=A1=B1 as the top level container.

 <= /span>

L3 Topo= logy Model (draft-ietf-i2rs-yang-l3-topology)

1. &nbs= p;    L3 Topology Model should have references to TE Topology model, so that the= related TE information can be properly retrieved, when L3 topology and TE = topology are congruent.
Solution: L3 Topology Model authors will need to update the model and draft= to include these.

 <= /span>

L2 Topo= logy Model (draft-ietf-i2rs-yang-l2-topology)

1. &nbs= p;    L2 Topology Model should have references to TE Topology model, so that the= related TE information can be properly retrieved, when L2 topology and TE = topology are congruent.
Solution: This needs to be discussed with L2 Topology Model authors.
=

 <= /span>

Regards= ,

- Xufen= g (on behalf of the authors of the TE Topology Model)

 <= /span>

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 01, 2015 6:42 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for Topology (10/1 to 10/14)

 

This begins a 2 week WG Last ca= ll (10/1 to 10/14)

 

draft-ietf-yang-network-topo = =A8C modeling draft

http://datatracker.ietf.org= /doc/draft-ietf-i2rs-yang-network-topo/

 

draft-ietf-i2rs-yang-l3-topolog= y =A8C L3 topology

http://datatracker.ietf.org/= doc/draft-ietf-i2rs-yang-l3-topology/

 

draft-ietf-i2rs-yang-l2-topolog= y =A8C L2 topology

http://datatracker.i= etf.org/doc/draft-ietf-i2rs-yang-l2-network-topology/=

 

Implementation status:

 

This an OpenDaylight (ODL) impl= ementation of the L3 topology and general model.  It is likely the L2 = topology model will be supported in future ODL implementations.   = ;Jeff and I would appreciate anyone who has implementations of these topology models to provide details on list or offlist to the chai= rs.

 

Sue Hares  

--_000_C636AF2FA540124E9B9ACB5A6BECCE6B54ACDD33SZXEMA512MBSchi_-- From nobody Fri Oct 9 00:22:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88A051A6F2E for ; Fri, 9 Oct 2015 00:22:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id owdr_Q9QQLjR for ; Fri, 9 Oct 2015 00:22:15 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D27261A6F02 for ; Fri, 9 Oct 2015 00:22:14 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 4CAA01005; Fri, 9 Oct 2015 09:22:13 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id CRQ0YhsSU4a9; Fri, 9 Oct 2015 09:22:12 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Fri, 9 Oct 2015 09:22:12 +0200 (CEST) Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 4351520053; Fri, 9 Oct 2015 09:22:12 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id HD048ozsSa88; Fri, 9 Oct 2015 09:22:11 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 0FFC92004E; Fri, 9 Oct 2015 09:22:10 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 14D8237AF013; Fri, 9 Oct 2015 09:22:08 +0200 (CEST) Date: Fri, 9 Oct 2015 09:22:07 +0200 From: Juergen Schoenwaelder To: Susan Hares Message-ID: <20151009072207.GA56815@elstar.local> Mail-Followup-To: Susan Hares , i2rs@ietf.org, 'Jeffrey Haas' , 'Alia Atlas' , Ladislav Lhotka , Martin Bjorklund , Andy Bierman References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: i2rs@ietf.org, Martin Bjorklund , Ladislav Lhotka , Andy Bierman , 'Jeffrey Haas' , 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 07:22:17 -0000 Hi, there is a discussion on the yang doctors mailing list about the data model design that mixes state data and configuration data into one subtree and that uses a data model specific runtime object to identify what is config data and what is state data. One of the main outcomes of the IAB workshop back in 2002 was the need to clearly separate configuration from operational state and this has been driven the design of NETCONF and YANG. YANG data model validation rules, for example, make a distinction between config true and config false data. The config true or false property impacts what is returned by NETCONF's get-config operation. Also note that config data is not allowed to refer to config false data in constraints. It is unclear why the document does not follow the typical design pattern, namely to have a config true subtree /networks/network* and a config false subtree /networks-state/network* Section 3.5 describes this approach in the 3rd paragraph and states "As most data is defined in those groupings, the amount of additional definitions required will be limited." and there are no strong reasons given why this approach has not been followed. /js On Thu, Oct 01, 2015 at 06:41:34PM -0400, Susan Hares wrote: > This begins a 2 week WG Last call (10/1 to 10/14) > > > > draft-ietf-yang-network-topo - modeling draft > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ > > > > draft-ietf-i2rs-yang-l3-topology - L3 topology > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ > > > > draft-ietf-i2rs-yang-l2-topology - L2 topology > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topology/ > > > > Implementation status: > > > > This an OpenDaylight (ODL) implementation of the L3 topology and general > model. It is likely the L2 topology model will be supported in future ODL > implementations. Jeff and I would appreciate anyone who has > implementations of these topology models to provide details on list or > offlist to the chairs. > > > > Sue Hares > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Fri Oct 9 01:13:14 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92E881A8839; Fri, 9 Oct 2015 01:13:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.661 X-Spam-Level: X-Spam-Status: No, score=-5.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cb2KAWjziAlF; Fri, 9 Oct 2015 01:13:12 -0700 (PDT) Received: from mail.nic.cz (mail.nic.cz [217.31.204.67]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9AD71A8835; Fri, 9 Oct 2015 01:13:10 -0700 (PDT) Received: from [IPv6:2001:718:1a02:1:1c2:d14c:7ffc:4360] (unknown [IPv6:2001:718:1a02:1:1c2:d14c:7ffc:4360]) by mail.nic.cz (Postfix) with ESMTPSA id E477E181899; Fri, 9 Oct 2015 10:13:08 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nic.cz; s=default; t=1444378388; bh=GMmxRAvTU4m57gPSKSeMb89a/eIPAzzkpwd4ifGhzuA=; h=From:Date:To; b=TwFxGJ/EF8q4apW837kf3wimQtcHVXNM2JkIXFJOxP+qLT1OAxk7jGe/3G448s7ik pT7MyaQDCBFFWaznlDFKQT0RC7H3f8adeGgTcBJeJLIgYknG2xW8CuvsQzLwJZjzDm 3w7RgoADO+xw9faJZ6Vm8YiGBUyel6gvVx0NSTyQ= From: Ladislav Lhotka Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-Id: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> Date: Fri, 9 Oct 2015 10:13:09 +0200 To: i2rs@ietf.org, NETMOD WG Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) X-Mailer: Apple Mail (2.3094) X-Virus-Scanned: clamav-milter 0.98.7 at mail X-Virus-Status: Clean Archived-At: Subject: [i2rs] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 08:13:13 -0000 Hi, I am sorry for cross-posting but I think it is high time to decide the = relationship between the data models in i2rs-rib-data-model and = netmod-routing-cfg I-Ds because they clearly target the same management = data in a router. I can see three possible scenarios: 1. The i2rs-rib module will be modified to augment = ietf-routing/ietf-ipv[46]-unicast-routing. 2. The scope of ietf-routing will be changed so that it would address = only host routing and simple routers. The modelling work for advanced = routers will be done elsewhere. 3. The work on netmod-routing-cfg will be stopped. Opinions? Thanks, Lada -- Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C From nobody Fri Oct 9 06:00:16 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 545981B3C52; Fri, 9 Oct 2015 06:00:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t_HJuRfSDkwA; Fri, 9 Oct 2015 06:00:10 -0700 (PDT) Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EFB91B3C53; Fri, 9 Oct 2015 06:00:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1938; q=dns/txt; s=iport; t=1444395610; x=1445605210; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=wsPHNLel0ZcRRujFOWrgQc+0cBz2v4GyzZk3w9plpwU=; b=O1QoKOj0+FFmwg7Z7PWlXqXwkwb/TL3TnoLpPHRBCjCFaYYJKLDvZod/ lbm1LK3P5OMDLHzHEKpnXxwjnO3A9x3d837yTm5bwDws46k5hWFHHmLMk M0C1OzQYsFgFLle0IumUzyWAXrl1cqoFLpKr58XpVJv3WR0FGnfzJfiDX U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AhAgCruRdW/49dJa1egyZUbga9WwENgVoXCoJyggo1SgIcgS04FAEBAQEBAQGBCoQnAQEEAQEBIBE6BAcQAgEIGgImAgICJQsVEAIEAQ0FiC4Nrw6UFwEBAQEBAQEBAQEBAQEBAQEBAQEBARMEgSKKT4UNB4JpgUUFlhIBjRmbfx8BAUKEAnGGZIEGAQEB X-IronPort-AV: E=Sophos;i="5.17,657,1437436800"; d="scan'208";a="196326494" Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 09 Oct 2015 13:00:09 +0000 Received: from XCH-ALN-015.cisco.com (xch-aln-015.cisco.com [173.36.7.25]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id t99D09fG021502 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 9 Oct 2015 13:00:09 GMT Received: from xch-aln-015.cisco.com (173.36.7.25) by XCH-ALN-015.cisco.com (173.36.7.25) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 9 Oct 2015 08:00:06 -0500 Received: from xhc-rcd-x11.cisco.com (173.37.183.85) by xch-aln-015.cisco.com (173.36.7.25) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Fri, 9 Oct 2015 08:00:06 -0500 Received: from xmb-aln-x06.cisco.com ([169.254.1.127]) by xhc-rcd-x11.cisco.com ([173.37.183.85]) with mapi id 14.03.0248.002; Fri, 9 Oct 2015 08:00:08 -0500 From: "Acee Lindem (acee)" To: Ladislav Lhotka , "i2rs@ietf.org" , "NETMOD WG" Thread-Topic: [netmod] rib-data-model and routing-cfg Thread-Index: AQHRAmpn2WDjXB7SH0yyXI3vdDB1jJ5jMMMA Date: Fri, 9 Oct 2015 13:00:08 +0000 Message-ID: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> In-Reply-To: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [173.36.7.28] Content-Type: text/plain; charset="utf-8" Content-ID: <56B9385C80123946AA490DB40F3FC673@emea.cisco.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Cc: Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 13:00:12 -0000 SGkgTGFkYSwgDQpJMlJTIGlzIG5vdCBjaGFydGVyZWQgdG8gZG8gdGhlIGJhc2UgbW9kZWxzLiBU aGVyZSBhcmUgb3RoZXIgcm91dGluZw0KbW9kZWxzIHRoYXQgcmVmZXJlbmNlIHJvdXRpbmctY2Zn IGFuZCBldmVuIGluLXByb2dyZXNzIGltcGxlbWVudGF0aW9ucy4NCg0KT24gMTAvOS8xNSwgNDox MyBBTSwgIm5ldG1vZCBvbiBiZWhhbGYgb2YgTGFkaXNsYXYgTGhvdGthIg0KPG5ldG1vZC1ib3Vu Y2VzQGlldGYub3JnIG9uIGJlaGFsZiBvZiBsaG90a2FAbmljLmN6PiB3cm90ZToNCg0KPkhpLA0K Pg0KPkkgYW0gc29ycnkgZm9yIGNyb3NzLXBvc3RpbmcgYnV0IEkgdGhpbmsgaXQgaXMgaGlnaCB0 aW1lIHRvIGRlY2lkZSB0aGUNCj5yZWxhdGlvbnNoaXAgYmV0d2VlbiB0aGUgZGF0YSBtb2RlbHMg aW4gaTJycy1yaWItZGF0YS1tb2RlbCBhbmQNCj5uZXRtb2Qtcm91dGluZy1jZmcgSS1EcyBiZWNh dXNlIHRoZXkgY2xlYXJseSB0YXJnZXQgdGhlIHNhbWUgbWFuYWdlbWVudA0KPmRhdGEgaW4gYSBy b3V0ZXIuIEkgY2FuIHNlZSB0aHJlZSBwb3NzaWJsZSBzY2VuYXJpb3M6DQo+DQo+MS4gVGhlIGky cnMtcmliIG1vZHVsZSB3aWxsIGJlIG1vZGlmaWVkIHRvIGF1Z21lbnQNCj5pZXRmLXJvdXRpbmcv aWV0Zi1pcHZbNDZdLXVuaWNhc3Qtcm91dGluZy4NCg0KVGhpcyB3b3VsZCBzZWVtIHRvIGJlIHRo ZSBvYnZpb3VzIGNob2ljZS4NCg0KPg0KPjIuIFRoZSBzY29wZSBvZiBpZXRmLXJvdXRpbmcgd2ls bCBiZSBjaGFuZ2VkIHNvIHRoYXQgaXQgd291bGQgYWRkcmVzcw0KPm9ubHkgaG9zdCByb3V0aW5n IGFuZCBzaW1wbGUgcm91dGVycy4gVGhlIG1vZGVsbGluZyB3b3JrIGZvciBhZHZhbmNlZA0KPnJv dXRlcnMgd2lsbCBiZSBkb25lIGVsc2V3aGVyZS4NCj4NCj4zLiBUaGUgd29yayBvbiBuZXRtb2Qt cm91dGluZy1jZmcgd2lsbCBiZSBzdG9wcGVkLg0KDQpBIGZvdXJ0aCBvcHRpb24gd291bGQgYmUg Zm9yIG1lIHRvIHRha2Ugb3ZlciBvd25lcnNoaXAsIG1vdmUgdGhlIHdvcmsgdG8NCnRoZSBSVEcg V0csIGFuZCB3ZeKAmWQgcmVjcnVpdCBzb21lIHN0cm9uZyBhdXRob3JzL3Jldmlld2VycyBmcm9t IG9wZXJhdG9ycw0KYW5kIG90aGVyIHZlbmRvcnMgKGludm9sdmluZyB0aGUgQURzIGluIHNlbGVj dGlvbikuDQoNClRoYW5rcywNCkFjZWUgDQoNCg0KPg0KPk9waW5pb25zPw0KPg0KPlRoYW5rcywg TGFkYQ0KPg0KPi0tDQo+TGFkaXNsYXYgTGhvdGthLCBDWi5OSUMgTGFicw0KPlBHUCBLZXkgSUQ6 IEU3NEU4QzBDDQo+DQo+DQo+DQo+DQo+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX18NCj5uZXRtb2QgbWFpbGluZyBsaXN0DQo+bmV0bW9kQGlldGYub3JnDQo+ aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9uZXRtb2QNCg0K From nobody Fri Oct 9 06:39:57 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8961D1B3E35; Fri, 9 Oct 2015 06:39:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -5.661 X-Spam-Level: X-Spam-Status: No, score=-5.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, RCVD_IN_DNSWL_HI=-5, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EwgzUpEOGmn6; Fri, 9 Oct 2015 06:39:51 -0700 (PDT) Received: from mail.nic.cz (mail.nic.cz [217.31.204.67]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68E391B3E33; Fri, 9 Oct 2015 06:39:50 -0700 (PDT) Received: from [IPv6:2001:718:1a02:1:1c2:d14c:7ffc:4360] (unknown [IPv6:2001:718:1a02:1:1c2:d14c:7ffc:4360]) by mail.nic.cz (Postfix) with ESMTPSA id 8D7D91810CF; Fri, 9 Oct 2015 15:39:48 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nic.cz; s=default; t=1444397988; bh=KX4luHfdkolbOkkZbA98waNpGjlaHqefDc89puml5mw=; h=From:Date:To; b=F70naQLptFxwbJA1lDFzOXeX/qqb/EPtVS3X1vckqusLpYEt03QspZu11WMJHAuv2 abUH1CZBIXow4UmGuIoEBz1tAJZbB/hfzUnVA0u0YJTHBhvpGn9qpjI2gbTQD6wpiq EQFpmXAd0/ZcNhiOlTtLngtkodxVhSHAsjx/7NvU= Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Ladislav Lhotka In-Reply-To: Date: Fri, 9 Oct 2015 15:39:48 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> To: "Acee Lindem (acee)" X-Mailer: Apple Mail (2.3094) X-Virus-Scanned: clamav-milter 0.98.7 at mail X-Virus-Status: Clean Archived-At: Cc: "i2rs@ietf.org" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 13:39:53 -0000 > On 09 Oct 2015, at 15:00, Acee Lindem (acee) wrote: >=20 > Hi Lada,=20 > I2RS is not chartered to do the base models. There are other routing > models that reference routing-cfg and even in-progress = implementations. Of course, I am aware of them. However, assuming that changes resulting = from I2RS operation will be available for inspection as state data to = NETCONF/RESTCONF clients, and vice versa, it's important that the those = routing data models and I2RS data models remain compatible and = coordinated. A data model for RIBs should IMO be developed simultaneously for both = purposes, and common parts implemented as groupings so as to be reusable = without copying-and-pasting.=20 >=20 > On 10/9/15, 4:13 AM, "netmod on behalf of Ladislav Lhotka" > wrote: >=20 >> Hi, >>=20 >> I am sorry for cross-posting but I think it is high time to decide = the >> relationship between the data models in i2rs-rib-data-model and >> netmod-routing-cfg I-Ds because they clearly target the same = management >> data in a router. I can see three possible scenarios: >>=20 >> 1. The i2rs-rib module will be modified to augment >> ietf-routing/ietf-ipv[46]-unicast-routing. >=20 > This would seem to be the obvious choice. I agree, and so far it can be done quite easily. >=20 >>=20 >> 2. The scope of ietf-routing will be changed so that it would address >> only host routing and simple routers. The modelling work for advanced >> routers will be done elsewhere. >>=20 >> 3. The work on netmod-routing-cfg will be stopped. >=20 > A fourth option would be for me to take over ownership, move the work = to > the RTG WG, and we=E2=80=99d recruit some strong authors/reviewers = from operators > and other vendors (involving the ADs in selection). Yes, that's what I meant. Thanks, Lada >=20 > Thanks, > Acee=20 >=20 >=20 >>=20 >> Opinions? >>=20 >> Thanks, Lada >>=20 >> -- >> Ladislav Lhotka, CZ.NIC Labs >> PGP Key ID: E74E8C0C >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> netmod mailing list >> netmod@ietf.org >> https://www.ietf.org/mailman/listinfo/netmod >=20 -- Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C From nobody Fri Oct 9 13:13:19 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F2C21A1BC9; Fri, 9 Oct 2015 13:13:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -93.045 X-Spam-Level: X-Spam-Status: No, score=-93.045 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, J_CHICKENPOX_41=0.6, J_CHICKENPOX_64=0.6, J_CHICKENPOX_65=0.6, MANGLED_LIPS=2.3, T_HTML_ATTACH=0.01, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WqM5n61VWSht; Fri, 9 Oct 2015 13:13:11 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A8A01B2CE9; Fri, 9 Oct 2015 13:13:10 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=184.157.84.146; From: "Susan Hares" To: Date: Fri, 9 Oct 2015 16:13:03 -0400 Message-ID: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_05C9_01D102AD.642D4060" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdECzbLPf/jBR8T3RumWqwNQi5I6fw== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: i2rs-proto-dt@ietf.org Subject: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 20:13:18 -0000 This is a multipart message in MIME format. ------=_NextPart_000_05C9_01D102AD.642D4060 Content-Type: multipart/alternative; boundary="----=_NextPart_001_05CA_01D102AD.642D4060" ------=_NextPart_001_05CA_01D102AD.642D4060 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit The 10/7/2015 interim discussed the ephemeral portion of the protocol 1) Ephemeral state is not unique to zI2RS 2) The ephemeral datastore is a datastore holds configuration that is intended to not survive a reboot. 3) The ephemeral datastore is never locked. 4) I2RS is using a 2 panes of glass mechanisms Pane 1: normal configuration Pane 2: ephemeral state The I2RS agent and configuration software on the node must handle this complexity. 5) The key word "ephemeral" can be used to identify Identities which are ephemeral in data models. Does anyone have any concerns with adding this to Yang? 6) Each client has a priority. a. Multiple clients may share a priority, b. AAA or other external mechanisms provides the client ID and priority c. An authorized I2RS client must have both A client Id and a priority, d. System administrators set up the number of client IDs and priorities within a system. 7) I2RS has defined 3 ways of handling errors in order To be efficient in the processing. a. "all-or-nothing", b. "stop-on-error", c. "continue on error" . If these three are supported, it is the agent which must support the complexity to support all three. . The WG must consider whether for the initial release we limit the agent by doing "all or nothing". . One issues with this is grouping changes into a related group. . The failure in one part of a related group could cause errors in the related . "continue on error" were only meant for variables which are orthogonal or independent. 8) There is no caching in the I2RS agents. . Andy - noted a concern that without caching some of updates may have too much latency. Please review the whole minutes for all the details. Sue Hares ------=_NextPart_001_05CA_01D102AD.642D4060 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

The = 10/7/2015 interim discussed the ephemeral portion of the protocol =

 

1)      = Ephemeral state is not unique to zI2RS =

2)      = The ephemeral datastore is a datastore holds =

configuration that is = intended to not survive a reboot.

 

3)      = The ephemeral datastore is never = locked.

4)      = I2RS is using a 2 panes of glass = mechanisms

Pane 1: normal configuration =

Pane 2:  ephemeral state =

 

  =             &= nbsp; The I2RS agent and configuration software on

         &= nbsp;    the node  must handle this = complexity.

 

5)      = The key word “ephemeral” can be used = to identify

Identities which = are ephemeral in data models.

 

Does anyone have any concerns with adding this = to

Yang?

 

6)      =  Each client has a priority.  =

a.       = Multiple clients may share a priority, =

b.      = AAA or other external mechanisms =

provides the client ID and priority =

c.       An = authorized I2RS client must have both

A client Id and a = priority,

d.      = System administrators set up the number =

of client IDs and priorities within a = system.

 

7)      = I2RS has defined 3 ways of handling errors =  in order

To be efficient = in the processing.

a.       = “all-or-nothing”,

b.      = “stop-on-error”,

c.       = “continue on error”

 

·         = If these three are supported, it is the = agent which must support the complexity to support all = three.

·         = The WG must consider whether for the = initial release we limit the agent by doing “all or = nothing”.

 

·         = One issues with this is grouping changes = into a related group.

·         = The failure in one part of a = related  group could cause errors in the related

·         = “continue on error” were only = meant for variables which are orthogonal or independent. =

 

8)      = There is no caching in the I2RS agents. =

 

·         = Andy – noted a concern that without = caching some of updates may have too much latency.

 

Please = review the whole minutes for all the details.

 

Sue = Hares

 

 

 

       

------=_NextPart_001_05CA_01D102AD.642D4060-- ------=_NextPart_000_05C9_01D102AD.642D4060 Content-Type: text/html; name="i2rs-interim-oct-10-2015-minutes.html" Content-Transfer-Encoding: quoted-printable Content-Disposition: attachment; filename="i2rs-interim-oct-10-2015-minutes.html" =0A= =0A= =0A= i2rs-interim-oct-10-2015-minutes=0A= =0A= =0A= =0A= I2RS Minutes 


1) Agenda Bashing [10:00 - 10:05 = ]

2) I2RS Protocol Requirements Summary 
   = [10:05 - 10:15]
  https://= ;www.ietf.org/proceedings/interim/2015/10/07= F;i2rs/slides/slides-interim-2015-i2rs-15-1.pdf

3) = Discussion of Requirements [10:15-30] 

4) I2RS Protocol = Strawman [10:25 - 10:45]
https://= ;www.ietf.org/proceedings/interim/2015/10/07= F;i2rs/slides/slides-interim-2015-i2rs-15-2.pdf
https://= ;www.ietf.org/proceedings/interim/2015/10/07= F;i2rs/slides/slides-interim-2015-i2rs-15-3.pdf

5) = Discussion of I2RS Protocol [10:45-11:00]
7) I2RS Hackathon [11:00 - = 11:15]
8) I2RS FB-RIB [11:15 - 11:30] 

Slides: = I2RS Protocol Requirements Summary

Slides  showing = ephemeral requirements 1-5 


Discussion: 
  • Kent -  in slide 7, in the text  = "Each client ... if a client is not in the i2rs client list, then = it has worst priority", Is there actually a set of = clients.  
  • Is this different that the list of clients = that already exist?  When I first saw that my thought was that if = the client was not present, 
  • The edit request would be = refused.  We do not allow edits from clients which are unknown to = the system. 
  • Sue: In the actual protocol examples, we have = not worked out how the clients identify each other.  This could be = done via an attribute. 
    • In the = architecture and in the requirements, we have said you must (mutually) = identify an I2RS client. 
    • The I2RS client is the only = identity approve dto go to an I2RS RIB. 
    • This limited = access of the I2RS RIB is the way the I2RS architecture has been = designed. 

  • Joel Halpern - We don't = necessarily require a separate client list.  AAA must provide a = priority.
  • Andy: There is a little yang table in the original = propose that assigns a priority to a client (see table below).
    • One thought was to have unique priority/client = matches so you would not have to save the client IDs.
    • If you do = not have unique priority/client matches, you will need save the = client ids. 
    
container = i2rs-clients {
     leaf max-clients = { 
        config = false;
       mandatory = true;
         type uint32 = {
           range = "1 = ..max";
          = }
    }

   list i2rs-client = {
          key = name;
          = uniquepriority;
         = leaf name { ... }
         = leaf priority { ...}
    }
}

  • Joel Halpern: AAA must provide a priority.  = Not that the priority will be unique per client. 
    • The full unique would be the priority plus = unique. 

  • Andy - There = will not be any standar way to have the priority mapping set within = the 
    •  the only way to figure this = out will be fully external?
  • Sue - The mapping expected to = be loaded from something external.  
    • What happens if the client id and priority does not = exist upon the box?   
    • What happens if AAA = doesn't give the client ID and priority ? 
  • Joel - = You can't accept a request from the client that does not have a = client and priority.
    • The bottom line is = that client is not authorized.
  • Sue - What if the client is = authorized, but AAA didn't give priority?
  • Joel - If the = client does not have both ID and priority, then  it's not = authorized.
  • Sue: Authorization has to include ID and = priority 
  • Kent - I agree with joel.   You have a = list of clients that are supported (ephemeral and = non-ephemeral). 
    • Of the ephemeral = clients, there is a subset that is allowed to ephemeral edits = (writes). 
    • We want to have a bounded list of datastores = where each datastore is a mapping to an ephemeral = client. 
    • If the client is ephemeral, has a priority, but = does not have a mapping to the data store, then this client is = denied. 
    • Only an administrator with privileges  can = change the mapping between clients and data stores. 
    • list = of: datastore --- client -- priority  (sorted in order of priority = per datastore). 
  • Andy - the original suggestion was to = put it in the nacm group entries.  
    • I just put it into its own table. Whether it is in = the NACM vs. table is irrelevant.
    • Joel is saying this table must = be loaded from external sources. 

  • Kent:  At IETF 93 I stood at the mic, is it = okay that clients have unique priorities?  
    • This would elminate the chance that we would have = two clients at the same priority. 
    • We didn't pursue = this discussion completely.  
    • In my mind it is a = sorted  list. Whether this list is inside/outside NACM can be = debated. 

  • Andy - nacm = allows user mappings to be external and not just local.

  • Joel - Can't see why we'd ever allow a = client to be authorized with the priority. 
  • Kent: I agree = (that you need each client to have a priority).  We need an example = to see how this work. 
  • Sue: Action item 1:  I will = create an example of the client with priority and = client.

  • Sue: Other = comments
  • Joel - staring at #5, trying to understand it.  We = had side meetings in prague. 
    • Side = meetings in prague.  How can each client can have its own = pane?  
    • Clients have to know when there's = overlap.
    • Clients have to see what A and B wrote. 
    • I = cannot see how they can be operating in separate panes of = glass. 
  • Sue: Can I pick up item 5 after we go through = examples? 
  • Joel:I'm willing to wait for = examples.
  • Sue: I believe the conflicts should provide the = notifications. 
  • Joel: I am ok with an = example. 

[00:13:22 at recording] 

  • Sue: item #6 had lots of the discussion in the = protocol list. 
    • A Partial operation is = one where a subset of thewritten data is  not appliedbecause of = better priority for that node. A partial operation is only allowed if = the error-option is stop-on-error orcontinue-on-error.
    • For = example, you have 100 routes and on the 20th of the 100 routes you have = a problem. 
    • You have two choices once you get to item = 20.  You can stop or you can continue writing = 21-100.  
  • Joel: The key to whole debate is = NETCONF does not have order within elements.
    • You cannot do meaningful do stop on = error. 
  • Kent: In this draft, we are focusing on = RESTCONF.  The Yang Patch operation has = ordering. 
  • Sue: All of our examples have RESTCONF.  I = put NETCONF here is section. 
  • Joel: While continue on error = is well defined, it is a challenge to utilize NETCONF because of some of = the ways that NETCONF communicates success and failure. 
    • If you do not have ordering, = "all-or-nothing" is defined, "continue on error" is = defined, but  Stop on error is not defined.
    • This is a = problem if we used NETCONF. 
  • Sue: For the rest of the = discussion, we will be using RESTCONF. I am trying to get a solution we = can work with. 
    • Yang Patch is being = defined for RESTCONF. 
    • It is hoped it would be applied to = NETCONF in the long term.
 
  • Andy: There are more ways to have an = error.  
  • Joel: The error handling in the architecture = was not written about all the error handling.
    • The error handling was written about the priority = error handling. 

  • Sue: = The syntactical checking could cause an error. 
  • Joel: This = simply isn't true. 
    • The = "stop on error", "all-or-nothing", = "continue-on-error" were behavior for any type of = error. 
    • These were not just 
  • Sue: Would = you restate this for me as I thought that's what I said.  It = would help me a lot. 

  • Joel: = Bullet 6 (slide 8) is about the priority error condition, and not all = the condition. 
    • Error checking is = broader than bullet 6. 

  • Andy: I have not see clients take advantage with = this point.  It is complicated on the client side. 
    • Jan made the comments a few interim.  I am not = convinced anyone aided. 
    • If you add more options, it goes = slower.
 
  • Kent: If you = want the continue on error to make sense, there must be a bunch of = disjoint errors. 
    • To continue on = error, it must be a disjoint set of edits. 
    • The problem is = you want a grouping of edits.
    • NETCONF currently does all the = configuration or nothing, without focus on = grouping. 
    • Continue on error does not make sense of you are = working with a group in NETCONF or = I2RS.  

  • Joel: If = you want groups of things, you must send them in different = messages.
    • Only if you have a set of = unrelated edits can you send them in one message that has continue on = error.
    • The other problem is "all-or-nothing" is a lot = of data that you have to buffer and analyzed. 
    • The NETCONF = folks are used to "all-or-nothing" pain. 
    • All of = these options ("all-or-nothing", = "continue-on-error", "stop-on-error") have = pain. 
    • We could just start with "all-or-nothing = because the agent would have only one type to implement.
    • The = agent has to be able to support all the modes. 
  • Dean: = Actually, it was Jan that was leaving.  
    • Continue on error is valuable only when you have = series of automatic functialities.  
    • Autonomic = functionalities are self-sufficient between functions. 
    • You = can put a series of autonomic functionalities together because if one = fails, the others can continue because there are no dependencies on the = functionality. 
    • I agree with Joel. 
  • Kent: = Joel clarified that the edit will be an independent bundle.
    • Continue on error depends on the kind of = error. 
    • For example, there is a list of interfaces, and you = can specify only up to so many interfaces. The edit is trying to add one = more interface that the maximum allowed (For example, 100 interfaces and = the edit is adding 101).  This error is not = recoverable.  
    • The other type of error is the error we = spoke of before where due to the higher priority, your edit is not going = through. This type of error is OK to go one.  When the panes of = glass, this would be error.
  • Sue: Any more = comments? 

  • Jeff: One of the = interesting heachaches is, if the objects your client is setting has = dependencies.
    • This creates a situation = which is problematic. 

  • Joel: As a client, you would not send a message = with "continue-on-error" when the data the client is setting = has dependencies among it. 
    • The only = case you will use continue on error is if you have no dependencies = [autonomic functions]. 
    • If there are dependencies, you need = to use one of the other modes.
    • The idea is the client will use = the mode that is appropriate for the data. 
    • The idea with = the modes ("all-or-nothing", "continue-on-error", = "stop-on-error") was to be able to ship as much data as = possible, as fast as possible.  When the client could use = "continue-on-error", the client used continue on = error. 
    • If you want to ask the WG to relax this to say the = agents have "all-or-nothing" because of the complexity of the = agent suypporting three modes, this is a reasonable = discussion. 
    • We could discuss this on the general = list. 

  • Jeff: What Joel = is discussing, is not relevant to my point. The issue we have worry = about for "continue-on-error" functionality beause you have = independent stuff, but based on the error the agent must wants to = "roll-back" the configuration that was done, there is an = implicit understanding that the agent have to maintain the state to be = able to undo the patch. 

  • Dean: When you are saying roll-back, let us go for = the following changes:
    • original = value 
    • Change 1 works 
    • change 2 = fails 
    • change 3 
    • What are roll-back are you = wishing to do.  Roll back to pre-change 2 (aka change 1) or are you = rolling back to the original state?  
  • Jeff: This = is part of the question.  When you allow partial completion, at = what point does the rollback come to? 
    • Andy may be rolling his eyes.  Coding for this = is very difficult. 
    • Even if the system told you exactly = what is going on. 
    • For example, if you had a list of 100 = items, and 80% completed. 
    • Is this 80% completion Ok for = the client? 
    • We would need to build into the error = notification structure, the information that tells you the 20% that = failed. Any implicit behavior that the partial application is = implying. 

  • Joel: It does = follow logically. 
    • The first part I = agree with.  I agree that if you have partial success, you must be = able to report what failed. 
    • The client must be able to = figure out what to do when it receives these reports of the = error. 
    • If the client sends things in multiple requests, it = has just as much issue whether the requests are sent in a bunch, and we = get the error reports.  Or if the requests are sent one at a = time.
    • This is the nature of the I2RS client and an network = management client. 
    • Not all changes can be contained within = one message anyway. 
    • If the I2RS client knows the items = being sent are independent, then it should be able to handle = this. 
    • If the I2RS client knows there are dependencies and = thought the bunching of the data within a message would work, it must = handle the failure for = "continue-on-error".

  • Jeff: My focus is the = agent.  

  • Joel: The agent = is not to undo anything it has partially done. This is the client's = job. 
  • Jeff: I disagree.  It is the clients job that = introduces a significant anount of complexity in the client. Is this so = complicated in the agent that we should discount the partial completion = in the client? RESTCONF already disallows any partial completion in the = agent.  
    • This is where Kent = corrects me about PATCH and how this is suppose to work in the = cleint. 

  • Sue: Is this a = really good discussion, would it be beneficial to go through some of our = examples, and then come back to partial operationa and = caching? 
    • I've got a time check = at 10:37pm. 

  • Joel: The = three error conditions ("all-or-nothing", = "continue-on-error", and "stop-on-error") have = little to do with the panes of glass or the caching issues. This is a = protocol issue, but it does not have anything to do with panes of glass = or caching. 

  • Andy: To go to = what Kent's saying, if a I2RS agent does not treat overlap as an = error, then the I2RS agent is caching the lower priority stuff to = overwrite later on.

  • Joel: The = architecture specifically says you shall not cache. When I saw you were = going to specifically propose caching on item 7 (slide 9) - then I have = a problem with this point. 
    • Allowing, = but not requiring caching does not provide a situation where the client = can know what the I2RS agent is going to do with its = requests. 
    • For example, the lower priority work could be = "not applied" so the total request would be partially applied. = Later on, the request could be fully aplied. 

  • Andy: The I2RS client could be notified by the I2RS = agent returning a status whether the lower priority information cached = it or not. 

  • Joel: If you = allow the caching and non-caching case to both be allowed, then the = client will be required to design for both cases.  Talk about = complexity... 
  • Andy: The complexity I'm trying to = avoid is the latency when the higher priority stuff is taken out, and = the lower priority stuff takes a while to be uploaded using = notification. 
    • I am concerned about = latency than the complexity 

  • Joel: This is a big change in the design of I2RS as = shown in the architecture. 

4) I2RS Protocol Strawman = [10:25 - 10:45]

Andy's presentation of = slides
 https://= ;www.ietf.org/proceedings/interim/2015/10/07= F;i2rs/slides/slides-interim-2015-i2rs-15-2.pdf

Disc= ussion:  
  • Andy: The openconfig is = using the intended config, applied config, and oiperationally derived = data. 
  • Kent: It is TBD whether the applied configuration is = above or below the orange line. We are thinking that the data mode for = the intended configuration is the same as the applied = configuration.
  • Andy: Even in openconfig stuff, the applied = configuration is changed to config false.
  • Kent: You are = correct.  This is the openconfig solution model. in the = kwatsen-netmod-opstate draft we put the applied configuration as config = true. 
  • Andy: This is correct.  It does not matter whether it = is another.
  • Dean: Did anyone body think how long the the = intended configuratino and applied configuration to be out of = sync? 
  • Andy: This is a long discussion going on in the = netmod with the openconfig stuff. 
    • For = google, it is a long time. 
  • Dean: For everyone, it is = a long time.  You have this inbetween state that you do not know = what state the network is in. 
  • Andy: Not if you have an = operation that retrieves the actual values. 
  • Kent: There is = always the ability to get hte applied configuration from the = system.  Whether or not the intended configuration has been = applied, it can take forever.  You can get the applied and intended = configuration
  • Dean: I agree, but there are ....  We can = take this problem offline. 
  • [Slide 5] 
  • Andy: = The purpose of this tiny little model is to show how the ephemeral data = store will interact with the config=3Dfalse nodes.  We do not have = to spend a lot of time on config=3Dtrue nodes. The one that is not as = clear is the over writing a config=3Dfalse.
  • [slide = 6]
  • Andy: The desired temperature maps to the intended = configuration.  actual value maps to the applied configuration = (config=3Dfalse). 
  • [slide 7] 
  • Andy: Comparison = the desired-temp =3D intended (
    • Some of the = stuff the openconfig has open issue. 
    • Doing a diff on these = two things, assumes 
  • Joel: actual temperature is not = the applied configuration.  Applied configuration is the setting of = desired-temp.  The actual temperature is the derived operational = state. 
  • Jeff: There is a modeling issue. What I perceive = actual temp is standalone operational temperature showing what the = current temperature is.  The configuration "desired-temp" = is what you want to get.  You example tries to show what = operational state is doing in actual-temp.
  • Joel: I agree with = Jeff.  actual-temp is orthogonal as (derived) operational = state. 
  • Alia: What about calling it "goal-temp" = for the applied configuration. 
  • Joel: "goal-temp" = would be applied intentiona.  
  • Andy: actual-temp is = derived operational state.  The system needs to compare the applied = temperature with the actual temperature in order to know when to turn = off. 
  • Jeff: What you are trying to represent is that the = I2RS system is reading the intended configuration which is the original = configuration overwritten by the ephemeral state.  You are trying = to compare the intended configuration against the applied = configuration?  
  • Andy: Yes, this is correct.  = Joel is right, the actual temperature is just a derived operational = state. 
  • Joel:  The actual applied temperature = configuration is different that the intended due to the lag in applying = the configuration. 
    • This is the = configuration application delays that the openconfiguration people are = talking about. 
    • The applied configuration = "desired-temp" is understandable, but this is not actual = temp. 
  • Andy: By standalone, it is a temperature sensor = that has nothing to do with the temperature system that is turning on = and off the airconditioner. 
  • Joel: I agree. It is just a = sensor.  The one inside the ephemeral state would be = "goal-temp" and not the applied = temperature. 
  • Kent: For applied configuration, it is = interesting enough to have the ephemeral data store. 
    • A thermostat is intuitively simple. 
    • A = thermostat has a desired temperature and a thermostat. 
    • The = thermostat sends commands to the dataplane for a call for heat or a call = for cooling.
    • I'm thinking about the ephemeral edit be an = override on the actual-temp or would it be a lower level call for heat = or colling. 

  • Joel: It is = perfectly reasonable to have these temperature, but I do not know why we = are talking openconfig stuff in terms of I2RS.  I wait to see what = it is. 

  • jeff: I would not put = a "goal" temperature into this discussion. Let us center this = on the ephemeral state.  For the purposes of the ephemeral state we = care about  
    • 1) what have we = programmed to survive reboot (20 celius)
    • 2) we have a different = routes. 
 
  • Sue: = Let's go to the RESTCONF example, and then over to the Route = example. 
  • Jeff: This is perfect example:
    • We have the original temperature,
    • We have = the ephemeral temperature state,
    • The operational state is = completely distinct. 

  • Andy: The goal temperature fits for the = 'diag-temperature'. Let's say you were trying to test = whether this system work.  
    • The = goal temperature was "50 celius" without getting the = temperature. 

  • Joel: That = is very diffrent than goal temperature. 
    • You want to the system was measured system from the = outside world "70" degrees.

  • Andy: I'm checking to see if you want to over = write values in the measured system. 
    • If I2RS only focuses on over writing the intended = configuration, this is great. 

  • Joel: This is why I was confused by the = example. 

  • Andy: Sue needs to = go through the routing example to show the value for this over writing = the measured system. 

  • Jeff I = would expect that you would want to temporarily override what intended = configuration sets. 
    • For example, the = config test temperature.
    • The thermostate would have a = config-test temperture that it would compare the configuration = temperature against. 
  • Joel: I agree with = you. 

I2RS RIB State

https://= ;www.ietf.org/proceedings/interim/2015/10/07= F;i2rs/slides/slides-interim-2015-i2rs-15-3.pdf

Sue:= Let me dive into the routing RIB.  I'm sure you've all = read it. 
  • [slide = 5/6] 
  • route-index - uint64
  • nexthop-id - = uint32 
  • Here's a thermostat equivalent:  (slide = 7)  
    • intended config:  = 128.1/16 nexhop id 1 (192.1.1.1) 
    • applied = config:   128.1/16 nexthop id 1 = (192.1.1.1.) 
      • derived state:  = route-installed-state =3D installed 
    • Any routing = state  - should have installed 
    • [This is installed = state in general state]

  • [slide 8]
    • scheduler = I2RS client on this slide installs the normal configuration
      • 128.2/16 nexthop id 1 --> intended = configuratino
      • 128.2/16 nexthop id 1 --> applied = configuratino 
    • IPS I2RS client replaces the intended = config with ephemeral config 

    • The IDS/IPS that replaces the 128.2/16 = nexthop 2 in ephemeral state which is loaded in the  intended = configuration. 
    • Actual configuration =3D 128.2/16 = nexthop 1  (installed/active flag) 
  • slide = 9 
  • IPS I2RS client requests the intended state to go to the = applied configuration. 
  • Now, the actual configuration = changes: 
  • Actual configuration =3D 128.2/16 nexthop = 2 
  • Intended configuration - should notify the scheduler = client it has 128.2/16 overwritten 
  • Applied = configuration - should notify to the schedule client it has = 128.2/16 overwritten 
  • actual configuration - should = notify that the new actual sttus is 128.2/16 nexthop = 2. 

  • Jeff: What you are = saying here is that the reader of the configuration would be able to see = both of these things: 
    • (ephemeral = state and intended configuration) and applied configuration.
    • We = have two model options to get the keying of it: 
      • 128.2/16 nexthop 1  - instance = 1 
      • 128.2/16 nexthop 2  - instance = 2 
    • we have priority or administrative distance that = could choose being the two things trying to install.
    • We do not = need ephemeral to do this function. 
    • A pane of glass is not = needed in this example.
  • Sue:  We are overwriting what = is active. 
  • Jeff: If we are doing an over-writing, who sees = two of these at the same time? 
    • You = have a reader the status that wants to see the merged view of the panes = of glass. 
    • The other two views are the configuration = datastore and the ephemeral datastore. 
    • I would not call = these derived state. 
    • The merged configuration view is the = applied configuration state. 
  • Sue: The ephemeral over = writes something in the intended config. 
    • When the ephemeral config in the intended = configuration goes to the applied configuration, do you want to track = which configuration pieces are coming from ephemeral and which are = coming from original configuration?
  • Joel: Why do we care = for I2RS purposes what is under configuration?
    • Applied configuration is the result of the decision = process from the I2RS scheduler client, and the IPS = datastore. 
    • Let's start out of the debate of the = applied configuration.

  • Sue:  Andy and I would be happy if there is = not an override on the "config=3Dfalse" data = store. 
    • Let me give you an example to = confirm this point. 
    • For example, an IDS/IPS system = with an IPS I2RS client.  
      • The = IDS/IPS portion of the system detects that the DDoS routes are no = longer needed (DDoS all clear status). 
      • The attack has = stopped, and we need to remove a bunch of routes in the applied = configuration. 
      • It is easy to remove the DDOS routes in the = intended configuration. 
      • If you want to remove the DDOS = routes quickly in the applied configuration, you must have a thread that = indicates these are ephemeral routes. 
      • If you will wait for = the intended to over write the applied configuration, this will take out = lots of complexity.

  • Alia: I'm not clear about the difference = between the config=3Dtrue, and the config=3Dfalse functionality
    • What goes into the devices for the applied = configuration 
      • original configuration = + ephemeral -- gets installed 
      • I do not think the applied = routes comes from this mechanisms
    • We could do resolution of = route by policy of administrative distance 
      • static class of config
      • static class of = ephemeral state 
      • Administrative distance would then install = the route to tie break between the RIB. 
    • If they are = both coming in as the protocol, I do not think you will get multiple = routes in the RIB. 

  • Sue: = I think we were thinking of the administrative distance = mechanism. 
    • However, our question is = do we need to complexity. 
    • We do not to have a flag that = tags ephemeral route. 
    • You have answered a lot of confusion = at once. 
    • Ephemeral exists above the config=3Dtrue = line. 

  • Alia: What are = the implications of config=3Dfalse? 

  • Sue: Config false is simply the applied = configuration in the devices.
    • For example, = if you have a control plane which creates the intended config that is = the merge of ephemeral and normal configuration.  At some points = the routes are going from there to forwarding engines inside of high = speed forwarding engines or other boxes. 
    • Going from = intended configuration to applied configuration is a normal = process.
    • If we need something to short cut that addresses just = the ephemeral state, we need a flag that indicates the ephemeral pieces = of config=3Dfalse data.  
    • It is tricky to deal with = this data, but it is possible if we keep a flag. 
    • We wonder = about the benefit of keeping that ephemeral flag. 
    • What I = have heard from you, Joel, and Jeff is that complexity is not = needed. 
    • We will take it out. 

  • Alia: The reason I was pushing on config=3Dtrue = versus config=3Dfalse being able to have the ephemeral configuration be = able to have read access to dynamically learned state. This is a = separate aspect. 
    • I was looking to see = if there was a tie between the two = questions. 

  • Sue: I did = not indicate what happens if the route is tied to an interface what = would happen in the applied configuration.
    • Rob Shakir in the netmod last Thursday indicated = that applied configuration would not show up with the interface and the = applied route if you did not have a valid = interface. 
    • Therefore, what happens applied the = configuration without the derived = state.  

  • Joel: This = is a different problem that we are trying to = solve. 
  • Sue:  If we have panes of glass, the panes of = glass are in the intended config. 
    • The = concept is you have the configuration in one pane.
    • In a second = pane you have the I2RS ephemeral state.
    • What happens if you have = multiple clients working on each of these two = panes. 
    • Should multiple clients be able to change things in = each of these two panes? 
    • For example: Client 2, = 128.2/16 nh 3, priority 3.  Client IPS 128.2/16 nh 2, = priority 5. 
    • In the end it has to 
  • Joel: = 2 clients with 2 priorities, and in the end the system will only apply 1 = thing. 
    • Two panes of glass - is what = each client saw. 
    • Client 2 - writes 128.2/16 at = priority 3 and reads it back. 
    • Client IPS  writes = 128.2/16  at priority 5, and see it. 
    • Client 2 - = must get a notification that his work is not = accepted. 
  • Sue: In this case, there are 3 panes of = glass: 
    • pane 1: IPS 
    • pane = 2: Client 3
    • pane 3: Ephemeral state. 
    • I should have = drawn this point. 
  • Andy: The panes of glass at the = highest level is running datastore and ephemeral = datastore. 
    • The system comes up the = effective configuration, then these are the only two data = stores. 
    • If there is no caching in I2RS, then a pane of = glass per client is not helpful, it is implementation detail.
    • If = there is no pane of glass per client, then your edit goes in all the = way, partially or not at all. 

  • Joel: This is the way I have understood = it. 
  • Andy: If you really think the feedback loop is = adequate, then this will be fine.
  • Joel: When we analyzed it = earlier in I2RS, we found that when a client does something and then = things happen. 
    • You create a lot of = complexity to have the client figure our the intermediate states (the = things that happen). 
    • We decided these intermediate states = introduced more complexity than the states were worth. 
    • You = will need to create the time delays to complexity. 
    • The = latency. 
  • Andy: In this example, the client 2 is going = to change what it wants to do based on what IPS is = doing? 
  • Joel: When IPS over writes client 2, then client 2 = is likely to say "my 128.2/16 nh 3" is = gone. 
    • I better register for = notification when IPS route goes away.  When IPS goes away, I will = figure out what really needs to happen. 
    • It is really hard = for client 2 to delete the state when IPS has state over writing it = state. 
    • He can delete it, but he cannot = write. 
    • The I2RS WG had an = extended 
  • Andy: I think your system is more = complex. 
  • Sue: Andy and Joel is a good point.  If the = ephemeral state is with 2 panes of glass (intended and ephemeral), does = it block people from doing caching in an interoperable = fashion. 
  • Joel: Caching in an interoperable fashion = requires that the client knows that caching is occuring, and be able to = correct cache saved over time. This includes additional = mechanisms. 
    • As we current suggested, = you cannot do caching of over written data plus = reversions. 
    • The architecture statement states you do not = do it. 
    • For some I2RS agents to do this, and some agents to = not do this feature means that I2RS clients have to cope with the = complexity of both caching and non-caching = clients. 

  • Sue: I have my = answer on this point.  We will take out the caching for the initial = simple protocol. 
    • Thank you for the = input on caching pieces for the first round. 
    • Andy and Kent = felt it was just as easy to have caching as to not have = caching. 
    • However, I do not want to revisit something I2RS = WG had a decision on.
    • I'll note it as = something 

  • Joel: Andy = and Kent I am willing to 
  • Kent: It seems we are already = having to do caching between I2RS ephemeral and the static = configuration 
    • When the ephemeral is = removed, the static configuration is left behind. 
    • We are = already having two panes of glass (ephemeral and static) = . 
    • Why not carry this forward to multiple panes of glass = and that pain. 
    • I understand the decision was made = before. 

  • Joel: I agree = that the model in this system is a 2 pane of glass = systems. 
    • The system must manage = removing the ephemeral state and going back to the configuration = state. 
    • The ephemeral state goes away in total during = reboot. 
    • The ephemeral state goes away in pieces when = clients remove it. 
    • It is the ephemeral-ephemeral = interactions you are discussing.

  • Kent: I pointed out that we are already in the two = panes of glass with ephemeral. 

  • Sue: I would like to invite people who are = intersted in the Hackathon 
    • Anyone who = is interested in the hack-athon. 
    • Our simple Hack-athon = work would be to:
      • Add/delete link in = L3 v4 topology
      • Add/delete/change v4 route in L3 RIB = with priority and overlapping = routes 
      • add/delete/change FB-RIB, and fall = through to default route.  
    • The purpose is to get = any additional experience. 

  • Kent: There is a 4 session on Sunday, 1 LADA = tutorial, and yang and editing session. 
  • Sue: This is = Saturday hack-a-thon.  I hope on Sunday people will go to = session. 
  • Joel: It has 2 day work (Saturday and = Sunday)  
  • Sue: I am looking for people to join = me. 

Conclusion: Thank you for your patience and = help. 
  • We will find 3-4 deep dive = people to push this forward in NETCONF group. 
  • We got = started in August with the strawman. 
  • Thank you for all = comments and help.

Andy: Whether or not we need the = ephemeral key word.
  • How do you tell the I2RS = what is compliant? 
  • Do I have to provide I2RS for every = config true;
  • Even it is not able to flag = config=3Dfalse.

Joel: We will not want to support the = entire ephemeral. 
  • Good = question. 

Sue: Would send it to the mail list?  = I will try to grab some people. 
  • Thank = you for all your helps and comments. 
  • Kent, Andy, and = Jeff. 


=0A= =0A= ------=_NextPart_000_05C9_01D102AD.642D4060-- From nobody Fri Oct 9 13:16:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94B131B2D13; Fri, 9 Oct 2015 13:16:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.75 X-Spam-Level: X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iuaLvyiQE_lf; Fri, 9 Oct 2015 13:16:40 -0700 (PDT) Received: from mail-qg0-x22e.google.com (mail-qg0-x22e.google.com [IPv6:2607:f8b0:400d:c04::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 494421B2D02; Fri, 9 Oct 2015 13:16:40 -0700 (PDT) Received: by qgew37 with SMTP id w37so19926311qge.0; Fri, 09 Oct 2015 13:16:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:content-transfer-encoding; bh=4Z5AptrcMmhpupMV4AmdgsZqPkJJKYaLEiNJG8+jpi4=; b=rm3YQMFpPk6DOBYvmbyMmKnyIXTvgyz+/78spCPLWzVQ1q3xviBkq0K8R8N7PIWkNW JztlCP1kXe6zXhxYgPTUi70m8LAMEpbI7eP5sfh26ka6y/CkIh8pw8ldu2Xbka/XomZd yYOzJGSLly/MFhA8nKu27ZRjPio/BKyAIo0pUssxNk5i8YEKWvR4QZu74aGG+uxeH6dO IG8vGElSZTpSFuKSdcF1Z+aKrPMgAecCB3pfixFPJax8yYKDZENHi6EM1Ep7muIu1+qQ sPdMSSuTniQ6Xc3Wrzp5+ba9S+NAQdl4v203qIuw1Csze44op99S01Nfw49yguy8o0/V s6Sw== MIME-Version: 1.0 X-Received: by 10.140.18.240 with SMTP id 103mr18164653qgf.31.1444421799511; Fri, 09 Oct 2015 13:16:39 -0700 (PDT) Received: by 10.233.216.194 with HTTP; Fri, 9 Oct 2015 13:16:39 -0700 (PDT) In-Reply-To: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> Date: Fri, 9 Oct 2015 15:16:39 -0500 Message-ID: From: Behcet Sarikaya To: Ladislav Lhotka Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Archived-At: Cc: "i2rs@ietf.org" , "Acee Lindem \(acee\)" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: sarikaya@ieee.org List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 20:16:41 -0000 On Fri, Oct 9, 2015 at 8:39 AM, Ladislav Lhotka wrote: > >> On 09 Oct 2015, at 15:00, Acee Lindem (acee) wrote: >> >> Hi Lada, >> I2RS is not chartered to do the base models. There are other routing >> models that reference routing-cfg and even in-progress implementations. > > Of course, I am aware of them. However, assuming that changes resulting f= rom I2RS operation will be available for inspection as state data to NETCON= F/RESTCONF clients, and vice versa, it's important that the those routing d= ata models and I2RS data models remain compatible and coordinated. > > A data model for RIBs should IMO be developed simultaneously for both pur= poses, and common parts implemented as groupings so as to be reusable witho= ut copying-and-pasting. > >> >> On 10/9/15, 4:13 AM, "netmod on behalf of Ladislav Lhotka" >> wrote: >> >>> Hi, >>> >>> I am sorry for cross-posting but I think it is high time to decide the >>> relationship between the data models in i2rs-rib-data-model and >>> netmod-routing-cfg I-Ds because they clearly target the same management >>> data in a router. I can see three possible scenarios: >>> >>> 1. The i2rs-rib module will be modified to augment >>> ietf-routing/ietf-ipv[46]-unicast-routing. >> >> This would seem to be the obvious choice. > > I agree, and so far it can be done quite easily. > >> >>> >>> 2. The scope of ietf-routing will be changed so that it would address >>> only host routing and simple routers. The modelling work for advanced >>> routers will be done elsewhere. >>> >>> 3. The work on netmod-routing-cfg will be stopped. >> >> A fourth option would be for me to take over ownership, move the work to >> the RTG WG, and we=E2=80=99d recruit some strong authors/reviewers from = operators >> and other vendors (involving the ADs in selection). > You mean i2rs-rib-data-model? Regards, Behcet > Yes, that's what I meant. > > Thanks, Lada > >> >> Thanks, >> Acee >> >> >>> >>> Opinions? >>> >>> Thanks, Lada >>> >>> -- >>> Ladislav Lhotka, CZ.NIC Labs >>> PGP Key ID: E74E8C0C >>> >>> >>> >>> >>> _______________________________________________ >>> netmod mailing list >>> netmod@ietf.org >>> https://www.ietf.org/mailman/listinfo/netmod >> > > -- > Ladislav Lhotka, CZ.NIC Labs > PGP Key ID: E74E8C0C > > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Fri Oct 9 14:55:24 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84F2D1B4D42 for ; Fri, 9 Oct 2015 14:55:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GctEGLm9uH_2 for ; Fri, 9 Oct 2015 14:55:21 -0700 (PDT) Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D0BB1ACEFD for ; Fri, 9 Oct 2015 14:55:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4779; q=dns/txt; s=iport; t=1444427721; x=1445637321; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=4fU44z0u2Hbnpbu50jpVa5VgMpSqItF9vHvRwEWnP/s=; b=gb1OC4byYbBr6bIFcTU9tIGoj9o8C53EkpgUGJsCY5WpXlHIanPDpQBI 9zdojdjdWIUAQ4ZPgV87iei2eqgMobbV84exLaKDhvdOcz1FMulYtuFD0 3gezl0uM5J7M1KSpGLrhYVeJ2MZH7rntkOE5Y5oTE6PbZn3tojEJw0LgH c=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AXAgDTNhhW/4UNJK1UBwODJlRuBr1fAQ2BWhcKgnKCCn8CgUk4FAEBAQEBAQGBCoQmAQEBBAEBATc0CwUHAgICAQgOAgEEAQEBChQJBxsGBgsUCQgBAQQBDQUIiBEDEg2+Ww2FIQEBAQEBAQEBAQEBAQEBAQEBAQEBARcEi22CUIFgBA4aIRAHBgyDCIEUBZYSAYUYhg2DTEiHFosAg1qDbx8BAUKEAnGGIQIeBxyBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,659,1437436800"; d="scan'208";a="196358945" Received: from alln-core-11.cisco.com ([173.36.13.133]) by alln-iport-7.cisco.com with ESMTP; 09 Oct 2015 21:55:20 +0000 Received: from XCH-ALN-014.cisco.com (xch-aln-014.cisco.com [173.36.7.24]) by alln-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id t99LtKDQ021433 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 9 Oct 2015 21:55:20 GMT Received: from xch-aln-014.cisco.com (173.36.7.24) by XCH-ALN-014.cisco.com (173.36.7.24) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 9 Oct 2015 16:55:15 -0500 Received: from xhc-aln-x05.cisco.com (173.36.12.79) by xch-aln-014.cisco.com (173.36.7.24) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Fri, 9 Oct 2015 16:55:15 -0500 Received: from xmb-rcd-x05.cisco.com ([169.254.15.194]) by xhc-aln-x05.cisco.com ([173.36.12.79]) with mapi id 14.03.0248.002; Fri, 9 Oct 2015 16:55:20 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder , Susan Hares Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQF84GqAABKj0ZA= Date: Fri, 9 Oct 2015 21:55:19 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> In-Reply-To: <20151009072207.GA56815@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.154.204.68] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 21:55:23 -0000 Hi Juergen, which specific objects/ subtrees are you referring to? =20 Essentially, in ietf-network and ietf-network-topology, we have all configu= ration information. The same is true for the Layer 3 topology - all config= uration information. (I cannot comment on L2 topology as I am not involved= there.) =20 Are you saying that we should add an additional branch as a placeholder (an= d perhaps an augmentation target) for operational data, even if we have not= otherwise defined any operational data? =20 The only item in the topology that is read-only concerns the "server-provid= ed" flag, but this concerns a separate issue that was also discussed (I am = not sure if this is what you are referring to). It is analogous to the oth= er discussion concerning distinguishing configuration that has been intende= d, versus one that is in effect etc . This concerns the issue that some to= pologies are populated by the server whereas some topologies can be populat= ed by client applications. We have had discussions in the past whether to = "split this up", having a (rw) branch to populate "intended" topologies and= a (ro) branch for topologies "in effect". We decided against it for vario= us reasons - every piece of information would essentially be duplicated ins= ide the model (this is not your normal config vs oper data distinction, but= would essentially reflect a limitation of the framework), leading to unnec= essary additional complexity in the model (every augmentation has to be con= ducted in two places), more complex validation rules, etc. =20 --- Alex -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelde= r Sent: Friday, October 09, 2015 12:22 AM To: Susan Hares Cc: i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka ; Andy Bierman ; 'Jeffrey Haas' ; 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Hi, there is a discussion on the yang doctors mailing list about the data model= design that mixes state data and configuration data into one subtree and t= hat uses a data model specific runtime object to identify what is config da= ta and what is state data. One of the main outcomes of the IAB workshop bac= k in 2002 was the need to clearly separate configuration from operational s= tate and this has been driven the design of NETCONF and YANG. YANG data mod= el validation rules, for example, make a distinction between config true an= d config false data. The config true or false property impacts what is returned by NETCONF's get= -config operation. Also note that config data is not allowed to refer to co= nfig false data in constraints. It is unclear why the document does not follow the typical design pattern, = namely to have a config true subtree /networks/network* and a config false subtree /networks-state/network* Section 3.5 describes this approach in the 3rd paragraph and states "As mos= t data is defined in those groupings, the amount of additional definitions = required will be limited." and there are no strong reasons given why this a= pproach has not been followed. /js On Thu, Oct 01, 2015 at 06:41:34PM -0400, Susan Hares wrote: > This begins a 2 week WG Last call (10/1 to 10/14) >=20 > =20 >=20 > draft-ietf-yang-network-topo - modeling draft >=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ >=20 > =20 >=20 > draft-ietf-i2rs-yang-l3-topology - L3 topology >=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ >=20 > =20 >=20 > draft-ietf-i2rs-yang-l2-topology - L2 topology >=20 > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topolo > gy/ >=20 > =20 >=20 > Implementation status:=20 >=20 > =20 >=20 > This an OpenDaylight (ODL) implementation of the L3 topology and=20 > general model. It is likely the L2 topology model will be supported in f= uture ODL > implementations. Jeff and I would appreciate anyone who has > implementations of these topology models to provide details on list or=20 > offlist to the chairs. >=20 > =20 >=20 > Sue Hares >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Fri Oct 9 15:18:55 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC0A81B4DBF for ; Fri, 9 Oct 2015 15:18:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -13.911 X-Spam-Level: X-Spam-Status: No, score=-13.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_74=0.6, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Po4v7QluTer7 for ; Fri, 9 Oct 2015 15:18:53 -0700 (PDT) Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B20B1B4AA0 for ; Fri, 9 Oct 2015 15:18:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3510; q=dns/txt; s=iport; t=1444429133; x=1445638733; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=u8gpEqmd4mVHBey9442TOZDBPIUf+BV6+0QtRWjYAeE=; b=BjXZLGYOKT3pBZd7fHY4KhBvsK0aYoFBPIUOwGZ9GEZv+/E+Sva+qQit EpDqYURjsB5RVgG+D0Q+s3yOrhq1ZU22E1b3nUC01JPU0DYTM8YVpjdM1 3h5+zIOpxwYRZcFqZoJEcOcBCz2wWC+lJpvmUPKso3el7ocvaWwV4tmwh U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AXAgDzPBhW/4sNJK1bA4MmVG4GvV8BDYFaFwqCcoIKfwKBSTgUAQEBAQEBAYEKhCYBAQEEAQEBNzQXAgICAQgOAgEEAQELFAkHGwwLFAkIAgQBEgiIJg3ECgEBAQEBAQEBAQEBAQEBAQEBAQEBARcEi22EXAYFFhcCBAyDCIEUBY0NiQUBhRiJWUiDcoMkjlqDbx8BAUKEAnEBhmOBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,660,1437436800"; d="scan'208";a="195337282" Received: from alln-core-6.cisco.com ([173.36.13.139]) by alln-iport-2.cisco.com with ESMTP; 09 Oct 2015 22:18:52 +0000 Received: from XCH-RCD-015.cisco.com (xch-rcd-015.cisco.com [173.37.102.25]) by alln-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id t99MIqFu010552 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 9 Oct 2015 22:18:52 GMT Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-015.cisco.com (173.37.102.25) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 9 Oct 2015 17:18:47 -0500 Received: from xhc-aln-x04.cisco.com (173.36.12.78) by xch-rcd-015.cisco.com (173.37.102.25) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Fri, 9 Oct 2015 17:18:47 -0500 Received: from xmb-rcd-x05.cisco.com ([169.254.15.194]) by xhc-aln-x04.cisco.com ([173.36.12.78]) with mapi id 14.03.0248.002; Fri, 9 Oct 2015 17:18:51 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder , "i2rs@ietf.org" Thread-Topic: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt Thread-Index: AQHQ/KFauPzifsA2Y0a0N2vH2AZAOZ5jwUdA Date: Fri, 9 Oct 2015 22:18:50 +0000 Message-ID: References: <20151001233038.GC29135@elstar.local> In-Reply-To: <20151001233038.GC29135@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.154.204.68] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Subject: Re: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Oct 2015 22:18:55 -0000 Hi Juergen, thank you for your notes. =20 Quick comments inline --- Alex -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelde= r Sent: Thursday, October 01, 2015 4:31 PM To: i2rs@ietf.org Subject: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt A few notes from a quick read of this I-D: - There are multiple places where the text says network.yang but really means ietf-network.yang. The same for network-topology.yang and ietf-network-topology.yang. Will clean this up. - The 'organization' and 'contact' are TBD or WILL-BE-DEFINED-LATER. I think this needs to be filled in now. OK - There is probably a need to add some copyright etc. text to the module descriptions. OK - Instead of putting I-D names into reference clauses, please insert instructions for the RFC editor so that the editor knows which things need to be replaced with RFC numbers. OK - The description of the typedef link-id says 'The identifier may be opaque.' What does that mean? It is an inet:uri after all. If two systems populate a link-id, how are they going to come up with the same identifier? Is the SHOULD realistic to achieve? The same comment applies to the typedef tp-id. Basically, this says that there may be different convenions=20 used to pick identifiers, and we are not prescribing a specific=20 convention. You may have different systems which choose to populate=20 link-ids differently, but they are different systems and=20 refer to different links. =20 - I am not sure whether the security considerations are sufficient. I think it would be fair to point out that topology information is most likely information that requires proper protection. See also section 3.4 of RFC6087 which points to the template: http://trac.tools.ietf.org/area/ops/trac/wiki/yang-security-guidelines OK, we can expand. - Reference 6021 has been obsoleted by RFC 6991. OK, will fix - Reference 6241 is cited but not in the references section. OK, will fix - The IANA considerations section is missing. You need to do IANA registrations of the YANG module name and the namespace URN. OK, will fix - RFC 2119 terms are used but not 'imported'. - There are references without citations: [yang-json], [restconf]. OK - I do not really understand why RFC1195, RFC2328, and RFC3209 are normative references. Even RFC6241 and RFC7223 may not be normative. Well, RFC6241 is not cited at all so it should be removed anyway (ah, bad for my h-index). I am not sure why they would not be normative - they are standards t= rack? What would be the criteria to list them otherwise? =20 (And, we can try to add a citation for RFC 6241 to make your h-index happy) - Make sure idnits is happy. OK, we'll try to make that happy too. I have asked the YANG doctors to comment on section 3.5. /js --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Fri Oct 9 17:21:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF5791B29D0; Fri, 9 Oct 2015 17:20:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -13.51 X-Spam-Level: X-Spam-Status: No, score=-13.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J-Sn2_9SxC2p; Fri, 9 Oct 2015 17:20:53 -0700 (PDT) Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B78371B29CA; Fri, 9 Oct 2015 17:20:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30622; q=dns/txt; s=iport; t=1444436453; x=1445646053; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=OIdAPkf8WV0JQQAIH4rVYxnUy+73QNVlLtUoL2sM1Hk=; b=RD4jdHXmcdxkKoePvzQ1My4tsIFtUYa3UgbcZ/81JrgdsRyDzJnxYqtJ /zhzXVsXgFfQqJi4la30B2yTm6qwUlwB7UQE8jzfB/Ox++GdmtEh5kXvU zZPmNWOO97hIxTe+sav8NlHGASMCdSiT61xjKyyFWTo4DUweJWnVI9689 g=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0CoAgD2WBhW/5xdJa1egllNVG4GrFuRBAENgVojgnCCCn8CgUA4FAEBAQEBAQGBCoQmAQEBBCEBC0wQAgEIEQQBAQsFEQEGAgMCIREUCQgBAQQBDQUIE4d+AxINkkKdMQGOVw2FIQEBAQEBAQEBAQEBAQEBAQEBAQEBAReLcYJQgXIaDSQGAQKCZDSBFAWNDYkFAYUYhg2DTEiHFooBf4dJEQ4BAUKCER2BVHGGIyUcgQYBAQE X-IronPort-AV: E=Sophos; i="5.17,660,1437436800"; d="scan'208,217"; a="40067679" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 10 Oct 2015 00:20:51 +0000 Received: from XCH-RCD-017.cisco.com (xch-rcd-017.cisco.com [173.37.102.27]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t9A0KoOZ016965 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 10 Oct 2015 00:20:50 GMT Received: from xch-rcd-017.cisco.com (173.37.102.27) by XCH-RCD-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 9 Oct 2015 19:20:45 -0500 Received: from xhc-rcd-x15.cisco.com (173.37.183.89) by xch-rcd-017.cisco.com (173.37.102.27) with Microsoft SMTP Server (TLS) id 15.0.1104.5 via Frontend Transport; Fri, 9 Oct 2015 19:20:45 -0500 Received: from xmb-rcd-x05.cisco.com ([169.254.15.194]) by xhc-rcd-x15.cisco.com ([173.37.183.89]) with mapi id 14.03.0248.002; Fri, 9 Oct 2015 19:20:49 -0500 From: "Alexander Clemm (alex)" To: "Zhangxian (Xian)" , Xufeng Liu , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQFbBFrAAAxNSnAAKpvNMA== Date: Sat, 10 Oct 2015 00:20:48 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.154.204.68] Content-Type: multipart/alternative; boundary="_000_DBC595ED2346914F9F81D17DD5C32B5728237296xmbrcdx05ciscoc_" MIME-Version: 1.0 Archived-At: Cc: 'Jeffrey Haas' , TEAS WG , 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 10 Oct 2015 00:20:59 -0000 --_000_DBC595ED2346914F9F81D17DD5C32B5728237296xmbrcdx05ciscoc_ Content-Type: text/plain; charset="iso-2022-jp" Content-Transfer-Encoding: quoted-printable Hi Xian, responses inline, Thanks --- Alex From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Zhangxian (Xian) Sent: Thursday, October 08, 2015 7:20 PM To: Xufeng Liu ; Susan Hares ; i2= rs@ietf.org Cc: 'Jeffrey Haas' ; TEAS WG ; 'Alia Atlas' = Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Hi, Xufeng, Alex, Thank you for taking the effort to work toward getting aligned as discussed= in last meeting. I have some comments on some of the conclusions. Could you share a bit more on reasons behind Point 3 conclusion? The reason is that the schedule stuff, while generic / non-specific = to any specific topology, is not =1B$B!H=1B(Bcommon=1B$B!I=1B(B, i.e. does = not apply to all topologies/ every instantiation of the model. The goal is= to have ietf-network-topology refer to the stuff that is truly common. For points 4 and 5, I think they are related. My understanding is that for = ietf-network, it does not follow the method taken by YANG modules such as i= etf-interface and ietf-te-topology, in which each -rw leaf will have a corr= esponding -ro leaf. Instead, it choose to use the =1B$B!H=1B(Bserver-provid= ed=1B$B!I=1B(B attribute to say whether all the leafs in the module is conf= igurable or state. I am not sure I understand the conclusion of these two p= oints. Do you agree that both methods are acceptable? There is no operational data defined. The server-provided attribute= d guides whether network topology information is populated by the server or= by the client application, but the information is the same - this not the = config vs oper data (read: stats) separation. To add stats, you should pro= vide an additional subtree/branch as applicable when you are augmenting. One last comment on point 6: is this for future-proofness or you have alrea= dy have some attributes in mind that can apply to all networks? I=1B$B!G=1B(Bll let Xufeng respond to that one. We did not have a top-leve= l container because it keeps paths shorter (one less level in the hierarchy= ) and because if you wanted to insert something at the =1B$B!H=1B(Btop leve= l=1B$B!I=1B(B, you could always do it in parallel. I still think this is t= he design that=1B$B!G=1B(Bs preferable. That said, having a top-level container may not really hurt. There were co= ncerns regarding the ramification to existing implementations of the model = (notably, Open Daylight) if we were to add it but it seems the fallout woul= d be manageable. Thanks, Alex (end of my comments) Thank you, Xian From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Xufeng Liu Sent: 2015=1B$BG/=1B(B10=1B$B7n=1B(B9=1B$BF|=1B(B 4:15 To: Susan Hares; i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Hi Folks, The following is an update on the ongoing I2RS<=3D>TE Topology alignment di= scussion (between the authors of the TE Topology model and Alex). The issues / solutions that are currently being discussed are: I2RS Generic Network Topology Model (draft-ietf-yang-network-topo): 1. Some groupings in ietf-network.yang and ietf-network-topology.yang= cannot be used in augmenting module because of missing name spaces, such a= s =1B$B!H=1B(Bpath "/network/network-id" at line 42 of ietf-network.yang. Solution: Proposed fixes have been sent to Alex to verify. 2. =1B$B!H=1B(Bleaf network-ref=1B$B!I=1B(B in ietf-network-topology.= yang:169, 220, is causing pyang validation errors. Solution: Alex will check the errors. 3. Can the group of schedule attributes be moved from ietf-te-topolog= y.yang to ietf-network-topology.yang? Solution: We agreed to keep them in ietf-te-topology.yang. 4. How to support state branch in augmenting module? Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes. 5. Should =1B$B!H=1B(Bserver-provided=1B$B!I=1B(B flag be used to blo= ck user operation on read-only entities? Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose. 6. Should I2RS Generic Network Topology model have a top-level contai= ner? The benefit of doing so is to provide an augmentation target node to d= efine attributes global to all networks. Solution: I2RS Generic Network Topology module authors will consider making= =1B$B!H=1B(B/networks=1B$B!I=1B(B as the top level container. L3 Topology Model (draft-ietf-i2rs-yang-l3-topology) 1. L3 Topology Model should have references to TE Topology model, so = that the related TE information can be properly retrieved, when L3 topology= and TE topology are congruent. Solution: L3 Topology Model authors will need to update the model and draft= to include these. L2 Topology Model (draft-ietf-i2rs-yang-l2-topology) 1. L2 Topology Model should have references to TE Topology model, so = that the related TE information can be properly retrieved, when L2 topology= and TE topology are congruent. Solution: This needs to be discussed with L2 Topology Model authors. Regards, - Xufeng (on behalf of the authors of the TE Topology Model) From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares Sent: Thursday, October 01, 2015 6:42 PM To: i2rs@ietf.org Cc: 'Jeffrey Haas'; 'Alia Atlas' Subject: [i2rs] WG LC for Topology (10/1 to 10/14) This begins a 2 week WG Last call (10/1 to 10/14) draft-ietf-yang-network-topo - modeling draft http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ draft-ietf-i2rs-yang-l3-topology - L3 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ draft-ietf-i2rs-yang-l2-topology - L2 topology http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topology/ Implementation status: This an OpenDaylight (ODL) implementation of the L3 topology and general mo= del. It is likely the L2 topology model will be supported in future ODL im= plementations. Jeff and I would appreciate anyone who has implementations= of these topology models to provide details on list or offlist to the chai= rs. Sue Hares --_000_DBC595ED2346914F9F81D17DD5C32B5728237296xmbrcdx05ciscoc_ Content-Type: text/html; charset="iso-2022-jp" Content-Transfer-Encoding: quoted-printable

Hi Xian,

 

responses inline, <ALEX>= ;

 

Thanks

--- Alex

 

From: i2rs [mailto:i2rs-bounces@ietf.org] = On Behalf Of Zhangxian (Xian)
Sent: Thursday, October 08, 2015 7:20 PM
To: Xufeng Liu <xufeng.liu@ericsson.com>; Susan Hares <shar= es@ndzh.com>; i2rs@ietf.org
Cc: 'Jeffrey Haas' <jhaas@pfrc.org>; TEAS WG <teas@ietf.org= >; 'Alia Atlas' <akatlas@gmail.com>
Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi, Xufeng, Alex,

 

Thank you for taking the effort to work toward getting aligned as dis= cussed in last meeting.   I have some comments on some of the con= clusions.

 

Could you share a bit more on reasons behind Point 3 conclusion?=

 

<ALEX> The reaso= n is that the schedule stuff, while generic / non-specific to any specific = topology, is not =1B$B!H=1B(Bcommon=1B$B!I=1B(B, i.e. does not apply to all= topologies/ every instantiation of the model.  The goal is to have ietf-network-topology refer to the stuff that is truly common.  =

</ALEX>

 

For points 4 and 5, I think they are related. My understanding is tha= t for ietf-network, it does not follow the method taken by YANG modules suc= h as ietf-interface and ietf-te-topology, in which each –rw leaf will have a corresponding –ro leaf. Ins= tead, it choose to use the =1B$B!H=1B(Bserver-provided=1B$B!I=1B(B attribut= e to say whether all the leafs in the module is configurable or state. I am= not sure I understand the conclusion of these two points. Do you agree that both methods are acceptable?

 

<ALEX> There is = no operational data defined.  The server-provided attributed guides wh= ether network topology information is populated by the server or by the cli= ent application, but the information is the same – this not the config vs oper data (read: stats) separation.  T= o add stats, you should provide an additional subtree/branch as applicable = when you are augmenting.

</ALEX>

 

One last comment on point 6: is this for future-proofness or you have= already have some attributes in mind that can apply to all networks?

 

<ALEX>

I=1B$B!G=1B(Bll let Xu= feng respond to that one.  We did not have a top-level container becau= se it keeps paths shorter (one less level in the hierarchy) and because if = you wanted to insert something at the =1B$B!H=1B(Btop level=1B$B!I=1B(B, yo= u could always do it in parallel.  I still think this is the design tha= t=1B$B!G=1B(Bs preferable. 

That said, having a to= p-level container may not really hurt.  There were concerns regarding = the ramification to existing implementations of the model (notably, Open Da= ylight) if we were to add it but it seems the fallout would be manageable.

 

Thanks, Alex (end of m= y comments)

</ALEX>

 

Thank you,

Xian=

=  

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Xufeng Liu
Sent: 2015
=1B$BG/=1B(B10=1B$B7n=1B(B9=1B$BF|=1B(B 4:15
To: Susan Hares; i2rs@ietf.org<= br> Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi Folks,<= /o:p>

 

The following is an up= date on the ongoing I2RSóTE Topology alignment = discussion (between the authors of the TE Topology model and Alex).

 

The issues / solutions= that are currently being discussed are:

 

I2RS Generic Network T= opology Model (draft-ietf-yang-network-topo):

1.     &= nbsp; Some groupings in iet= f-network.yang and ietf-network-topology.yang cannot be used in augmenting = module because of missing name spaces, such as =1B$B!H=1B(Bpath "/netw= ork/network-id" at line 42 of ietf-network.yang.
Solution: Proposed fixes have been sent to Alex to verify.

 

2.       =1B$B!H=1B(Bleaf netw= ork-ref=1B$B!I=1B(B in ietf-network-topology.yang:169, 220, is causing pyan= g validation errors.
Solution: Alex will check the errors.

3.       Can the group of sche= dule attributes be moved from ietf-te-topology.yang to ietf-network-topolog= y.yang?
Solution: We agreed to keep them in ietf-te-topology.yang.

4.       How to support state = branch in augmenting module?
Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes.

5.       Should =1B$B!H=1B(Bse= rver-provided=1B$B!I=1B(B flag be used to block user operation on read-only= entities?
Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose.

6.     &= nbsp; Should I2RS Generic N= etwork Topology model have a top-level container? The benefit of doing so i= s to provide an augmentation target node to define attributes global to all= networks.
Solution: I2RS Generic Network Topology module authors will consider making= =1B$B!H=1B(B/networks=1B$B!I=1B(B as the top level container.
<= /o:p>

 

L3 Topology Model (draft-ietf-i2rs-yang-l3-topology)

1.     &= nbsp; L3 Topology Model sho= uld have references to TE Topology model, so that the related TE informatio= n can be properly retrieved, when L3 topology and TE topology are congruent= .
Solution: L3 Topology Model authors will need to update the model and draft= to include these.

 

L2 Topology Model (draft-ietf-i2rs-yang-l2-topology)

1.     &= nbsp; L2 Topology Model sho= uld have references to TE Topology model, so that the related TE informatio= n can be properly retrieved, when L2 topology and TE topology are congruent= .
Solution: This needs to be discussed with L2 Topology Model authors.
=

 

Regards,

- Xufeng (on behalf of= the authors of the TE Topology Model)

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 01, 2015 6:42 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for Topology (10/1 to 10/14)
=

 

This begins a 2 week WG Last call (10/1 to 10/14)

 

draft-ietf-yang-network-topo – modeling draft =

http://datatracker.ietf.org/doc/draft-ietf-i2rs-= yang-network-topo/

 

draft-ietf-i2rs-yang-l3-topology – L3 topology=

http://datatracker.ietf.org/doc/draft-ietf-i2rs-y= ang-l3-topology/

 

draft-ietf-i2rs-yang-l2-topology – L2 topology=

http://datatracker.ietf.org/doc/draft-iet= f-i2rs-yang-l2-network-topology/

 

Implementation status:

 

This an OpenDaylight (ODL) implementation of the L3 = topology and general model.  It is likely the L2 topology model will b= e supported in future ODL implementations.   Jeff and I would app= reciate anyone who has implementations of these topology models to provide details on list or offlist to the chairs.

 

Sue Hares  

--_000_DBC595ED2346914F9F81D17DD5C32B5728237296xmbrcdx05ciscoc_-- From nobody Fri Oct 9 18:44:39 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C45141B2EF5 for ; Fri, 9 Oct 2015 18:44:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xqr5Z0Bw7CQs for ; Fri, 9 Oct 2015 18:44:34 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE1821B2EF8 for ; Fri, 9 Oct 2015 18:44:33 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml406-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CCJ02822; Sat, 10 Oct 2015 01:44:26 +0000 (GMT) Received: from NKGEML403-HUB.china.huawei.com (10.98.56.34) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.235.1; Sat, 10 Oct 2015 02:44:25 +0100 Received: from NKGEML512-MBX.china.huawei.com ([169.254.7.203]) by nkgeml403-hub.china.huawei.com ([10.98.56.34]) with mapi id 14.03.0235.001; Sat, 10 Oct 2015 09:44:16 +0800 From: "Dongjie (Jimmy)" To: "Alexander Clemm (alex)" , Juergen Schoenwaelder , Susan Hares Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQFhoqyAAB5/BIAAF9VPcA== Date: Sat, 10 Oct 2015 01:44:15 +0000 Message-ID: <76CD132C3ADEF848BD84D028D243C927743B5722@nkgeml512-mbx.china.huawei.com> References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> In-Reply-To: Accept-Language: en-US, zh-CN Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.111.97.131] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 10 Oct 2015 01:44:37 -0000 Hi Juergen, Alex, Currently in the L2 topology model there is one leaf "tp-state" which is st= ate data. We can remove it first before we reach some agreement on how to i= ntroduce operational/state information to topology models. Besides the approach Juergen suggested, do we also need to consider the app= roach proposed by openconfig-opstate?=20 Best regards, Jie > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Saturday, October 10, 2015 5:55 AM > To: Juergen Schoenwaelder; Susan Hares > Cc: Andy Bierman; i2rs@ietf.org; Martin Bjorklund; Ladislav Lhotka; 'Alia= Atlas'; > 'Jeffrey Haas' > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Juergen, >=20 > which specific objects/ subtrees are you referring to? >=20 > Essentially, in ietf-network and ietf-network-topology, we have all > configuration information. The same is true for the Layer 3 topology - a= ll > configuration information. (I cannot comment on L2 topology as I am not > involved there.) >=20 > Are you saying that we should add an additional branch as a placeholder (= and > perhaps an augmentation target) for operational data, even if we have not > otherwise defined any operational data? >=20 > The only item in the topology that is read-only concerns the "server-prov= ided" > flag, but this concerns a separate issue that was also discussed (I am no= t sure if > this is what you are referring to). It is analogous to the other discuss= ion > concerning distinguishing configuration that has been intended, versus on= e that > is in effect etc . This concerns the issue that some topologies are popu= lated by > the server whereas some topologies can be populated by client application= s. > We have had discussions in the past whether to "split this up", having a = (rw) > branch to populate "intended" topologies and a (ro) branch for topologies= "in > effect". We decided against it for various reasons - every piece of info= rmation > would essentially be duplicated inside the model (this is not your normal= config > vs oper data distinction, but would essentially reflect a limitation of t= he > framework), leading to unnecessary additional complexity in the model (ev= ery > augmentation has to be conducted in two ! > places), > more complex validation rules, etc. >=20 > --- Alex >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwael= der > Sent: Friday, October 09, 2015 12:22 AM > To: Susan Hares > Cc: i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka > ; Andy Bierman ; 'Jeffrey Haas' > ; 'Alia Atlas' > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi, >=20 > there is a discussion on the yang doctors mailing list about the data mod= el > design that mixes state data and configuration data into one subtree and = that > uses a data model specific runtime object to identify what is config data= and > what is state data. One of the main outcomes of the IAB workshop back in = 2002 > was the need to clearly separate configuration from operational state and= this > has been driven the design of NETCONF and YANG. YANG data model validatio= n > rules, for example, make a distinction between config true and config fal= se > data. > The config true or false property impacts what is returned by NETCONF's > get-config operation. Also note that config data is not allowed to refer = to > config false data in constraints. >=20 > It is unclear why the document does not follow the typical design pattern= , > namely to have a config true subtree >=20 > /networks/network* >=20 > and a config false subtree >=20 > /networks-state/network* >=20 > Section 3.5 describes this approach in the 3rd paragraph and states "As m= ost > data is defined in those groupings, the amount of additional definitions = required > will be limited." and there are no strong reasons given why this approach= has > not been followed. >=20 > /js >=20 > On Thu, Oct 01, 2015 at 06:41:34PM -0400, Susan Hares wrote: > > This begins a 2 week WG Last call (10/1 to 10/14) > > > > > > > > draft-ietf-yang-network-topo - modeling draft > > > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-network-topo/ > > > > > > > > draft-ietf-i2rs-yang-l3-topology - L3 topology > > > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l3-topology/ > > > > > > > > draft-ietf-i2rs-yang-l2-topology - L2 topology > > > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-yang-l2-network-topolo > > gy/ > > > > > > > > Implementation status: > > > > > > > > This an OpenDaylight (ODL) implementation of the L3 topology and > > general model. It is likely the L2 topology model will be supported in= future > ODL > > implementations. Jeff and I would appreciate anyone who has > > implementations of these topology models to provide details on list or > > offlist to the chairs. > > > > > > > > Sue Hares > > >=20 > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs >=20 >=20 > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Sat Oct 10 14:03:34 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1221C1A916B for ; Sat, 10 Oct 2015 14:03:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.902 X-Spam-Level: X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0b9JplumDbYM for ; Sat, 10 Oct 2015 14:03:30 -0700 (PDT) Received: from mxb2.tigertech.net (mxb2.tigertech.net [208.80.4.164]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF8071A914C for ; Sat, 10 Oct 2015 14:03:30 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 9D2FA580002; Sat, 10 Oct 2015 14:03:30 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 2782F1C02C3; Sat, 10 Oct 2015 14:03:30 -0700 (PDT) To: "i2rs@ietf.org" , Jonathan Hardwick , 'Jon Hudson' From: "Joel M. Halpern" Message-ID: <56197D21.3090304@joelhalpern.com> Date: Sat, 10 Oct 2015 17:03:29 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Subject: [i2rs] Rtg Area QA Review: draft-ietf-i2rs-ephemeral-state-02 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 10 Oct 2015 21:03:32 -0000 For details on Routing Area QA reviews, see: https://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDirDocQa Name: draft-ietf-i2rs-ephemeral-state-02 I2RS Ephemeral State Requirements Reviewer: Joel M. Halpern Review Date: October 10, 2015 This document is close to ready for working group last call. Major issues: None. Minor Issues: I would suggest that the introduction needs to include a description, longer than that in the abstract, of the purpose of the document. If the document purpose is as stated in the abstract, to provide requirements to NetConf and NetMod working groups regarding ephemeral state, then section 2 should have a bit more explanatory text, as the requirements there are explicitly not abotu ephemeral state. It may be as simple as stating that these requirements are repeated hear to provide context for the reader. Or whatever explanation does apply for why they are here. On section 3.2 requirement 02, the text prohibiting reference from non-ephemeral to ephemeral state needs some clarification. First, it should be clear that this is a requirement on behavior outside of I2RS, as I2RS can not refer to non-ephemeral state. Also, it seems likely that such incorrect references could be attempted at either model definition time or NetConf request application time. As such "validation error" may be too specific a description of the errors needed. Requirement 3.4 is written as if writeable / non-writeable were a new requirement to NetConf. I believe what is wanted here is only that there must be indications in the model of ephemeral elements, and that it is writeable. If there is a need for non-writeable ephemeral elements, that should be described seperately. At this reading, I do not see a need for such. Section 3.6 would benefit from an introductory sentence indicating that these requirements are included because they have an impact on viable solutions to the ephemeral state requirements, although they themselves are more general requirements applying to I2RS operations. Given that the design team is looking at a model which they describe as a limited panes of glass model, it seems that if section 4 is retained (as it provides useful context) section 4.2 needs to be modified to be clear as to what solution is being rejected. Editorial Issues: Not noted From nobody Sun Oct 11 09:11:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05EE01A014E; Sun, 11 Oct 2015 09:11:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4wjRksD3n3Uj; Sun, 11 Oct 2015 09:11:15 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D776A1A010C; Sun, 11 Oct 2015 09:11:14 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id A7EC9AF3; Sun, 11 Oct 2015 18:11:13 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id Q-KY6VWelV3Y; Sun, 11 Oct 2015 18:11:12 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Sun, 11 Oct 2015 18:11:12 +0200 (CEST) Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id A9B8220053; Sun, 11 Oct 2015 18:11:12 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id PODnegTmuhr3; Sun, 11 Oct 2015 18:11:12 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 7AE632004E; Sun, 11 Oct 2015 18:11:11 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 3BE9037B09F8; Sun, 11 Oct 2015 18:11:09 +0200 (CEST) Date: Sun, 11 Oct 2015 18:11:08 +0200 From: Juergen Schoenwaelder To: Susan Hares Message-ID: <20151011161106.GA61856@elstar.local> Mail-Followup-To: Susan Hares , i2rs@ietf.org, i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: i2rs@ietf.org, i2rs-proto-dt@ietf.org Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 16:11:17 -0000 On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > 1) Ephemeral state is not unique to zI2RS > > 2) The ephemeral datastore is a datastore holds > > configuration that is intended to not survive a reboot. > Configuration as YANG config true or a subset thereof? > 3) The ephemeral datastore is never locked. > > 4) I2RS is using a 2 panes of glass mechanisms > > Pane 1: normal configuration > > Pane 2: ephemeral state > > > > The I2RS agent and configuration software on > > the node must handle this complexity. So is there one ephemeral datastore or are there multiple? Some slides say one per client, others seem to indicate one for all clients. > > 5) The key word "ephemeral" can be used to identify > > Identities which are ephemeral in data models. > > Does anyone have any concerns with adding this to > Yang? Identities? I assume you mean schema nodes, do you? Adding by defining an YANG extension such as i2rs:ephemeral true? How does such an i2rs:ephemeral true interplay with config true/false? What about contexts for must/when expressions? Or is the idea to settle on RESTCONF and to work with YANG patch? /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Sun Oct 11 09:55:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FE921AD0A7 for ; Sun, 11 Oct 2015 09:55:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.378 X-Spam-Level: X-Spam-Status: No, score=-1.378 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_64=0.6, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Tg-coinYCjMC for ; Sun, 11 Oct 2015 09:55:34 -0700 (PDT) Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6471A1ACAD8 for ; Sun, 11 Oct 2015 09:55:33 -0700 (PDT) Received: by lbbk10 with SMTP id k10so10910798lbb.0 for ; Sun, 11 Oct 2015 09:55:31 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=fw/NQd7N09+M5wYGdLzapIdyp0FPpoff61eb4pnCkzk=; b=JGP5ixgQKPbUmv224XVZ2a7Bwf/l6dJpAs0zCjXx8SuUP4QFsE0OwCdicD+SM2DsyU amMGZyT18HgnokqAPuFQcZKDqUS0r1YSpnTbLJLoy1lcjeAlPtBxTtCtamRwhvrHxd0Y 5DEzQnhZ0adD+w6aOIcRKp2JNIlerYMTsOAaSLfE0aMc+9U2MA7AjQLZzOe1xle6qWd0 UDT+vbr1qeDuGCLVoj6v1QpUBvx7wrAEZWqcUYYGATi/fBI5IjTEiTCZPyEX+yXeJsvT dkTo8ee0WwkxcsPC07qofi/9OF6nvzBufZ6w31D/DEh5hZHvKwSEPuABbARbLX7F4PpO CR9w== X-Gm-Message-State: ALoCoQnrDz/cN5eFAsjyKZD9PGrA4EuAY2uonJ9XtcFl7SHxTVT/B5s2ny6/X97CODuDzwbI+uOO MIME-Version: 1.0 X-Received: by 10.112.147.39 with SMTP id th7mr10666610lbb.82.1444582531353; Sun, 11 Oct 2015 09:55:31 -0700 (PDT) Received: by 10.112.138.72 with HTTP; Sun, 11 Oct 2015 09:55:31 -0700 (PDT) In-Reply-To: <20151011161106.GA61856@elstar.local> References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> Date: Sun, 11 Oct 2015 09:55:31 -0700 Message-ID: From: Andy Bierman To: Juergen Schoenwaelder , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org Content-Type: multipart/alternative; boundary=047d7b344202a1734b0521d7146c Archived-At: Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 16:55:35 -0000 --047d7b344202a1734b0521d7146c Content-Type: text/plain; charset=UTF-8 On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < j.schoenwaelder@jacobs-university.de> wrote: > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > > > > > 1) Ephemeral state is not unique to zI2RS > > > > 2) The ephemeral datastore is a datastore holds > > > > configuration that is intended to not survive a reboot. > > > > Configuration as YANG config true or a subset thereof? > config=true nodes only. Some way is needed to specify I2RS conformance for a given YANG module, unless every persistent config leaf is expected to also be supported as ephemeral data. If not, a YANG "ephemeral-stmt" is probably needed, since config=true is insufficient to support I2RS conformance. > > 3) The ephemeral datastore is never locked. > > > > 4) I2RS is using a 2 panes of glass mechanisms > > > > Pane 1: normal configuration > > > > Pane 2: ephemeral state > > > > > > > > The I2RS agent and configuration software on > > > > the node must handle this complexity. > > So is there one ephemeral datastore or are there multiple? Some > slides say one per client, others seem to indicate one for all > clients. > > One ephemeral datastore. No client panes. That was to support caching, but the architecture forbids caching, so that was taken out. One ephemeral pane that overrides the running datastore > > > > 5) The key word "ephemeral" can be used to identify > > > > Identities which are ephemeral in data models. > > > > Does anyone have any concerns with adding this to > > Yang? > > Identities? I assume you mean schema nodes, do you? Adding by > defining an YANG extension such as i2rs:ephemeral true? How does such > an i2rs:ephemeral true interplay with config true/false? What about > contexts for must/when expressions? Or is the idea to settle on > RESTCONF and to work with YANG patch? > I think a real keyword is needed not an extension. Otherwise YANG groupings cannot be utilized w/ statements that are refined in the uses-stmt to set the ephemeral flag. NETCONF has no edit ordering or ability to return a partial error. IMO only RESTCONF is needed. Proposals to improve NETCONF editing to support YANG Patch have already been made, and the WG had higher priorities. I don't see why 2 protocols are needed instead of 1. > > /js > > Andy > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > --047d7b344202a1734b0521d7146c Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable


On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> wrote:
On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hare= s wrote:
> The 10/7/2015 interim discussed the ephemeral portion of the protocol<= br> >
>
>
> 1)=C2=A0 =C2=A0 =C2=A0 Ephemeral state is not unique to zI2RS
>
> 2)=C2=A0 =C2=A0 =C2=A0 The ephemeral datastore is a datastore holds >
> configuration that is intended to not survive a reboot.
>

Configuration as YANG config true or a subset thereof?


config=3Dtrue nodes only.
Some way= is needed to specify I2RS conformance for
a given YANG module, u= nless every persistent config leaf
is expected to also be support= ed as ephemeral data.

If not, a YANG "ephemer= al-stmt" is probably needed, since
config=3Dtrue is insuffic= ient to support I2RS conformance.



> 3)=C2=A0 =C2=A0 =C2=A0 The ephemeral datastore is never locked.
>
> 4)=C2=A0 =C2=A0 =C2=A0 I2RS is using a 2 panes of glass mechanisms
>
> Pane 1: normal configuration
>
> Pane 2:=C2=A0 ephemeral state
>
>
>
>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0The I2RS = agent and configuration software on
>
>=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0the node=C2=A0 m= ust handle this complexity.

So is there one ephemeral datastore or are there multiple?=C2=A0 Some
slides say one per client, others seem to indicate one for all
clients.



One ephemeral datastore= .
No client panes.=C2=A0 That was to support caching, but
the architecture forbids caching, so that was taken out.

<= /div>
One ephemeral pane that overrides the running datastore
=C2=A0
>
> 5)=C2=A0 =C2=A0 =C2=A0 The key word "ephemeral" can be used = to identify
>
> Identities which are ephemeral in data models.
>
> Does anyone have any concerns with adding this to
> Yang?

Identities? I assume you mean schema nodes, do you?=C2=A0 Adding by
defining an YANG extension such as i2rs:ephemeral true? How does such
an i2rs:ephemeral true interplay with config true/false? What about
contexts for must/when expressions? Or is the idea to settle on
RESTCONF and to work with YANG patch?

I= think a real keyword is needed not an extension.
Otherwise YANG = groupings cannot be utilized w/ statements
that are refined in th= e uses-stmt to set the ephemeral flag.

NETCONF has= no edit ordering or ability to return a partial
error. IMO only = RESTCONF is needed.=C2=A0 Proposals to
improve NETCONF editing to= support YANG Patch have
already been made, and the WG had higher= priorities.
I don't see why 2 protocols are needed instead o= f 1.


=C2=A0

/js



Andy
=C2=A0
--
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer= sity Bremen gGmbH
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28= 759 Bremen | Germany
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

--047d7b344202a1734b0521d7146c-- From nobody Sun Oct 11 10:51:33 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7E571B2C03; Sun, 11 Oct 2015 10:51:31 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.26 X-Spam-Level: X-Spam-Status: No, score=-3.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, J_CHICKENPOX_64=0.6, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yRhHIrjvJNaX; Sun, 11 Oct 2015 10:51:30 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05ACF1B2BA7; Sun, 11 Oct 2015 10:51:29 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 61D8DAC1; Sun, 11 Oct 2015 19:51:27 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id Rl19ECA4-SY1; Sun, 11 Oct 2015 19:51:26 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Sun, 11 Oct 2015 19:51:26 +0200 (CEST) Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id 393B920053; Sun, 11 Oct 2015 19:51:26 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id 8RAzowU2FIg9; Sun, 11 Oct 2015 19:51:25 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 129192004E; Sun, 11 Oct 2015 19:51:25 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id F046437B0AFC; Sun, 11 Oct 2015 19:51:23 +0200 (CEST) Date: Sun, 11 Oct 2015 19:51:23 +0200 From: Juergen Schoenwaelder To: Andy Bierman Message-ID: <20151011175123.GA62046@elstar.local> Mail-Followup-To: Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "i2rs@ietf.org" , i2rs-proto-dt@ietf.org, Susan Hares Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 17:51:32 -0000 On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > j.schoenwaelder@jacobs-university.de> wrote: > > > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > > > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > > > > > > > > > 1) Ephemeral state is not unique to zI2RS > > > > > > 2) The ephemeral datastore is a datastore holds > > > > > > configuration that is intended to not survive a reboot. > > > > > > > Configuration as YANG config true or a subset thereof? > > > > > config=true nodes only. good > Some way is needed to specify I2RS conformance for > a given YANG module, unless every persistent config leaf > is expected to also be supported as ephemeral data. > > If not, a YANG "ephemeral-stmt" is probably needed, since > config=true is insufficient to support I2RS conformance. One question is whether this needs to be inline in the data model or not. If conformance is the goal, then you know what having things defined inline has limits. If we would address conformance in more general terms, perhaps I2RS conformance falls out as a special case. > One ephemeral datastore. > No client panes. That was to support caching, but > the architecture forbids caching, so that was taken out. > > One ephemeral pane that overrides the running datastore good > > Identities? I assume you mean schema nodes, do you? Adding by > > defining an YANG extension such as i2rs:ephemeral true? How does such > > an i2rs:ephemeral true interplay with config true/false? What about > > contexts for must/when expressions? Or is the idea to settle on > > RESTCONF and to work with YANG patch? > > > > I think a real keyword is needed not an extension. > Otherwise YANG groupings cannot be utilized w/ statements > that are refined in the uses-stmt to set the ephemeral flag. I fail to understand the groupings argument. > NETCONF has no edit ordering or ability to return a partial > error. IMO only RESTCONF is needed. Proposals to > improve NETCONF editing to support YANG Patch have > already been made, and the WG had higher priorities. > I don't see why 2 protocols are needed instead of 1. Perhaps the WG should discuss and decide. If all the WG wants is RESTCONF, then we can simplify the discussion. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Sun Oct 11 11:10:23 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98E431B2C37 for ; Sun, 11 Oct 2015 11:10:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.378 X-Spam-Level: X-Spam-Status: No, score=-1.378 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_64=0.6, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xemqn_f7ku4t for ; Sun, 11 Oct 2015 11:10:18 -0700 (PDT) Received: from mail-lb0-f181.google.com (mail-lb0-f181.google.com [209.85.217.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B7081B2C32 for ; Sun, 11 Oct 2015 11:10:18 -0700 (PDT) Received: by lbwr8 with SMTP id r8so122494956lbw.2 for ; Sun, 11 Oct 2015 11:10:16 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=x+nhkfT7ewFcgye3nMhskvY1JUNRuujJ/YXED0z3KLo=; b=IHuL9JYt76gsLaFJgcwBcuzCHf4STqcaNPbfeyWsrtZOPIHf5W5J3WC1ymm6B3Cx1+ c20aVGmncecsufYc1azfHUFN99WXjSfWD7M2yZxNoMODws55cnX1c+WL/OMy8MnItJu/ tLc2vLPiGcL8rydtsJ4mcjZmnUTUQgw3C2C+5lgU8bTi6k3zcFaKCIpi2GOdhEhMvxPO oBhH0SnJ6THYev6y30QZuD5YQ4baLbbNLRRfbdN6K8QCDx5F2DgsEg9aiWM7vVLEJKEh imxfS6rrjGBmL+Q2aatA/RkiokjEiXQE+TPTRy/wH/zsb1UaXUgXx1BURh4JWkjyREIb CMEw== X-Gm-Message-State: ALoCoQkDAQPq/rEdTRUKOXSd1y0VopRI3k99nROEj7IwJVhIFp5QCxW9FCRjs0iJK7aR3NWmVKZM MIME-Version: 1.0 X-Received: by 10.112.199.170 with SMTP id jl10mr5224961lbc.88.1444587016346; Sun, 11 Oct 2015 11:10:16 -0700 (PDT) Received: by 10.112.138.72 with HTTP; Sun, 11 Oct 2015 11:10:16 -0700 (PDT) In-Reply-To: <20151011175123.GA62046@elstar.local> References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> Date: Sun, 11 Oct 2015 11:10:16 -0700 Message-ID: From: Andy Bierman To: Juergen Schoenwaelder , Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org Content-Type: multipart/alternative; boundary=001a11c38a7af504210521d81f9b Archived-At: Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 18:10:20 -0000 --001a11c38a7af504210521d81f9b Content-Type: text/plain; charset=UTF-8 On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < j.schoenwaelder@jacobs-university.de> wrote: > On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > > On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > > j.schoenwaelder@jacobs-university.de> wrote: > > > > > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > > > > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > > > > > > > > > > > > > 1) Ephemeral state is not unique to zI2RS > > > > > > > > 2) The ephemeral datastore is a datastore holds > > > > > > > > configuration that is intended to not survive a reboot. > > > > > > > > > > Configuration as YANG config true or a subset thereof? > > > > > > > > > config=true nodes only. > > good > > > Some way is needed to specify I2RS conformance for > > a given YANG module, unless every persistent config leaf > > is expected to also be supported as ephemeral data. > > > > If not, a YANG "ephemeral-stmt" is probably needed, since > > config=true is insufficient to support I2RS conformance. > > One question is whether this needs to be inline in the data model or > not. If conformance is the goal, then you know what having things > defined inline has limits. If we would address conformance in more > general terms, perhaps I2RS conformance falls out as a special case. > > > One ephemeral datastore. > > No client panes. That was to support caching, but > > the architecture forbids caching, so that was taken out. > > > > One ephemeral pane that overrides the running datastore > > good > > > > Identities? I assume you mean schema nodes, do you? Adding by > > > defining an YANG extension such as i2rs:ephemeral true? How does such > > > an i2rs:ephemeral true interplay with config true/false? What about > > > contexts for must/when expressions? Or is the idea to settle on > > > RESTCONF and to work with YANG patch? > > > > > > > I think a real keyword is needed not an extension. > > Otherwise YANG groupings cannot be utilized w/ statements > > that are refined in the uses-stmt to set the ephemeral flag. > > I fail to understand the groupings argument. > The refine-stmt is defined to work on YANG statements, not external statements. A YANG extension is (by definition) something external to the YANG language. The WG needs to decide if the ephemeral property should be specific to an I2RS YANG module or should be basic property of the YANG data modeling language. YANG keywords must be supported and they do not need to be imported from a YANG module to be used. > > NETCONF has no edit ordering or ability to return a partial > > error. IMO only RESTCONF is needed. Proposals to > > improve NETCONF editing to support YANG Patch have > > already been made, and the WG had higher priorities. > > I don't see why 2 protocols are needed instead of 1. > > Perhaps the WG should discuss and decide. If all the WG wants is > RESTCONF, then we can simplify the discussion. > > /js > > Andy > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 > --001a11c38a7af504210521d81f9b Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable


On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> wrote:
On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bier= man wrote:
> On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder <
> j.schoenwaelde= r@jacobs-university.de> wrote:
>
> > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote:
> > > The 10/7/2015 interim discussed the ephemeral portion of the= protocol
> > >
> > >
> > >
> > > 1)=C2=A0 =C2=A0 =C2=A0 Ephemeral state is not unique to zI2R= S
> > >
> > > 2)=C2=A0 =C2=A0 =C2=A0 The ephemeral datastore is a datastor= e holds
> > >
> > > configuration that is intended to not survive a reboot.
> > >
> >
> > Configuration as YANG config true or a subset thereof?
> >
>
>
> config=3Dtrue nodes only.

good

> Some way is needed to specify I2RS conformance for
> a given YANG module, unless every persistent config leaf
> is expected to also be supported as ephemeral data.
>
> If not, a YANG "ephemeral-stmt" is probably needed, since > config=3Dtrue is insufficient to support I2RS conformance.

One question is whether this needs to be inline in the data model or
not. If conformance is the goal, then you know what having things
defined inline has limits. If we would address conformance in more
general terms, perhaps I2RS conformance falls out as a special case.

> One ephemeral datastore.
> No client panes.=C2=A0 That was to support caching, but
> the architecture forbids caching, so that was taken out.
>
> One ephemeral pane that overrides the running datastore

good

> > Identities? I assume you mean schema nodes, do you?=C2=A0 Adding = by
> > defining an YANG extension such as i2rs:ephemeral true? How does = such
> > an i2rs:ephemeral true interplay with config true/false? What abo= ut
> > contexts for must/when expressions? Or is the idea to settle on > > RESTCONF and to work with YANG patch?
> >
>
> I think a real keyword is needed not an extension.
> Otherwise YANG groupings cannot be utilized w/ statements
> that are refined in the uses-stmt to set the ephemeral flag.

I fail to understand the groupings argument.


The refine-stmt is defined to work on YANG statements,= not external statements.

A YANG extension is (by = definition) something external to the YANG language.
The WG needs= to decide if the ephemeral property should be specific to
an I2R= S YANG module or should be basic property of the YANG data modeling languag= e.=C2=A0 YANG keywords must be supported and they do not need
to = be imported from a YANG module to be used.

=C2=A0<= /div>
> NETCONF has no edit ordering or ability to return a partial
> error. IMO only RESTCONF is needed.=C2=A0 Proposals to
> improve NETCONF editing to support YANG Patch have
> already been made, and the WG had higher priorities.
> I don't see why 2 protocols are needed instead of 1.

Perhaps the WG should discuss and decide. If all the WG wants is
RESTCONF, then we can simplify the discussion.
=C2=A0
=C2=A0
/js



Andy

=C2=A0
--
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer= sity Bremen gGmbH
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28= 759 Bremen | Germany
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<http://www.jacobs-university.de/>

--001a11c38a7af504210521d81f9b-- From nobody Sun Oct 11 12:58:29 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DE031A9036; Sun, 11 Oct 2015 12:58:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.26 X-Spam-Level: X-Spam-Status: No, score=-3.26 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, J_CHICKENPOX_64=0.6, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4B-QNHhoOz1e; Sun, 11 Oct 2015 12:58:26 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B005D1A9045; Sun, 11 Oct 2015 12:58:25 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 7816EFB0; Sun, 11 Oct 2015 21:58:24 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id 7C4Zdjn41k1J; Sun, 11 Oct 2015 21:58:23 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Sun, 11 Oct 2015 21:58:23 +0200 (CEST) Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id 32D2D20053; Sun, 11 Oct 2015 21:58:23 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id dYPzXR7TAPoX; Sun, 11 Oct 2015 21:58:22 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 6F2D62004E; Sun, 11 Oct 2015 21:58:21 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 7B82F37B0BB7; Sun, 11 Oct 2015 21:58:19 +0200 (CEST) Date: Sun, 11 Oct 2015 21:58:18 +0200 From: Juergen Schoenwaelder To: Andy Bierman Message-ID: <20151011195818.GA62201@elstar.local> Mail-Followup-To: Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "i2rs@ietf.org" , i2rs-proto-dt@ietf.org, Susan Hares Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 19:58:28 -0000 On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: > On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < > j.schoenwaelder@jacobs-university.de> wrote: > > > On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > > > On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > > > j.schoenwaelder@jacobs-university.de> wrote: > > > > > > > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > > > > > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > > > > > > > > > > > > > > > > > 1) Ephemeral state is not unique to zI2RS > > > > > > > > > > 2) The ephemeral datastore is a datastore holds > > > > > > > > > > configuration that is intended to not survive a reboot. > > > > > > > > > > > > > Configuration as YANG config true or a subset thereof? > > > > > > > > > > > > > config=true nodes only. > > > > good > > > > > Some way is needed to specify I2RS conformance for > > > a given YANG module, unless every persistent config leaf > > > is expected to also be supported as ephemeral data. > > > > > > If not, a YANG "ephemeral-stmt" is probably needed, since > > > config=true is insufficient to support I2RS conformance. > > > > One question is whether this needs to be inline in the data model or > > not. If conformance is the goal, then you know what having things > > defined inline has limits. If we would address conformance in more > > general terms, perhaps I2RS conformance falls out as a special case. > > > > > One ephemeral datastore. > > > No client panes. That was to support caching, but > > > the architecture forbids caching, so that was taken out. > > > > > > One ephemeral pane that overrides the running datastore > > > > good > > > > > > Identities? I assume you mean schema nodes, do you? Adding by > > > > defining an YANG extension such as i2rs:ephemeral true? How does such > > > > an i2rs:ephemeral true interplay with config true/false? What about > > > > contexts for must/when expressions? Or is the idea to settle on > > > > RESTCONF and to work with YANG patch? > > > > > > > > > > I think a real keyword is needed not an extension. > > > Otherwise YANG groupings cannot be utilized w/ statements > > > that are refined in the uses-stmt to set the ephemeral flag. > > > > I fail to understand the groupings argument. > > > > > The refine-stmt is defined to work on YANG statements, not external > statements. RFC 6020bis says in section 7.13.2.: o Any node can get refined extensions, if the extension allows refinement. See Section 7.19 for details. > A YANG extension is (by definition) something external to the YANG language. > The WG needs to decide if the ephemeral property should be specific to > an I2RS YANG module or should be basic property of the YANG data modeling > language. YANG keywords must be supported and they do not need > to be imported from a YANG module to be used. Or it is a common extension (that is the extension is not I2RS specific but instead for everything that wants to use ephemeral datastores). Anyway, if the main purpose is to define a conformance level, it may be worth thinking about adding a conformance mechanism that decouples conformance requirements from the data model definition. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Sun Oct 11 13:11:17 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D98771A90B5; Sun, 11 Oct 2015 13:11:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.302 X-Spam-Level: X-Spam-Status: No, score=-1.302 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_64=0.6, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 58drejnQqE2B; Sun, 11 Oct 2015 13:11:14 -0700 (PDT) Received: from mxb2.tigertech.net (mxb2.tigertech.net [208.80.4.164]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCD071A90B4; Sun, 11 Oct 2015 13:11:14 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 91B921C05C5; Sun, 11 Oct 2015 13:11:14 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id EBDB61C0240; Sun, 11 Oct 2015 13:11:13 -0700 (PDT) To: Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> From: "Joel M. Halpern" Message-ID: <561AC25F.7050407@joelhalpern.com> Date: Sun, 11 Oct 2015 16:11:11 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151011195818.GA62201@elstar.local> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 20:11:16 -0000 I would phrase the marking need slightly differently. Given that it would seem onerous to expect all I2RS-supporting devices to support ephemeral behavior for all parts of all models, we need some way to clearly indicate what is expected. Trying to do it as separate models seems difficult. Marking elements in the model as ephemeral seems the clearest and most efficient mechanism, but I am sure there are other alternatives. Yours, Joel On 10/11/15 3:58 PM, Juergen Schoenwaelder wrote: > On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: >> On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < >> j.schoenwaelder@jacobs-university.de> wrote: >> >>> On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: >>>> On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < >>>> j.schoenwaelder@jacobs-university.de> wrote: >>>> >>>>> On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: >>>>>> The 10/7/2015 interim discussed the ephemeral portion of the protocol >>>>>> >>>>>> >>>>>> >>>>>> 1) Ephemeral state is not unique to zI2RS >>>>>> >>>>>> 2) The ephemeral datastore is a datastore holds >>>>>> >>>>>> configuration that is intended to not survive a reboot. >>>>>> >>>>> >>>>> Configuration as YANG config true or a subset thereof? >>>>> >>>> >>>> >>>> config=true nodes only. >>> >>> good >>> >>>> Some way is needed to specify I2RS conformance for >>>> a given YANG module, unless every persistent config leaf >>>> is expected to also be supported as ephemeral data. >>>> >>>> If not, a YANG "ephemeral-stmt" is probably needed, since >>>> config=true is insufficient to support I2RS conformance. >>> >>> One question is whether this needs to be inline in the data model or >>> not. If conformance is the goal, then you know what having things >>> defined inline has limits. If we would address conformance in more >>> general terms, perhaps I2RS conformance falls out as a special case. >>> >>>> One ephemeral datastore. >>>> No client panes. That was to support caching, but >>>> the architecture forbids caching, so that was taken out. >>>> >>>> One ephemeral pane that overrides the running datastore >>> >>> good >>> >>>>> Identities? I assume you mean schema nodes, do you? Adding by >>>>> defining an YANG extension such as i2rs:ephemeral true? How does such >>>>> an i2rs:ephemeral true interplay with config true/false? What about >>>>> contexts for must/when expressions? Or is the idea to settle on >>>>> RESTCONF and to work with YANG patch? >>>>> >>>> >>>> I think a real keyword is needed not an extension. >>>> Otherwise YANG groupings cannot be utilized w/ statements >>>> that are refined in the uses-stmt to set the ephemeral flag. >>> >>> I fail to understand the groupings argument. >>> >> >> >> The refine-stmt is defined to work on YANG statements, not external >> statements. > > RFC 6020bis says in section 7.13.2.: > > o Any node can get refined extensions, if the extension allows > refinement. See Section 7.19 for details. > >> A YANG extension is (by definition) something external to the YANG language. >> The WG needs to decide if the ephemeral property should be specific to >> an I2RS YANG module or should be basic property of the YANG data modeling >> language. YANG keywords must be supported and they do not need >> to be imported from a YANG module to be used. > > Or it is a common extension (that is the extension is not I2RS > specific but instead for everything that wants to use ephemeral > datastores). > > Anyway, if the main purpose is to define a conformance level, it may > be worth thinking about adding a conformance mechanism that decouples > conformance requirements from the data model definition. > > /js > From nobody Sun Oct 11 13:24:20 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B36D1A910F; Sun, 11 Oct 2015 13:24:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OChxTdFejwWY; Sun, 11 Oct 2015 13:24:16 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5450D1A9109; Sun, 11 Oct 2015 13:24:16 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 25C17900; Sun, 11 Oct 2015 22:24:15 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id hpyiegjZ2fIQ; Sun, 11 Oct 2015 22:24:14 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Sun, 11 Oct 2015 22:24:13 +0200 (CEST) Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id E19DC20053; Sun, 11 Oct 2015 22:24:13 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id wQcyI6gwmjTH; Sun, 11 Oct 2015 22:24:12 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 2B2DF2004E; Sun, 11 Oct 2015 22:24:12 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 5715037B0C19; Sun, 11 Oct 2015 22:24:11 +0200 (CEST) Date: Sun, 11 Oct 2015 22:24:10 +0200 From: Juergen Schoenwaelder To: "Joel M. Halpern" Message-ID: <20151011202410.GA62276@elstar.local> Mail-Followup-To: "Joel M. Halpern" , Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <561AC25F.7050407@joelhalpern.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "i2rs@ietf.org" , i2rs-proto-dt@ietf.org, Andy Bierman , Susan Hares Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 20:24:18 -0000 Joel, do you expect that special models will be written for I2RS or do you expect that generic routing configuration models will do the job? /js On Sun, Oct 11, 2015 at 04:11:11PM -0400, Joel M. Halpern wrote: > I would phrase the marking need slightly differently. > Given that it would seem onerous to expect all I2RS-supporting devices > to support ephemeral behavior for all parts of all models, we need some > way to clearly indicate what is expected. > > Trying to do it as separate models seems difficult. > > Marking elements in the model as ephemeral seems the clearest and most > efficient mechanism, but I am sure there are other alternatives. > > Yours, > Joel > > On 10/11/15 3:58 PM, Juergen Schoenwaelder wrote: > >On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: > >>On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < > >>j.schoenwaelder@jacobs-university.de> wrote: > >> > >>>On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > >>>>On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > >>>>j.schoenwaelder@jacobs-university.de> wrote: > >>>> > >>>>>On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > >>>>>>The 10/7/2015 interim discussed the ephemeral portion of the protocol > >>>>>> > >>>>>> > >>>>>> > >>>>>>1) Ephemeral state is not unique to zI2RS > >>>>>> > >>>>>>2) The ephemeral datastore is a datastore holds > >>>>>> > >>>>>>configuration that is intended to not survive a reboot. > >>>>>> > >>>>> > >>>>>Configuration as YANG config true or a subset thereof? > >>>>> > >>>> > >>>> > >>>>config=true nodes only. > >>> > >>>good > >>> > >>>>Some way is needed to specify I2RS conformance for > >>>>a given YANG module, unless every persistent config leaf > >>>>is expected to also be supported as ephemeral data. > >>>> > >>>>If not, a YANG "ephemeral-stmt" is probably needed, since > >>>>config=true is insufficient to support I2RS conformance. > >>> > >>>One question is whether this needs to be inline in the data model or > >>>not. If conformance is the goal, then you know what having things > >>>defined inline has limits. If we would address conformance in more > >>>general terms, perhaps I2RS conformance falls out as a special case. > >>> > >>>>One ephemeral datastore. > >>>>No client panes. That was to support caching, but > >>>>the architecture forbids caching, so that was taken out. > >>>> > >>>>One ephemeral pane that overrides the running datastore > >>> > >>>good > >>> > >>>>>Identities? I assume you mean schema nodes, do you? Adding by > >>>>>defining an YANG extension such as i2rs:ephemeral true? How does such > >>>>>an i2rs:ephemeral true interplay with config true/false? What about > >>>>>contexts for must/when expressions? Or is the idea to settle on > >>>>>RESTCONF and to work with YANG patch? > >>>>> > >>>> > >>>>I think a real keyword is needed not an extension. > >>>>Otherwise YANG groupings cannot be utilized w/ statements > >>>>that are refined in the uses-stmt to set the ephemeral flag. > >>> > >>>I fail to understand the groupings argument. > >>> > >> > >> > >>The refine-stmt is defined to work on YANG statements, not external > >>statements. > > > >RFC 6020bis says in section 7.13.2.: > > > > o Any node can get refined extensions, if the extension allows > > refinement. See Section 7.19 for details. > > > >>A YANG extension is (by definition) something external to the YANG > >>language. > >>The WG needs to decide if the ephemeral property should be specific to > >>an I2RS YANG module or should be basic property of the YANG data modeling > >>language. YANG keywords must be supported and they do not need > >>to be imported from a YANG module to be used. > > > >Or it is a common extension (that is the extension is not I2RS > >specific but instead for everything that wants to use ephemeral > >datastores). > > > >Anyway, if the main purpose is to define a conformance level, it may > >be worth thinking about adding a conformance mechanism that decouples > >conformance requirements from the data model definition. > > > >/js > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Sun Oct 11 13:28:56 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CCE91A911D; Sun, 11 Oct 2015 13:28:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.002 X-Spam-Level: X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_64=0.6, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s23etlKuyDLq; Sun, 11 Oct 2015 13:28:52 -0700 (PDT) Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACD8D1A911A; Sun, 11 Oct 2015 13:28:52 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 9BFDB241048; Sun, 11 Oct 2015 13:28:52 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 0AF94240681; Sun, 11 Oct 2015 13:28:51 -0700 (PDT) To: Andy Bierman , Susan Hares , "i2rs@ietf.org" , i2rs-proto-dt@ietf.org References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> <20151011202410.GA62276@elstar.local> From: "Joel M. Halpern" Message-ID: <561AC682.4000607@joelhalpern.com> Date: Sun, 11 Oct 2015 16:28:50 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <20151011202410.GA62276@elstar.local> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 11 Oct 2015 20:28:54 -0000 While there will be new information that needs new models, some of the things to be manipulated in an ephemeral fashion by I2RS are already in existing models. I have heard proposals to use some version of overlapping or related models, and I do not know what can be made to work. Yours, Joel On 10/11/15 4:24 PM, Juergen Schoenwaelder wrote: > Joel, > > do you expect that special models will be written for I2RS or do you > expect that generic routing configuration models will do the job? > > /js > > On Sun, Oct 11, 2015 at 04:11:11PM -0400, Joel M. Halpern wrote: >> I would phrase the marking need slightly differently. >> Given that it would seem onerous to expect all I2RS-supporting devices >> to support ephemeral behavior for all parts of all models, we need some >> way to clearly indicate what is expected. >> >> Trying to do it as separate models seems difficult. >> >> Marking elements in the model as ephemeral seems the clearest and most >> efficient mechanism, but I am sure there are other alternatives. >> >> Yours, >> Joel >> >> On 10/11/15 3:58 PM, Juergen Schoenwaelder wrote: >>> On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: >>>> On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < >>>> j.schoenwaelder@jacobs-university.de> wrote: >>>> >>>>> On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: >>>>>> On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < >>>>>> j.schoenwaelder@jacobs-university.de> wrote: >>>>>> >>>>>>> On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: >>>>>>>> The 10/7/2015 interim discussed the ephemeral portion of the protocol >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> 1) Ephemeral state is not unique to zI2RS >>>>>>>> >>>>>>>> 2) The ephemeral datastore is a datastore holds >>>>>>>> >>>>>>>> configuration that is intended to not survive a reboot. >>>>>>>> >>>>>>> >>>>>>> Configuration as YANG config true or a subset thereof? >>>>>>> >>>>>> >>>>>> >>>>>> config=true nodes only. >>>>> >>>>> good >>>>> >>>>>> Some way is needed to specify I2RS conformance for >>>>>> a given YANG module, unless every persistent config leaf >>>>>> is expected to also be supported as ephemeral data. >>>>>> >>>>>> If not, a YANG "ephemeral-stmt" is probably needed, since >>>>>> config=true is insufficient to support I2RS conformance. >>>>> >>>>> One question is whether this needs to be inline in the data model or >>>>> not. If conformance is the goal, then you know what having things >>>>> defined inline has limits. If we would address conformance in more >>>>> general terms, perhaps I2RS conformance falls out as a special case. >>>>> >>>>>> One ephemeral datastore. >>>>>> No client panes. That was to support caching, but >>>>>> the architecture forbids caching, so that was taken out. >>>>>> >>>>>> One ephemeral pane that overrides the running datastore >>>>> >>>>> good >>>>> >>>>>>> Identities? I assume you mean schema nodes, do you? Adding by >>>>>>> defining an YANG extension such as i2rs:ephemeral true? How does such >>>>>>> an i2rs:ephemeral true interplay with config true/false? What about >>>>>>> contexts for must/when expressions? Or is the idea to settle on >>>>>>> RESTCONF and to work with YANG patch? >>>>>>> >>>>>> >>>>>> I think a real keyword is needed not an extension. >>>>>> Otherwise YANG groupings cannot be utilized w/ statements >>>>>> that are refined in the uses-stmt to set the ephemeral flag. >>>>> >>>>> I fail to understand the groupings argument. >>>>> >>>> >>>> >>>> The refine-stmt is defined to work on YANG statements, not external >>>> statements. >>> >>> RFC 6020bis says in section 7.13.2.: >>> >>> o Any node can get refined extensions, if the extension allows >>> refinement. See Section 7.19 for details. >>> >>>> A YANG extension is (by definition) something external to the YANG >>>> language. >>>> The WG needs to decide if the ephemeral property should be specific to >>>> an I2RS YANG module or should be basic property of the YANG data modeling >>>> language. YANG keywords must be supported and they do not need >>>> to be imported from a YANG module to be used. >>> >>> Or it is a common extension (that is the extension is not I2RS >>> specific but instead for everything that wants to use ephemeral >>> datastores). >>> >>> Anyway, if the main purpose is to define a conformance level, it may >>> be worth thinking about adding a conformance mechanism that decouples >>> conformance requirements from the data model definition. >>> >>> /js >>> >> >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs > From nobody Sun Oct 11 23:55:30 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 479CF1A1AB6; Sun, 11 Oct 2015 23:55:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a5EM1_J-v5Fv; Sun, 11 Oct 2015 23:55:27 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0867D1A1AB8; Sun, 11 Oct 2015 23:55:26 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Juergen Schoenwaelder'" References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> In-Reply-To: <20151011161106.GA61856@elstar.local> Date: Mon, 12 Oct 2015 02:55:12 -0400 Message-ID: <00b901d104ba$f3570690$da0513b0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHHBWI2YK0cgP6O7aghYGNeB+dLGgIYY1VbnmqnxNA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: i2rs@ietf.org, i2rs-proto-dt@ietf.org Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 06:55:28 -0000 Juergen: >Identities? I assume you mean schema nodes, do you? Adding by defining an YANG extension such as i2rs:ephemeral true? >How does such an i2rs:ephemeral true interplay with config true/false? What about contexts for must/when expressions? Or >is the idea to settle on RESTCONF and to work with YANG patch? Yes - I should have said schema nodes. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Sunday, October 11, 2015 12:11 PM To: Susan Hares Cc: i2rs@ietf.org; i2rs-proto-dt@ietf.org Subject: Re: [i2rs] inteirm 10/7/20 On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > The 10/7/2015 interim discussed the ephemeral portion of the protocol > > > > 1) Ephemeral state is not unique to zI2RS > > 2) The ephemeral datastore is a datastore holds > > configuration that is intended to not survive a reboot. > Configuration as YANG config true or a subset thereof? > 3) The ephemeral datastore is never locked. > > 4) I2RS is using a 2 panes of glass mechanisms > > Pane 1: normal configuration > > Pane 2: ephemeral state > > > > The I2RS agent and configuration software on > > the node must handle this complexity. So is there one ephemeral datastore or are there multiple? Some slides say one per client, others seem to indicate one for all clients. > > 5) The key word "ephemeral" can be used to identify > > Identities which are ephemeral in data models. > > Does anyone have any concerns with adding this to Yang? Identities? I assume you mean schema nodes, do you? Adding by defining an YANG extension such as i2rs:ephemeral true? How does such an i2rs:ephemeral true interplay with config true/false? What about contexts for must/when expressions? Or is the idea to settle on RESTCONF and to work with YANG patch? /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 12 00:18:24 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE9CF1A1A9B; Mon, 12 Oct 2015 00:18:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -98.455 X-Spam-Level: X-Spam-Status: No, score=-98.455 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, J_CHICKENPOX_64=0.6, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cIt9M_fFPAvB; Mon, 12 Oct 2015 00:18:20 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 766F81A0035; Mon, 12 Oct 2015 00:18:20 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Juergen Schoenwaelder'" , "'Andy Bierman'" References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> In-Reply-To: <20151011175123.GA62046@elstar.local> Date: Mon, 12 Oct 2015 03:18:10 -0400 Message-ID: <00ec01d104be$28222a00$78667e00$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHHBWI2YK0cgP6O7aghYGNeB+dLGgIYY1VbAUr8eV0C/3J64p5IWqjQ Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: i2rs@ietf.org, i2rs-proto-dt@ietf.org Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 07:18:22 -0000 Juergen: You make an excellent point on whether the WG should just select RESTCONF instead of both RESTCONF and NETCONF. I will start a discussion thread later today on this point. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Sunday, October 11, 2015 1:51 PM To: Andy Bierman Cc: i2rs@ietf.org; i2rs-proto-dt@ietf.org; Susan Hares Subject: Re: [i2rs] inteirm 10/7/20 On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > j.schoenwaelder@jacobs-university.de> wrote: > > > On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > > > The 10/7/2015 interim discussed the ephemeral portion of the > > > protocol > > > > > > > > > > > > 1) Ephemeral state is not unique to zI2RS > > > > > > 2) The ephemeral datastore is a datastore holds > > > > > > configuration that is intended to not survive a reboot. > > > > > > > Configuration as YANG config true or a subset thereof? > > > > > config=true nodes only. good > Some way is needed to specify I2RS conformance for a given YANG > module, unless every persistent config leaf is expected to also be > supported as ephemeral data. > > If not, a YANG "ephemeral-stmt" is probably needed, since config=true > is insufficient to support I2RS conformance. One question is whether this needs to be inline in the data model or not. If conformance is the goal, then you know what having things defined inline has limits. If we would address conformance in more general terms, perhaps I2RS conformance falls out as a special case. > One ephemeral datastore. > No client panes. That was to support caching, but the architecture > forbids caching, so that was taken out. > > One ephemeral pane that overrides the running datastore good > > Identities? I assume you mean schema nodes, do you? Adding by > > defining an YANG extension such as i2rs:ephemeral true? How does > > such an i2rs:ephemeral true interplay with config true/false? What > > about contexts for must/when expressions? Or is the idea to settle > > on RESTCONF and to work with YANG patch? > > > > I think a real keyword is needed not an extension. > Otherwise YANG groupings cannot be utilized w/ statements that are > refined in the uses-stmt to set the ephemeral flag. I fail to understand the groupings argument. > NETCONF has no edit ordering or ability to return a partial error. IMO > only RESTCONF is needed. Proposals to improve NETCONF editing to > support YANG Patch have already been made, and the WG had higher > priorities. > I don't see why 2 protocols are needed instead of 1. Perhaps the WG should discuss and decide. If all the WG wants is RESTCONF, then we can simplify the discussion. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 12 00:45:24 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF9C41A21B3; Mon, 12 Oct 2015 00:45:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ASKktrbp27B4; Mon, 12 Oct 2015 00:45:22 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9E4B1A21AE; Mon, 12 Oct 2015 00:45:21 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Juergen Schoenwaelder'" , "'Joel M. Halpern'" References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> <20151011202410.GA62276@elstar.local> In-Reply-To: <20151011202410.GA62276@elstar.local> Date: Mon, 12 Oct 2015 03:45:10 -0400 Message-ID: <00fa01d104c1$eca3ebe0$c5ebc3a0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHHBWI2YK0cgP6O7aghYGNeB+dLGgIYY1VbAUr8eV0C/3J64gI3r/8BAS74WKMBWsO9kgKOn5JJng3hlsA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: i2rs@ietf.org, i2rs-proto-dt@ietf.org, 'Andy Bierman' Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 07:45:23 -0000 Juergen: The data models will be different for I2RS. I2RS has protocol independent Data models which are different that the general data models (I2RS RIB, I2RS topology models, and I2RS FB-RIB). The I2RS protocol modules discuss for BGP are different than BGP general yang modules. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Sunday, October 11, 2015 4:24 PM To: Joel M. Halpern Cc: i2rs@ietf.org; i2rs-proto-dt@ietf.org; Andy Bierman; Susan Hares Subject: Re: [i2rs] inteirm 10/7/20 Joel, do you expect that special models will be written for I2RS or do you expect that generic routing configuration models will do the job? /js On Sun, Oct 11, 2015 at 04:11:11PM -0400, Joel M. Halpern wrote: > I would phrase the marking need slightly differently. > Given that it would seem onerous to expect all I2RS-supporting devices > to support ephemeral behavior for all parts of all models, we need > some way to clearly indicate what is expected. > > Trying to do it as separate models seems difficult. > > Marking elements in the model as ephemeral seems the clearest and most > efficient mechanism, but I am sure there are other alternatives. > > Yours, > Joel > > On 10/11/15 3:58 PM, Juergen Schoenwaelder wrote: > >On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: > >>On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < > >>j.schoenwaelder@jacobs-university.de> wrote: > >> > >>>On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: > >>>>On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < > >>>>j.schoenwaelder@jacobs-university.de> wrote: > >>>> > >>>>>On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: > >>>>>>The 10/7/2015 interim discussed the ephemeral portion of the > >>>>>>protocol > >>>>>> > >>>>>> > >>>>>> > >>>>>>1) Ephemeral state is not unique to zI2RS > >>>>>> > >>>>>>2) The ephemeral datastore is a datastore holds > >>>>>> > >>>>>>configuration that is intended to not survive a reboot. > >>>>>> > >>>>> > >>>>>Configuration as YANG config true or a subset thereof? > >>>>> > >>>> > >>>> > >>>>config=true nodes only. > >>> > >>>good > >>> > >>>>Some way is needed to specify I2RS conformance for a given YANG > >>>>module, unless every persistent config leaf is expected to also be > >>>>supported as ephemeral data. > >>>> > >>>>If not, a YANG "ephemeral-stmt" is probably needed, since > >>>>config=true is insufficient to support I2RS conformance. > >>> > >>>One question is whether this needs to be inline in the data model > >>>or not. If conformance is the goal, then you know what having > >>>things defined inline has limits. If we would address conformance > >>>in more general terms, perhaps I2RS conformance falls out as a special case. > >>> > >>>>One ephemeral datastore. > >>>>No client panes. That was to support caching, but the > >>>>architecture forbids caching, so that was taken out. > >>>> > >>>>One ephemeral pane that overrides the running datastore > >>> > >>>good > >>> > >>>>>Identities? I assume you mean schema nodes, do you? Adding by > >>>>>defining an YANG extension such as i2rs:ephemeral true? How does > >>>>>such an i2rs:ephemeral true interplay with config true/false? > >>>>>What about contexts for must/when expressions? Or is the idea to > >>>>>settle on RESTCONF and to work with YANG patch? > >>>>> > >>>> > >>>>I think a real keyword is needed not an extension. > >>>>Otherwise YANG groupings cannot be utilized w/ statements that are > >>>>refined in the uses-stmt to set the ephemeral flag. > >>> > >>>I fail to understand the groupings argument. > >>> > >> > >> > >>The refine-stmt is defined to work on YANG statements, not external > >>statements. > > > >RFC 6020bis says in section 7.13.2.: > > > > o Any node can get refined extensions, if the extension allows > > refinement. See Section 7.19 for details. > > > >>A YANG extension is (by definition) something external to the YANG > >>language. > >>The WG needs to decide if the ephemeral property should be specific > >>to an I2RS YANG module or should be basic property of the YANG data > >>modeling language. YANG keywords must be supported and they do not > >>need to be imported from a YANG module to be used. > > > >Or it is a common extension (that is the extension is not I2RS > >specific but instead for everything that wants to use ephemeral > >datastores). > > > >Anyway, if the main purpose is to define a conformance level, it may > >be worth thinking about adding a conformance mechanism that decouples > >conformance requirements from the data model definition. > > > >/js > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 12 00:46:22 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A44E1A21B7; Mon, 12 Oct 2015 00:46:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -98.455 X-Spam-Level: X-Spam-Status: No, score=-98.455 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, J_CHICKENPOX_64=0.6, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dXKE57DNkbId; Mon, 12 Oct 2015 00:46:20 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 67F631A21B3; Mon, 12 Oct 2015 00:46:20 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Joel M. Halpern'" , "'Andy Bierman'" , , References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> <20151011202410.GA62276@elstar.local> <561AC682.4000607@joelhalpern.com> In-Reply-To: <561AC682.4000607@joelhalpern.com> Date: Mon, 12 Oct 2015 03:46:16 -0400 Message-ID: <00fc01d104c2$1393b9b0$3abb2d10$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHHBWI2YK0cgP6O7aghYGNeB+dLGgIYY1VbAUr8eV0C/3J64gI3r/8BAS74WKMBWsO9kgKOn5JJAsz+SjGd93pGMA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 07:46:22 -0000 Joel: The I2RS models for BGP utilize the BGP yang module definitions, but these models are not the same. I would agree with you that the I2RS models are unique. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern Sent: Sunday, October 11, 2015 4:29 PM To: Andy Bierman; Susan Hares; i2rs@ietf.org; i2rs-proto-dt@ietf.org Subject: Re: [i2rs] inteirm 10/7/20 While there will be new information that needs new models, some of the things to be manipulated in an ephemeral fashion by I2RS are already in existing models. I have heard proposals to use some version of overlapping or related models, and I do not know what can be made to work. Yours, Joel On 10/11/15 4:24 PM, Juergen Schoenwaelder wrote: > Joel, > > do you expect that special models will be written for I2RS or do you > expect that generic routing configuration models will do the job? > > /js > > On Sun, Oct 11, 2015 at 04:11:11PM -0400, Joel M. Halpern wrote: >> I would phrase the marking need slightly differently. >> Given that it would seem onerous to expect all I2RS-supporting >> devices to support ephemeral behavior for all parts of all models, we >> need some way to clearly indicate what is expected. >> >> Trying to do it as separate models seems difficult. >> >> Marking elements in the model as ephemeral seems the clearest and >> most efficient mechanism, but I am sure there are other alternatives. >> >> Yours, >> Joel >> >> On 10/11/15 3:58 PM, Juergen Schoenwaelder wrote: >>> On Sun, Oct 11, 2015 at 11:10:16AM -0700, Andy Bierman wrote: >>>> On Sun, Oct 11, 2015 at 10:51 AM, Juergen Schoenwaelder < >>>> j.schoenwaelder@jacobs-university.de> wrote: >>>> >>>>> On Sun, Oct 11, 2015 at 09:55:31AM -0700, Andy Bierman wrote: >>>>>> On Sun, Oct 11, 2015 at 9:11 AM, Juergen Schoenwaelder < >>>>>> j.schoenwaelder@jacobs-university.de> wrote: >>>>>> >>>>>>> On Fri, Oct 09, 2015 at 04:13:03PM -0400, Susan Hares wrote: >>>>>>>> The 10/7/2015 interim discussed the ephemeral portion of the >>>>>>>> protocol >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> 1) Ephemeral state is not unique to zI2RS >>>>>>>> >>>>>>>> 2) The ephemeral datastore is a datastore holds >>>>>>>> >>>>>>>> configuration that is intended to not survive a reboot. >>>>>>>> >>>>>>> >>>>>>> Configuration as YANG config true or a subset thereof? >>>>>>> >>>>>> >>>>>> >>>>>> config=true nodes only. >>>>> >>>>> good >>>>> >>>>>> Some way is needed to specify I2RS conformance for a given YANG >>>>>> module, unless every persistent config leaf is expected to also >>>>>> be supported as ephemeral data. >>>>>> >>>>>> If not, a YANG "ephemeral-stmt" is probably needed, since >>>>>> config=true is insufficient to support I2RS conformance. >>>>> >>>>> One question is whether this needs to be inline in the data model >>>>> or not. If conformance is the goal, then you know what having >>>>> things defined inline has limits. If we would address conformance >>>>> in more general terms, perhaps I2RS conformance falls out as a special case. >>>>> >>>>>> One ephemeral datastore. >>>>>> No client panes. That was to support caching, but the >>>>>> architecture forbids caching, so that was taken out. >>>>>> >>>>>> One ephemeral pane that overrides the running datastore >>>>> >>>>> good >>>>> >>>>>>> Identities? I assume you mean schema nodes, do you? Adding by >>>>>>> defining an YANG extension such as i2rs:ephemeral true? How does >>>>>>> such an i2rs:ephemeral true interplay with config true/false? >>>>>>> What about contexts for must/when expressions? Or is the idea to >>>>>>> settle on RESTCONF and to work with YANG patch? >>>>>>> >>>>>> >>>>>> I think a real keyword is needed not an extension. >>>>>> Otherwise YANG groupings cannot be utilized w/ statements that >>>>>> are refined in the uses-stmt to set the ephemeral flag. >>>>> >>>>> I fail to understand the groupings argument. >>>>> >>>> >>>> >>>> The refine-stmt is defined to work on YANG statements, not external >>>> statements. >>> >>> RFC 6020bis says in section 7.13.2.: >>> >>> o Any node can get refined extensions, if the extension allows >>> refinement. See Section 7.19 for details. >>> >>>> A YANG extension is (by definition) something external to the YANG >>>> language. >>>> The WG needs to decide if the ephemeral property should be specific >>>> to an I2RS YANG module or should be basic property of the YANG data >>>> modeling language. YANG keywords must be supported and they do not >>>> need to be imported from a YANG module to be used. >>> >>> Or it is a common extension (that is the extension is not I2RS >>> specific but instead for everything that wants to use ephemeral >>> datastores). >>> >>> Anyway, if the main purpose is to define a conformance level, it may >>> be worth thinking about adding a conformance mechanism that >>> decouples conformance requirements from the data model definition. >>> >>> /js >>> >> >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 12 00:49:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 768511A6F22; Mon, 12 Oct 2015 00:49:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xeOStRFHeRul; Mon, 12 Oct 2015 00:49:15 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 86E151A6EDA; Mon, 12 Oct 2015 00:49:15 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 0ABBDFB7; Mon, 12 Oct 2015 09:49:14 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id Pn9Kuo_fYAN9; Mon, 12 Oct 2015 09:49:13 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 12 Oct 2015 09:49:13 +0200 (CEST) Received: from localhost (demetrius1.jacobs-university.de [212.201.44.46]) by hermes.jacobs-university.de (Postfix) with ESMTP id 3ADB220054; Mon, 12 Oct 2015 09:49:13 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius1.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id UrDlfBDshbcM; Mon, 12 Oct 2015 09:49:12 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 354D220057; Mon, 12 Oct 2015 09:49:12 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 360FF37B10C0; Mon, 12 Oct 2015 09:49:12 +0200 (CEST) Date: Mon, 12 Oct 2015 09:49:12 +0200 From: Juergen Schoenwaelder To: Susan Hares Message-ID: <20151012074912.GB63194@elstar.local> Mail-Followup-To: Susan Hares , "'Joel M. Halpern'" , i2rs@ietf.org, i2rs-proto-dt@ietf.org, 'Andy Bierman' References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> <20151011202410.GA62276@elstar.local> <00fa01d104c1$eca3ebe0$c5ebc3a0$@ndzh.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <00fa01d104c1$eca3ebe0$c5ebc3a0$@ndzh.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: i2rs@ietf.org, "'Joel M. Halpern'" , i2rs-proto-dt@ietf.org, 'Andy Bierman' Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 07:49:17 -0000 On Mon, Oct 12, 2015 at 03:45:10AM -0400, Susan Hares wrote: > Juergen: > > The data models will be different for I2RS. > > I2RS has protocol independent Data models which are different that the > general data models (I2RS RIB, I2RS topology models, and I2RS FB-RIB). The > I2RS protocol modules discuss for BGP are different than BGP general yang > modules. > My parser throws an except here... /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 12 00:59:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63D981A8752; Mon, 12 Oct 2015 00:58:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.661 X-Spam-Level: X-Spam-Status: No, score=-0.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, T_RP_MATCHES_RCVD=-0.01] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id omycmSfUcJoF; Mon, 12 Oct 2015 00:58:55 -0700 (PDT) Received: from mail.nic.cz (mail.nic.cz [IPv6:2001:1488:800:400::400]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65A231A8739; Mon, 12 Oct 2015 00:58:55 -0700 (PDT) Received: from birdie.labs.nic.cz (unknown [195.113.220.110]) by mail.nic.cz (Postfix) with ESMTPSA id E4F8F1818DB; Mon, 12 Oct 2015 09:58:53 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nic.cz; s=default; t=1444636733; bh=GDH/li0X0ohFuJUpdBPmMRYiJ//bhKiwDT5WN0j4BYA=; h=From:Date:To; b=aVYJiDu9OcEJo//IrVcNEDBPmnFbgQllSeRlRfoLMvyu1xuHsLgL0f3EkGvRofo+e eiNnS2z1c2qKJqdVmS+3nbKWKmhZLalRqmhcIJFsDW6suI+Gdi2x6XekI8+ioXUV5d tRbaUPwr+AP0hJ920ojnGnbOfN8pm2DCmyZIBuCk= Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Ladislav Lhotka In-Reply-To: Date: Mon, 12 Oct 2015 09:58:54 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: <661ACA66-0E88-4574-864C-23DFFC8F670A@nic.cz> References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> To: sarikaya@ieee.org X-Mailer: Apple Mail (2.3094) X-Virus-Scanned: clamav-milter 0.98.7 at mail X-Virus-Status: Clean Archived-At: Cc: "i2rs@ietf.org" , "Acee Lindem \(acee\)" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 07:58:57 -0000 > On 09 Oct 2015, at 22:16, Behcet Sarikaya = wrote: >=20 > On Fri, Oct 9, 2015 at 8:39 AM, Ladislav Lhotka wrote: >>=20 >>> On 09 Oct 2015, at 15:00, Acee Lindem (acee) wrote: >>>=20 >>> Hi Lada, >>> I2RS is not chartered to do the base models. There are other routing >>> models that reference routing-cfg and even in-progress = implementations. >>=20 >> Of course, I am aware of them. However, assuming that changes = resulting from I2RS operation will be available for inspection as state = data to NETCONF/RESTCONF clients, and vice versa, it's important that = the those routing data models and I2RS data models remain compatible and = coordinated. >>=20 >> A data model for RIBs should IMO be developed simultaneously for both = purposes, and common parts implemented as groupings so as to be reusable = without copying-and-pasting. >>=20 >>>=20 >>> On 10/9/15, 4:13 AM, "netmod on behalf of Ladislav Lhotka" >>> wrote: >>>=20 >>>> Hi, >>>>=20 >>>> I am sorry for cross-posting but I think it is high time to decide = the >>>> relationship between the data models in i2rs-rib-data-model and >>>> netmod-routing-cfg I-Ds because they clearly target the same = management >>>> data in a router. I can see three possible scenarios: >>>>=20 >>>> 1. The i2rs-rib module will be modified to augment >>>> ietf-routing/ietf-ipv[46]-unicast-routing. >>>=20 >>> This would seem to be the obvious choice. >>=20 >> I agree, and so far it can be done quite easily. >>=20 >>>=20 >>>>=20 >>>> 2. The scope of ietf-routing will be changed so that it would = address >>>> only host routing and simple routers. The modelling work for = advanced >>>> routers will be done elsewhere. >>>>=20 >>>> 3. The work on netmod-routing-cfg will be stopped. >>>=20 >>> A fourth option would be for me to take over ownership, move the = work to >>> the RTG WG, and we=E2=80=99d recruit some strong authors/reviewers = from operators >>> and other vendors (involving the ADs in selection). >>=20 >=20 > You mean i2rs-rib-data-model? We are talking about a bigger picture, and i2rs-rib-data-model is a part = of it. Lada >=20 > Regards, >=20 > Behcet >> Yes, that's what I meant. >>=20 >> Thanks, Lada >>=20 >>>=20 >>> Thanks, >>> Acee >>>=20 >>>=20 >>>>=20 >>>> Opinions? >>>>=20 >>>> Thanks, Lada >>>>=20 >>>> -- >>>> Ladislav Lhotka, CZ.NIC Labs >>>> PGP Key ID: E74E8C0C >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> _______________________________________________ >>>> netmod mailing list >>>> netmod@ietf.org >>>> https://www.ietf.org/mailman/listinfo/netmod >>>=20 >>=20 >> -- >> Ladislav Lhotka, CZ.NIC Labs >> PGP Key ID: E74E8C0C >>=20 >>=20 >>=20 >>=20 >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs -- Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C From nobody Mon Oct 12 01:43:02 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0BC81A88C4; Mon, 12 Oct 2015 01:43:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9a0T_YDNltra; Mon, 12 Oct 2015 01:42:59 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DD5B1A88C2; Mon, 12 Oct 2015 01:42:59 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Juergen Schoenwaelder'" References: <05c801d102ce$eb398930$c1ac9b90$@ndzh.com> <20151011161106.GA61856@elstar.local> <20151011175123.GA62046@elstar.local> <20151011195818.GA62201@elstar.local> <561AC25F.7050407@joelhalpern.com> <20151011202410.GA62276@elstar.local> <00fa01d104c1$eca3ebe0$c5ebc3a0$@ndzh.com> <20151012074912.GB63194@elstar.local> In-Reply-To: <20151012074912.GB63194@elstar.local> Date: Mon, 12 Oct 2015 04:42:50 -0400 Message-ID: <010d01d104c9$fa847f60$ef8d7e20$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHHBWI2YK0cgP6O7aghYGNeB+dLGgIYY1VbAUr8eV0C/3J64gI3r/8BAS74WKMBWsO9kgKOn5JJAjfh/sACKWww8p3q5j+w Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: i2rs@ietf.org, "'Joel M. Halpern'" , i2rs-proto-dt@ietf.org, 'Andy Bierman' Subject: Re: [i2rs] inteirm 10/7/20 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 12 Oct 2015 08:43:00 -0000 Juergen: My apologies. Reparsing. By experience, the data models seem to be different. The I2RS has protocol independent data modules which are different that the routing data modules (I2RS RIB, I2RS topology models, and I2RS FB-RIB). As I've worked on I2RS BGP modules, these BGP modules also appear to require different data than the general BGP yang modules even though the I2RS BGP modules want to use groupings from standard BGP yang modules. These i2RS BGP modules need to be reviewed by Yang experts. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder Sent: Monday, October 12, 2015 3:49 AM To: Susan Hares Cc: i2rs@ietf.org; 'Joel M. Halpern'; i2rs-proto-dt@ietf.org; 'Andy Bierman' Subject: Re: [i2rs] inteirm 10/7/20 On Mon, Oct 12, 2015 at 03:45:10AM -0400, Susan Hares wrote: > Juergen: > > The data models will be different for I2RS. > > I2RS has protocol independent Data models which are different that the > general data models (I2RS RIB, I2RS topology models, and I2RS FB-RIB). > The I2RS protocol modules discuss for BGP are different than BGP > general yang modules. > My parser throws an except here... /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 12 20:15:39 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 536DA1B2F80; Mon, 12 Oct 2015 20:15:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.75 X-Spam-Level: X-Spam-Status: No, score=-0.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_BACKHAIR_42=1, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mkR4zeacvhTm; Mon, 12 Oct 2015 20:15:27 -0700 (PDT) Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 852221B2F7C; Mon, 12 Oct 2015 20:15:27 -0700 (PDT) X-AuditID: c618062d-f79ef6d000007f54-87-561c172458af Received: from EUSAAHC007.ericsson.se (Unknown_Domain [147.117.188.93]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id E3.AF.32596.4271C165; Mon, 12 Oct 2015 22:25:09 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC007.ericsson.se ([147.117.188.93]) with mapi id 14.03.0248.002; Mon, 12 Oct 2015 23:15:25 -0400 From: Xufeng Liu To: "Alexander Clemm (alex)" , "Zhangxian (Xian)" , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQFbBFrAAAxNSnAAKpvNMACgWUQQ Date: Tue, 13 Oct 2015 03:15:24 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.10] Content-Type: multipart/alternative; boundary="_000_AAB1CC9C17CBA440BDFA169056B93B9E127C0865eusaamb107erics_" MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrBIsWRmVeSWpSXmKPExsUyuXRPrK6quEyYwfzZPBafHl5itph/8jCT xboZH1gs9h98y2rx580rFovWHztYLBZv62RxYPeY8nsjq8fOWXfZPVqOvGX1WLLkJ5PH7NfX WT0u925lDWCL4rJJSc3JLEst0rdL4Mq4tsK/4NxXxooTH06yNTDOe8TYxcjJISFgIvHmRR8T hC0mceHeerYuRi4OIYGjjBJzXt9jhHCWM0pse7WJuYuRg4NNQEvi8lNHkLiIwFxGiYct98Am MQskSFy8fpQVxBYWMJd4f/cJM4gtImAhcfPLSlYI203iaucHMJtFQFXizKxNbCA2r4CvxL0f P1kglnUySXT/bARr5gRKvH3YBWYzAp33/dQaJohl4hK3nsyHOltAYsme88wQtqjEy8f/WCFs JYlJS8+xQtTnSxxZtIcRYpmgxMmZT1gmMIrOQjJqFpKyWUjKIOJaEvMafkPVKEpM6X7IDmFr SlyZfAjK1pZYtvA18wJG9lWMHKXFqWW56UYGmxiBUXtMgk13B+Oel5aHGAU4GJV4eBOypcKE WBPLiitzDzFKc7AoifPuX3I/VEggPbEkNTs1tSC1KL6oNCe1+BAjEwenVAPjAnfvxVUcK9Wv dRvYMnKF9m1hsb963IjP8SHrq05BDpNJvlNb513OvTJRdJ/VNH6mxTV8V6MzJH5P/PJdbRbD s3P+KlpphUt3RV46H/+urSdPlmdzfyyb6d6djeIav77+eX2db0p0vnzapzsipZ+lFPLnxbmr RTRutA2b8+MJk8BHDaf6S8FKLMUZiYZazEXFiQAtTI+tuwIAAA== Archived-At: Cc: 'Jeffrey Haas' , TEAS WG , 'Alia Atlas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 03:15:36 -0000 --_000_AAB1CC9C17CBA440BDFA169056B93B9E127C0865eusaamb107erics_ Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: base64 SGkgWGlhbiwNCg0KUmVzcG9uZGluZyBvbiBpdGVtIDYgaW5saW5lIGJlbG93Lg0KVGhhbmtzLA0K DQotIFh1ZmVuZw0KDQpGcm9tOiBBbGV4YW5kZXIgQ2xlbW0gKGFsZXgpIFttYWlsdG86YWxleEBj aXNjby5jb21dDQpTZW50OiBGcmlkYXksIE9jdG9iZXIgMDksIDIwMTUgODoyMSBQTQ0KVG86IFpo YW5neGlhbiAoWGlhbik7IFh1ZmVuZyBMaXU7IFN1c2FuIEhhcmVzOyBpMnJzQGlldGYub3JnDQpD YzogJ0plZmZyZXkgSGFhcyc7IFRFQVMgV0c7ICdBbGlhIEF0bGFzJw0KU3ViamVjdDogUkU6IFtp MnJzXSBXRyBMQyBmb3IgVG9wb2xvZ3kgKDEwLzEgdG8gMTAvMTQpDQoNCkhpIFhpYW4sDQoNCnJl c3BvbnNlcyBpbmxpbmUsIDxBTEVYPg0KDQpUaGFua3MNCi0tLSBBbGV4DQoNCkZyb206IGkycnMg W21haWx0bzppMnJzLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBaaGFuZ3hpYW4gKFhp YW4pDQpTZW50OiBUaHVyc2RheSwgT2N0b2JlciAwOCwgMjAxNSA3OjIwIFBNDQpUbzogWHVmZW5n IExpdSA8eHVmZW5nLmxpdUBlcmljc3Nvbi5jb208bWFpbHRvOnh1ZmVuZy5saXVAZXJpY3Nzb24u Y29tPj47IFN1c2FuIEhhcmVzIDxzaGFyZXNAbmR6aC5jb208bWFpbHRvOnNoYXJlc0BuZHpoLmNv bT4+OyBpMnJzQGlldGYub3JnPG1haWx0bzppMnJzQGlldGYub3JnPg0KQ2M6ICdKZWZmcmV5IEhh YXMnIDxqaGFhc0BwZnJjLm9yZzxtYWlsdG86amhhYXNAcGZyYy5vcmc+PjsgVEVBUyBXRyA8dGVh c0BpZXRmLm9yZzxtYWlsdG86dGVhc0BpZXRmLm9yZz4+OyAnQWxpYSBBdGxhcycgPGFrYXRsYXNA Z21haWwuY29tPG1haWx0bzpha2F0bGFzQGdtYWlsLmNvbT4+DQpTdWJqZWN0OiBSZTogW2kycnNd IFdHIExDIGZvciBUb3BvbG9neSAoMTAvMSB0byAxMC8xNCkNCg0KSGksIFh1ZmVuZywgQWxleCwN Cg0KVGhhbmsgeW91IGZvciB0YWtpbmcgdGhlIGVmZm9ydCB0byB3b3JrIHRvd2FyZCBnZXR0aW5n IGFsaWduZWQgYXMgZGlzY3Vzc2VkIGluIGxhc3QgbWVldGluZy4gICBJIGhhdmUgc29tZSBjb21t ZW50cyBvbiBzb21lIG9mIHRoZSBjb25jbHVzaW9ucy4NCg0KQ291bGQgeW91IHNoYXJlIGEgYml0 IG1vcmUgb24gcmVhc29ucyBiZWhpbmQgUG9pbnQgMyBjb25jbHVzaW9uPw0KDQo8QUxFWD4gVGhl IHJlYXNvbiBpcyB0aGF0IHRoZSBzY2hlZHVsZSBzdHVmZiwgd2hpbGUgZ2VuZXJpYyAvIG5vbi1z cGVjaWZpYyB0byBhbnkgc3BlY2lmaWMgdG9wb2xvZ3ksIGlzIG5vdCChsGNvbW1vbqGxLCBpLmUu IGRvZXMgbm90IGFwcGx5IHRvIGFsbCB0b3BvbG9naWVzLyBldmVyeSBpbnN0YW50aWF0aW9uIG9m IHRoZSBtb2RlbC4gIFRoZSBnb2FsIGlzIHRvIGhhdmUgaWV0Zi1uZXR3b3JrLXRvcG9sb2d5IHJl ZmVyIHRvIHRoZSBzdHVmZiB0aGF0IGlzIHRydWx5IGNvbW1vbi4NCjwvQUxFWD4NCg0KRm9yIHBv aW50cyA0IGFuZCA1LCBJIHRoaW5rIHRoZXkgYXJlIHJlbGF0ZWQuIE15IHVuZGVyc3RhbmRpbmcg aXMgdGhhdCBmb3IgaWV0Zi1uZXR3b3JrLCBpdCBkb2VzIG5vdCBmb2xsb3cgdGhlIG1ldGhvZCB0 YWtlbiBieSBZQU5HIG1vZHVsZXMgc3VjaCBhcyBpZXRmLWludGVyZmFjZSBhbmQgaWV0Zi10ZS10 b3BvbG9neSwgaW4gd2hpY2ggZWFjaCCoQ3J3IGxlYWYgd2lsbCBoYXZlIGEgY29ycmVzcG9uZGlu ZyCoQ3JvIGxlYWYuIEluc3RlYWQsIGl0IGNob29zZSB0byB1c2UgdGhlIKGwc2VydmVyLXByb3Zp ZGVkobEgYXR0cmlidXRlIHRvIHNheSB3aGV0aGVyIGFsbCB0aGUgbGVhZnMgaW4gdGhlIG1vZHVs ZSBpcyBjb25maWd1cmFibGUgb3Igc3RhdGUuIEkgYW0gbm90IHN1cmUgSSB1bmRlcnN0YW5kIHRo ZSBjb25jbHVzaW9uIG9mIHRoZXNlIHR3byBwb2ludHMuIERvIHlvdSBhZ3JlZSB0aGF0IGJvdGgg bWV0aG9kcyBhcmUgYWNjZXB0YWJsZT8NCg0KPEFMRVg+IFRoZXJlIGlzIG5vIG9wZXJhdGlvbmFs IGRhdGEgZGVmaW5lZC4gIFRoZSBzZXJ2ZXItcHJvdmlkZWQgYXR0cmlidXRlZCBndWlkZXMgd2hl dGhlciBuZXR3b3JrIHRvcG9sb2d5IGluZm9ybWF0aW9uIGlzIHBvcHVsYXRlZCBieSB0aGUgc2Vy dmVyIG9yIGJ5IHRoZSBjbGllbnQgYXBwbGljYXRpb24sIGJ1dCB0aGUgaW5mb3JtYXRpb24gaXMg dGhlIHNhbWUgqEMgdGhpcyBub3QgdGhlIGNvbmZpZyB2cyBvcGVyIGRhdGEgKHJlYWQ6IHN0YXRz KSBzZXBhcmF0aW9uLiAgVG8gYWRkIHN0YXRzLCB5b3Ugc2hvdWxkIHByb3ZpZGUgYW4gYWRkaXRp b25hbCBzdWJ0cmVlL2JyYW5jaCBhcyBhcHBsaWNhYmxlIHdoZW4geW91IGFyZSBhdWdtZW50aW5n Lg0KPC9BTEVYPg0KDQpPbmUgbGFzdCBjb21tZW50IG9uIHBvaW50IDY6IGlzIHRoaXMgZm9yIGZ1 dHVyZS1wcm9vZm5lc3Mgb3IgeW91IGhhdmUgYWxyZWFkeSBoYXZlIHNvbWUgYXR0cmlidXRlcyBp biBtaW5kIHRoYXQgY2FuIGFwcGx5IHRvIGFsbCBuZXR3b3Jrcz8NCg0KPEFMRVg+DQpJoa9sbCBs ZXQgWHVmZW5nIHJlc3BvbmQgdG8gdGhhdCBvbmUuICBXZSBkaWQgbm90IGhhdmUgYSB0b3AtbGV2 ZWwgY29udGFpbmVyIGJlY2F1c2UgaXQga2VlcHMgcGF0aHMgc2hvcnRlciAob25lIGxlc3MgbGV2 ZWwgaW4gdGhlIGhpZXJhcmNoeSkgYW5kIGJlY2F1c2UgaWYgeW91IHdhbnRlZCB0byBpbnNlcnQg c29tZXRoaW5nIGF0IHRoZSChsHRvcCBsZXZlbKGxLCB5b3UgY291bGQgYWx3YXlzIGRvIGl0IGlu IHBhcmFsbGVsLiAgSSBzdGlsbCB0aGluayB0aGlzIGlzIHRoZSBkZXNpZ24gdGhhdKGvcyBwcmVm ZXJhYmxlLg0KVGhhdCBzYWlkLCBoYXZpbmcgYSB0b3AtbGV2ZWwgY29udGFpbmVyIG1heSBub3Qg cmVhbGx5IGh1cnQuICBUaGVyZSB3ZXJlIGNvbmNlcm5zIHJlZ2FyZGluZyB0aGUgcmFtaWZpY2F0 aW9uIHRvIGV4aXN0aW5nIGltcGxlbWVudGF0aW9ucyBvZiB0aGUgbW9kZWwgKG5vdGFibHksIE9w ZW4gRGF5bGlnaHQpIGlmIHdlIHdlcmUgdG8gYWRkIGl0IGJ1dCBpdCBzZWVtcyB0aGUgZmFsbG91 dCB3b3VsZCBiZSBtYW5hZ2VhYmxlLg0KDQpUaGFua3MsIEFsZXggKGVuZCBvZiBteSBjb21tZW50 cykNCjwvQUxFWD4NCltYdWZlbmddIFRoaXMgaXMgZm9yIGJvdGggZnV0dXJlLXByb29mbmVzcyBh bmQgY3VycmVudCByZXF1aXJlbWVudC4gVG8gYWxsb3cgb3BlcmF0b3IgZWFzaWx5IGNvbmZpZ3Vy ZSBURSB0b3BvbG9neSBhdHRyaWJ1dGVzLCB3ZSBhcmUgZGVmaW5pbmcgdGVtcGxhdGVzIHRoYXQg Y2FuIGJlIGFwcGxpZWQgdG8gYWxsIG5ldHdvcmtzLg0KDQpUaGFuayB5b3UsDQpYaWFuDQoNCkZy b206IGkycnMgW21haWx0bzppMnJzLWJvdW5jZXNAaWV0Zi5vcmddIE9uIEJlaGFsZiBPZiBYdWZl bmcgTGl1DQpTZW50OiAyMDE1xOoxMNTCOcjVIDQ6MTUNClRvOiBTdXNhbiBIYXJlczsgaTJyc0Bp ZXRmLm9yZzxtYWlsdG86aTJyc0BpZXRmLm9yZz4NCkNjOiAnSmVmZnJleSBIYWFzJzsgJ0FsaWEg QXRsYXMnDQpTdWJqZWN0OiBSZTogW2kycnNdIFdHIExDIGZvciBUb3BvbG9neSAoMTAvMSB0byAx MC8xNCkNCg0KSGkgRm9sa3MsDQoNClRoZSBmb2xsb3dpbmcgaXMgYW4gdXBkYXRlIG9uIHRoZSBv bmdvaW5nIEkyUlM8PT5URSBUb3BvbG9neSBhbGlnbm1lbnQgZGlzY3Vzc2lvbiAoYmV0d2VlbiB0 aGUgYXV0aG9ycyBvZiB0aGUgVEUgVG9wb2xvZ3kgbW9kZWwgYW5kIEFsZXgpLg0KDQpUaGUgaXNz dWVzIC8gc29sdXRpb25zIHRoYXQgYXJlIGN1cnJlbnRseSBiZWluZyBkaXNjdXNzZWQgYXJlOg0K DQpJMlJTIEdlbmVyaWMgTmV0d29yayBUb3BvbG9neSBNb2RlbCAoZHJhZnQtaWV0Zi15YW5nLW5l dHdvcmstdG9wbyk6DQoNCjEuICAgICAgIFNvbWUgZ3JvdXBpbmdzIGluIGlldGYtbmV0d29yay55 YW5nIGFuZCBpZXRmLW5ldHdvcmstdG9wb2xvZ3kueWFuZyBjYW5ub3QgYmUgdXNlZCBpbiBhdWdt ZW50aW5nIG1vZHVsZSBiZWNhdXNlIG9mIG1pc3NpbmcgbmFtZSBzcGFjZXMsIHN1Y2ggYXMgobBw YXRoICIvbmV0d29yay9uZXR3b3JrLWlkIiBhdCBsaW5lIDQyIG9mIGlldGYtbmV0d29yay55YW5n Lg0KU29sdXRpb246IFByb3Bvc2VkIGZpeGVzIGhhdmUgYmVlbiBzZW50IHRvIEFsZXggdG8gdmVy aWZ5Lg0KDQoNCg0KMi4gICAgICAgobBsZWFmIG5ldHdvcmstcmVmobEgaW4gaWV0Zi1uZXR3b3Jr LXRvcG9sb2d5Lnlhbmc6MTY5LCAyMjAsIGlzIGNhdXNpbmcgcHlhbmcgdmFsaWRhdGlvbiBlcnJv cnMuDQpTb2x1dGlvbjogQWxleCB3aWxsIGNoZWNrIHRoZSBlcnJvcnMuDQoNCjMuICAgICAgIENh biB0aGUgZ3JvdXAgb2Ygc2NoZWR1bGUgYXR0cmlidXRlcyBiZSBtb3ZlZCBmcm9tIGlldGYtdGUt dG9wb2xvZ3kueWFuZyB0byBpZXRmLW5ldHdvcmstdG9wb2xvZ3kueWFuZz8NClNvbHV0aW9uOiBX ZSBhZ3JlZWQgdG8ga2VlcCB0aGVtIGluIGlldGYtdGUtdG9wb2xvZ3kueWFuZy4NCg0KNC4gICAg ICAgSG93IHRvIHN1cHBvcnQgc3RhdGUgYnJhbmNoIGluIGF1Z21lbnRpbmcgbW9kdWxlPw0KU29s dXRpb246IEtlZXAgYmFzZSBtb2RlbCBpZXRmLW5ldHdvcmstdG9wb2xvZ3kueWFuZyBhcyBpcy4g SW4gdGhlIGF1Z21lbnRpbmcgbW9kdWxlLCBmb3IgZWFjaCBlbnRpdHkgbGlrZSB0b3BvbG9neSwg bm9kZSBhbmQgbGluaywgY3JlYXRlIGEgY29uZmlnIGNvbnRhaW5lciBmb3IgY29uZmlndXJhdGlv biBhdHRyaWJ1dGVzIGFuZCBhIHN0YXRlIGNvbnRhaW5lciBmb3Igb3BlcmF0aW9uYWwgc3RhdGUg YXR0cmlidXRlcy4NCg0KNS4gICAgICAgU2hvdWxkIKGwc2VydmVyLXByb3ZpZGVkobEgZmxhZyBi ZSB1c2VkIHRvIGJsb2NrIHVzZXIgb3BlcmF0aW9uIG9uIHJlYWQtb25seSBlbnRpdGllcz8NClNv bHV0aW9uOiBLZWVwIGJhc2UgbW9kZWwgaWV0Zi1uZXR3b3JrLXRvcG9sb2d5LnlhbmcgYXMgaXMu IFRFIHRvcG9sb2d5IHdpbGwgdXNlIG90aGVyIG1lYW5zIHRvIGFjaGlldmUgc3VjaCBhIHB1cnBv c2UuDQoNCjYuICAgICAgIFNob3VsZCBJMlJTIEdlbmVyaWMgTmV0d29yayBUb3BvbG9neSBtb2Rl bCBoYXZlIGEgdG9wLWxldmVsIGNvbnRhaW5lcj8gVGhlIGJlbmVmaXQgb2YgZG9pbmcgc28gaXMg dG8gcHJvdmlkZSBhbiBhdWdtZW50YXRpb24gdGFyZ2V0IG5vZGUgdG8gZGVmaW5lIGF0dHJpYnV0 ZXMgZ2xvYmFsIHRvIGFsbCBuZXR3b3Jrcy4NClNvbHV0aW9uOiBJMlJTIEdlbmVyaWMgTmV0d29y ayBUb3BvbG9neSBtb2R1bGUgYXV0aG9ycyB3aWxsIGNvbnNpZGVyIG1ha2luZyChsC9uZXR3b3Jr c6GxIGFzIHRoZSB0b3AgbGV2ZWwgY29udGFpbmVyLg0KDQpMMyBUb3BvbG9neSBNb2RlbCAoZHJh ZnQtaWV0Zi1pMnJzLXlhbmctbDMtdG9wb2xvZ3kpDQoNCjEuICAgICAgIEwzIFRvcG9sb2d5IE1v ZGVsIHNob3VsZCBoYXZlIHJlZmVyZW5jZXMgdG8gVEUgVG9wb2xvZ3kgbW9kZWwsIHNvIHRoYXQg dGhlIHJlbGF0ZWQgVEUgaW5mb3JtYXRpb24gY2FuIGJlIHByb3Blcmx5IHJldHJpZXZlZCwgd2hl biBMMyB0b3BvbG9neSBhbmQgVEUgdG9wb2xvZ3kgYXJlIGNvbmdydWVudC4NClNvbHV0aW9uOiBM MyBUb3BvbG9neSBNb2RlbCBhdXRob3JzIHdpbGwgbmVlZCB0byB1cGRhdGUgdGhlIG1vZGVsIGFu ZCBkcmFmdCB0byBpbmNsdWRlIHRoZXNlLg0KDQpMMiBUb3BvbG9neSBNb2RlbCAoZHJhZnQtaWV0 Zi1pMnJzLXlhbmctbDItdG9wb2xvZ3kpDQoNCjEuICAgICAgIEwyIFRvcG9sb2d5IE1vZGVsIHNo b3VsZCBoYXZlIHJlZmVyZW5jZXMgdG8gVEUgVG9wb2xvZ3kgbW9kZWwsIHNvIHRoYXQgdGhlIHJl bGF0ZWQgVEUgaW5mb3JtYXRpb24gY2FuIGJlIHByb3Blcmx5IHJldHJpZXZlZCwgd2hlbiBMMiB0 b3BvbG9neSBhbmQgVEUgdG9wb2xvZ3kgYXJlIGNvbmdydWVudC4NClNvbHV0aW9uOiBUaGlzIG5l ZWRzIHRvIGJlIGRpc2N1c3NlZCB3aXRoIEwyIFRvcG9sb2d5IE1vZGVsIGF1dGhvcnMuDQoNClJl Z2FyZHMsDQotIFh1ZmVuZyAob24gYmVoYWxmIG9mIHRoZSBhdXRob3JzIG9mIHRoZSBURSBUb3Bv bG9neSBNb2RlbCkNCg0KRnJvbTogaTJycyBbbWFpbHRvOmkycnMtYm91bmNlc0BpZXRmLm9yZ10g T24gQmVoYWxmIE9mIFN1c2FuIEhhcmVzDQpTZW50OiBUaHVyc2RheSwgT2N0b2JlciAwMSwgMjAx NSA2OjQyIFBNDQpUbzogaTJyc0BpZXRmLm9yZzxtYWlsdG86aTJyc0BpZXRmLm9yZz4NCkNjOiAn SmVmZnJleSBIYWFzJzsgJ0FsaWEgQXRsYXMnDQpTdWJqZWN0OiBbaTJyc10gV0cgTEMgZm9yIFRv cG9sb2d5ICgxMC8xIHRvIDEwLzE0KQ0KDQpUaGlzIGJlZ2lucyBhIDIgd2VlayBXRyBMYXN0IGNh bGwgKDEwLzEgdG8gMTAvMTQpDQoNCmRyYWZ0LWlldGYteWFuZy1uZXR3b3JrLXRvcG8gqEMgbW9k ZWxpbmcgZHJhZnQNCmh0dHA6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1p MnJzLXlhbmctbmV0d29yay10b3BvLw0KDQpkcmFmdC1pZXRmLWkycnMteWFuZy1sMy10b3BvbG9n eSCoQyBMMyB0b3BvbG9neQ0KaHR0cDovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1p ZXRmLWkycnMteWFuZy1sMy10b3BvbG9neS8NCg0KZHJhZnQtaWV0Zi1pMnJzLXlhbmctbDItdG9w b2xvZ3kgqEMgTDIgdG9wb2xvZ3kNCmh0dHA6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJh ZnQtaWV0Zi1pMnJzLXlhbmctbDItbmV0d29yay10b3BvbG9neS8NCg0KSW1wbGVtZW50YXRpb24g c3RhdHVzOg0KDQpUaGlzIGFuIE9wZW5EYXlsaWdodCAoT0RMKSBpbXBsZW1lbnRhdGlvbiBvZiB0 aGUgTDMgdG9wb2xvZ3kgYW5kIGdlbmVyYWwgbW9kZWwuICBJdCBpcyBsaWtlbHkgdGhlIEwyIHRv cG9sb2d5IG1vZGVsIHdpbGwgYmUgc3VwcG9ydGVkIGluIGZ1dHVyZSBPREwgaW1wbGVtZW50YXRp b25zLiAgIEplZmYgYW5kIEkgd291bGQgYXBwcmVjaWF0ZSBhbnlvbmUgd2hvIGhhcyBpbXBsZW1l bnRhdGlvbnMgb2YgdGhlc2UgdG9wb2xvZ3kgbW9kZWxzIHRvIHByb3ZpZGUgZGV0YWlscyBvbiBs aXN0IG9yIG9mZmxpc3QgdG8gdGhlIGNoYWlycy4NCg0KU3VlIEhhcmVzDQo= --_000_AAB1CC9C17CBA440BDFA169056B93B9E127C0865eusaamb107erics_ Content-Type: text/html; charset="gb2312" Content-Transfer-Encoding: quoted-printable

Hi Xian,

 

Responding on item 6 i= nline below.

Thanks,

 

- Xufeng

 

From: Alexande= r Clemm (alex) [mailto:alex@cisco.com]
Sent: Friday, October 09, 2015 8:21 PM
To: Zhangxian (Xian); Xufeng Liu; Susan Hares; i2rs@ietf.org
Cc: 'Jeffrey Haas'; TEAS WG; 'Alia Atlas'
Subject: RE: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi Xian,

 

responses inline, <ALEX>= ;

 

Thanks

--- Alex

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Zhangxian (Xian)
Sent: Thursday, October 08, 2015 7:20 PM
To: Xufeng Liu <xufeng= .liu@ericsson.com>; Susan Hares <shares@ndzh.com>; i2rs@ietf.org
Cc: 'Jeffrey Haas' <jhaas@pfrc.= org>; TEAS WG <teas@ietf.org= >; 'Alia Atlas' <akatlas@gmail.c= om>
Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi, Xufeng, Alex,

 

Thank you for taking the effort to work toward getting aligned as dis= cussed in last meeting.   I have some comments on some of the con= clusions.

 

Could you share a bit more on reasons behind Point 3 conclusion?=

 

<ALEX> The reaso= n is that the schedule stuff, while generic / non-specific to any specific = topology, is not =A1=B0common=A1=B1, i.e. does not apply to all topologies/= every instantiation of the model.  The goal is to have ietf-network-topology refer to the stuff that is truly common.  =

</ALEX>

 

For points 4 and 5, I think they are related. My understanding is tha= t for ietf-network, it does not follow the method taken by YANG modules suc= h as ietf-interface and ietf-te-topology, in which each =A8Crw leaf will have a corresponding =A8Cro leaf. Instead, = it choose to use the =A1=B0server-provided=A1=B1 attribute to say whether a= ll the leafs in the module is configurable or state. I am not sure I unders= tand the conclusion of these two points. Do you agree that both methods are acceptable?

 

<ALEX> There is = no operational data defined.  The server-provided attributed guides wh= ether network topology information is populated by the server or by the cli= ent application, but the information is the same =A8C this not the config vs oper data (read: stats) separation.  To a= dd stats, you should provide an additional subtree/branch as applicable whe= n you are augmenting.

</ALEX>

 

One last comment on point 6: is this for future-proofness or you have= already have some attributes in mind that can apply to all networks?

 

<ALEX>

I=A1=AFll let Xufeng r= espond to that one.  We did not have a top-level container because it = keeps paths shorter (one less level in the hierarchy) and because if you wa= nted to insert something at the =A1=B0top level=A1=B1, you could always do it in parallel.  I still think this is the design tha= t=A1=AFs preferable. 

That said, having a to= p-level container may not really hurt.  There were concerns regarding = the ramification to existing implementations of the model (notably, Open Da= ylight) if we were to add it but it seems the fallout would be manageable.

 

Thanks, Alex (end of m= y comments)

</ALEX>

[Xufeng] This is= for both future-proofness and current requirement. To allow operator easil= y configure TE topology attributes, we are defining templates that can be a= pplied to all networks.

 

Thank you,

Xian=

=  

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Xufeng Liu
Sent: 2015
=C4=EA10=D4=C29= =C8=D5 4:15
To: Susan Hares; i2rs@ietf.org<= br> Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)

 

Hi Folks,<= /o:p>

 

The following is an up= date on the ongoing I2RS=A8=AETE Topology alignment di= scussion (between the authors of the TE Topology model and Alex).

 

The issues / solutions= that are currently being discussed are:

 

I2RS Generic Network T= opology Model (draft-ietf-yang-network-topo):

1.       Some groupings in ietf-network.yang an= d ietf-network-topology.yang cannot be used in augmenting module because of= missing name spaces, such as =A1=B0path "/network/network-id" at= line 42 of ietf-network.yang.
Solution: Proposed fixes have been sent to Alex to verify.

 

2.       =A1=B0leaf network-ref=A1=B1 in ietf-n= etwork-topology.yang:169, 220, is causing pyang validation errors.
Solution: Alex will check the errors.

3.       Can the group of schedule attributes b= e moved from ietf-te-topology.yang to ietf-network-topology.yang?
Solution: We agreed to keep them in ietf-te-topology.yang.

4.       How to support state branch in augment= ing module?
Solution: Keep base model ietf-network-topology.yang as is. In the augmenti= ng module, for each entity like topology, node and link, create a config co= ntainer for configuration attributes and a state container for operational = state attributes.

5.       Should =A1=B0server-provided=A1=B1 fla= g be used to block user operation on read-only entities?
Solution: Keep base model ietf-network-topology.yang as is. TE topology wil= l use other means to achieve such a purpose.

6.       Should I2RS Generic Network Topology m= odel have a top-level container? The benefit of doing so is to provide an a= ugmentation target node to define attributes global to all networks.
Solution: I2RS Generic Network Topology module authors will consider making= =A1=B0/networks=A1=B1 as the top level container.

 

L3 Topology Model (draft-ietf-i2rs-yang-l3-topology)

1.       L3 Topology Model should have referenc= es to TE Topology model, so that the related TE information can be properly= retrieved, when L3 topology and TE topology are congruent.
Solution: L3 Topology Model authors will need to update the model and draft= to include these.

 

L2 Topology Model (draft-ietf-i2rs-yang-l2-topology)

1.       L2 Topology Model should have referenc= es to TE Topology model, so that the related TE information can be properly= retrieved, when L2 topology and TE topology are congruent.
Solution: This needs to be discussed with L2 Topology Model authors.
=

 

Regards,

- Xufeng (on behalf of= the authors of the TE Topology Model)

 

From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Thursday, October 01, 2015 6:42 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia Atlas'
Subject: [i2rs] WG LC for Topology (10/1 to 10/14)
=

 

This begins a 2 week WG Last call (10/1 to 10/14)

 

draft-ietf-yang-network-topo =A8C modeling draft

http://datatracker.ietf.org/doc/draft-ietf-i2rs-= yang-network-topo/

 

draft-ietf-i2rs-yang-l3-topology =A8C L3 topology

http://datatracker.ietf.org/doc/draft-ietf-i2rs-y= ang-l3-topology/

 

draft-ietf-i2rs-yang-l2-topology =A8C L2 topology

http://datatracker.ietf.org/doc/draft-iet= f-i2rs-yang-l2-network-topology/

 

Implementation status:

 

This an OpenDaylight (ODL) implementation of the L3 = topology and general model.  It is likely the L2 topology model will b= e supported in future ODL implementations.   Jeff and I would app= reciate anyone who has implementations of these topology models to provide details on list or offlist to the chairs.

 

Sue Hares  

--_000_AAB1CC9C17CBA440BDFA169056B93B9E127C0865eusaamb107erics_-- From nobody Tue Oct 13 01:03:19 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B1B11B3B0B for ; Tue, 13 Oct 2015 01:03:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -96.354 X-Spam-Level: X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dgvk35a3WBml for ; Tue, 13 Oct 2015 01:03:17 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6932E1B3B0A for ; Tue, 13 Oct 2015 01:03:17 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: Date: Tue, 13 Oct 2015 04:03:13 -0400 Message-ID: <011301d1058d$9d8769c0$d8963d40$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0114_01D1056C.16775060" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdECGXfiEDd9gz8ZTWqDWjgtRRE80Q== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' Subject: [i2rs] WebEx recording is available for viewing: I2RS Interim 10/7-20151007 1405-1 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 08:03:18 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0114_01D1056C.16775060 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Here's the web-ex recording for 10/27/2015 interim I2RS Interim 10/7-20151007 1405-1 Wednesday, October 7, 2015 11:39 am | Eastern Daylight Time (New York, GMT-04:00) PLAY RECORDING (1 hr 31 min) https://ietf.webex.com/ietf/ldr.php?RCID=c7a470c3bec3a9ed4db8a379e273716d Sue Hares ------=_NextPart_000_0114_01D1056C.16775060 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Here’s the web-ex = recording for 10/27/2015 interim

I2RS Interim 10/7-20151007 = 1405-1
Wednesday, October 7, = 2015
11:39 = am | Eastern Daylight Time (New York, GMT-04:00) =

PLAY RECORDING (1 hr 31 = min)
https://ietf.webex.com/ietf/ldr.php?RCID=3Dc7a470c3bec3a9ed4d= b8a379e273716d

 

Sue = Hares

------=_NextPart_000_0114_01D1056C.16775060-- From nobody Tue Oct 13 01:03:52 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07BCC1B3B08 for ; Tue, 13 Oct 2015 01:03:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k1NbjiuXtiky for ; Tue, 13 Oct 2015 01:03:50 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9F3B1B3AAB for ; Tue, 13 Oct 2015 01:03:49 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Martin Bjorklund'" References: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> <20151008.085448.838467418663018728.mbj@tail-f.com> In-Reply-To: <20151008.085448.838467418663018728.mbj@tail-f.com> Date: Tue, 13 Oct 2015 04:03:37 -0400 Message-ID: <012001d1058d$abfb5d40$03f217c0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQHCHNW4W5OiwrMgaRQXRIpsvzvqkAJwsRGWnnIvtDA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, i2rs@ietf.org, kwatsen@juniper.net, andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 08:03:51 -0000 Martin: Did you get web-ex recording information you requested? Sue Hares -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund Sent: Thursday, October 08, 2015 2:55 AM To: shares@ndzh.com Cc: jhaas@pfrc.org; i2rs@ietf.org; kwatsen@juniper.net; andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting Hi, Was this WebEX recorded? If so, where can I find it? /martin "Susan Hares" wrote: > > > I2RS Interim 10/7/2015 > > > > 1) Agenda Bashing [10:00 - 10:05 ] > > 2) I2RS Protocol Requirements Summary > > [10:05 - 10:15] > > 3) Discussion of Requirements [10:15-30] > > 4) I2RS Protocol Strawman [10:25 - 10:45] > > 5) Discussion of I2RS Protocol [10:45-11:00] > > 7) I2RS Hackathon [11:00 - 11:15] > > 8) I2RS FB-RIB [11:15 - 11:30] > > > > > > Next I2RS Meeting 10/7/2015 > > I2RS Interim 10/7 > > Wednesday, October 7, 2015 > > 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs > > > > > > Join WebEx meeting > > https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db > > > > Meeting number: 649 136 221 > > Meeting password: kent.andy.proto > > > > Join by phone > > 1-877-668-4493 Call-in toll free number (US/Canada) > > 1-650-479-3208 Call-in toll number (US/Canada) > > Access code: 649 136 221 > > Toll-free calling restrictions > > > > > > > > > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Tue Oct 13 01:12:12 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F3B21B3981 for ; Tue, 13 Oct 2015 01:12:11 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lbZxoTs9tGTP for ; Tue, 13 Oct 2015 01:12:10 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F24641B2F17 for ; Tue, 13 Oct 2015 01:12:09 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: "'Joel M. Halpern'" , , "'Jonathan Hardwick'" , "'Jon Hudson'" References: <56197D21.3090304@joelhalpern.com> In-Reply-To: <56197D21.3090304@joelhalpern.com> Date: Tue, 13 Oct 2015 04:12:02 -0400 Message-ID: <000901d1058e$d79339e0$86b9ada0$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQGvCyH2p5c3/GVcEyjE26wW2qie3Z6tB0VQ Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: Re: [i2rs] Rtg Area QA Review: draft-ietf-i2rs-ephemeral-state-02 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 08:12:11 -0000 Joel: Thank you for the review. I complete an revision to address these issues. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern Sent: Saturday, October 10, 2015 5:03 PM To: i2rs@ietf.org; Jonathan Hardwick; 'Jon Hudson' Subject: [i2rs] Rtg Area QA Review: draft-ietf-i2rs-ephemeral-state-02 For details on Routing Area QA reviews, see: https://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDirDocQa Name: draft-ietf-i2rs-ephemeral-state-02 I2RS Ephemeral State Requirements Reviewer: Joel M. Halpern Review Date: October 10, 2015 This document is close to ready for working group last call. Major issues: None. Minor Issues: I would suggest that the introduction needs to include a description, longer than that in the abstract, of the purpose of the document. If the document purpose is as stated in the abstract, to provide requirements to NetConf and NetMod working groups regarding ephemeral state, then section 2 should have a bit more explanatory text, as the requirements there are explicitly not abotu ephemeral state. It may be as simple as stating that these requirements are repeated hear to provide context for the reader. Or whatever explanation does apply for why they are here. On section 3.2 requirement 02, the text prohibiting reference from non-ephemeral to ephemeral state needs some clarification. First, it should be clear that this is a requirement on behavior outside of I2RS, as I2RS can not refer to non-ephemeral state. Also, it seems likely that such incorrect references could be attempted at either model definition time or NetConf request application time. As such "validation error" may be too specific a description of the errors needed. Requirement 3.4 is written as if writeable / non-writeable were a new requirement to NetConf. I believe what is wanted here is only that there must be indications in the model of ephemeral elements, and that it is writeable. If there is a need for non-writeable ephemeral elements, that should be described seperately. At this reading, I do not see a need for such. Section 3.6 would benefit from an introductory sentence indicating that these requirements are included because they have an impact on viable solutions to the ephemeral state requirements, although they themselves are more general requirements applying to I2RS operations. Given that the design team is looking at a model which they describe as a limited panes of glass model, it seems that if section 4 is retained (as it provides useful context) section 4.2 needs to be modified to be clear as to what solution is being rejected. Editorial Issues: Not noted _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Tue Oct 13 01:25:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E458B1A00E2 for ; Tue, 13 Oct 2015 01:25:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X37neWwW97P0 for ; Tue, 13 Oct 2015 01:25:15 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DB301A00E9 for ; Tue, 13 Oct 2015 01:25:12 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 56056948; Tue, 13 Oct 2015 10:25:11 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id tiZHuOBQtN0B; Tue, 13 Oct 2015 10:25:10 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Tue, 13 Oct 2015 10:25:10 +0200 (CEST) Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id 4ED4D20053; Tue, 13 Oct 2015 10:25:10 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id 4EjGXA1PD32M; Tue, 13 Oct 2015 10:25:09 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 1CE8D2004E; Tue, 13 Oct 2015 10:25:09 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 26E4037B2024; Tue, 13 Oct 2015 10:25:08 +0200 (CEST) Date: Tue, 13 Oct 2015 10:25:07 +0200 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151013082507.GA65884@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , "i2rs@ietf.org" References: <20151001233038.GC29135@elstar.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "i2rs@ietf.org" Subject: Re: [i2rs] nits review of draft-ietf-i2rs-yang-network-topo-01.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 08:25:17 -0000 On Fri, Oct 09, 2015 at 10:18:50PM +0000, Alexander Clemm (alex) wrote: > > - The description of the typedef link-id says 'The identifier may be > opaque.' What does that mean? It is an inet:uri after all. If two > systems populate a link-id, how are they going to come up with the > same identifier? Is the SHOULD realistic to achieve? The same > comment applies to the typedef tp-id. > > Basically, this says that there may be different convenions > used to pick identifiers, and we are not prescribing a specific > convention. You may have different systems which choose to populate > link-ids differently, but they are different systems and > refer to different links. > The description says: The identifier SHOULD be chosen such that the same link in a real network topology will always be identified through the same identifier, even if the model is instantiated in separate datastores. Your answer does not match this text. So my comment remains open. > - I do not really understand why RFC1195, RFC2328, and RFC3209 are > normative references. Even RFC6241 and RFC7223 may not be normative. > Well, RFC6241 is not cited at all so it should be removed anyway > (ah, bad for my h-index). > > I am not sure why they would not be normative - they are standards track? What would be the criteria to list them otherwise? > (And, we can try to add a citation for RFC 6241 to make your h-index happy) > A reference is normative if the reference is required to implement the specification correctly. This is orthogonal to a document's status. Usually, normative references of standards-track documents are standards-track documents but this is not strictly required (such cases are called a downrefs and trigger special procedures). And it is perfectly fine to standards-track non-normative references. In other words, you should ask for each reference whether it is essential to implement this specification correctly or not. In this case, I think RFC 6020 and RFC 6991 are (not that RFC 6991 has obsoleted RFC 6020). You probably also need to cite RFC 2119 if you use MUST/SHOULD language and add the boilerplate paragraph somewhere. All references that are not cited should be removed. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Tue Oct 13 01:57:57 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AC691A1B23 for ; Tue, 13 Oct 2015 01:57:56 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -96.354 X-Spam-Level: X-Spam-Status: No, score=-96.354 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8rcDUsQ8049D for ; Tue, 13 Oct 2015 01:57:55 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 122541A1B1E for ; Tue, 13 Oct 2015 01:57:55 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: Date: Tue, 13 Oct 2015 04:57:53 -0400 Message-ID: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_005A_01D10573.B80FB4B0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEFlL52fGoodKw9S7qe8w+evsk1tg== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 08:57:56 -0000 This is a multipart message in MIME format. ------=_NextPart_000_005A_01D10573.B80FB4B0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Currently the I2RS requirements have error handling having three parts: 1) "all-or-nothing", 2) "continue-on-error", and 3) "stop-on-error". To provide an easier first step for the I2RS Agent for the first implementation of an I2RS protocol, the I2RS protocol design team suggests reduce this to the "all-or-nothing" for the initial version. Later versions of the I2RS protocol can provide the "continue-on-error" or "stop-on-error" error handling. The earlier decision in the I2RS architecture was to support all 3 error handling pieces. Sue Hares and Jeff Haas ------=_NextPart_000_005A_01D10573.B80FB4B0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Currently = the I2RS requirements have error handling having three parts: =

1)      = “all-or-nothing”,

2)      = “continue-on-error”, and =  

3)      = “stop-on-error”.

 

To provide = an easier first step for the I2RS Agent for the first implementation of = an I2RS protocol,  the I2RS protocol design team suggests reduce = this to the “all-or-nothing” for the initial version.  = Later versions of the I2RS protocol can provide the = “continue-on-error” or “stop-on-error” error = handling.  The earlier decision in the I2RS architecture was to = support all 3 error handling pieces.  

 

Sue Hares =  and Jeff Haas

 

 

------=_NextPart_000_005A_01D10573.B80FB4B0-- From nobody Tue Oct 13 02:14:58 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 391AF1A6F3C for ; Tue, 13 Oct 2015 02:14:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5iGWBb2qYbQK for ; Tue, 13 Oct 2015 02:14:55 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8DD781A6F38 for ; Tue, 13 Oct 2015 02:14:55 -0700 (PDT) Received: from localhost (unknown [173.38.220.37]) by mail.tail-f.com (Postfix) with ESMTPSA id CB6EF1AE0478; Tue, 13 Oct 2015 11:14:53 +0200 (CEST) Date: Tue, 13 Oct 2015 11:14:53 +0200 (CEST) Message-Id: <20151013.111453.185873350231969205.mbj@tail-f.com> To: shares@ndzh.com From: Martin Bjorklund In-Reply-To: <012001d1058d$abfb5d40$03f217c0$@ndzh.com> References: <004a01d1008c$8c6d2680$a5477380$@ndzh.com> <20151008.085448.838467418663018728.mbj@tail-f.com> <012001d1058d$abfb5d40$03f217c0$@ndzh.com> X-Mailer: Mew version 6.5 on Emacs 23.4 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, i2rs@ietf.org, kwatsen@juniper.net, andy@yumaworks.com Subject: Re: [i2rs] 10/7/2015 Interim meeting X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 09:14:57 -0000 "Susan Hares" wrote: > Martin: > > Did you get web-ex recording information you requested? Yes, thank you! /martin > > Sue Hares > > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund > Sent: Thursday, October 08, 2015 2:55 AM > To: shares@ndzh.com > Cc: jhaas@pfrc.org; i2rs@ietf.org; kwatsen@juniper.net; andy@yumaworks.com > Subject: Re: [i2rs] 10/7/2015 Interim meeting > > Hi, > > Was this WebEX recorded? If so, where can I find it? > > > /martin > > > "Susan Hares" wrote: > > > > > > I2RS Interim 10/7/2015 > > > > > > > > 1) Agenda Bashing [10:00 - 10:05 ] > > > > 2) I2RS Protocol Requirements Summary > > > > [10:05 - 10:15] > > > > 3) Discussion of Requirements [10:15-30] > > > > 4) I2RS Protocol Strawman [10:25 - 10:45] > > > > 5) Discussion of I2RS Protocol [10:45-11:00] > > > > 7) I2RS Hackathon [11:00 - 11:15] > > > > 8) I2RS FB-RIB [11:15 - 11:30] > > > > > > > > > > > > Next I2RS Meeting 10/7/2015 > > > > I2RS Interim 10/7 > > > > Wednesday, October 7, 2015 > > > > 10:00 am | Eastern Daylight Time (New York, GMT-04:00) | 2 hrs > > > > > > > > > > > > Join WebEx meeting > > > > https://ietf.webex.com/ietf/j.php?MTID=m1e24725f4e5646061f21baae1c6a87db > > > > > > > > Meeting number: 649 136 221 > > > > Meeting password: kent.andy.proto > > > > > > > > Join by phone > > > > 1-877-668-4493 Call-in toll free number (US/Canada) > > > > 1-650-479-3208 Call-in toll number (US/Canada) > > > > Access code: 649 136 221 > > > > Toll-free calling restrictions > > > > > > > > > > > > > > > > > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Tue Oct 13 05:33:53 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5D7E1B2FE0 for ; Tue, 13 Oct 2015 05:33:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.155 X-Spam-Level: X-Spam-Status: No, score=-97.155 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o0pGK0VqGtTf for ; Tue, 13 Oct 2015 05:33:48 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 829E01B2FE2 for ; Tue, 13 Oct 2015 05:33:41 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: Date: Tue, 13 Oct 2015 08:33:40 -0400 Message-ID: <016e01d105b3$641d1f10$2c575d30$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_016F_01D10591.DD0D05B0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdEFsvNToTaH54n8Seuk0EMp1UWJCQ== Content-Language: en-us X-Authenticated-User: skh@ndzh.com X-IsFriend: Archived-At: Cc: jhaas@pfrc.org, 'Susan Hares' Subject: [i2rs] IETF94 I2RS Meeting - on 11/2/2015 at 9:00am - 11:30am and Interim on 10/21/2015 at 10:00am - 11:30am ET X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 12:33:49 -0000 This is a multipart message in MIME format. ------=_NextPart_000_016F_01D10591.DD0D05B0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Hi all: The I2RS Meeting at IETF is on 11/2/2015 from 9:00am - 11:30am (Japan time). Please request time slots for this meeting by responding to this mail message. The I2RS will have a virtual interim 10/21/2015 from 10:00am - 12:00 am ET to discuss the I2RS protocol (requirements and strawman), and I2RS Data Models (RIB Data Model, Topology Data Models, and Filter Data models). Please request time slots by responding to this message. The I2RS mail list may be very busy as we consider the requirements, data models, and protocol strawman. We thank you for all your hard work regarding the I2RS work. Sue Hares and Jeff Haas ------=_NextPart_000_016F_01D10591.DD0D05B0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi all: =

 

The I2RS Meeting at IETF is on 11/2/2015 from 9:00am = – 11:30am (Japan time).  Please request time slots for this = meeting by responding to this mail message.

 

The I2RS = will have a virtual interim 10/21/2015 from 10:00am – 12:00 am ET = to discuss the I2RS protocol (requirements and strawman), and I2RS Data = Models (RIB Data Model, Topology Data Models, and Filter Data = models).   Please request time slots by responding to this = message.

 

The I2RS mail list may be very busy as we consider the = requirements, data models, and protocol strawman.  We thank you for = all your hard work regarding the I2RS work.

 

Sue Hares = and Jeff Haas

------=_NextPart_000_016F_01D10591.DD0D05B0-- From nobody Tue Oct 13 05:56:07 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F19AA1B306E for ; Tue, 13 Oct 2015 05:56:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R-4rBhizVkqw for ; Tue, 13 Oct 2015 05:56:00 -0700 (PDT) Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BBB181B307F for ; Tue, 13 Oct 2015 05:55:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=964; q=dns/txt; s=iport; t=1444740955; x=1445950555; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=+2MlTr3ZU9L2zB9KYCNp4uiia9hqTjZlgDb0YyWhow4=; b=TTlLV3usNiQJyvX3Ksy1gJOH2y7xUi1qLDbEpYfJMPcSxnG19VAB8+kY 4NH+44GTLwEpmj5n4Eh4bWuu+eiPhcK0xbe2EPSrWJBQJPSt1pSrox0FX b5XkAp0QIIoSsk+ivphFbO3ATCpyiDwWoFgzI3aYTewl6uIh7bWifpbSn A=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BWAgCJ/hxW/5RdJa1egya/VAENgVqDEzKBWH8CgUQ4FAEBAQEBAQGBCoQnAQEEHRUBBUABEAsOBAYJFg8JAwIBAgE3DgYBDAgBAYgqwRMBAQEBAQEBAQEBAQEBAQEBAQEahnWEfoUNB4QuAQSWFo0aiROSdR8BAUKCRIFaIockAQEB X-IronPort-AV: E=Sophos;i="5.17,678,1437436800"; d="scan'208";a="40973949" Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Oct 2015 12:55:54 +0000 Received: from [10.82.217.210] (rtp-vpn3-464.cisco.com [10.82.217.210]) by rcdn-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id t9DCtsf6001974; Tue, 13 Oct 2015 12:55:54 GMT To: Susan Hares , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <561CFF59.3020604@cisco.com> Date: Tue, 13 Oct 2015 08:55:53 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 12:56:01 -0000 On 10/13/15 04:57, Susan Hares wrote: > Currently the I2RS requirements have error handling having three parts: > > 1)“all-or-nothing”, > > 2)“continue-on-error”, and > > 3)“stop-on-error”. > > To provide an easier first step for the I2RS Agent for the first > implementation of an I2RS protocol, the I2RS protocol design team > suggests reduce this to the “all-or-nothing” for the initial version. > Later versions of the I2RS protocol can provide the “continue-on-error” > or “stop-on-error” error handling. The earlier decision in the I2RS > architecture was to support all 3 error handling pieces. It seems to me the latter two would be easier to implement as the Client continues to fire (until not told to do so in the stop-on-error case) and the Agent wouldn't have to track all operations for rollback. Is the assumption that most I2RS transactions will have mutual dependencies, and this is the most common error case? Joe From nobody Tue Oct 13 08:21:31 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87EB61B32FC; Tue, 13 Oct 2015 08:21:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OXsVMG-o43hU; Tue, 13 Oct 2015 08:21:23 -0700 (PDT) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 336351B46DE; Tue, 13 Oct 2015 08:20:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3524; q=dns/txt; s=iport; t=1444749654; x=1445959254; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=80jwaM68mSdPypeimEECDoDNSlBdPsx6bWnp2x0SPiQ=; b=Eii3TyAfxaiq6jbBH2gl6tr5Tcdbu0u42RH84iwv9m6ZHp/gyuYzC6nl v6XuCJH5PHPRfrJu4yygRzKV/EBjE8tM+kJDF3rtt8820SqH8VLwtjrZi pHhVy+fw19mqDQWeGMGLShYu8+IKswhobFKIMqEpkUaLw5LMIo/LIfFX7 8=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0B2AgD9Hx1W/4gNJK1egyZUYA4Gvg0BDYFaFwqCcoIKNUoCHIEkOBQBAQEBAQEBgQqEJwEBBAEBASAROgQHEAIBCBgCAiYCAgIlCxUQAgQBDQWILg2uAZNgAQEBAQEBAQEBAQEBAQEBAQEBAQEBEwSBIopRhQ0HgmmBRQWWFgGNGZwHAR8BAUKEAnGFKiUcgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,678,1437436800"; d="scan'208";a="35305018" Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-7.cisco.com with ESMTP; 13 Oct 2015 15:20:53 +0000 Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t9DFKrac030734 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 13 Oct 2015 15:20:53 GMT Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 13 Oct 2015 10:20:39 -0500 Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.000; Tue, 13 Oct 2015 10:20:39 -0500 From: "Acee Lindem (acee)" To: "Acee Lindem (acee)" , Ladislav Lhotka , "i2rs@ietf.org" , NETMOD WG Thread-Topic: [netmod] rib-data-model and routing-cfg Thread-Index: AQHRAmpn2WDjXB7SH0yyXI3vdDB1jJ5jMMMAgAZwt4A= Date: Tue, 13 Oct 2015 15:20:39 +0000 Message-ID: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.116.152.199] Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Cc: Routing YANG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 15:21:24 -0000 SGkgTGFkYSwgTkVUTU9ELCANCg0KU28gSSB0aGluayB3ZSBzaG91bGQgbW92ZSBmb3J3YXJkIHRo aXMgaWV0Zi1ydGctY2ZnIHNvIHRoYXQgaXQgY2FuIGJlDQphdWdtZW50ZWQgYW5kIG90aGVyIHdv cmsgY2FuIG1vdmUgZm9yd2FyZC4gV2UgYXJlIHN0aWxsIGluIGRpc2FncmVlbWVudA0Kd2l0aCBy ZXNwZWN0IHRvIHJvdXRpbmctaW5zdGFuY2UvaW50ZXJmYWNlIGNvbmZpZ3VyYXRpb24uDQoNCiAg ICAtIFdlIGZlZWwgdGhlIElQdjQvSVB2NiBpbnRlcmZhY2VzIHNob3VsZCByZWZlcmVuY2UgdGhl DQpyb3V0aW5nLWluc3RhbmNlIGluIHRoZWlyIGNvbmZpZyBzdGF0ZS4gVGhpcyBpcyBjb25zaXN0 ZW50IHdpdGgNCmRyYWZ0LXJ0Z3lhbmdkdC1ydGd3Zy1kZXZpY2UtbW9kZWwtMDEudHh0Lg0KICAg IC0gWW91IGZlZWwgdGhhdCB0aGUgcm91dGluZy1pbnN0YW5jZSBzaG91bGQgaGF2ZSBhIGxpc3Qg b2YgbGVhZi1yZWbigJlzDQp0byB0aGUgaW50ZXJmYWNlLiBZb3UgYmVsaWV2ZSB0aGUgbGVhZi1y ZWYgcHJvdmlkZXMgYSBsZXZlbCBvZiB2YWxpZGF0aW9uDQpkdWUgdG8gdGhlIGZhY3QgdGhhdCBy ZWZlcmVuY2VzIGNhbiBiZSBjb25maW5lZCB0byByb3V0aW5nLWluc3RhbmNlDQpyZWZlcmVuY2Vz LiBIb3dldmVyLCBoZXJldG9mb3JlLCBubyBtb2RlbHMgYXJlIHJlZmVyZW5jaW5nIHRoZSBpbnRl cmZhY2UNCmxlYWYtcmVmcyBpbiB0aGUgbGlzdC4NCg0KT3RoZXIgdGhhbiB0aGUgUm91dGluZyBZ QU5HIERlc2lnbiBUZWFtIGhhdmluZyBjaG9zZW4gdGhlIGZpcnN0IG9wdGlvbiAtDQphcmUgdGhl cmUgYW55IG90aGVyIG9waW5pb25zPw0KDQpUaGFua3MsDQpBY2VlDQoNCk9uIDEwLzkvMTUsIDk6 MDAgQU0sICJuZXRtb2Qgb24gYmVoYWxmIG9mIEFjZWUgTGluZGVtIChhY2VlKSINCjxuZXRtb2Qt Ym91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgYWNlZUBjaXNjby5jb20+IHdyb3RlOg0KDQo+ SGkgTGFkYSwgDQo+STJSUyBpcyBub3QgY2hhcnRlcmVkIHRvIGRvIHRoZSBiYXNlIG1vZGVscy4g VGhlcmUgYXJlIG90aGVyIHJvdXRpbmcNCj5tb2RlbHMgdGhhdCByZWZlcmVuY2Ugcm91dGluZy1j ZmcgYW5kIGV2ZW4gaW4tcHJvZ3Jlc3MgaW1wbGVtZW50YXRpb25zLg0KPg0KPk9uIDEwLzkvMTUs IDQ6MTMgQU0sICJuZXRtb2Qgb24gYmVoYWxmIG9mIExhZGlzbGF2IExob3RrYSINCj48bmV0bW9k LWJvdW5jZXNAaWV0Zi5vcmcgb24gYmVoYWxmIG9mIGxob3RrYUBuaWMuY3o+IHdyb3RlOg0KPg0K Pj5IaSwNCj4+DQo+PkkgYW0gc29ycnkgZm9yIGNyb3NzLXBvc3RpbmcgYnV0IEkgdGhpbmsgaXQg aXMgaGlnaCB0aW1lIHRvIGRlY2lkZSB0aGUNCj4+cmVsYXRpb25zaGlwIGJldHdlZW4gdGhlIGRh dGEgbW9kZWxzIGluIGkycnMtcmliLWRhdGEtbW9kZWwgYW5kDQo+Pm5ldG1vZC1yb3V0aW5nLWNm ZyBJLURzIGJlY2F1c2UgdGhleSBjbGVhcmx5IHRhcmdldCB0aGUgc2FtZSBtYW5hZ2VtZW50DQo+ PmRhdGEgaW4gYSByb3V0ZXIuIEkgY2FuIHNlZSB0aHJlZSBwb3NzaWJsZSBzY2VuYXJpb3M6DQo+ Pg0KPj4xLiBUaGUgaTJycy1yaWIgbW9kdWxlIHdpbGwgYmUgbW9kaWZpZWQgdG8gYXVnbWVudA0K Pj5pZXRmLXJvdXRpbmcvaWV0Zi1pcHZbNDZdLXVuaWNhc3Qtcm91dGluZy4NCj4NCj5UaGlzIHdv dWxkIHNlZW0gdG8gYmUgdGhlIG9idmlvdXMgY2hvaWNlLg0KPg0KPj4NCj4+Mi4gVGhlIHNjb3Bl IG9mIGlldGYtcm91dGluZyB3aWxsIGJlIGNoYW5nZWQgc28gdGhhdCBpdCB3b3VsZCBhZGRyZXNz DQo+Pm9ubHkgaG9zdCByb3V0aW5nIGFuZCBzaW1wbGUgcm91dGVycy4gVGhlIG1vZGVsbGluZyB3 b3JrIGZvciBhZHZhbmNlZA0KPj5yb3V0ZXJzIHdpbGwgYmUgZG9uZSBlbHNld2hlcmUuDQo+Pg0K Pj4zLiBUaGUgd29yayBvbiBuZXRtb2Qtcm91dGluZy1jZmcgd2lsbCBiZSBzdG9wcGVkLg0KPg0K PkEgZm91cnRoIG9wdGlvbiB3b3VsZCBiZSBmb3IgbWUgdG8gdGFrZSBvdmVyIG93bmVyc2hpcCwg bW92ZSB0aGUgd29yayB0bw0KPnRoZSBSVEcgV0csIGFuZCB3ZeKAmWQgcmVjcnVpdCBzb21lIHN0 cm9uZyBhdXRob3JzL3Jldmlld2VycyBmcm9tIG9wZXJhdG9ycw0KPmFuZCBvdGhlciB2ZW5kb3Jz IChpbnZvbHZpbmcgdGhlIEFEcyBpbiBzZWxlY3Rpb24pLg0KPg0KPlRoYW5rcywNCj5BY2VlIA0K Pg0KPg0KPj4NCj4+T3BpbmlvbnM/DQo+Pg0KPj5UaGFua3MsIExhZGENCj4+DQo+Pi0tDQo+Pkxh ZGlzbGF2IExob3RrYSwgQ1ouTklDIExhYnMNCj4+UEdQIEtleSBJRDogRTc0RThDMEMNCj4+DQo+ Pg0KPj4NCj4+DQo+Pl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fDQo+Pm5ldG1vZCBtYWlsaW5nIGxpc3QNCj4+bmV0bW9kQGlldGYub3JnDQo+Pmh0dHBzOi8v d3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo+DQo+X19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj5uZXRtb2QgbWFpbGluZyBsaXN0DQo+ bmV0bW9kQGlldGYub3JnDQo+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9u ZXRtb2QNCg0K From nobody Tue Oct 13 08:57:49 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E1FB1B47BA for ; Tue, 13 Oct 2015 08:57:48 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.602 X-Spam-Level: X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sXFHeN-7yAFf for ; Tue, 13 Oct 2015 08:57:47 -0700 (PDT) Received: from maila1.tigertech.net (maila1.tigertech.net [208.80.4.151]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55DE21B4793 for ; Tue, 13 Oct 2015 08:57:47 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by maila1.tigertech.net (Postfix) with ESMTP id 414CF360494; Tue, 13 Oct 2015 08:57:47 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at maila1.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila1.tigertech.net (Postfix) with ESMTPSA id BE25436137A; Tue, 13 Oct 2015 08:57:46 -0700 (PDT) To: Susan Hares , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> From: "Joel M. Halpern" Message-ID: <561D29F9.6030704@joelhalpern.com> Date: Tue, 13 Oct 2015 11:57:45 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 15:57:48 -0000 I can live with this reduction. It simplifies the agent implementation (as it only has to support one instead of three modes). The increase in effort on the client is small. If we find out that, as was suspected, there are performance issues, then we can add back the other error modes. Yours, Joel On 10/13/15 4:57 AM, Susan Hares wrote: > Currently the I2RS requirements have error handling having three parts: > > 1)“all-or-nothing”, > > 2)“continue-on-error”, and > > 3)“stop-on-error”. > > To provide an easier first step for the I2RS Agent for the first > implementation of an I2RS protocol, the I2RS protocol design team > suggests reduce this to the “all-or-nothing” for the initial version. > Later versions of the I2RS protocol can provide the “continue-on-error” > or “stop-on-error” error handling. The earlier decision in the I2RS > architecture was to support all 3 error handling pieces. > > Sue Hares and Jeff Haas > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Tue Oct 13 09:30:16 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF7181B4862; Tue, 13 Oct 2015 09:30:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.661 X-Spam-Level: X-Spam-Status: No, score=-0.661 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HELO_EQ_CZ=0.445, HOST_EQ_CZ=0.904, T_RP_MATCHES_RCVD=-0.01] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uhHRVGcUXATo; Tue, 13 Oct 2015 09:30:13 -0700 (PDT) Received: from mail.nic.cz (mail.nic.cz [IPv6:2001:1488:800:400::400]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD50D1B4861; Tue, 13 Oct 2015 09:30:12 -0700 (PDT) Received: from [IPv6:2a01:5e0:29:ffff:6c23:3ee3:ca1:cdc5] (unknown [IPv6:2a01:5e0:29:ffff:6c23:3ee3:ca1:cdc5]) by mail.nic.cz (Postfix) with ESMTPSA id 09DB3180A4C; Tue, 13 Oct 2015 18:30:11 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=nic.cz; s=default; t=1444753811; bh=EKj9yh0A07ijJhVQYFF46oFYFlhma2MGE47FPpEtodQ=; h=From:Date:To; b=EHRoPfbDwyYBMPZptbOq80Z9xwkqM9uxU3E/0Heuaapd5qA7gyAFZvNbhLmOyIpc6 Ucip9GEEaoiPBRC5Vomo7uz646Q95kvYRNGVBFcOjCBf5KQUXhYvJhwiLW03brgT56 87/eBuGpWzdaDvQyCN/x1DEjr9V1kf4LsePkpjkU= Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 9.0 \(3094\)) From: Ladislav Lhotka In-Reply-To: Date: Tue, 13 Oct 2015 18:30:09 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> To: "Acee Lindem (acee)" X-Mailer: Apple Mail (2.3094) X-Virus-Scanned: clamav-milter 0.98.7 at mail X-Virus-Status: Clean Archived-At: Cc: Routing YANG , "i2rs@ietf.org" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 16:30:15 -0000 > On 13 Oct 2015, at 17:20, Acee Lindem (acee) wrote: >=20 > Hi Lada, NETMOD,=20 >=20 > So I think we should move forward this ietf-rtg-cfg so that it can be > augmented and other work can move forward. We are still in = disagreement > with respect to routing-instance/interface configuration. >=20 > - We feel the IPv4/IPv6 interfaces should reference the > routing-instance in their config state. This is consistent with > draft-rtgyangdt-rtgwg-device-model-01.txt. > - You feel that the routing-instance should have a list of = leaf-ref=E2=80=99s > to the interface. You believe the leaf-ref provides a level of = validation > due to the fact that references can be confined to routing-instance > references. However, heretofore, no models are referencing the = interface > leaf-refs in the list. True, these models (ietf-isis, for instance) use leafrefs with = "if:interface-ref" type. However, such leafrefs are under-constrained = because they can be configured to refer to: - interfaces of any layer, including physical interfaces, VLAN trunks = etc. - interfaces assigned to any routing instance. I believe in all these cases the choice has to be limited to (1) L3 = interfaces, and (2) belonging to "own" routing instance. These = constraints will have to be checked in server code somehow - I would = prefer to have them represented in the data model. But if nobody shares this concern with me, I am not going to block the = document on this issue. Lada=20 >=20 > Other than the Routing YANG Design Team having chosen the first option = - > are there any other opinions? >=20 > Thanks, > Acee >=20 > On 10/9/15, 9:00 AM, "netmod on behalf of Acee Lindem (acee)" > wrote: >=20 >> Hi Lada,=20 >> I2RS is not chartered to do the base models. There are other routing >> models that reference routing-cfg and even in-progress = implementations. >>=20 >> On 10/9/15, 4:13 AM, "netmod on behalf of Ladislav Lhotka" >> wrote: >>=20 >>> Hi, >>>=20 >>> I am sorry for cross-posting but I think it is high time to decide = the >>> relationship between the data models in i2rs-rib-data-model and >>> netmod-routing-cfg I-Ds because they clearly target the same = management >>> data in a router. I can see three possible scenarios: >>>=20 >>> 1. The i2rs-rib module will be modified to augment >>> ietf-routing/ietf-ipv[46]-unicast-routing. >>=20 >> This would seem to be the obvious choice. >>=20 >>>=20 >>> 2. The scope of ietf-routing will be changed so that it would = address >>> only host routing and simple routers. The modelling work for = advanced >>> routers will be done elsewhere. >>>=20 >>> 3. The work on netmod-routing-cfg will be stopped. >>=20 >> A fourth option would be for me to take over ownership, move the work = to >> the RTG WG, and we=E2=80=99d recruit some strong authors/reviewers = from operators >> and other vendors (involving the ADs in selection). >>=20 >> Thanks, >> Acee=20 >>=20 >>=20 >>>=20 >>> Opinions? >>>=20 >>> Thanks, Lada >>>=20 >>> -- >>> Ladislav Lhotka, CZ.NIC Labs >>> PGP Key ID: E74E8C0C >>>=20 >>>=20 >>>=20 >>>=20 >>> _______________________________________________ >>> netmod mailing list >>> netmod@ietf.org >>> https://www.ietf.org/mailman/listinfo/netmod >>=20 >> _______________________________________________ >> netmod mailing list >> netmod@ietf.org >> https://www.ietf.org/mailman/listinfo/netmod >=20 -- Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C From nobody Tue Oct 13 11:25:41 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8FCE1A1A1D; Tue, 13 Oct 2015 11:25:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 42tDxfHugH7v; Tue, 13 Oct 2015 11:25:34 -0700 (PDT) Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E99A51A0439; Tue, 13 Oct 2015 11:25:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5690; q=dns/txt; s=iport; t=1444760734; x=1445970334; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=pVu00i/w5YXJQZfO4SD1H/eJxw0fJNcuLZe0W/5n+lA=; b=K2dX6L1IiG7CUB/9xVxCAn+rFQBLEqSJeiTXGf6mKPSsxkoR3LE9tn2+ 1wfDvFkNA0XIwJgmb2qLkJt4uVfOsvq9iF1iIdx+o+zs4KpeGOZ7KG9WT lpo6nv7+8w6Q23ZDAZJIAaSyqlBPb+YU9UH0d0I6tsHSMtSxpZqIdQDDd M=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BZAgAoSx1W/5xdJa1egyZUbga+DQENgVoXCoJyggo1SgIcgS04FAEBAQEBAQGBCoQmAQEBAwEBAQEgEToEBxACAQgYAgImAgICJQsVEAIEDgWIJggNrluTRQEBAQEBAQEBAQEBAQEBAQEBAQEBARMEgSKKUYQ0DhgYGweCaYFFBZYWAY0ZnAcBHwEBQoQCcYUoAh4HHIEGAQEB X-IronPort-AV: E=Sophos;i="5.17,679,1437436800"; d="scan'208";a="197041838" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-4.cisco.com with ESMTP; 13 Oct 2015 18:25:33 +0000 Received: from XCH-ALN-011.cisco.com (xch-aln-011.cisco.com [173.36.7.21]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t9DIPXdb014402 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 13 Oct 2015 18:25:33 GMT Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-ALN-011.cisco.com (173.36.7.21) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 13 Oct 2015 13:25:19 -0500 Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.000; Tue, 13 Oct 2015 13:25:19 -0500 From: "Acee Lindem (acee)" To: Ladislav Lhotka Thread-Topic: [netmod] rib-data-model and routing-cfg Thread-Index: AQHRAmpn2WDjXB7SH0yyXI3vdDB1jJ5jMMMAgAZwt4CAAFZcgP//3TyA Date: Tue, 13 Oct 2015 18:25:19 +0000 Message-ID: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.116.152.199] Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Cc: Routing YANG , "i2rs@ietf.org" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 18:25:35 -0000 DQoNCk9uIDEwLzEzLzE1LCAxMjozMCBQTSwgIkxhZGlzbGF2IExob3RrYSIgPGxob3RrYUBuaWMu Y3o+IHdyb3RlOg0KDQo+DQo+PiBPbiAxMyBPY3QgMjAxNSwgYXQgMTc6MjAsIEFjZWUgTGluZGVt IChhY2VlKSA8YWNlZUBjaXNjby5jb20+IHdyb3RlOg0KPj4gDQo+PiBIaSBMYWRhLCBORVRNT0Qs DQo+PiANCj4+IFNvIEkgdGhpbmsgd2Ugc2hvdWxkIG1vdmUgZm9yd2FyZCB0aGlzIGlldGYtcnRn LWNmZyBzbyB0aGF0IGl0IGNhbiBiZQ0KPj4gYXVnbWVudGVkIGFuZCBvdGhlciB3b3JrIGNhbiBt b3ZlIGZvcndhcmQuIFdlIGFyZSBzdGlsbCBpbiBkaXNhZ3JlZW1lbnQNCj4+IHdpdGggcmVzcGVj dCB0byByb3V0aW5nLWluc3RhbmNlL2ludGVyZmFjZSBjb25maWd1cmF0aW9uLg0KPj4gDQo+PiAg ICAtIFdlIGZlZWwgdGhlIElQdjQvSVB2NiBpbnRlcmZhY2VzIHNob3VsZCByZWZlcmVuY2UgdGhl DQo+PiByb3V0aW5nLWluc3RhbmNlIGluIHRoZWlyIGNvbmZpZyBzdGF0ZS4gVGhpcyBpcyBjb25z aXN0ZW50IHdpdGgNCj4+IGRyYWZ0LXJ0Z3lhbmdkdC1ydGd3Zy1kZXZpY2UtbW9kZWwtMDEudHh0 Lg0KPj4gICAgLSBZb3UgZmVlbCB0aGF0IHRoZSByb3V0aW5nLWluc3RhbmNlIHNob3VsZCBoYXZl IGEgbGlzdCBvZiBsZWFmLXJlZuKAmXMNCj4+IHRvIHRoZSBpbnRlcmZhY2UuIFlvdSBiZWxpZXZl IHRoZSBsZWFmLXJlZiBwcm92aWRlcyBhIGxldmVsIG9mDQo+PnZhbGlkYXRpb24NCj4+IGR1ZSB0 byB0aGUgZmFjdCB0aGF0IHJlZmVyZW5jZXMgY2FuIGJlIGNvbmZpbmVkIHRvIHJvdXRpbmctaW5z dGFuY2UNCj4+IHJlZmVyZW5jZXMuIEhvd2V2ZXIsIGhlcmV0b2ZvcmUsIG5vIG1vZGVscyBhcmUg cmVmZXJlbmNpbmcgdGhlIGludGVyZmFjZQ0KPj4gbGVhZi1yZWZzIGluIHRoZSBsaXN0Lg0KPg0K PlRydWUsIHRoZXNlIG1vZGVscyAoaWV0Zi1pc2lzLCBmb3IgaW5zdGFuY2UpIHVzZSBsZWFmcmVm cyB3aXRoDQo+ImlmOmludGVyZmFjZS1yZWYiIHR5cGUuIEhvd2V2ZXIsIHN1Y2ggbGVhZnJlZnMg YXJlIHVuZGVyLWNvbnN0cmFpbmVkDQo+YmVjYXVzZSB0aGV5IGNhbiBiZSBjb25maWd1cmVkIHRv IHJlZmVyIHRvOg0KPg0KPi0gaW50ZXJmYWNlcyBvZiBhbnkgbGF5ZXIsIGluY2x1ZGluZyBwaHlz aWNhbCBpbnRlcmZhY2VzLCBWTEFOIHRydW5rcyBldGMuDQoNCkFjdHVhbGx5LCBwdXR0aW5nIHRo ZSByb3V0aW5nLWluc3RhbmNlIHJlZmVyZW5jZSBpbiB0aGUgSVB2NCBhbmQgSVB2Ng0KaW50ZXJm YWNlIG1vZGVscyAoaS5lLiwgUkZDIDcyNzcpIGNvbnN0cmFpbnMgdGhlIHJlZmVyZW5jZSB0byBs YXllciAzIG1vcmUNCmVmZmVjdGl2ZWx5IHRoYW4gdGhlIGxpc3Qgb2YgbGVhZi1yZWZzLg0KDQo+ DQo+LSBpbnRlcmZhY2VzIGFzc2lnbmVkIHRvIGFueSByb3V0aW5nIGluc3RhbmNlLg0KDQpCdXQg dGhlIGxpc3Qgb2YgbGVhZi1yZWZzIGRvZXNu4oCZdCBpbnN1cmUgYW4gSVB2NCBpbnRlcmZhY2Ug b3IgSVB2Ng0KaW50ZXJmYWNlIGlzbuKAmXQgaW5jbHVkZWQgYnkgYSBzaW5nbGUgcm91dGluZy1p bnN0YW5jZS4NCg0KPg0KPkkgYmVsaWV2ZSBpbiBhbGwgdGhlc2UgY2FzZXMgdGhlIGNob2ljZSBo YXMgdG8gYmUgbGltaXRlZCB0byAoMSkgTDMNCj5pbnRlcmZhY2VzLCBhbmQgKDIpIGJlbG9uZ2lu ZyB0byAib3duIiByb3V0aW5nIGluc3RhbmNlLiBUaGVzZQ0KPmNvbnN0cmFpbnRzIHdpbGwgaGF2 ZSB0byBiZSBjaGVja2VkIGluIHNlcnZlciBjb2RlIHNvbWVob3cgLSBJIHdvdWxkDQo+cHJlZmVy IHRvIGhhdmUgdGhlbSByZXByZXNlbnRlZCBpbiB0aGUgZGF0YSBtb2RlbC4NCj4NCj5CdXQgaWYg bm9ib2R5IHNoYXJlcyB0aGlzIGNvbmNlcm4gd2l0aCBtZSwgSSBhbSBub3QgZ29pbmcgdG8gYmxv Y2sgdGhlDQo+ZG9jdW1lbnQgb24gdGhpcyBpc3N1ZS4NCg0KSeKAmWQgYWxzbyBiZSBpbnRlcmVz dGVkIGlmIGFueW9uZSBzaGFyZXMgdGhpcyBjb25jZXJuLg0KDQpUaGFua3MsDQpBY2VlIA0KDQoN Cj4NCj5MYWRhIA0KPg0KPj4gDQo+PiBPdGhlciB0aGFuIHRoZSBSb3V0aW5nIFlBTkcgRGVzaWdu IFRlYW0gaGF2aW5nIGNob3NlbiB0aGUgZmlyc3Qgb3B0aW9uIC0NCj4+IGFyZSB0aGVyZSBhbnkg b3RoZXIgb3BpbmlvbnM/DQo+PiANCj4+IFRoYW5rcywNCj4+IEFjZWUNCj4+IA0KPj4gT24gMTAv OS8xNSwgOTowMCBBTSwgIm5ldG1vZCBvbiBiZWhhbGYgb2YgQWNlZSBMaW5kZW0gKGFjZWUpIg0K Pj4gPG5ldG1vZC1ib3VuY2VzQGlldGYub3JnIG9uIGJlaGFsZiBvZiBhY2VlQGNpc2NvLmNvbT4g d3JvdGU6DQo+PiANCj4+PiBIaSBMYWRhLCANCj4+PiBJMlJTIGlzIG5vdCBjaGFydGVyZWQgdG8g ZG8gdGhlIGJhc2UgbW9kZWxzLiBUaGVyZSBhcmUgb3RoZXIgcm91dGluZw0KPj4+IG1vZGVscyB0 aGF0IHJlZmVyZW5jZSByb3V0aW5nLWNmZyBhbmQgZXZlbiBpbi1wcm9ncmVzcyBpbXBsZW1lbnRh dGlvbnMuDQo+Pj4gDQo+Pj4gT24gMTAvOS8xNSwgNDoxMyBBTSwgIm5ldG1vZCBvbiBiZWhhbGYg b2YgTGFkaXNsYXYgTGhvdGthIg0KPj4+IDxuZXRtb2QtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhh bGYgb2YgbGhvdGthQG5pYy5jej4gd3JvdGU6DQo+Pj4gDQo+Pj4+IEhpLA0KPj4+PiANCj4+Pj4g SSBhbSBzb3JyeSBmb3IgY3Jvc3MtcG9zdGluZyBidXQgSSB0aGluayBpdCBpcyBoaWdoIHRpbWUg dG8gZGVjaWRlIHRoZQ0KPj4+PiByZWxhdGlvbnNoaXAgYmV0d2VlbiB0aGUgZGF0YSBtb2RlbHMg aW4gaTJycy1yaWItZGF0YS1tb2RlbCBhbmQNCj4+Pj4gbmV0bW9kLXJvdXRpbmctY2ZnIEktRHMg YmVjYXVzZSB0aGV5IGNsZWFybHkgdGFyZ2V0IHRoZSBzYW1lDQo+Pj4+bWFuYWdlbWVudA0KPj4+ PiBkYXRhIGluIGEgcm91dGVyLiBJIGNhbiBzZWUgdGhyZWUgcG9zc2libGUgc2NlbmFyaW9zOg0K Pj4+PiANCj4+Pj4gMS4gVGhlIGkycnMtcmliIG1vZHVsZSB3aWxsIGJlIG1vZGlmaWVkIHRvIGF1 Z21lbnQNCj4+Pj4gaWV0Zi1yb3V0aW5nL2lldGYtaXB2WzQ2XS11bmljYXN0LXJvdXRpbmcuDQo+ Pj4gDQo+Pj4gVGhpcyB3b3VsZCBzZWVtIHRvIGJlIHRoZSBvYnZpb3VzIGNob2ljZS4NCj4+PiAN Cj4+Pj4gDQo+Pj4+IDIuIFRoZSBzY29wZSBvZiBpZXRmLXJvdXRpbmcgd2lsbCBiZSBjaGFuZ2Vk IHNvIHRoYXQgaXQgd291bGQgYWRkcmVzcw0KPj4+PiBvbmx5IGhvc3Qgcm91dGluZyBhbmQgc2lt cGxlIHJvdXRlcnMuIFRoZSBtb2RlbGxpbmcgd29yayBmb3IgYWR2YW5jZWQNCj4+Pj4gcm91dGVy cyB3aWxsIGJlIGRvbmUgZWxzZXdoZXJlLg0KPj4+PiANCj4+Pj4gMy4gVGhlIHdvcmsgb24gbmV0 bW9kLXJvdXRpbmctY2ZnIHdpbGwgYmUgc3RvcHBlZC4NCj4+PiANCj4+PiBBIGZvdXJ0aCBvcHRp b24gd291bGQgYmUgZm9yIG1lIHRvIHRha2Ugb3ZlciBvd25lcnNoaXAsIG1vdmUgdGhlIHdvcmsN Cj4+PnRvDQo+Pj4gdGhlIFJURyBXRywgYW5kIHdl4oCZZCByZWNydWl0IHNvbWUgc3Ryb25nIGF1 dGhvcnMvcmV2aWV3ZXJzIGZyb20NCj4+Pm9wZXJhdG9ycw0KPj4+IGFuZCBvdGhlciB2ZW5kb3Jz IChpbnZvbHZpbmcgdGhlIEFEcyBpbiBzZWxlY3Rpb24pLg0KPj4+IA0KPj4+IFRoYW5rcywNCj4+ PiBBY2VlIA0KPj4+IA0KPj4+IA0KPj4+PiANCj4+Pj4gT3BpbmlvbnM/DQo+Pj4+IA0KPj4+PiBU aGFua3MsIExhZGENCj4+Pj4gDQo+Pj4+IC0tDQo+Pj4+IExhZGlzbGF2IExob3RrYSwgQ1ouTklD IExhYnMNCj4+Pj4gUEdQIEtleSBJRDogRTc0RThDMEMNCj4+Pj4gDQo+Pj4+IA0KPj4+PiANCj4+ Pj4gDQo+Pj4+IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f DQo+Pj4+IG5ldG1vZCBtYWlsaW5nIGxpc3QNCj4+Pj4gbmV0bW9kQGlldGYub3JnDQo+Pj4+IGh0 dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vbmV0bW9kDQo+Pj4gDQo+Pj4gX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4+PiBuZXRtb2Qg bWFpbGluZyBsaXN0DQo+Pj4gbmV0bW9kQGlldGYub3JnDQo+Pj4gaHR0cHM6Ly93d3cuaWV0Zi5v cmcvbWFpbG1hbi9saXN0aW5mby9uZXRtb2QNCj4+IA0KPg0KPi0tDQo+TGFkaXNsYXYgTGhvdGth LCBDWi5OSUMgTGFicw0KPlBHUCBLZXkgSUQ6IEU3NEU4QzBDDQo+DQo+DQo+DQo+DQoNCg== From nobody Tue Oct 13 14:35:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83FE21A905F for ; Tue, 13 Oct 2015 14:35:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.707 X-Spam-Level: X-Spam-Status: No, score=-2.707 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ooMHUCBpcoZ2 for ; Tue, 13 Oct 2015 14:35:35 -0700 (PDT) Received: from nm19-vm4.bullet.mail.gq1.yahoo.com (nm19-vm4.bullet.mail.gq1.yahoo.com [98.136.217.27]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A41451A905C for ; Tue, 13 Oct 2015 14:35:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1444772135; bh=5XMRfHXT+zNghACfwa16YVfPMWyxsXsvML8icTjCFjs=; h=Date:Subject:From:To:CC:References:In-Reply-To:From:Subject; b=YxhFs0xmlTf6rZf7vq7mAMOyzxvb1xkgfCeG/0VGH3Mw6WjdmuUCCDjRiBw+3/kOn1QIguhybAdjc04tMv0gWuoORNDr1zGKRSF6jkcpD5NkrAlswC2ARC12JhxcuZkPg8LyHHmVatKbr5pNOYpcFoshylxBs3KoVS1eKByJSnBhEPZKy+f87IcnyfFXMLaLScAc9+L7nj/gTC7qWJ5WVbHADCUQPZoh+genw2S92g0LVZqwNPHg38H6zNAvAWi4bgbjJtXH8TBc/wSvCh+n6AlpcB7r41QZyygRsOK5E6woUNeSjYmpY+tZanXVY/xFNlr7/2upNaBi5nFqpKl3cA== Received: from [216.39.60.181] by nm19.bullet.mail.gq1.yahoo.com with NNFMP; 13 Oct 2015 21:35:35 -0000 Received: from [98.136.164.77] by tm17.bullet.mail.gq1.yahoo.com with NNFMP; 13 Oct 2015 21:35:35 -0000 Received: from [127.0.0.1] by smtp239.mail.gq1.yahoo.com with NNFMP; 13 Oct 2015 21:35:35 -0000 X-Yahoo-Newman-Id: 89720.29845.bm@smtp239.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: _sgwNZgVM1lt9QkzIIcfu90RKNKuHHCqR7yEqg9L4klC2yq vrC6wZOkH98N8kfRV6MjQDS9luCidsO4ex7m5q9I8knucceEPgXiFGvls6Fi 9UMf1agpGHIAZt0XwQIIws7xtULqhfufgVvOtzyDV1I1Z3L8EStg5rUDi9C9 ZO_6aV3YzOt2vAw4ArVtDNqlrlntFjbbHLZnT3T.59Kdi787kuTyeLnxbjuD qnixwe6cfQRIJFplPNZZ8turswbXvXqsL9X3IxBMpebAxZ0QCuZm4ZAb9Tg2 hJGYAsC339idXZze2Y12peSpv846uJoMQLNzn3oDVo3UXtJSrivpPNAk0BJ7 nH1_a4F8oZIqagZsL780hn7zF0UBMOVz_18zRhCnAB4e59Zf1lWkqpJ.1An. vXmPBmdVC1qkLrzNSixwvIRd6AT39_Yjt0rPWUvd08KI82EuHCMXmQCoZdkY jbfztITTz2Id61dLfPRiLHijzTqm9AB47242FCUZnistd2mXnDozN0UCjqnC dgHc1YSRnfERPu4LNfcdC1GCDYO6HdhGGOKs3OAc- X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Tue, 13 Oct 2015 14:35:25 -0700 From: Nitin Bahadur To: "Jeffrey (Zhaohui) Zhang" , Susan Hares , "i2rs@ietf.org" Message-ID: Thread-Topic: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) References: <009a01d10098$2b03bfb0$810b3f10$@ndzh.com> In-Reply-To: Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3527591734_53924627" Archived-At: Cc: "sriganesh.kini@ericsson.com" Subject: Re: [i2rs] draft-ietf-i2rs-rib-info-model-07 - WG LC from (10/6 to 10/20/2015) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Oct 2015 21:35:37 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3527591734_53924627 Content-type: text/plain; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable o tunnel encap: This can be an encap representing an IP tunnel or MPLS tunnel or others as defined in this document. An optional egress interface can be specified to indicate which interface to send the packet out on. The egress interface is useful when the network device contains Ethernet interfaces and one needs to perform address resolution for the IP packet. =20 I don=B9t think an egress interface should be part of the tunnel encap. The egress interface and optionally a nbr address should be in a separate chain member. NB> Removed. =20 ::=3D ( ...) ::=3D ( [] [] []) | ( []) =20 is part of - so does not make sense= ? =20 NB> There was no easy place to put the POP operation. One option would have been to define . =20 Zzh> I think that option is better. =20 Will add Thanks Nitin --B_3527591734_53924627 Content-type: text/html; charset="ISO-8859-1" Content-transfer-encoding: quoted-printable


 =  o  tunnel encap: This can be an encap representing an IP tunnel = or

&n= bsp;     MPLS tunnel or others as defined in this docume= nt.  An optional

      egress interface can be spec= ified to indicate which interface to

      send the pack= et out on.  The egress interface is useful when the

    =   network device contains Ethernet interfaces and one needs to

  &= nbsp;   perform address resolution for the IP packet.

 =

I don’t think an egress interface shou= ld be part of the tunnel encap. The egress interface and optionally a nbr ad= dress should be in a separate chain member.


NB> Removed.


 

<mpls-header> ::=3D (<mpls-label-operation> ...)

<mpl= s-label-operation> ::=3D (<MPLS_PUSH> <MPLS_LABEL> [<S_BIT&g= t;]

&= nbsp;            = ;            &nb= sp;  [<TOS_VALUE>] [<TTL_VALUE>]) |

    &nbs= p;            &n= bsp;          (<MPLS_POP>= [<TTL_ACTION>])

 

<mpls-header> is part of <tunnel-encap> - = so <MPLS_POP> does not make sense?

 <= o:p>

NB> There was no easy place to put the POP oper= ation. One option would have been to define <tunnel-decap>.=

 

Z= zh> I think that option is better.

=

 <= /o:p>


Wil= l add <tunnel-decap>

Thanks
Nitin
--B_3527591734_53924627-- From nobody Tue Oct 13 20:48:31 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FDE31B2AE3 for ; Tue, 13 Oct 2015 20:48:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vLwjvhNHxJIb for ; Tue, 13 Oct 2015 20:48:28 -0700 (PDT) Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F1671B2AE4 for ; Tue, 13 Oct 2015 20:48:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6540; q=dns/txt; s=iport; t=1444794508; x=1446004108; h=from:to:cc:subject:date:message-id:mime-version; bh=Uv+QCLr8EMzniK6JeD9oUJNBWmGdk7MsExpFegNFUzA=; b=flXztBhCvG/ZzwkHr/OABXaBefaDGK59dDAA5wUgiyI1CbndOKwC91rh rFPrx7A47OjfqRjeHyDp2/Wmv5bT7+zhfHM37yT22HOT/gDaVxuFi0o6U DUi5dctq/efnRHdq9l0dcgCD8XIg0SoiPwDmTlnSi1n5HsA+KpAmsp1nq 0=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DqAgAgzx1W/5ldJa1egllNVG4GuWmEIgENgVoXAQmCcoIKf4FGOBQBAQEBAQEBfwuEKQQtTBIBLVMmAQQODQGIJQ3CWgEBAQEBAQEBAQEBAQEBAQEBAQEBAReGdYoHBII1T4ExBZYWAYUYh3qBX4Q6lXUBHwEBQoQCcQGFaoEGAQEB X-IronPort-AV: E=Sophos; i="5.17,681,1437436800"; d="scan'208,217"; a="35488875" Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-9.cisco.com with ESMTP; 14 Oct 2015 03:48:27 +0000 Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t9E3mRBP010918 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for ; Wed, 14 Oct 2015 03:48:27 GMT Received: from xch-aln-013.cisco.com (173.36.7.23) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Tue, 13 Oct 2015 22:48:14 -0500 Received: from xch-aln-013.cisco.com ([173.36.7.23]) by XCH-ALN-013.cisco.com ([173.36.7.23]) with mapi id 15.00.1104.000; Tue, 13 Oct 2015 22:48:13 -0500 From: "Eric Voit (evoit)" To: "i2rs@ietf.org" Thread-Topic: I2RS requirements in YANG PubSub drafts for NETCONF, RESTCONF, HTTP/2 Thread-Index: AdEGMxwrYB8CDHgGSYy2H35St/LWOg== Date: Wed, 14 Oct 2015 03:48:13 +0000 Message-ID: <56dda8e1105144d098a70f4b1d84f993@XCH-ALN-013.cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.118.56.228] Content-Type: multipart/alternative; boundary="_000_56dda8e1105144d098a70f4b1d84f993XCHALN013ciscocom_" MIME-Version: 1.0 Archived-At: Cc: "Ambika Prasad Tripathy \(ambtripa\)" , "Einar Nilsen-Nygaard \(einarnn\)" , "Alexander Clemm \(alex\)" , "Alberto Gonzalez Prieto \(albertgo\)" Subject: [i2rs] I2RS requirements in YANG PubSub drafts for NETCONF, RESTCONF, HTTP/2 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Oct 2015 03:48:30 -0000 --_000_56dda8e1105144d098a70f4b1d84f993XCHALN013ciscocom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable We just posted two drafts in NETCONF. These drafts technology specificatio= ns aiming to cover the requirements from I2RS as per: https://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ These drafts are: (1) Subscribing to YANG datastore push updates (updated) http://www.ietf.org/id/draft-clemm-netconf-yang-push-02.txt (2) Restconf subscription and HTTP push for YANG datastores (new) http://www.ietf.org/id/draft-voit-restconf-yang-push-00.txt Draft (2) is new in that it: * proposes Restconf subscription and push mechanisms to continuously st= ream information from YANG datastores over HTTP * provides a mechanism to support static subscriptions so that an opera= tor can stream updates over HTTP without Restconf * provides YANG model extensions to leverage HTTP/2 so that individual = subscriptions can get custom treatment via their own HTTP streams. If you are interested, please come over and follow the discussions in NETCO= NF. Thanks! - Alexander Clemm, Eric Voit, Alberto Gonzalez Prieto, Ambika Prasad Tripat= hy, & Einar Nilsen-Nygaard --_000_56dda8e1105144d098a70f4b1d84f993XCHALN013ciscocom_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

We just posted two drafts in NETCONF.  These dr= afts technology specifications aiming to cover the requirements from I2RS a= s per:

https://datatr= acker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/

These drafts are:=

 

(1)  Subscribing to YANG datastore push updates= (updated)

http://www.ietf.org/id/draft-clemm-netconf-yang-push-02= .txt

 

(2) Restconf subscription and HTTP push for YANG dat= astores (new)

http://www.ietf.org/id/draft-voit-restconf-yang-push-00= .txt

   Draft (= 2) is new in that it:

· =     proposes Restconf subscription and push mechanisms to continuously s= tream information from YANG datastores over HTTP

· =     provides a mechanism to support static subscriptions so that an oper= ator can stream updates over HTTP without Restconf

· =     provides YANG model extensions to leverage HTTP/2 so that individual= subscriptions can get custom treatment via their own HTTP streams. 

 

If you are interested, please come over and follow t= he discussions in NETCONF.  Thanks!

 

- Alexander Clemm, Eric Voit, Alberto Gonzalez Priet= o, Ambika Prasad Tripathy, & Einar Nilsen-Nygaard

 

 

 

 

--_000_56dda8e1105144d098a70f4b1d84f993XCHALN013ciscocom_-- From nobody Wed Oct 14 00:55:57 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA0601B2C15 for ; Wed, 14 Oct 2015 00:55:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r160U8sTMQHK for ; Wed, 14 Oct 2015 00:55:52 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 661881A9025 for ; Wed, 14 Oct 2015 00:55:51 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CCN41153; Wed, 14 Oct 2015 07:55:49 +0000 (GMT) Received: from NKGEML406-HUB.china.huawei.com (10.98.56.37) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 14 Oct 2015 08:55:49 +0100 Received: from NKGEML512-MBX.china.huawei.com ([169.254.7.203]) by nkgeml406-hub.china.huawei.com ([10.98.56.37]) with mapi id 14.03.0235.001; Wed, 14 Oct 2015 15:55:45 +0800 From: "Dongjie (Jimmy)" To: "Joel M. Halpern" , Susan Hares , "i2rs@ietf.org" Thread-Topic: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol Thread-Index: AdEFlL52fGoodKw9S7qe8w+evsk1tv//8DOA//5vneA= Date: Wed, 14 Oct 2015 07:55:44 +0000 Message-ID: <76CD132C3ADEF848BD84D028D243C927743B80A5@nkgeml512-mbx.china.huawei.com> References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561D29F9.6030704@joelhalpern.com> In-Reply-To: <561D29F9.6030704@joelhalpern.com> Accept-Language: en-US, zh-CN Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.111.97.131] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: Cc: "jhaas@pfrc.org" , 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 14 Oct 2015 07:55:56 -0000 Agree to reduce to "all-or-nothing" at current stage. If later we find use = cases for the other two modes, they can be added back. Best regards, Jie > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joel M. Halpern > Sent: Tuesday, October 13, 2015 11:58 PM > To: Susan Hares; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplific= ation for > initial I2RS protocol >=20 > I can live with this reduction. It simplifies the agent implementation (= as it only > has to support one instead of three modes). The increase in effort on th= e > client is small. If we find out that, as was suspected, there are perfor= mance > issues, then we can add back the other error modes. >=20 > Yours, > Joel >=20 > On 10/13/15 4:57 AM, Susan Hares wrote: > > Currently the I2RS requirements have error handling having three parts: > > > > 1)"all-or-nothing", > > > > 2)"continue-on-error", and > > > > 3)"stop-on-error". > > > > To provide an easier first step for the I2RS Agent for the first > > implementation of an I2RS protocol, the I2RS protocol design team > > suggests reduce this to the "all-or-nothing" for the initial version. > > Later versions of the I2RS protocol can provide the "continue-on-error" > > or "stop-on-error" error handling. The earlier decision in the I2RS > > architecture was to support all 3 error handling pieces. > > > > Sue Hares and Jeff Haas > > > > > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Wed Oct 14 18:25:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20C841B2E85 for ; Wed, 14 Oct 2015 18:24:59 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8CRclw6EqM3K for ; Wed, 14 Oct 2015 18:24:57 -0700 (PDT) Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 479761B2E78 for ; Wed, 14 Oct 2015 18:24:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13771; q=dns/txt; s=iport; t=1444872297; x=1446081897; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=P2D8wDWNR0jPH1Nh3ZoM5hQZiFfo1L+l9LrvFteql+I=; b=jnbb+JYDXmXKPtROvYY6uX2cvNgrAE/zXr9gm3RujHYLoGYqGHsjG01O 1aNdwjG/B2nRmqumwU3Ad7m5gpX8wS1O4CwwYkuheQJvp8Jq/MI0iFgh2 7mAnoHj6n6s1ENvTPbKf8gXZJLHs4b7itHGyWsV8gVH8SSpUd60qaKFtD M=; X-Files: signature.asc : 841 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DhAgDC/x5W/5ldJa1egllNVG4GrBmRCQ6BWhcBC4V5AoFEOBQBAQEBAQEBgQqEJgEBAQMBAQEBIEsLBQsCAQgOCicDAgInCxQRAQEEDgUOiBgIDa9ek00BAQEBAQEBAQEBAQEBAQEBAQEBAQEXhnaCEIJuhQkEB4JpMYEUBZYXAYJNgWFqiAIFghuZagERDgFDghEdgVVxhWmBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,683,1437436800"; d="asc'?scan'208,217";a="40844986" Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-2.cisco.com with ESMTP; 15 Oct 2015 01:24:56 +0000 Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t9F1Ouvf026108 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Oct 2015 01:24:56 GMT Received: from xch-aln-020.cisco.com (173.36.7.30) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 14 Oct 2015 20:24:42 -0500 Received: from xch-aln-020.cisco.com ([173.36.7.30]) by XCH-ALN-020.cisco.com ([173.36.7.30]) with mapi id 15.00.1104.000; Wed, 14 Oct 2015 20:24:41 -0500 From: "Carlos Pignataro (cpignata)" To: Susan Hares Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - Thread-Index: AdEAk2BU9yZ2WnJ8TuuGrQLrVu1BdAGftQMA Date: Thu, 15 Oct 2015 01:24:41 +0000 Message-ID: References: <007301d10095$65bb8410$31328c30$@ndzh.com> In-Reply-To: <007301d10095$65bb8410$31328c30$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.82.228.142] Content-Type: multipart/signed; boundary="Apple-Mail=_F6D6EE8A-7D7A-4732-933F-14584FD43A19"; protocol="application/pgp-signature"; micalg=pgp-sha256 MIME-Version: 1.0 Archived-At: Cc: Jeffrey Haas , "i2rs@ietf.org" , Alia Atlas Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 01:24:59 -0000 --Apple-Mail=_F6D6EE8A-7D7A-4732-933F-14584FD43A19 Content-Type: multipart/alternative; boundary="Apple-Mail=_CD9389D3-EC6D-42B5-86E1-17C7FD92A687" --Apple-Mail=_CD9389D3-EC6D-42B5-86E1-17C7FD92A687 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hi, Sue, Sorry, I am a bit confused =E2=80=94 draft-ietf-i2rs-traceability = finished WG LC over 4 months ago. Looking at = https://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/history/ = = you might recall: 2015-06-12 03 Susan Hares IETF WG state changed to WG = Consensus: Waiting for Write-Up from In WG Last Call 2015-05-26 02 Susan Hares WG LC (5/26 to 6/9) for = inclusion in requirements 2015-05-26 02 Susan Hares IETF WG state changed to In WG = Last Call from WG Document And so did draft-ietf-i2rs-pub-sub-requirements BTW. What is the goal of this new WG LC? Thanks, =E2=80=94 Carlos. > On Oct 6, 2015, at 8:16 PM, Susan Hares wrote: >=20 > This begins a 2 week WG LC on the following requirement documents for = I2RS: >=20 > draft-ietf-i2rs-ephemeral-state-02.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ = >=20 > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > This section is blank and this will be discussed at the 10/17/2015 = interim. > We will discuss whether this section should be kept or removed. >=20 > draft-ietf-i2rs-protocol-security-requirements-01.txt > = http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirem= ents/ = >=20 > draft-ietf-i2rs-pub-sub-requirements-03.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ = >=20 > draft-ietf-i2rs-traceability-03.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ = >=20 > Sue Hares >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs = --Apple-Mail=_CD9389D3-EC6D-42B5-86E1-17C7FD92A687 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Hi, Sue,

Sorry, I am a bit confused = =E2=80=94 draft-ietf-i2rs-traceability finished WG LC over 4 months = ago.


2015-06-12 03 Susan Hares IETF WG = state changed to WG Consensus: Waiting for Write-Up from In WG = Last Call
2015-05-26 02 Susan Hares WG LC = (5/26 to 6/9) for inclusion in requirements
2015-05-26 02 Susan = Hares = IETF WG state changed to In WG Last Call from WG = Document

And = so did draft-ietf-i2rs-pub-sub-requirements BTW.

What is the goal of this = new WG LC?

Thanks,

=E2=80=94 Carlos.

On = Oct 6, 2015, at 8:16 PM, Susan Hares <shares@ndzh.com> = wrote:

This begins a 2 week WG LC on the = following requirement documents for I2RS: 
 
draft-ietf-i2rs-ephemeral-state-02.txt  
 
Note: = I2RS ephemeral state has a section on minimal NETCONF = Changes.  
This = section is blank and this will be discussed at the 10/17/2015 = interim.
We will discuss whether this section should be kept or = removed.   
 
draft-ietf-i2rs-protocol-security-requirements-01.txt 
 
draft-ietf-i2rs-pub-sub-requirements-03.txt 
 
draft-ietf-i2rs-traceability-03.txt 
_______________________________________________
i2rs mailing = list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

= --Apple-Mail=_CD9389D3-EC6D-42B5-86E1-17C7FD92A687-- --Apple-Mail=_F6D6EE8A-7D7A-4732-933F-14584FD43A19 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="signature.asc" Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIbBAEBCAAGBQJWHwBmAAoJEIXgpQGOZny95IYP913JUhr+5PQmlCt+WGZmHJGl P3ajThSbiTmQVqUOmeyWTmDfcVTi2tzl3NvnU8Ambnlvr1Zwnjr0jO4OBa701ulz I+z/34X99L5Gi6NUmG0Xo+NkjsG063YiIKWWmt1vYRliA69uHF/ENJXvMgArSXMn IoXIfRB1ssJbo6ruZgTN5hvTctCZJqUyjO9RMkHc5JvQfHHZkkS/BNEFYEcmV3D9 vXUd1wwr+bb/yOJHtkGb/a3/7eRWDBpBwv+1snXucfXxmxveRC5RcMcpiN8UNo7F uZzB3h7uquba4GphuFWDzVE9P/f9zx1PhQKro0t6fKbN/TLRUj8ZOxUNciwrgvHm BaVmiexIKGPhldT9fWv913ObkwGzjq8Ujt64RPdZJg5R9Ghr1EWniPUjZGzsY8Re oV7krM2FloDn1TNo3Sue9rWgRbs/yvKqfXq5QI4UMzOVzlWSVb1AwtbUzsztJwKa jc5QmJSUge+KhGxxwT91UjawBw1f5uhB4bZAI/UELHYxTIwUEklJm753V7bIgUL0 80ikbRNkcnqqA0QNBYuuuRW2wDanWMwoMUFSU0SVPHI+gv4MrjtAghZkQT1GXYsp zU0LPhqdHcrMvuhLwP6htfU8DVnEd2NFKu0r0D/p+KS0wDEaUDzxhx0EBoFNgYUJ P+PZs9T5bBw3KkkQcFY= =kNfW -----END PGP SIGNATURE----- --Apple-Mail=_F6D6EE8A-7D7A-4732-933F-14584FD43A19-- From nobody Wed Oct 14 18:26:33 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 123D81B2E8F for ; Wed, 14 Oct 2015 18:26:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EglCQfj6G-vi for ; Wed, 14 Oct 2015 18:26:30 -0700 (PDT) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4EED91B2E8D for ; Wed, 14 Oct 2015 18:26:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15565; q=dns/txt; s=iport; t=1444872390; x=1446081990; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=FI6RB5SCZh0GXTqnoDppHzBNNQGoBbM7SStzh7ii3+A=; b=T7X+RzEAX0TewX+Q3q7s/Whq6aGNfuLSmXcJ2tvEtEchFEpYjtvsCcjt 8XZldlDyvmOxRBZitAbt//SRSCZtLAU6XRHdrOXIwDc4C3v7aPn/YhUeu aPKtL9CmnGW89EQuxPFXRGOdtCTwME5GzCRGqfnF1+D1IjCiCKCkoItUy U=; X-Files: signature.asc : 841 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0DiAgD6/x5W/4YNJK1egllNVG4GrBmRCQ6BWhcBC4V5AoFEOBQBAQEBAQEBgQqEJgEBAQMBAQEBIEsLBQsCAQgOAwQBAQEnAwICJwsUCQgBAQQOBQ6IGAgNr16TTAEBAQEBAQEBAQEBAQEBAQEBAQEBAReGdoIQgm6EOwEBTAQGAYJpMYEUBZYXAYJNgWFqiAKCIJlqAREOAUOCRIE/cQGFLjqBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,683,1437436800"; d="asc'?scan'208,217";a="35820179" Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-7.cisco.com with ESMTP; 15 Oct 2015 01:26:29 +0000 Received: from XCH-RCD-018.cisco.com (xch-rcd-018.cisco.com [173.37.102.28]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id t9F1QTNA022288 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Oct 2015 01:26:29 GMT Received: from xch-aln-020.cisco.com (173.36.7.30) by XCH-RCD-018.cisco.com (173.37.102.28) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 14 Oct 2015 20:26:15 -0500 Received: from xch-aln-020.cisco.com ([173.36.7.30]) by XCH-ALN-020.cisco.com ([173.36.7.30]) with mapi id 15.00.1104.000; Wed, 14 Oct 2015 20:26:14 -0500 From: "Carlos Pignataro (cpignata)" To: Susan Hares Thread-Topic: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure Thread-Index: AdEB5+DLM5h+BqpqTSycX0eoPofscAFKosGA Date: Thu, 15 Oct 2015 01:26:14 +0000 Message-ID: <8A88801D-D647-486F-84F4-37EE70091955@cisco.com> References: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> In-Reply-To: <023401d101e9$0466aaa0$0d33ffe0$@ndzh.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.82.228.142] Content-Type: multipart/signed; boundary="Apple-Mail=_180A0AD0-3D0A-4DFC-8AD9-355B218024D8"; protocol="application/pgp-signature"; micalg=pgp-sha256 MIME-Version: 1.0 Archived-At: Cc: Jeffrey Haas , "i2rs@ietf.org" , Alia Atlas Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - IPR disclosure X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 01:26:32 -0000 --Apple-Mail=_180A0AD0-3D0A-4DFC-8AD9-355B218024D8 Content-Type: multipart/alternative; boundary="Apple-Mail=_C03D20B2-383A-4510-9D8D-BB5F4C661B8D" --Apple-Mail=_C03D20B2-383A-4510-9D8D-BB5F4C661B8D Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 No change since the WG (almost-)LC from May: https://www.ietf.org/mail-archive/web/i2rs/current/msg02514.html = Thanks, =E2=80=94 Carlos. > On Oct 8, 2015, at 12:47 PM, Susan Hares > wrote: >=20 > I2RS WG: >=20 > I missed an important part of the WG LC. Each author of each document = should indicate whether they have any IPR on the requirements. >=20 > Sue Hares >=20 > From: i2rs [mailto:i2rs-bounces@ietf.org = ] On Behalf Of Susan Hares > Sent: Tuesday, October 06, 2015 7:16 PM > To: i2rs@ietf.org > Cc: 'Jeffrey Haas'; 'Alia Atlas' > Subject: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - >=20 > This begins a 2 week WG LC on the following requirement documents for = I2RS: >=20 > draft-ietf-i2rs-ephemeral-state-02.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ = >=20 > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > This section is blank and this will be discussed at the 10/17/2015 = interim. > We will discuss whether this section should be kept or removed. >=20 > draft-ietf-i2rs-protocol-security-requirements-01.txt > = http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirem= ents/ = >=20 > draft-ietf-i2rs-pub-sub-requirements-03.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ = >=20 > draft-ietf-i2rs-traceability-03.txt > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ = >=20 > Sue Hares >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs = --Apple-Mail=_C03D20B2-383A-4510-9D8D-BB5F4C661B8D Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 No change since the WG (almost-)LC from May:

Thanks,

=E2=80=94 Carlos.

On = Oct 8, 2015, at 12:47 PM, Susan Hares <shares@ndzh.com> = wrote:

I2RS WG: 
 
I missed = an important part of the WG LC.  Each author of each document = should indicate whether they have any IPR on the requirements.
 
Sue = Hares 
 
From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf = Of Susan Hares
Sent: Tuesday, October 06, 2015 = 7:16 PM
To: i2rs@ietf.org
Cc: 'Jeffrey Haas'; 'Alia = Atlas'
Subject: [i2rs] WG LC for = requirement documents (10/6 to 10/20/2015) -
 
This begins a 2 week WG LC on the following requirement = documents for I2RS: 
 
draft-ietf-i2rs-ephemeral-state-02.txt  
 
Note: = I2RS ephemeral state has a section on minimal NETCONF = Changes.  
This = section is blank and this will be discussed at the 10/17/2015 = interim.
We will discuss whether this section should be kept or = removed.   
 
draft-ietf-i2rs-protocol-security-requirements-01.txt 
 
draft-ietf-i2rs-pub-sub-requirements-03.txt 
 
draft-ietf-i2rs-traceability-03.txt 
_______________________________________________
i2rs mailing = list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

= --Apple-Mail=_C03D20B2-383A-4510-9D8D-BB5F4C661B8D-- --Apple-Mail=_180A0AD0-3D0A-4DFC-8AD9-355B218024D8 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="signature.asc" Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJWHwDDAAoJEIXgpQGOZny9fnwP+gLkF80yzSOvU74o/VKQvXDx ObXBkCnf6w+MY3Brn3bVRDUfWgwfJHq72QI0nR+QnKZU++a1Lc2eV1OqfOYBbQlN GzDtvJs7owplP/gZ93OXN35d4d9eIhJqvtIkYC0tCEm6pBwfPX33ZJCKYy7yW9GB cU6Q1RRECDSba3Tsy7hBhu0iDR/48/swg42HXmCEx2H7hn7MOH23Xbh/lzB9lJyN rFQdnETrG+19sFZJBeGUaHYtwrzIH/c53AjTJPgNBhrw+a81CuJBPWpHgj7LEtSD ZT+TOTkvg1Ot/BHNJCDOaSCiRx3t6tAKyLssGdHMl24tJ/+3LpUdOevmudfodpg2 tTETDhrblitB4jWHaj7aVpkDdsIRacFIwP2Wab5VP5Xm5iWqPWDc8jkkuwHaOpOL N7/OUzH5e0fWjwpqOwawOoED1B10jNA2dSOdX6ToDI/KfmP9ZlSFMlci8CnaxCFS 7HWvD9Widt24w66wdIIl+WNy+qAEi1VlbLX5IQyXR42JHSgeHosqDwFbe8Mq8Dmm 15fURIvLJssIjxWwzsTO8myLLgu72E/wcwWmPS5KI/LFeJg8AubwSTe7wUkO6Kw2 TosfdGTK3+AMPOrFH1jLzG8H8w2mvxO8JyKuYqZTI3fruFgBIxIt+UadxHRBw+cQ 0bMrk01LPfv8cfDrKutE =INvN -----END PGP SIGNATURE----- --Apple-Mail=_180A0AD0-3D0A-4DFC-8AD9-355B218024D8-- From nobody Wed Oct 14 19:36:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 685391ACE2D for ; Wed, 14 Oct 2015 19:36:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TMfrrgSpFoE1 for ; Wed, 14 Oct 2015 19:36:35 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70AE11AC437 for ; Wed, 14 Oct 2015 19:36:35 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Carlos Pignataro \(cpignata\)'" References: <007301d10095$65bb8410$31328c30$@ndzh.com> In-Reply-To: Date: Wed, 14 Oct 2015 22:36:30 -0400 Message-ID: <011e01d106f2$4d7d3ac0$e877b040$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_011F_01D106D0.C66DE4B0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQFcUMQzbHuRSZnaJ/N5epYSlx5LtQDJON8An07lyJA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , i2rs@ietf.org, 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 02:36:37 -0000 This is a multipart message in MIME format. ------=_NextPart_000_011F_01D106D0.C66DE4B0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Carlos:=20 =20 Very good question. You are correct traceability was WG LC 4 months ago = (6/12/2015) and pub/sub (10/2/2015). This fine work paved the way for = the rest of the I2RS requirements to be completed. The NETMOD/NETCONF = chairs know these drafts have reached WG consensus.=20 =20 However, the other components of the I2RS requirements for the I2RS = protocol were not complete (I2rs security, I2rs ephemeral state). This = WG LC asks the WG to review all the I2RS requirements as a whole group = to see that the whole package of requirements are consistent. This WG LC = will not change the results of the pub/sub WG LCs, but other eyes may = review and provide you with additional review comments (always good). =20 =20 The I2RS WG, NETCONF/NETMOD WG, and the early I2RS protocol design team = have spent a great deal of time in July =E2=80=93 September working = through the other requirements for the I2RS protocol so this WG LC (10/6 = to 10/20) is for the WG to consider all the WG requirements at one = time. =20 =20 The 10/7/2015 I2RS interim provided some initial work on an I2RS = strawman for the I2RS protocol. The 10/21/2015 I2RS interim will = provide addition details on the strawman based on all of these = requirements.=20 =20 Thank you for asking this question, =20 Sue Hares=20 =20 From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Carlos Pignataro = (cpignata) Sent: Wednesday, October 14, 2015 9:25 PM To: Susan Hares Cc: Jeffrey Haas; i2rs@ietf.org; Alia Atlas Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) = - =20 Hi, Sue, =20 Sorry, I am a bit confused =E2=80=94 draft-ietf-i2rs-traceability = finished WG LC over 4 months ago. =20 Looking at = https://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/history/ = you might recall: 2015-06-12 03 Susan Hares IETF WG state changed to WG = Consensus: Waiting for Write-Up from In WG Last Call 2015-05-26 02 Susan Hares WG LC (5/26 to 6/9) for = inclusion in requirements 2015-05-26 02 Susan Hares IETF WG state changed to In WG = Last Call from WG Document =20 And so did draft-ietf-i2rs-pub-sub-requirements BTW. =20 What is the goal of this new WG LC? =20 Thanks, =20 =E2=80=94 Carlos. =20 On Oct 6, 2015, at 8:16 PM, Susan Hares wrote: =20 This begins a 2 week WG LC on the following requirement documents for = I2RS:=20 =20 draft-ietf-i2rs-ephemeral-state-02.txt =20 = http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ =20 Note: I2RS ephemeral state has a section on minimal NETCONF Changes. =20 This section is blank and this will be discussed at the 10/17/2015 = interim. We will discuss whether this section should be kept or removed. =20 =20 draft-ietf-i2rs-protocol-security-requirements-01.txt=20 = = http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-require= ments/ =20 draft-ietf-i2rs-pub-sub-requirements-03.txt=20 = http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ =20 draft-ietf-i2rs-traceability-03.txt=20 = http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ =20 Sue Hares=20 =20 _______________________________________________ i2rs mailing list i2rs@ietf.org = https://www.ietf.org/mailman/listinfo/i2rs =20 ------=_NextPart_000_011F_01D106D0.C66DE4B0 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable

Carlos:

 

Very good question. =C2=A0You are correct traceability was WG LC 4 = months ago (6/12/2015) and pub/sub (10/2/2015). =C2=A0This fine work = paved the way for the rest of the I2RS requirements to be completed. The = NETMOD/NETCONF chairs know these drafts have reached WG consensus. =

 

However, the other components of the I2RS requirements for the I2RS = protocol were not complete (I2rs security, I2rs ephemeral state).=C2=A0 = This WG LC asks the WG to review all the I2RS requirements as a whole = group to see that the whole package of requirements are consistent. This = WG LC will not change the results of the pub/sub WG LCs, but other eyes = may review and provide you with additional review comments (always = good). =C2=A0

 

The I2RS WG, NETCONF/NETMOD WG, and the early I2RS protocol design = team have spent a great deal of time in July =E2=80=93 September working = through the other requirements for the I2RS protocol so this WG LC (10/6 = to 10/20) =C2=A0is for the WG to consider all the WG requirements at one = time. =C2=A0

 

The 10/7/2015 I2RS interim provided some initial work on an I2RS = strawman for the I2RS protocol.=C2=A0 The 10/21/2015 I2RS interim will = provide addition details on the strawman based on all of these = requirements.

 

Thank you for asking this question,

 

Sue Hares

 

From:= = i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Carlos Pignataro = (cpignata)
Sent: Wednesday, October 14, 2015 9:25 = PM
To: Susan Hares
Cc: Jeffrey Haas; i2rs@ietf.org; = Alia Atlas
Subject: Re: [i2rs] WG LC for requirement documents = (10/6 to 10/20/2015) -

 

Hi, = Sue,

 

Sorry, I am a bit confused = =E2=80=94 draft-ietf-i2rs-traceability finished WG LC over 4 months = ago.

 


2015-06-12=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 03=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = Susan Hares=C2=A0=C2=A0=C2=A0 = IETF WG state changed to WG Consensus: Waiting for = Write-Up from In WG Last Call
2015-05-26=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 02=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = Susan Hares=C2=A0=C2=A0=C2=A0 = WG LC (5/26 to 6/9) for inclusion in = requirements
2015-05-26=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 02=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = Susan Hares=C2=A0=C2=A0=C2=A0 = IETF WG state changed to In WG Last Call from WG = Document

 

And so did draft-ietf-i2rs-pub-sub-requirements = BTW.

 

What is the goal of this new WG = LC?

 

Thanks,

 

=E2=80=94 Carlos.

 

On Oct 6, 2015, at 8:16 PM, Susan Hares <shares@ndzh.com> = wrote:

 

This = begins a 2 week WG LC on the following requirement documents for = I2RS: 

 =

draft-ietf-= i2rs-ephemeral-state-02.txt  

 =

Note: I2RS = ephemeral state has a section on minimal NETCONF Changes.  

This = section is blank and this will be discussed at the 10/17/2015 = interim.

We will = discuss whether this section should be kept or removed. =   

 =

draft-ietf-= i2rs-protocol-security-requirements-01.txt 

http://datatracker.ietf.org/doc/draft-ietf-i2rs-pr= otocol-security-requirements/

=

 =

draft-ietf-= i2rs-pub-sub-requirements-03.txt 

http://datatracker.ietf.org/doc/draft-ietf-i2rs-pu= b-sub-requirements/

 =

draft-ietf-= i2rs-traceability-03.txt 

http://datatracker.ietf.org/doc/draft-ietf-i2rs-tr= aceability/

 =

Sue = Hares 

 =

__________= _____________________________________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs

 

------=_NextPart_000_011F_01D106D0.C66DE4B0-- From nobody Wed Oct 14 20:20:45 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6C1D1B2F86 for ; Wed, 14 Oct 2015 20:20:43 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Va6DqsLU4RbH for ; Wed, 14 Oct 2015 20:20:43 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCDE51B2F85 for ; Wed, 14 Oct 2015 20:20:42 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Joe Clarke'" , References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> In-Reply-To: <561CFF59.3020604@cisco.com> Date: Wed, 14 Oct 2015 23:20:14 -0400 Message-ID: <01b601d106f8$69c836c0$3d58a440$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQEoIgrEBoPDtxDxKD7aeuKUQrt9ZAMAOITjn6WpaxA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 03:20:43 -0000 Joe: There will be some groups of data model have dependencies between objects. Some Client interactions will be orthogonal to each other. If there are groupings, then the dependencies may leave the I2RS agent and routing system in an unknown state. The "all-or-nothing" is the normal case for NETCONF/RESTCONF. If clients are based on the Netconf/RESTCONF code base, this will be the simple upward change. The I2RS agent needs to provide notification for error on writing for priority conflict, and for other errors. The Stop-on-error would also need to provide this input. Sue -----Original Message----- From: Joe Clarke [mailto:jclarke@cisco.com] Sent: Tuesday, October 13, 2015 8:56 AM To: Susan Hares; i2rs@ietf.org Cc: jhaas@pfrc.org; 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol On 10/13/15 04:57, Susan Hares wrote: > Currently the I2RS requirements have error handling having three parts: > > 1)"all-or-nothing", > > 2)"continue-on-error", and > > 3)"stop-on-error". > > To provide an easier first step for the I2RS Agent for the first > implementation of an I2RS protocol, the I2RS protocol design team > suggests reduce this to the "all-or-nothing" for the initial version. > Later versions of the I2RS protocol can provide the "continue-on-error" > or "stop-on-error" error handling. The earlier decision in the I2RS > architecture was to support all 3 error handling pieces. It seems to me the latter two would be easier to implement as the Client continues to fire (until not told to do so in the stop-on-error case) and the Agent wouldn't have to track all operations for rollback. Is the assumption that most I2RS transactions will have mutual dependencies, and this is the most common error case? Joe From nobody Wed Oct 14 23:24:16 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A63D91B30CF for ; Wed, 14 Oct 2015 23:24:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5-EhDCw0fhR8 for ; Wed, 14 Oct 2015 23:24:13 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 753421B30B8 for ; Wed, 14 Oct 2015 23:24:13 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 4481C8EA; Thu, 15 Oct 2015 08:24:12 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id y_jh9QNFizFQ; Thu, 15 Oct 2015 08:24:11 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Thu, 15 Oct 2015 08:24:11 +0200 (CEST) Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id E2EBE20053; Thu, 15 Oct 2015 08:24:10 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id RVigEI_V7RFS; Thu, 15 Oct 2015 08:24:09 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id B13A72004E; Thu, 15 Oct 2015 08:24:08 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 19EA937B3DD2; Thu, 15 Oct 2015 08:24:06 +0200 (CEST) Date: Thu, 15 Oct 2015 08:24:05 +0200 From: Juergen Schoenwaelder To: Susan Hares Message-ID: <20151015062403.GA70280@elstar.local> Mail-Followup-To: Susan Hares , "'Carlos Pignataro (cpignata)'" , 'Jeffrey Haas' , i2rs@ietf.org, 'Alia Atlas' References: <007301d10095$65bb8410$31328c30$@ndzh.com> <011e01d106f2$4d7d3ac0$e877b040$@ndzh.com> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline X-Clacks-Overhead: GNU Terry Pratchett Content-Transfer-Encoding: 8bit In-Reply-To: <011e01d106f2$4d7d3ac0$e877b040$@ndzh.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: 'Jeffrey Haas' , "'Carlos Pignataro \(cpignata\)'" , 'Alia Atlas' , i2rs@ietf.org Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 06:24:15 -0000 Susan, so let me state clearly once more that the ephemeral requirements document seems to be incomplete: 3.5. Minimal sub-set of Changes to NETCONF Ephemeral-REQ-07: The minimal set of changes are: (TBD). Potential set: TBD Note: I2RS protocol design team is working to complete this set of minimal changes. I assume you will need another WG last call once the missing pieces have been filled in. I am also not sure 'the NETMOD/NETCONF WGs have spent a great deal of time' - I think it was more a design team that involves people active in NETMOD and NETCONF. /js On Wed, Oct 14, 2015 at 10:36:30PM -0400, Susan Hares wrote: > Carlos: > > > > Very good question. You are correct traceability was WG LC 4 months ago (6/12/2015) and pub/sub (10/2/2015). This fine work paved the way for the rest of the I2RS requirements to be completed. The NETMOD/NETCONF chairs know these drafts have reached WG consensus. > > > > However, the other components of the I2RS requirements for the I2RS protocol were not complete (I2rs security, I2rs ephemeral state). This WG LC asks the WG to review all the I2RS requirements as a whole group to see that the whole package of requirements are consistent. This WG LC will not change the results of the pub/sub WG LCs, but other eyes may review and provide you with additional review comments (always good). > > > > The I2RS WG, NETCONF/NETMOD WG, and the early I2RS protocol design team have spent a great deal of time in July – September working through the other requirements for the I2RS protocol so this WG LC (10/6 to 10/20) is for the WG to consider all the WG requirements at one time. > > > > The 10/7/2015 I2RS interim provided some initial work on an I2RS strawman for the I2RS protocol. The 10/21/2015 I2RS interim will provide addition details on the strawman based on all of these requirements. > > > > Thank you for asking this question, > > > > Sue Hares > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Carlos Pignataro (cpignata) > Sent: Wednesday, October 14, 2015 9:25 PM > To: Susan Hares > Cc: Jeffrey Haas; i2rs@ietf.org; Alia Atlas > Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - > > > > Hi, Sue, > > > > Sorry, I am a bit confused — draft-ietf-i2rs-traceability finished WG LC over 4 months ago. > > > > Looking at https://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/history/ you might recall: > > > 2015-06-12 03 Susan Hares IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call > 2015-05-26 02 Susan Hares WG LC (5/26 to 6/9) for inclusion in requirements > 2015-05-26 02 Susan Hares IETF WG state changed to In WG Last Call from WG Document > > > > And so did draft-ietf-i2rs-pub-sub-requirements BTW. > > > > What is the goal of this new WG LC? > > > > Thanks, > > > > — Carlos. > > > > On Oct 6, 2015, at 8:16 PM, Susan Hares wrote: > > > > This begins a 2 week WG LC on the following requirement documents for I2RS: > > > > draft-ietf-i2rs-ephemeral-state-02.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ > > > > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. > > This section is blank and this will be discussed at the 10/17/2015 interim. > > We will discuss whether this section should be kept or removed. > > > > draft-ietf-i2rs-protocol-security-requirements-01.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requirements/ > > > > draft-ietf-i2rs-pub-sub-requirements-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ > > > > draft-ietf-i2rs-traceability-03.txt > > http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ > > > > Sue Hares > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Wed Oct 14 23:34:55 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA9501AC3A7 for ; Wed, 14 Oct 2015 23:34:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ugUhM8NmeWA3 for ; Wed, 14 Oct 2015 23:34:52 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1896C1ABD3D for ; Wed, 14 Oct 2015 23:34:52 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id D8D6BF6B; Thu, 15 Oct 2015 08:34:50 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id C-ZaZIX-LuIU; Thu, 15 Oct 2015 08:34:50 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Thu, 15 Oct 2015 08:34:50 +0200 (CEST) Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id D90D520053; Thu, 15 Oct 2015 08:34:49 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id pfF-lzVrYs6U; Thu, 15 Oct 2015 08:34:49 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 0CE7F2004E; Thu, 15 Oct 2015 08:34:48 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 1179A37B3E1D; Thu, 15 Oct 2015 08:34:46 +0200 (CEST) Date: Thu, 15 Oct 2015 08:34:46 +0200 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151015063446.GB70280@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Susan Hares , Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 06:34:54 -0000 On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) wrote: > > The only item in the topology that is read-only concerns the > "server-provided" flag, but this concerns a separate issue that was > also discussed (I am not sure if this is what you are referring to). > It is analogous to the other discussion concerning distinguishing > configuration that has been intended, versus one that is in effect > etc . This concerns the issue that some topologies are populated by > the server whereas some topologies can be populated by client > applications. Yes, this is what the concern is about. > We have had discussions in the past whether to "split this up", > having a (rw) branch to populate "intended" topologies and a (ro) > branch for topologies "in effect". This is the normal way to do this in YANG. And this goes back to what was driving us for years, namely to clearly separate config from state. This module makes this distinction a runtime property controlled by a data model specific mechanism. None of the generic tools out there will be able to understand this. > We decided against it for various reasons - every piece of > information would essentially be duplicated inside the model (this > is not your normal config vs oper data distinction, but would > essentially reflect a limitation of the framework), leading to > unnecessary additional complexity in the model (every augmentation > has to be conducted in two places), more complex validation rules, > etc. I do not understand why this is not a normal config vs oper data distinction. Please explain. I do not understand how this leads to more complex validation rules. Please explain. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Thu Oct 15 04:25:32 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DFC751B2B65; Thu, 15 Oct 2015 04:25:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 1.7 X-Spam-Level: * X-Spam-Status: No, score=1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_210=0.6, J_CHICKENPOX_22=0.6, J_CHICKENPOX_25=0.6, J_CHICKENPOX_26=0.6, J_CHICKENPOX_27=0.6, J_CHICKENPOX_28=0.6] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XNRjwnDZoiOT; Thu, 15 Oct 2015 04:25:23 -0700 (PDT) Received: from trail.lhotka.name (trail.lhotka.name [77.48.224.143]) by ietfa.amsl.com (Postfix) with ESMTP id A40301B2B61; Thu, 15 Oct 2015 04:25:22 -0700 (PDT) Received: from localhost (unknown [195.113.220.110]) by trail.lhotka.name (Postfix) with ESMTPSA id C0E691CC0183; Thu, 15 Oct 2015 13:25:25 +0200 (CEST) From: Ladislav Lhotka To: "Acee Lindem \(acee\)" In-Reply-To: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> User-Agent: Notmuch/0.20.2 (http://notmuchmail.org) Emacs/24.4.51.2 (x86_64-apple-darwin14.0.0) Date: Thu, 15 Oct 2015 13:25:21 +0200 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Archived-At: Cc: Routing YANG , "i2rs@ietf.org" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 11:25:26 -0000 Hi Acee, I made the necessary changes in ietf-routing, please see the GitHub repo: https://github.com/netmod-wg/routing-cfg A new leaf "rt:routing-instance" was augmented into interface configuration, and "rt:interfaces" container in configuration is gone. Below is the complete new tree. Will this work? Lada module: ietf-interfaces +--rw interfaces | +--rw interface* [name] | +--rw name string | +--rw description? string | +--rw type identityref | +--rw enabled? boolean | +--rw ip:ipv4! | | +--rw ip:enabled? boolean | | +--rw ip:forwarding? boolean | | +--rw ip:mtu? uint16 | | +--rw ip:address* [ip] | | | +--rw ip:ip inet:ipv4-address-no-zone | | | +--rw (subnet) | | | +--:(prefix-length) | | | +--rw ip:prefix-length? uint8 | | +--rw ip:neighbor* [ip] | | +--rw ip:ip inet:ipv4-address-no-zone | | +--rw ip:link-layer-address yang:phys-address | +--rw ip:ipv6! | | +--rw ip:enabled? boolean | | +--rw ip:forwarding? boolean | | +--rw ip:mtu? uint32 | | +--rw ip:address* [ip] | | | +--rw ip:ip inet:ipv6-address-no-zone | | | +--rw ip:prefix-length uint8 | | +--rw ip:neighbor* [ip] | | | +--rw ip:ip inet:ipv6-address-no-zone | | | +--rw ip:link-layer-address yang:phys-address | | +--rw ip:dup-addr-detect-transmits? uint32 | | +--rw ip:autoconf | | | +--rw ip:create-global-addresses? boolean | | +--rw v6ur:ipv6-router-advertisements | | +--rw v6ur:send-advertisements? boolean | | +--rw v6ur:max-rtr-adv-interval? uint16 | | +--rw v6ur:min-rtr-adv-interval? uint16 | | +--rw v6ur:managed-flag? boolean | | +--rw v6ur:other-config-flag? boolean | | +--rw v6ur:link-mtu? uint32 | | +--rw v6ur:reachable-time? uint32 | | +--rw v6ur:retrans-timer? uint32 | | +--rw v6ur:cur-hop-limit? uint8 | | +--rw v6ur:default-lifetime? uint16 | | +--rw v6ur:prefix-list | | +--rw v6ur:prefix* [prefix-spec] | | +--rw v6ur:prefix-spec inet:ipv6-prefix | | +--rw (control-adv-prefixes)? | | +--:(no-advertise) | | | +--rw v6ur:no-advertise? empty | | +--:(advertise) | | +--rw v6ur:valid-lifetime? uint32 | | +--rw v6ur:on-link-flag? boolean | | +--rw v6ur:preferred-lifetime? uint32 | | +--rw v6ur:autonomous-flag? boolean | +--rw rt:routing-instance? routing-instance-ref +--ro interfaces-state +--ro interface* [name] +--ro name string +--ro type identityref +--ro oper-status enumeration +--ro last-change? yang:date-and-time +--ro phys-address? yang:phys-address +--ro higher-layer-if* interface-state-ref +--ro lower-layer-if* interface-state-ref +--ro speed? yang:gauge64 +--ro statistics | +--ro discontinuity-time yang:date-and-time | +--ro in-octets? yang:counter64 | +--ro in-unicast-pkts? yang:counter64 | +--ro in-broadcast-pkts? yang:counter64 | +--ro in-multicast-pkts? yang:counter64 | +--ro in-discards? yang:counter32 | +--ro in-errors? yang:counter32 | +--ro in-unknown-protos? yang:counter32 | +--ro out-octets? yang:counter64 | +--ro out-unicast-pkts? yang:counter64 | +--ro out-broadcast-pkts? yang:counter64 | +--ro out-multicast-pkts? yang:counter64 | +--ro out-discards? yang:counter32 | +--ro out-errors? yang:counter32 +--ro ip:ipv4! | +--ro ip:forwarding? boolean | +--ro ip:mtu? uint16 | +--ro ip:address* [ip] | | +--ro ip:ip inet:ipv4-address-no-zone | | +--ro (subnet)? | | | +--:(prefix-length) | | | +--ro ip:prefix-length? uint8 | | +--ro ip:origin? ip-address-origin | +--ro ip:neighbor* [ip] | +--ro ip:ip inet:ipv4-address-no-zone | +--ro ip:link-layer-address? yang:phys-address | +--ro ip:origin? neighbor-origin +--ro ip:ipv6! | +--ro ip:forwarding? boolean | +--ro ip:mtu? uint32 | +--ro ip:address* [ip] | | +--ro ip:ip inet:ipv6-address-no-zone | | +--ro ip:prefix-length uint8 | | +--ro ip:origin? ip-address-origin | | +--ro ip:status? enumeration | +--ro ip:neighbor* [ip] | | +--ro ip:ip inet:ipv6-address-no-zone | | +--ro ip:link-layer-address? yang:phys-address | | +--ro ip:origin? neighbor-origin | | +--ro ip:is-router? empty | | +--ro ip:state? enumeration | +--ro v6ur:ipv6-router-advertisements | +--ro v6ur:send-advertisements? boolean | +--ro v6ur:max-rtr-adv-interval? uint16 | +--ro v6ur:min-rtr-adv-interval? uint16 | +--ro v6ur:managed-flag? boolean | +--ro v6ur:other-config-flag? boolean | +--ro v6ur:link-mtu? uint32 | +--ro v6ur:reachable-time? uint32 | +--ro v6ur:retrans-timer? uint32 | +--ro v6ur:cur-hop-limit? uint8 | +--ro v6ur:default-lifetime? uint16 | +--ro v6ur:prefix-list | +--ro v6ur:prefix* [prefix-spec] | +--ro v6ur:prefix-spec inet:ipv6-prefix | +--ro v6ur:valid-lifetime? uint32 | +--ro v6ur:on-link-flag? boolean | +--ro v6ur:preferred-lifetime? uint32 | +--ro v6ur:autonomous-flag? boolean +--ro rt:routing-instance? routing-instance-state-ref module: ietf-routing +--ro routing-state | +--ro routing-instance* [name] | +--ro name string | +--ro type? identityref | +--ro router-id? yang:dotted-quad | +--ro interfaces | | +--ro interface* if:interface-state-ref | +--ro routing-protocols | | +--ro routing-protocol* [type name] | | +--ro type identityref | | +--ro name string | +--ro ribs | +--ro rib* [name] | +--ro name string | +--ro address-family identityref | +--ro default-rib? boolean {multiple-ribs}? | +--ro routes | +--ro route* | +--ro route-preference? route-preference | +--ro next-hop | | +--ro (next-hop-options) | | +--:(outgoing-interface) | | | +--ro outgoing-interface? if:interface-s= tate-ref | | +--:(special-next-hop) | | | +--ro special-next-hop? enumeration | | +--:(next-hop-address) | | | +--ro v6ur:next-hop-address? inet:ipv6-addr= ess | | +--:(next-hop-address) | | +--ro v4ur:next-hop-address? inet:ipv4-addr= ess | +--ro source-protocol identityref | +--ro active? empty | +--ro last-updated? yang:date-and-time | +--ro v6ur:destination-prefix? inet:ipv6-prefix | +--ro v4ur:destination-prefix? inet:ipv4-prefix +--rw routing +--rw routing-instance* [name] +--rw name string +--rw type? identityref +--rw enabled? boolean +--rw router-id? yang:dotted-quad +--rw description? string +--rw routing-protocols | +--rw routing-protocol* [type name] | +--rw type identityref | +--rw name string | +--rw description? string | +--rw static-routes | +--rw v6ur:ipv6 | | +--rw v6ur:route* [destination-prefix] | | +--rw v6ur:destination-prefix inet:ipv6-prefix | | +--rw v6ur:description? string | | +--rw v6ur:next-hop | | +--rw (next-hop-options) | | +--:(outgoing-interface) | | | +--rw v6ur:outgoing-interface? if:interf= ace-ref | | +--:(special-next-hop) | | | +--rw v6ur:special-next-hop? enumerati= on | | +--:(next-hop-address) | | +--rw v6ur:next-hop-address? inet:ipv6= -address | +--rw v4ur:ipv4 | +--rw v4ur:route* [destination-prefix] | +--rw v4ur:destination-prefix inet:ipv4-prefix | +--rw v4ur:description? string | +--rw v4ur:next-hop | +--rw (next-hop-options) | +--:(outgoing-interface) | | +--rw v4ur:outgoing-interface? if:interf= ace-ref | +--:(special-next-hop) | | +--rw v4ur:special-next-hop? enumerati= on | +--:(next-hop-address) | +--rw v4ur:next-hop-address? inet:ipv4= -address +--rw ribs +--rw rib* [name] +--rw name string +--rw address-family? identityref +--rw description? string "Acee Lindem (acee)" writes: > On 10/13/15, 12:30 PM, "Ladislav Lhotka" wrote: > >> >>> On 13 Oct 2015, at 17:20, Acee Lindem (acee) wrote: >>>=20 >>> Hi Lada, NETMOD, >>>=20 >>> So I think we should move forward this ietf-rtg-cfg so that it can be >>> augmented and other work can move forward. We are still in disagreement >>> with respect to routing-instance/interface configuration. >>>=20 >>> - We feel the IPv4/IPv6 interfaces should reference the >>> routing-instance in their config state. This is consistent with >>> draft-rtgyangdt-rtgwg-device-model-01.txt. >>> - You feel that the routing-instance should have a list of leaf-ref= =E2=80=99s >>> to the interface. You believe the leaf-ref provides a level of >>>validation >>> due to the fact that references can be confined to routing-instance >>> references. However, heretofore, no models are referencing the interface >>> leaf-refs in the list. >> >>True, these models (ietf-isis, for instance) use leafrefs with >>"if:interface-ref" type. However, such leafrefs are under-constrained >>because they can be configured to refer to: >> >>- interfaces of any layer, including physical interfaces, VLAN trunks etc. > > Actually, putting the routing-instance reference in the IPv4 and IPv6 > interface models (i.e., RFC 7277) constrains the reference to layer 3 more > effectively than the list of leaf-refs. > >> >>- interfaces assigned to any routing instance. > > But the list of leaf-refs doesn=E2=80=99t insure an IPv4 interface or IPv6 > interface isn=E2=80=99t included by a single routing-instance. > >> >>I believe in all these cases the choice has to be limited to (1) L3 >>interfaces, and (2) belonging to "own" routing instance. These >>constraints will have to be checked in server code somehow - I would >>prefer to have them represented in the data model. >> >>But if nobody shares this concern with me, I am not going to block the >>document on this issue. > > I=E2=80=99d also be interested if anyone shares this concern. > > Thanks, > Acee=20 > > >> >>Lada=20 >> >>>=20 >>> Other than the Routing YANG Design Team having chosen the first option - >>> are there any other opinions? >>>=20 >>> Thanks, >>> Acee >>>=20 >>> On 10/9/15, 9:00 AM, "netmod on behalf of Acee Lindem (acee)" >>> wrote: >>>=20 >>>> Hi Lada,=20 >>>> I2RS is not chartered to do the base models. There are other routing >>>> models that reference routing-cfg and even in-progress implementations. >>>>=20 >>>> On 10/9/15, 4:13 AM, "netmod on behalf of Ladislav Lhotka" >>>> wrote: >>>>=20 >>>>> Hi, >>>>>=20 >>>>> I am sorry for cross-posting but I think it is high time to decide the >>>>> relationship between the data models in i2rs-rib-data-model and >>>>> netmod-routing-cfg I-Ds because they clearly target the same >>>>>management >>>>> data in a router. I can see three possible scenarios: >>>>>=20 >>>>> 1. The i2rs-rib module will be modified to augment >>>>> ietf-routing/ietf-ipv[46]-unicast-routing. >>>>=20 >>>> This would seem to be the obvious choice. >>>>=20 >>>>>=20 >>>>> 2. The scope of ietf-routing will be changed so that it would address >>>>> only host routing and simple routers. The modelling work for advanced >>>>> routers will be done elsewhere. >>>>>=20 >>>>> 3. The work on netmod-routing-cfg will be stopped. >>>>=20 >>>> A fourth option would be for me to take over ownership, move the work >>>>to >>>> the RTG WG, and we=E2=80=99d recruit some strong authors/reviewers from >>>>operators >>>> and other vendors (involving the ADs in selection). >>>>=20 >>>> Thanks, >>>> Acee=20 >>>>=20 >>>>=20 >>>>>=20 >>>>> Opinions? >>>>>=20 >>>>> Thanks, Lada >>>>>=20 >>>>> -- >>>>> Ladislav Lhotka, CZ.NIC Labs >>>>> PGP Key ID: E74E8C0C >>>>>=20 >>>>>=20 >>>>>=20 >>>>>=20 >>>>> _______________________________________________ >>>>> netmod mailing list >>>>> netmod@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/netmod >>>>=20 >>>> _______________________________________________ >>>> netmod mailing list >>>> netmod@ietf.org >>>> https://www.ietf.org/mailman/listinfo/netmod >>>=20 >> >>-- >>Ladislav Lhotka, CZ.NIC Labs >>PGP Key ID: E74E8C0C >> >> >> >> > --=20 Ladislav Lhotka, CZ.NIC Labs PGP Key ID: E74E8C0C From nobody Thu Oct 15 08:05:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67AF01B3341 for ; Thu, 15 Oct 2015 08:05:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ty7KD-I8L2rt for ; Thu, 15 Oct 2015 08:05:38 -0700 (PDT) Received: from alln-iport-3.cisco.com (alln-iport-3.cisco.com [173.37.142.90]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DAC861B2FFA for ; Thu, 15 Oct 2015 08:05:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2327; q=dns/txt; s=iport; t=1444921537; x=1446131137; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=Dgedp6tDEGFrQS+yk+bWBwwwXxZv+7OwYVQrLOxfu9g=; b=ITetEWOWyu1B3DreJQ7YkCCb1j9+eMpMHScsfKtQsq59bNq3/PEwXKgt zLSr4BouavFFRXYqC1SbihnHPwy54Irfiua77Zm0euh6XGGdDBV+GwgIT BW/ZNioIqLbM3iM+64j3H9WTiMKGs7/4Ubgb+rfq7ou/r/0kPiW0dtf29 g=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D2AQA8wB9W/4YNJK1egyaBQr09AQ2BWYYcAoEzOBQBAQEBAQEBgQqEJgEBAQMBHRtAAQwECw4DAQMBAQEJFggHCQMCAQIBNAMGCAYBDAYCAQGIIgjDQAEBAQEBAQEBAQEBAQEBAQEBAQEBAReGdoR+hQ0HBoQoAQSSVoNFjRuJE5J8HwEBQoJEgVsiM4VnAQEB X-IronPort-AV: E=Sophos;i="5.17,686,1437436800"; d="scan'208";a="197822204" Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 15 Oct 2015 15:05:37 +0000 Received: from [10.82.217.52] (rtp-vpn3-306.cisco.com [10.82.217.52]) by alln-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id t9FF5amH001815; Thu, 15 Oct 2015 15:05:36 GMT To: Susan Hares , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <561FC0C1.5070704@cisco.com> Date: Thu, 15 Oct 2015 11:05:37 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <01b601d106f8$69c836c0$3d58a440$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 15:05:40 -0000 On 10/14/15 23:20, Susan Hares wrote: > Joe: > > There will be some groups of data model have dependencies between objects. > Some Client interactions will be orthogonal to each other. If there are > groupings, then the dependencies may leave the I2RS agent and routing system > in an unknown state. Sure. > > The "all-or-nothing" is the normal case for NETCONF/RESTCONF. If clients are > based on the Netconf/RESTCONF code base, this will be the simple upward > change. RESTCONF does do all-or-none, but typically operations apply to one data element at a time. Clients would need to include multiple sub-operations for a, say, a PATCH. So, if I understand correctly, there would be burden on the Client that uses RESTCONF and multi-messages for a single "transaction" to handle the backout? Joe > > The I2RS agent needs to provide notification for error on writing for > priority conflict, and for other errors. The Stop-on-error would also need > to provide this input. > > Sue > > -----Original Message----- > From: Joe Clarke [mailto:jclarke@cisco.com] > Sent: Tuesday, October 13, 2015 8:56 AM > To: Susan Hares; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling > simplification for initial I2RS protocol > > On 10/13/15 04:57, Susan Hares wrote: >> Currently the I2RS requirements have error handling having three parts: >> >> 1)"all-or-nothing", >> >> 2)"continue-on-error", and >> >> 3)"stop-on-error". >> >> To provide an easier first step for the I2RS Agent for the first >> implementation of an I2RS protocol, the I2RS protocol design team >> suggests reduce this to the "all-or-nothing" for the initial version. >> Later versions of the I2RS protocol can provide the "continue-on-error" >> or "stop-on-error" error handling. The earlier decision in the I2RS >> architecture was to support all 3 error handling pieces. > > It seems to me the latter two would be easier to implement as the Client > continues to fire (until not told to do so in the stop-on-error case) and > the Agent wouldn't have to track all operations for rollback. > > Is the assumption that most I2RS transactions will have mutual dependencies, > and this is the most common error case? > > Joe > From nobody Thu Oct 15 08:40:22 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DC141B3381 for ; Thu, 15 Oct 2015 08:40:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lIz9SwJ8lftt for ; Thu, 15 Oct 2015 08:40:16 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CA611B3385 for ; Thu, 15 Oct 2015 08:40:16 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Juergen Schoenwaelder'" References: <007301d10095$65bb8410$31328c30$@ndzh.com> <011e01d106f2$4d7d3ac0$e877b040$@ndzh.com> <20151015062403.GA70280@elstar.local> In-Reply-To: <20151015062403.GA70280@elstar.local> Date: Thu, 15 Oct 2015 11:39:54 -0400 Message-ID: <015801d1075f$bdf28450$39d78cf0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_0159_01D1073E.36E8D390" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQFcUMQzbHuRSZnaJ/N5epYSlx5LtQDJON8AAcz87qcCBdjOI58xIIXA Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , "'Carlos Pignataro \(cpignata\)'" , i2rs@ietf.org, 'Alia Atlas' Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) - X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 15:40:20 -0000 This is a multipart message in MIME format. ------=_NextPart_000_0159_01D1073E.36E8D390 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Juergen: =20 Short answers: =20 =C2=B7 Yes, Ephemeral state will have to go through another WG = LC after we complete section 3.5: Minimal components of the I2RS = protocol.=20 =20 =C2=B7 Yes, you are correct that it was interested parties in = the NETCONF/NETMOD groups.=20 =20 Long-answer: =20 The full scope of ephemeral state requirements seems to be coalescing, = but it then important to reduce this long laundry list to a reasonable = first cut. This is what section 3.5 is supposed to provide.=20 =20 Can you provide any review the other components of Ephemeral state = without the minimal requirements for NETCONF? =20 =20 I also would like aid in refining the minimal set of requirements for = RESTCONF: =20 =C2=B7 I have posted the question of whether "all-or-nothing" = works for the I2RS agent which is the normal methodology for a NETCONF = server.=20 =20 =C2=B7 Where should we allow the ephemeral key word? - at the = Node level, module level=20 =20 =C2=B7 Other questions have been raised on the tradeoffs between = speed versus risk on =E2=80=9Climited validation=E2=80=9D? Can we = eliminate things for modules which most go fast? Should we remove MUST = statements or instance identifiers? =20 =20 All these things are part of reducing the total requirements to the = minimal subset for NETCONF. =20 =20 Sue=20 =20 -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen = Schoenwaelder Sent: Thursday, October 15, 2015 2:24 AM To: Susan Hares Cc: 'Jeffrey Haas'; 'Carlos Pignataro (cpignata)'; 'Alia Atlas'; = i2rs@ietf.org Subject: Re: [i2rs] WG LC for requirement documents (10/6 to 10/20/2015) = - =20 Susan, =20 so let me state clearly once more that the ephemeral requirements = document seems to be incomplete: =20 3.5. Minimal sub-set of Changes to NETCONF =20 Ephemeral-REQ-07: The minimal set of changes are: (TBD). =20 Potential set: TBD =20 Note: I2RS protocol design team is working to complete this set of minimal changes. =20 I assume you will need another WG last call once the missing pieces have = been filled in. =20 I am also not sure 'the NETMOD/NETCONF WGs have spent a great deal of = time' - I think it was more a design team that involves people active in = NETMOD and NETCONF. =20 /js =20 On Wed, Oct 14, 2015 at 10:36:30PM -0400, Susan Hares wrote: > Carlos:=20 >=20 > =20 >=20 > Very good question. You are correct traceability was WG LC 4 months = ago (6/12/2015) and pub/sub (10/2/2015). This fine work paved the way = for the rest of the I2RS requirements to be completed. The = NETMOD/NETCONF chairs know these drafts have reached WG consensus.=20 >=20 > =20 >=20 > However, the other components of the I2RS requirements for the I2RS = protocol were not complete (I2rs security, I2rs ephemeral state). This = WG LC asks the WG to review all the I2RS requirements as a whole group = to see that the whole package of requirements are consistent. This WG LC = will not change the results of the pub/sub WG LCs, but other eyes may = review and provide you with additional review comments (always good). =20 >=20 > =20 >=20 > The I2RS WG, NETCONF/NETMOD WG, and the early I2RS protocol design = team have spent a great deal of time in July =E2=80=93 September working = through the other requirements for the I2RS protocol so this WG LC (10/6 = to 10/20) is for the WG to consider all the WG requirements at one = time. =20 >=20 > =20 >=20 > The 10/7/2015 I2RS interim provided some initial work on an I2RS = strawman for the I2RS protocol. The 10/21/2015 I2RS interim will = provide addition details on the strawman based on all of these = requirements.=20 >=20 > =20 >=20 > Thank you for asking this question, >=20 > =20 >=20 > Sue Hares >=20 > =20 >=20 > From: i2rs [ = mailto:i2rs-bounces@ietf.org] On Behalf Of Carlos=20 > Pignataro (cpignata) > Sent: Wednesday, October 14, 2015 9:25 PM > To: Susan Hares > Cc: Jeffrey Haas; i2rs@ietf.org; Alia Atlas > Subject: Re: [i2rs] WG LC for requirement documents (10/6 to=20 > 10/20/2015) - >=20 > =20 >=20 > Hi, Sue, >=20 > =20 >=20 > Sorry, I am a bit confused =E2=80=94 draft-ietf-i2rs-traceability = finished WG LC over 4 months ago. >=20 > =20 >=20 > Looking at = = https://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/history/ = you might recall: >=20 >=20 > 2015-06-12 03 Susan Hares IETF WG state changed to WG = Consensus: Waiting for Write-Up from In WG Last Call > 2015-05-26 02 Susan Hares WG LC (5/26 to 6/9) for = inclusion in requirements > 2015-05-26 02 Susan Hares IETF WG state changed to In = WG Last Call from WG Document >=20 > =20 >=20 > And so did draft-ietf-i2rs-pub-sub-requirements BTW. >=20 > =20 >=20 > What is the goal of this new WG LC? >=20 > =20 >=20 > Thanks, >=20 > =20 >=20 > =E2=80=94 Carlos. >=20 > =20 >=20 > On Oct 6, 2015, at 8:16 PM, Susan Hares < = shares@ndzh.com> wrote: >=20 > =20 >=20 > This begins a 2 week WG LC on the following requirement documents for = I2RS:=20 >=20 > =20 >=20 > draft-ietf-i2rs-ephemeral-state-02.txt >=20 > < = http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/>=20 > = http://datatracker.ietf.org/doc/draft-ietf-i2rs-ephemeral-state/ >=20 > =20 >=20 > Note: I2RS ephemeral state has a section on minimal NETCONF Changes. =20 >=20 > This section is blank and this will be discussed at the 10/17/2015 = interim. >=20 > We will discuss whether this section should be kept or removed. =20 >=20 > =20 >=20 > draft-ietf-i2rs-protocol-security-requirements-01.txt >=20 > =20 > uirements/>=20 > = = http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-requ > irements/ >=20 > =20 >=20 > draft-ietf-i2rs-pub-sub-requirements-03.txt >=20 > =20 > >=20 > = = http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ >=20 > =20 >=20 > draft-ietf-i2rs-traceability-03.txt >=20 > < = http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/>=20 > = http://datatracker.ietf.org/doc/draft-ietf-i2rs-traceability/ >=20 > =20 >=20 > Sue Hares >=20 > =20 >=20 > _______________________________________________ > i2rs mailing list > < mailto:i2rs@ietf.org> = i2rs@ietf.org > < = https://www.ietf.org/mailman/listinfo/i2rs>=20 > = https://www.ietf.org/mailman/listinfo/i2rs >=20 > =20 >=20 =20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > = https://www.ietf.org/mailman/listinfo/i2rs =20 =20 --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 < = http://www.jacobs-university.de/> =20 _______________________________________________ i2rs mailing list i2rs@ietf.org = https://www.ietf.org/mailman/listinfo/i2rs ------=_NextPart_000_0159_01D1073E.36E8D390 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable

Juergen:

 

Short = answers: =C2=A0

=C2=B7         = Yes, Ephemeral state will have to go = through another WG LC after we complete section 3.5: Minimal components = of the I2RS protocol.

 

=C2=B7         = Yes, you are correct that it was = interested parties in the NETCONF/NETMOD groups.

 

Long-answer: =C2=A0

The full scope of ephemeral state requirements = seems to be coalescing, but it then important to reduce this long = laundry list to a reasonable first cut.=C2=A0 This is what section 3.5 = is supposed to provide.

 

Can = you provide any review the other components of Ephemeral state without = the minimal requirements for NETCONF?=C2=A0

 

I also = would like aid in refining the minimal set of requirements for = RESTCONF:

 

=C2=B7         = I have posted the question of whether = "all-or-nothing" works for the I2RS agent which is the normal = methodology for a NETCONF server.

 

=C2=B7         = Where should we allow the ephemeral key = word? =C2=A0- at the Node level, module level

 

=C2=B7         = Other questions have been raised on the = tradeoffs between speed versus risk on =E2=80=9Climited = validation=E2=80=9D?=C2=A0 Can we eliminate things for modules which = most go fast?=C2=A0 Should we remove MUST statements or instance = identifiers?=C2=A0

 

All these things are part of reducing the total = requirements to the minimal subset for NETCONF.=C2=A0

 

Sue =

 

-----Original Message-----
From: i2rs = [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen = Schoenwaelder
Sent: Thursday, October 15, 2015 2:24 AM
To: Susan = Hares
Cc: 'Jeffrey Haas'; 'Carlos Pignataro (cpignata)'; 'Alia = Atlas'; i2rs@ietf.org
Subject: Re: [i2rs] WG LC for requirement = documents (10/6 to 10/20/2015) -

 

Susan,

 

so let = me state clearly once more that the ephemeral requirements document = seems to be incomplete:

 

=C2=A0 = 3.5.=C2=A0 Minimal sub-set of Changes to NETCONF

 

=C2=A0=C2=A0=C2=A0=C2=A0 Ephemeral-REQ-07: The = minimal set of changes are: (TBD).

 

=C2=A0=C2=A0=C2=A0=C2=A0 Potential set: = TBD

 

=C2=A0=C2=A0=C2=A0=C2=A0 Note: I2RS protocol design = team is working to complete this set of

=C2=A0=C2=A0=C2=A0=C2=A0 minimal = changes.

 

I assume you will need another WG last call once = the missing pieces have been filled in.

 

I am = also not sure 'the NETMOD/NETCONF WGs have spent a great deal of time' - = I think it was more a design team that involves people active in NETMOD = and NETCONF.

 

/js

 

On = Wed, Oct 14, 2015 at 10:36:30PM -0400, Susan Hares = wrote:

> Carlos: =

>

>=C2=A0

>

> = Very good question.=C2=A0 You are correct traceability was WG LC 4 = months ago (6/12/2015) and pub/sub (10/2/2015).=C2=A0 This fine work = paved the way for the rest of the I2RS requirements to be completed. The = NETMOD/NETCONF chairs know these drafts have reached WG consensus. =

>

>=C2=A0

>

> = However, the other components of the I2RS requirements for the I2RS = protocol were not complete (I2rs security, I2rs ephemeral state).=C2=A0 = This WG LC asks the WG to review all the I2RS requirements as a whole = group to see that the whole package of requirements are consistent. This = WG LC will not change the results of the pub/sub WG LCs, but other eyes = may review and provide you with additional review comments (always = good).=C2=A0

> =

>=C2=A0

>

> = The I2RS WG, NETCONF/NETMOD WG, and the early I2RS protocol design team = have spent a great deal of time in July =E2=80=93 September working = through the other requirements for the I2RS protocol so this WG LC (10/6 = to 10/20)=C2=A0 is for the WG to consider all the WG requirements at one = time.=C2=A0

> =

>=C2=A0

>

> = The 10/7/2015 I2RS interim provided some initial work on an I2RS = strawman for the I2RS protocol.=C2=A0 The 10/21/2015 I2RS interim will = provide addition details on the strawman based on all of these = requirements.

> =

>=C2=A0

>

> = Thank you for asking this question,

>

>=C2=A0

>

> = Sue Hares

>

>=C2=A0

>

> = From: i2rs [mailto:i2rs-bounces@ietf.= org] On Behalf Of Carlos

> Pignataro (cpignata)

> Sent: Wednesday, October 14, 2015 9:25 = PM

> To: Susan = Hares

> Cc: Jeffrey Haas; i2rs@ietf.org;= Alia Atlas

> Subject: Re: = [i2rs] WG LC for requirement documents (10/6 to

> 10/20/2015) -

>

>=C2=A0

>

> = Hi, Sue,

>

>=C2=A0

>

> = Sorry, I am a bit confused =E2=80=94 draft-ietf-i2rs-traceability = finished WG LC over 4 months ago.

>

>=C2=A0

>

> = Looking at https://datatracker.ietf.= org/doc/draft-ietf-i2rs-traceability/history/ you might = recall:

>

>

> = 2015-06-12=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = 03=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Susan = Hares=C2=A0=C2=A0=C2=A0 IETF WG state changed to WG Consensus: Waiting = for Write-Up from In WG Last Call

> 2015-05-26=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = 02=C2=A0=C2=A0=C2=A0 =C2=A0=C2=A0=C2=A0=C2=A0Susan = Hares=C2=A0=C2=A0=C2=A0 WG LC (5/26 to 6/9) for inclusion in = requirements

> = 2015-05-26=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 = 02=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Susan = Hares=C2=A0=C2=A0=C2=A0 IETF WG state changed to In WG Last Call from WG = Document

>

>=C2=A0

>

> = And so did draft-ietf-i2rs-pub-sub-requirements BTW.

>

>=C2=A0

>

> = What is the goal of this new WG LC?

>

>=C2=A0

>

> = Thanks,

>

>=C2=A0

>

> = =E2=80=94 Carlos.

> =

>=C2=A0

>

> On = Oct 6, 2015, at 8:16 PM, Susan Hares <shares@ndzh.com> wrote:

> =

>=C2=A0

>

> = This begins a 2 week WG LC on the following requirement documents for = I2RS:

>

>=C2=A0

>

> = draft-ietf-i2rs-ephemeral-state-02.txt

>

>=C2=A0 <http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-ephemeral-state/>

> http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-ephemeral-state/

>

>=C2=A0

>

> = Note: I2RS ephemeral state has a section on minimal NETCONF = Changes.=C2=A0

> =

> This section is blank and = this will be discussed at the 10/17/2015 interim.

>

> We = will discuss whether this section should be kept or removed.=C2=A0=C2=A0 =

>

>=C2=A0

>

> = draft-ietf-i2rs-protocol-security-requirements-01.txt

>

>=C2=A0

> = <http://datatracker.ietf.org/doc/draft-ietf-i2rs-protocol-security-req=

> uirements/> =

> http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-protocol-security-requ

> irements/

>

>=C2=A0

>

> = draft-ietf-i2rs-pub-sub-requirements-03.txt

>

>=C2=A0

> = <http://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/=

> >

> http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-pub-sub-requirements/

>

>=C2=A0

>

> = draft-ietf-i2rs-traceability-03.txt

>

>=C2=A0 <http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-traceability/>

> http://datatracker.ietf.o= rg/doc/draft-ietf-i2rs-traceability/

>

>=C2=A0

>

> = Sue Hares

>

>=C2=A0

>

> = _______________________________________________

> i2rs mailing list

>=C2=A0 <mailto:i2rs@ietf.org> i2rs@ietf.org<= o:p>

>=C2=A0 <https://www.ietf.org/mail= man/listinfo/i2rs>

> https://www.ietf.org/mail= man/listinfo/i2rs

> =

>=C2=A0

>

 

> = _______________________________________________

> i2rs mailing list

> i2rs@ietf.org<= o:p>

> https://www.ietf.org/mail= man/listinfo/i2rs

 

 

-- =

Juergen = Schoenwaelder=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= Jacobs University Bremen gGmbH

Phone: +49 421 200 = 3587=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Campus Ring 1 | = 28759 Bremen | Germany

Fax:=C2=A0=C2=A0 +49 421 200 = 3103=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 <http://www.jacobs-univers= ity.de/>

 

_______________________________________________=

i2rs mailing list

i2rs@ietf.org<= o:p>

https://www.ietf.org/mail= man/listinfo/i2rs

------=_NextPart_000_0159_01D1073E.36E8D390-- From nobody Thu Oct 15 08:45:18 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 007D81B337C for ; Thu, 15 Oct 2015 08:45:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cf7dCgUOPSFe for ; Thu, 15 Oct 2015 08:45:15 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4204C1A90BB for ; Thu, 15 Oct 2015 08:45:15 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Joe Clarke'" , References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> In-Reply-To: <561FC0C1.5070704@cisco.com> Date: Thu, 15 Oct 2015 11:45:06 -0400 Message-ID: <016b01d10760$77cea020$676be060$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQEoIgrEBoPDtxDxKD7aeuKUQrt9ZAMAOITjAoWuDDkBs2I6OZ+EsYyQ Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 15:45:18 -0000 Joe: Joe: Great questions - see below. -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joe Clarke Sent: Thursday, October 15, 2015 11:06 AM To: Susan Hares; i2rs@ietf.org Cc: jhaas@pfrc.org; 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol On 10/14/15 23:20, Susan Hares wrote: >> Joe: >> >> There will be some groups of data model have dependencies between objects. >> Some Client interactions will be orthogonal to each other. If there are >> groupings, then the dependencies may leave the I2RS agent and routing >> system in an unknown state. >Sure. >> >> The "all-or-nothing" is the normal case for NETCONF/RESTCONF. If >> clients are based on the Netconf/RESTCONF code base, this will be the >> simple upward change. >RESTCONF does do all-or-none, but typically operations apply to one data element at a time. >Clients would need to include multiple sub-operations for a, say, a PATCH. So, if I understand >correctly, there would be burden on the Client that uses RESTCONF and multi-messages for a >single "transaction" to handle the backout? Yes - multiple sub-operation in RESTCONF requires a PATCH, and the burden is on the client to handle the backing out of data in RESTCONF. You have hit upon the challenge. The I2RS client is bearing the burden of this back-out instead of the I2RS agent (Netconf "server" concept). Do you think this is reasonable to keep the I2RS agents simple? Will it make the I2RS clients unworkable? >Joe > > The I2RS agent needs to provide notification for error on writing for > priority conflict, and for other errors. The Stop-on-error would also need > to provide this input. > > Sue > > -----Original Message----- > From: Joe Clarke [mailto:jclarke@cisco.com] > Sent: Tuesday, October 13, 2015 8:56 AM > To: Susan Hares; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling > simplification for initial I2RS protocol > > On 10/13/15 04:57, Susan Hares wrote: >> Currently the I2RS requirements have error handling having three parts: >> >> 1)"all-or-nothing", >> >> 2)"continue-on-error", and >> >> 3)"stop-on-error". >> >> To provide an easier first step for the I2RS Agent for the first >> implementation of an I2RS protocol, the I2RS protocol design team >> suggests reduce this to the "all-or-nothing" for the initial version. >> Later versions of the I2RS protocol can provide the "continue-on-error" >> or "stop-on-error" error handling. The earlier decision in the I2RS >> architecture was to support all 3 error handling pieces. > > It seems to me the latter two would be easier to implement as the Client > continues to fire (until not told to do so in the stop-on-error case) and > the Agent wouldn't have to track all operations for rollback. > > Is the assumption that most I2RS transactions will have mutual dependencies, > and this is the most common error case? > > Joe > _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Thu Oct 15 10:17:06 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 539701ACD68 for ; Thu, 15 Oct 2015 10:17:06 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LNOEt0tUuueH for ; Thu, 15 Oct 2015 10:17:05 -0700 (PDT) Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C3E81ACD6B for ; Thu, 15 Oct 2015 10:17:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=850; q=dns/txt; s=iport; t=1444929425; x=1446139025; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=X+1pTvo1ySiDhyFlN1lXWllMORiDLzEtCXRer8hvKno=; b=Ji5+InR2t0EGHeA7RZZZsoUjX8ZET24XAyId3UzcOSccFw8XRcKBcZlv Yat2G5l/9tes28UNvVmwYKN2MuTulOLLSLcZaQquMOgCmj+JD9Q7MPS8R XZ6G8+Nd/rgiBqhD8dt1rCt5fOEve0bjw6Tp0/WB3smiz3CtJHYlH3266 g=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D1AQD13h9W/5NdJa1egya+fwENgVmDRYJXAoE4OBQBAQEBAQEBgQqEJwEBBB0bQRALDgQGCSUPAjgOBgEMCAEBiCrDVgEBAQEBAQEBAQEBAQEBAQEBARqGdoR+hEJLB4QuAQSWG40biROSfB8BAUKCRIFbIoYaAQEB X-IronPort-AV: E=Sophos;i="5.17,686,1437436800"; d="scan'208";a="198399659" Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-8.cisco.com with ESMTP; 15 Oct 2015 17:17:04 +0000 Received: from [10.82.217.52] (rtp-vpn3-306.cisco.com [10.82.217.52]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id t9FHH34e001335; Thu, 15 Oct 2015 17:17:04 GMT To: Susan Hares , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <561FDF8F.70706@cisco.com> Date: Thu, 15 Oct 2015 13:17:03 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <016b01d10760$77cea020$676be060$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 17:17:06 -0000 On 10/15/15 11:45, Susan Hares wrote: > Yes - multiple sub-operation in RESTCONF requires a PATCH, and the burden is > on the client to handle the backing out of data in RESTCONF. You have hit > upon the challenge. The I2RS client is bearing the burden of this back-out > instead of the I2RS agent (Netconf "server" concept). > > Do you think this is reasonable to keep the I2RS agents simple? Will it make > the I2RS clients unworkable? I can't answer an behalf of all I2RS Client implementors, but it doesn't seem like an undue burden. It's just critical that they understand that the burden is upon them. How is this decision to be communicated? Will the architecture be updated? I assume that Agent implementors _could_ do the other two error handling techniques if they wanted and advertise this to the Client? Joe From nobody Thu Oct 15 10:58:21 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DEDB1B33EC for ; Thu, 15 Oct 2015 10:58:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8t_x2SUtnOr1 for ; Thu, 15 Oct 2015 10:58:19 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E51A01B33E8 for ; Thu, 15 Oct 2015 10:58:18 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Joe Clarke'" , References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> In-Reply-To: <561FDF8F.70706@cisco.com> Date: Thu, 15 Oct 2015 13:58:08 -0400 Message-ID: <001f01d10773$0da89300$28f9b900$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQEoIgrEBoPDtxDxKD7aeuKUQrt9ZAMAOITjAoWuDDkBs2I6OQK/qH8mAO0wvUifZ26skA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 17:58:20 -0000 Joe: Thank you for letting me know the "all-or-nothing" will be workable for you. The I2RS architecture will be updated to indicate that the initial pass on error handling for the I2RS client will only be required "all-or-nothing", but may do "stop-on-error", or "continue-on-error". My understanding is that the hello, module library, and other mechanisms in netconf/restconf can signal this. Give me about 24 hours to check my answers on signaling support with the NETCONF/RESTCONf methodology for indicating in the NETCONF Hello or modules library with Andy, Kent and other NETCONF/RESTCONF experts. Sue -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joe Clarke Sent: Thursday, October 15, 2015 1:17 PM To: Susan Hares; i2rs@ietf.org Cc: jhaas@pfrc.org; 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol On 10/15/15 11:45, Susan Hares wrote: > Yes - multiple sub-operation in RESTCONF requires a PATCH, and the > burden is on the client to handle the backing out of data in RESTCONF. > You have hit upon the challenge. The I2RS client is bearing the > burden of this back-out instead of the I2RS agent (Netconf "server" concept). > > Do you think this is reasonable to keep the I2RS agents simple? Will > it make the I2RS clients unworkable? I can't answer an behalf of all I2RS Client implementors, but it doesn't seem like an undue burden. It's just critical that they understand that the burden is upon them. How is this decision to be communicated? Will the architecture be updated? I assume that Agent implementors _could_ do the other two error handling techniques if they wanted and advertise this to the Client? Joe _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Thu Oct 15 13:38:47 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D6011A0398 for ; Thu, 15 Oct 2015 13:38:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.602 X-Spam-Level: X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SXt7HovgGe21 for ; Thu, 15 Oct 2015 13:38:41 -0700 (PDT) Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 841651A0377 for ; Thu, 15 Oct 2015 13:38:41 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 61DE824143E; Thu, 15 Oct 2015 13:38:41 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id C37C624073E; Thu, 15 Oct 2015 13:38:40 -0700 (PDT) To: Joe Clarke , Susan Hares , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> From: "Joel M. Halpern" Message-ID: <56200ECF.2080406@joelhalpern.com> Date: Thu, 15 Oct 2015 16:38:39 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <561FDF8F.70706@cisco.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 20:38:45 -0000 In terms of making clear this constraint, I would expect whatever RFC describes the protocol to be used for I2RS would indicate that although the archtiecture requested the three behaviors, the current protocol only supports "all-or-none." Assuming we can find ways to use NetConf or RestConf, I presume that will be an applicability / usage document rather than a protocol definition document. Yours, Joel On 10/15/15 1:17 PM, Joe Clarke wrote: > On 10/15/15 11:45, Susan Hares wrote: >> Yes - multiple sub-operation in RESTCONF requires a PATCH, and the >> burden is >> on the client to handle the backing out of data in RESTCONF. You have >> hit >> upon the challenge. The I2RS client is bearing the burden of this >> back-out >> instead of the I2RS agent (Netconf "server" concept). >> >> Do you think this is reasonable to keep the I2RS agents simple? Will >> it make >> the I2RS clients unworkable? > > I can't answer an behalf of all I2RS Client implementors, but it doesn't > seem like an undue burden. It's just critical that they understand that > the burden is upon them. How is this decision to be communicated? Will > the architecture be updated? > > I assume that Agent implementors _could_ do the other two error handling > techniques if they wanted and advertise this to the Client? > > Joe > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 15 13:41:14 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F377E1A03FF for ; Thu, 15 Oct 2015 13:41:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.602 X-Spam-Level: X-Spam-Status: No, score=-2.602 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eLF0ALKBiQuc for ; Thu, 15 Oct 2015 13:41:11 -0700 (PDT) Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F47F1A0398 for ; Thu, 15 Oct 2015 13:41:11 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 498922510C6; Thu, 15 Oct 2015 13:41:11 -0700 (PDT) X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id A3EC924153F; Thu, 15 Oct 2015 13:41:10 -0700 (PDT) To: Susan Hares , 'Joe Clarke' , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> <001f01d10773$0da89300$28f9b900$@ndzh.com> From: "Joel M. Halpern" Message-ID: <56200F65.7070102@joelhalpern.com> Date: Thu, 15 Oct 2015 16:41:09 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <001f01d10773$0da89300$28f9b900$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 20:41:13 -0000 Actually Sue, I would strongly prefer NOT to update the archtiecture. My primary reason is stability. My secondary reason is that I believe the working group would still like to see the other behaviors, but is compromising on the protocol delivery. Which is why my email suggested that the protocol document is the right place to clearly state the choice. Yours, Joel On 10/15/15 1:58 PM, Susan Hares wrote: > Joe: > > Thank you for letting me know the "all-or-nothing" will be workable for you. > > > The I2RS architecture will be updated to indicate that the initial pass on > error handling for the I2RS client will only be required "all-or-nothing", > but may do "stop-on-error", or "continue-on-error". My understanding is > that the hello, module library, and other mechanisms in netconf/restconf can > signal this. > > Give me about 24 hours to check my answers on signaling support with the > NETCONF/RESTCONf methodology for indicating in the NETCONF Hello or modules > library with Andy, Kent and other NETCONF/RESTCONF experts. > > Sue > > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joe Clarke > Sent: Thursday, October 15, 2015 1:17 PM > To: Susan Hares; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling > simplification for initial I2RS protocol > > On 10/15/15 11:45, Susan Hares wrote: >> Yes - multiple sub-operation in RESTCONF requires a PATCH, and the >> burden is on the client to handle the backing out of data in RESTCONF. >> You have hit upon the challenge. The I2RS client is bearing the >> burden of this back-out instead of the I2RS agent (Netconf "server" > concept). >> >> Do you think this is reasonable to keep the I2RS agents simple? Will >> it make the I2RS clients unworkable? > > I can't answer an behalf of all I2RS Client implementors, but it doesn't > seem like an undue burden. It's just critical that they understand that the > burden is upon them. How is this decision to be communicated? Will the > architecture be updated? > > I assume that Agent implementors _could_ do the other two error handling > techniques if they wanted and advertise this to the Client? > > Joe > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 15 14:00:17 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33A531A1B81 for ; Thu, 15 Oct 2015 14:00:16 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.51 X-Spam-Level: X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GzbU5-253LGL for ; Thu, 15 Oct 2015 14:00:13 -0700 (PDT) Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A58CB1A1B7B for ; Thu, 15 Oct 2015 14:00:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9140; q=dns/txt; s=iport; t=1444942813; x=1446152413; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lXipFvqGBQQs3PNXSThLBxak1pveoitDjeIZ9+512cg=; b=cHyuDttALLwgBI3seU2UVTaiQLIjMmL8BVnGgPQBDK3SIpUWd9OO1Zws IFf8Jkd2p4pFXmJct5O2R0vItaOUf6V6cVJNaNbfggySRuwT75qrtx0pY fJy8lK5JVJ4Yidn8g52KCwmRICI9UdrkIuuUlawuGFeSETObH4FPsje8S o=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AGAgCXEyBW/5RdJa1egllNVG4GuRaEIQENgVkXAQmFfQKBPDgUAQEBAQEBAX8LhCYBAQEELUwQAgEIEQQBAQ4hMh0IAQEEDgUIAYglDcNeAQEBAQEBAQEBAQEBAQEBAQEBAQEBF4t0hQkEB4IuT4ExBZYdAYUYh3uBX4Q6lX0BHwEBQoQDcQGEYIEGAQEB X-IronPort-AV: E=Sophos;i="5.17,687,1437436800"; d="scan'208,217";a="197318132" Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by alln-iport-2.cisco.com with ESMTP; 15 Oct 2015 21:00:12 +0000 Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by rcdn-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id t9FL0C2o016929 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL) for ; Thu, 15 Oct 2015 21:00:12 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 15 Oct 2015 15:59:57 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Thu, 15 Oct 2015 15:59:57 -0500 From: "Alexander Clemm (alex)" To: "i2rs@ietf.org" Thread-Topic: I2RS requirements in YANG PubSub drafts for NETCONF, RESTCONF, HTTP/2 Thread-Index: AdEGMxwrYB8CDHgGSYy2H35St/LWOgBWOjOQ Date: Thu, 15 Oct 2015 20:59:57 +0000 Message-ID: References: <56dda8e1105144d098a70f4b1d84f993@XCH-ALN-013.cisco.com> In-Reply-To: <56dda8e1105144d098a70f4b1d84f993@XCH-ALN-013.cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.93] Content-Type: multipart/alternative; boundary="_000_af0cb82cc2c743f9839cf851a30caf4cXCHRCD001ciscocom_" MIME-Version: 1.0 Archived-At: Cc: "Ambika Prasad Tripathy \(ambtripa\)" , "Einar Nilsen-Nygaard \(einarnn\)" , "Alberto Gonzalez Prieto \(albertgo\)" , "Eric Voit \(evoit\)" Subject: Re: [i2rs] I2RS requirements in YANG PubSub drafts for NETCONF, RESTCONF, HTTP/2 X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 21:00:16 -0000 --_000_af0cb82cc2c743f9839cf851a30caf4cXCHRCD001ciscocom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hello all, just as an FYI, "draft-clemm-netconf-yang-push" that we had posted in Netco= nf earlier this week (to cover I2RS requirements, as noted by Eric earlier)= has now become "draft-ietf-netconf-yang-push-00". The WG draft is now pos= ted here: https://datatracker.ietf.org/doc/draft-ietf-netconf-yang-push/ Kind regards --- Alex From: Eric Voit (evoit) Sent: Tuesday, October 13, 2015 8:48 PM To: i2rs@ietf.org Cc: Alexander Clemm (alex) ; Alberto Gonzalez Prieto (alber= tgo) ; Ambika Prasad Tripathy (ambtripa) ; Einar Nilsen-Nygaard (einarnn) Subject: I2RS requirements in YANG PubSub drafts for NETCONF, RESTCONF, HTT= P/2 We just posted two drafts in NETCONF. These drafts technology specificatio= ns aiming to cover the requirements from I2RS as per: https://datatracker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/ These drafts are: (1) Subscribing to YANG datastore push updates (updated) http://www.ietf.org/id/draft-clemm-netconf-yang-push-02.txt (2) Restconf subscription and HTTP push for YANG datastores (new) http://www.ietf.org/id/draft-voit-restconf-yang-push-00.txt Draft (2) is new in that it: * proposes Restconf subscription and push mechanisms to continuously st= ream information from YANG datastores over HTTP * provides a mechanism to support static subscriptions so that an opera= tor can stream updates over HTTP without Restconf * provides YANG model extensions to leverage HTTP/2 so that individual = subscriptions can get custom treatment via their own HTTP streams. If you are interested, please come over and follow the discussions in NETCO= NF. Thanks! - Alexander Clemm, Eric Voit, Alberto Gonzalez Prieto, Ambika Prasad Tripat= hy, & Einar Nilsen-Nygaard --_000_af0cb82cc2c743f9839cf851a30caf4cXCHRCD001ciscocom_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hello all,

 

just as an FYI, “draft-clemm-netconf-yang-push= ” that we had posted in Netconf earlier this week (to cover I2RS requ= irements, as noted by Eric earlier) has now become “draft-ietf-netcon= f-yang-push-00”.  The WG draft is now posted here:

https://datatracker.ietf.org/doc/draft-ietf-netconf-= yang-push/

 

Kind regards

--- Alex

 

 

From: Eric Voit (evoit)
Sent: Tuesday, October 13, 2015 8:48 PM
To: i2rs@ietf.org
Cc: Alexander Clemm (alex) <alex@cisco.com>; Alberto Gonzalez = Prieto (albertgo) <albertgo@cisco.com>; Ambika Prasad Tripathy (ambtr= ipa) <ambtripa@cisco.com>; Einar Nilsen-Nygaard (einarnn) <einarnn= @cisco.com>
Subject: I2RS requirements in YANG PubSub drafts for NETCONF, RESTCO= NF, HTTP/2

 

We just posted two drafts in NETCONF.  These dr= afts technology specifications aiming to cover the requirements from I2RS a= s per:

https://datatr= acker.ietf.org/doc/draft-ietf-i2rs-pub-sub-requirements/

These drafts are:=

 

(1)  Subscribing to YANG datastore push updates= (updated)

http://www.ietf.org/id/draft-clemm-netconf-yang-push-02= .txt

 

(2) Restconf subscription and HTTP push for YANG dat= astores (new)

http://www.ietf.org/id/draft-voit-restconf-yang-push-00= .txt

   Draft (= 2) is new in that it:

·   =   proposes Restconf subscription and push mechanisms to continuously s= tream information from YANG datastores over HTTP

·   =   provides a mechanism to support static subscriptions so that an oper= ator can stream updates over HTTP without Restconf

·   =   provides YANG model extensions to leverage HTTP/2 so that individual= subscriptions can get custom treatment via their own HTTP streams. 

 

If you are interested, please come over and follow t= he discussions in NETCONF.  Thanks!

 

- Alexander Clemm, Eric Voit, Alberto Gonzalez Priet= o, Ambika Prasad Tripathy, & Einar Nilsen-Nygaard

 

 

 

 

--_000_af0cb82cc2c743f9839cf851a30caf4cXCHRCD001ciscocom_-- From nobody Thu Oct 15 14:12:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB0521A1BC8; Thu, 15 Oct 2015 14:12:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.911 X-Spam-Level: X-Spam-Status: No, score=-10.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, J_CHICKENPOX_210=0.6, J_CHICKENPOX_22=0.6, J_CHICKENPOX_25=0.6, J_CHICKENPOX_26=0.6, J_CHICKENPOX_27=0.6, J_CHICKENPOX_28=0.6, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JY5NAUvXS907; Thu, 15 Oct 2015 14:12:33 -0700 (PDT) Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACF001A1BBE; Thu, 15 Oct 2015 14:12:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22542; q=dns/txt; s=iport; t=1444943552; x=1446153152; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=uScMXPNjLMqGClxGrDWEtbR+1TgEYksHmClbMMnwuZU=; b=hNYWXySKtnLKjSI3H18S29i9YhLx8uFXylfq602wmlPNq6ERlODt7JoS MUQlsRa94X2I+G7XczQmllUxtGTiteGEfyJwCbuLfILN/n4ySzhSavLaF AGBGeFwsRjhnjlHdIjrEz8TnZ+d82+6Bllkefu3qYLJe+6LwcdytunamL I=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AFAgDsFSBW/5ldJa1egyZUbga9NwENgVkXCoUzSgIcgSA4FAEBAQEBAQGBCoQnAQEEAQEBIBE6BAcQAgEIGAICJgICAiULFRACBA4FiC4NsCeTPAEBAQEBAQEBAQEBAQEBAQEBAQEBARMEgSKKUoQ0AQ0YGBsHgmmBRQWND4kOAYUYiAKBWIQ6lX0BHwEBQoQDcYQeAQEeBxyBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,687,1437436800"; d="scan'208";a="197321908" Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-2.cisco.com with ESMTP; 15 Oct 2015 21:12:31 +0000 Received: from XCH-RCD-012.cisco.com (xch-rcd-012.cisco.com [173.37.102.22]) by rcdn-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id t9FLCVIq032246 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Oct 2015 21:12:31 GMT Received: from xch-rcd-015.cisco.com (173.37.102.25) by XCH-RCD-012.cisco.com (173.37.102.22) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 15 Oct 2015 16:12:16 -0500 Received: from xch-rcd-015.cisco.com ([173.37.102.25]) by XCH-RCD-015.cisco.com ([173.37.102.25]) with mapi id 15.00.1104.000; Thu, 15 Oct 2015 16:12:16 -0500 From: "Acee Lindem (acee)" To: Ladislav Lhotka Thread-Topic: [netmod] rib-data-model and routing-cfg Thread-Index: AQHRAmpn2WDjXB7SH0yyXI3vdDB1jJ5jMMMAgAZwt4CAAFZcgP//3TyAgALyRYCAAGEWAA== Date: Thu, 15 Oct 2015 21:12:16 +0000 Message-ID: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.116.152.199] Content-Type: text/plain; charset="utf-8" Content-ID: <831E8953BAB4F14782F0EA1A175A966A@emea.cisco.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 Archived-At: Cc: Routing YANG , "i2rs@ietf.org" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 21:12:36 -0000 SGkgTGFkYSwgDQpJIGxvb2tlZCBhdCB0aGlzIGFuZCBJIGxpa2UgdGhpcyBzaW1wbGUgYXNzb2Np YXRpb24uIEkgdGhpbmsgd2Ugc2hvdWxkIGdvDQp3aXRoIHRoaXMgLSB0aGVyZSBpcyBvbmUgcG9p bnQgZm9yIGRpc2N1c3Npb24uDQoNCkFsbCwNCg0KSW4gcm91dGluZyBkZXNpZ24gdGVhbSBkaXNj dXNzaW9ucyB3ZSBoYWQgYXVnbWVudGVkDQrigJxpZjppbnRlcmZhY2VzL2lmOmludGVyZmFjZS9p cDppcHY04oCdIGFuZA0K4oCcaWY6aW50ZXJmYWNlL2lmOmludGVyZmFjZS9pcDppcHY24oCdIHNv IGFuIGludGVyZmFjZSBjb3VsZCBiZSBtYXBwZWQgdG8NCmRpZmZlcmVudCByb3V0aW5nLWluc3Rh bmNlcyBmb3IgSVB2NCBhbmQgSVB2Ni4NCg0KRG8gd2UgcmVhbGx5IHNlZSBhc3NvY2lhdGluZyB0 aGUgc2FtZSBpbnRlcmZhY2Ugd2l0aCBkaWZmZXJlbnQNCnJvdXRpbmctaW5zdGFuY2VzIGZvciBJ UHY0IGFuZCBJUHY2PyBJIGNhbiBzZWVtIHRvIHJlbWVtYmVyIHRoZSB1c2UgY2FzZQ0KYW5kIGl0 IGRvZXMgYWRkIGNvbXBsZXhpdHkgZm9yZXZlci4NCg0KVGhhbmtzLA0KQWNlZSANCg0KDQoNCk9u IDEwLzE1LzE1LCA3OjI1IEFNLCAiTGFkaXNsYXYgTGhvdGthIiA8bGhvdGthQG5pYy5jej4gd3Jv dGU6DQoNCj5IaSBBY2VlLA0KPg0KPkkgbWFkZSB0aGUgbmVjZXNzYXJ5IGNoYW5nZXMgaW4gaWV0 Zi1yb3V0aW5nLCBwbGVhc2Ugc2VlIHRoZSBHaXRIdWINCj5yZXBvOg0KPg0KPmh0dHBzOi8vZ2l0 aHViLmNvbS9uZXRtb2Qtd2cvcm91dGluZy1jZmcNCj4NCj5BIG5ldyBsZWFmICJydDpyb3V0aW5n LWluc3RhbmNlIiB3YXMgYXVnbWVudGVkIGludG8gaW50ZXJmYWNlDQo+Y29uZmlndXJhdGlvbiwg YW5kICJydDppbnRlcmZhY2VzIiBjb250YWluZXIgaW4gY29uZmlndXJhdGlvbiBpcyBnb25lLg0K Pg0KPkJlbG93IGlzIHRoZSBjb21wbGV0ZSBuZXcgdHJlZS4NCj4NCj5XaWxsIHRoaXMgd29yaz8N Cj4NCj5MYWRhDQo+DQo+bW9kdWxlOiBpZXRmLWludGVyZmFjZXMNCj4gICArLS1ydyBpbnRlcmZh Y2VzDQo+ICAgfCAgKy0tcncgaW50ZXJmYWNlKiBbbmFtZV0NCj4gICB8ICAgICArLS1ydyBuYW1l ICAgICAgICAgICAgICAgICAgIHN0cmluZw0KPiAgIHwgICAgICstLXJ3IGRlc2NyaXB0aW9uPyAg ICAgICAgICAgc3RyaW5nDQo+ICAgfCAgICAgKy0tcncgdHlwZSAgICAgICAgICAgICAgICAgICBp ZGVudGl0eXJlZg0KPiAgIHwgICAgICstLXJ3IGVuYWJsZWQ/ICAgICAgICAgICAgICAgYm9vbGVh bg0KPiAgIHwgICAgICstLXJ3IGlwOmlwdjQhDQo+ICAgfCAgICAgfCAgKy0tcncgaXA6ZW5hYmxl ZD8gICAgICBib29sZWFuDQo+ICAgfCAgICAgfCAgKy0tcncgaXA6Zm9yd2FyZGluZz8gICBib29s ZWFuDQo+ICAgfCAgICAgfCAgKy0tcncgaXA6bXR1PyAgICAgICAgICB1aW50MTYNCj4gICB8ICAg ICB8ICArLS1ydyBpcDphZGRyZXNzKiBbaXBdDQo+ICAgfCAgICAgfCAgfCAgKy0tcncgaXA6aXAg ICAgICAgICAgICAgICBpbmV0OmlwdjQtYWRkcmVzcy1uby16b25lDQo+ICAgfCAgICAgfCAgfCAg Ky0tcncgKHN1Ym5ldCkNCj4gICB8ICAgICB8ICB8ICAgICArLS06KHByZWZpeC1sZW5ndGgpDQo+ ICAgfCAgICAgfCAgfCAgICAgICAgKy0tcncgaXA6cHJlZml4LWxlbmd0aD8gICB1aW50OA0KPiAg IHwgICAgIHwgICstLXJ3IGlwOm5laWdoYm9yKiBbaXBdDQo+ICAgfCAgICAgfCAgICAgKy0tcncg aXA6aXAgICAgICAgICAgICAgICAgICAgIGluZXQ6aXB2NC1hZGRyZXNzLW5vLXpvbmUNCj4gICB8 ICAgICB8ICAgICArLS1ydyBpcDpsaW5rLWxheWVyLWFkZHJlc3MgICAgeWFuZzpwaHlzLWFkZHJl c3MNCj4gICB8ICAgICArLS1ydyBpcDppcHY2IQ0KPiAgIHwgICAgIHwgICstLXJ3IGlwOmVuYWJs ZWQ/ICAgICAgICAgICAgICAgICAgICAgICAgYm9vbGVhbg0KPiAgIHwgICAgIHwgICstLXJ3IGlw OmZvcndhcmRpbmc/ICAgICAgICAgICAgICAgICAgICAgYm9vbGVhbg0KPiAgIHwgICAgIHwgICst LXJ3IGlwOm10dT8gICAgICAgICAgICAgICAgICAgICAgICAgICAgdWludDMyDQo+ICAgfCAgICAg fCAgKy0tcncgaXA6YWRkcmVzcyogW2lwXQ0KPiAgIHwgICAgIHwgIHwgICstLXJ3IGlwOmlwICAg ICAgICAgICAgICAgaW5ldDppcHY2LWFkZHJlc3Mtbm8tem9uZQ0KPiAgIHwgICAgIHwgIHwgICst LXJ3IGlwOnByZWZpeC1sZW5ndGggICAgdWludDgNCj4gICB8ICAgICB8ICArLS1ydyBpcDpuZWln aGJvciogW2lwXQ0KPiAgIHwgICAgIHwgIHwgICstLXJ3IGlwOmlwICAgICAgICAgICAgICAgICAg ICBpbmV0OmlwdjYtYWRkcmVzcy1uby16b25lDQo+ICAgfCAgICAgfCAgfCAgKy0tcncgaXA6bGlu ay1sYXllci1hZGRyZXNzICAgIHlhbmc6cGh5cy1hZGRyZXNzDQo+ICAgfCAgICAgfCAgKy0tcncg aXA6ZHVwLWFkZHItZGV0ZWN0LXRyYW5zbWl0cz8gICAgICB1aW50MzINCj4gICB8ICAgICB8ICAr LS1ydyBpcDphdXRvY29uZg0KPiAgIHwgICAgIHwgIHwgICstLXJ3IGlwOmNyZWF0ZS1nbG9iYWwt YWRkcmVzc2VzPyAgIGJvb2xlYW4NCj4gICB8ICAgICB8ICArLS1ydyB2NnVyOmlwdjYtcm91dGVy LWFkdmVydGlzZW1lbnRzDQo+ICAgfCAgICAgfCAgICAgKy0tcncgdjZ1cjpzZW5kLWFkdmVydGlz ZW1lbnRzPyAgICBib29sZWFuDQo+ICAgfCAgICAgfCAgICAgKy0tcncgdjZ1cjptYXgtcnRyLWFk di1pbnRlcnZhbD8gICB1aW50MTYNCj4gICB8ICAgICB8ICAgICArLS1ydyB2NnVyOm1pbi1ydHIt YWR2LWludGVydmFsPyAgIHVpbnQxNg0KPiAgIHwgICAgIHwgICAgICstLXJ3IHY2dXI6bWFuYWdl ZC1mbGFnPyAgICAgICAgICAgYm9vbGVhbg0KPiAgIHwgICAgIHwgICAgICstLXJ3IHY2dXI6b3Ro ZXItY29uZmlnLWZsYWc/ICAgICAgYm9vbGVhbg0KPiAgIHwgICAgIHwgICAgICstLXJ3IHY2dXI6 bGluay1tdHU/ICAgICAgICAgICAgICAgdWludDMyDQo+ICAgfCAgICAgfCAgICAgKy0tcncgdjZ1 cjpyZWFjaGFibGUtdGltZT8gICAgICAgICB1aW50MzINCj4gICB8ICAgICB8ICAgICArLS1ydyB2 NnVyOnJldHJhbnMtdGltZXI/ICAgICAgICAgIHVpbnQzMg0KPiAgIHwgICAgIHwgICAgICstLXJ3 IHY2dXI6Y3VyLWhvcC1saW1pdD8gICAgICAgICAgdWludDgNCj4gICB8ICAgICB8ICAgICArLS1y dyB2NnVyOmRlZmF1bHQtbGlmZXRpbWU/ICAgICAgIHVpbnQxNg0KPiAgIHwgICAgIHwgICAgICst LXJ3IHY2dXI6cHJlZml4LWxpc3QNCj4gICB8ICAgICB8ICAgICAgICArLS1ydyB2NnVyOnByZWZp eCogW3ByZWZpeC1zcGVjXQ0KPiAgIHwgICAgIHwgICAgICAgICAgICstLXJ3IHY2dXI6cHJlZml4 LXNwZWMgICAgICAgICAgIGluZXQ6aXB2Ni1wcmVmaXgNCj4gICB8ICAgICB8ICAgICAgICAgICAr LS1ydyAoY29udHJvbC1hZHYtcHJlZml4ZXMpPw0KPiAgIHwgICAgIHwgICAgICAgICAgICAgICst LToobm8tYWR2ZXJ0aXNlKQ0KPiAgIHwgICAgIHwgICAgICAgICAgICAgIHwgICstLXJ3IHY2dXI6 bm8tYWR2ZXJ0aXNlPyAgICAgICAgIGVtcHR5DQo+ICAgfCAgICAgfCAgICAgICAgICAgICAgKy0t OihhZHZlcnRpc2UpDQo+ICAgfCAgICAgfCAgICAgICAgICAgICAgICAgKy0tcncgdjZ1cjp2YWxp ZC1saWZldGltZT8gICAgICAgdWludDMyDQo+ICAgfCAgICAgfCAgICAgICAgICAgICAgICAgKy0t cncgdjZ1cjpvbi1saW5rLWZsYWc/ICAgICAgICAgYm9vbGVhbg0KPiAgIHwgICAgIHwgICAgICAg ICAgICAgICAgICstLXJ3IHY2dXI6cHJlZmVycmVkLWxpZmV0aW1lPyAgIHVpbnQzMg0KPiAgIHwg ICAgIHwgICAgICAgICAgICAgICAgICstLXJ3IHY2dXI6YXV0b25vbW91cy1mbGFnPyAgICAgIGJv b2xlYW4NCj4gICB8ICAgICArLS1ydyBydDpyb3V0aW5nLWluc3RhbmNlPyAgIHJvdXRpbmctaW5z dGFuY2UtcmVmDQo+ICAgKy0tcm8gaW50ZXJmYWNlcy1zdGF0ZQ0KPiAgICAgICstLXJvIGludGVy ZmFjZSogW25hbWVdDQo+ICAgICAgICAgKy0tcm8gbmFtZSAgICAgICAgICAgICAgICAgICBzdHJp bmcNCj4gICAgICAgICArLS1ybyB0eXBlICAgICAgICAgICAgICAgICAgIGlkZW50aXR5cmVmDQo+ ICAgICAgICAgKy0tcm8gb3Blci1zdGF0dXMgICAgICAgICAgICBlbnVtZXJhdGlvbg0KPiAgICAg ICAgICstLXJvIGxhc3QtY2hhbmdlPyAgICAgICAgICAgeWFuZzpkYXRlLWFuZC10aW1lDQo+ICAg ICAgICAgKy0tcm8gcGh5cy1hZGRyZXNzPyAgICAgICAgICB5YW5nOnBoeXMtYWRkcmVzcw0KPiAg ICAgICAgICstLXJvIGhpZ2hlci1sYXllci1pZiogICAgICAgaW50ZXJmYWNlLXN0YXRlLXJlZg0K PiAgICAgICAgICstLXJvIGxvd2VyLWxheWVyLWlmKiAgICAgICAgaW50ZXJmYWNlLXN0YXRlLXJl Zg0KPiAgICAgICAgICstLXJvIHNwZWVkPyAgICAgICAgICAgICAgICAgeWFuZzpnYXVnZTY0DQo+ ICAgICAgICAgKy0tcm8gc3RhdGlzdGljcw0KPiAgICAgICAgIHwgICstLXJvIGRpc2NvbnRpbnVp dHktdGltZSAgICB5YW5nOmRhdGUtYW5kLXRpbWUNCj4gICAgICAgICB8ICArLS1ybyBpbi1vY3Rl dHM/ICAgICAgICAgICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBpbi11bmlj YXN0LXBrdHM/ICAgICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBpbi1icm9h ZGNhc3QtcGt0cz8gICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBpbi1tdWx0 aWNhc3QtcGt0cz8gICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBpbi1kaXNj YXJkcz8gICAgICAgICAgeWFuZzpjb3VudGVyMzINCj4gICAgICAgICB8ICArLS1ybyBpbi1lcnJv cnM/ICAgICAgICAgICAgeWFuZzpjb3VudGVyMzINCj4gICAgICAgICB8ICArLS1ybyBpbi11bmtu b3duLXByb3Rvcz8gICAgeWFuZzpjb3VudGVyMzINCj4gICAgICAgICB8ICArLS1ybyBvdXQtb2N0 ZXRzPyAgICAgICAgICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBvdXQtdW5p Y2FzdC1wa3RzPyAgICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBvdXQtYnJv YWRjYXN0LXBrdHM/ICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBvdXQtbXVs dGljYXN0LXBrdHM/ICAgeWFuZzpjb3VudGVyNjQNCj4gICAgICAgICB8ICArLS1ybyBvdXQtZGlz Y2FyZHM/ICAgICAgICAgeWFuZzpjb3VudGVyMzINCj4gICAgICAgICB8ICArLS1ybyBvdXQtZXJy b3JzPyAgICAgICAgICAgeWFuZzpjb3VudGVyMzINCj4gICAgICAgICArLS1ybyBpcDppcHY0IQ0K PiAgICAgICAgIHwgICstLXJvIGlwOmZvcndhcmRpbmc/ICAgYm9vbGVhbg0KPiAgICAgICAgIHwg ICstLXJvIGlwOm10dT8gICAgICAgICAgdWludDE2DQo+ICAgICAgICAgfCAgKy0tcm8gaXA6YWRk cmVzcyogW2lwXQ0KPiAgICAgICAgIHwgIHwgICstLXJvIGlwOmlwICAgICAgICAgICAgICAgaW5l dDppcHY0LWFkZHJlc3Mtbm8tem9uZQ0KPiAgICAgICAgIHwgIHwgICstLXJvIChzdWJuZXQpPw0K PiAgICAgICAgIHwgIHwgIHwgICstLToocHJlZml4LWxlbmd0aCkNCj4gICAgICAgICB8ICB8ICB8 ICAgICArLS1ybyBpcDpwcmVmaXgtbGVuZ3RoPyAgIHVpbnQ4DQo+ICAgICAgICAgfCAgfCAgKy0t cm8gaXA6b3JpZ2luPyAgICAgICAgICBpcC1hZGRyZXNzLW9yaWdpbg0KPiAgICAgICAgIHwgICst LXJvIGlwOm5laWdoYm9yKiBbaXBdDQo+ICAgICAgICAgfCAgICAgKy0tcm8gaXA6aXAgICAgICAg ICAgICAgICAgICAgIGluZXQ6aXB2NC1hZGRyZXNzLW5vLXpvbmUNCj4gICAgICAgICB8ICAgICAr LS1ybyBpcDpsaW5rLWxheWVyLWFkZHJlc3M/ICAgeWFuZzpwaHlzLWFkZHJlc3MNCj4gICAgICAg ICB8ICAgICArLS1ybyBpcDpvcmlnaW4/ICAgICAgICAgICAgICAgbmVpZ2hib3Itb3JpZ2luDQo+ ICAgICAgICAgKy0tcm8gaXA6aXB2NiENCj4gICAgICAgICB8ICArLS1ybyBpcDpmb3J3YXJkaW5n PyAgICAgICAgICAgICAgICAgICAgIGJvb2xlYW4NCj4gICAgICAgICB8ICArLS1ybyBpcDptdHU/ ICAgICAgICAgICAgICAgICAgICAgICAgICAgIHVpbnQzMg0KPiAgICAgICAgIHwgICstLXJvIGlw OmFkZHJlc3MqIFtpcF0NCj4gICAgICAgICB8ICB8ICArLS1ybyBpcDppcCAgICAgICAgICAgICAg IGluZXQ6aXB2Ni1hZGRyZXNzLW5vLXpvbmUNCj4gICAgICAgICB8ICB8ICArLS1ybyBpcDpwcmVm aXgtbGVuZ3RoICAgIHVpbnQ4DQo+ICAgICAgICAgfCAgfCAgKy0tcm8gaXA6b3JpZ2luPyAgICAg ICAgICBpcC1hZGRyZXNzLW9yaWdpbg0KPiAgICAgICAgIHwgIHwgICstLXJvIGlwOnN0YXR1cz8g ICAgICAgICAgZW51bWVyYXRpb24NCj4gICAgICAgICB8ICArLS1ybyBpcDpuZWlnaGJvciogW2lw XQ0KPiAgICAgICAgIHwgIHwgICstLXJvIGlwOmlwICAgICAgICAgICAgICAgICAgICBpbmV0Omlw djYtYWRkcmVzcy1uby16b25lDQo+ICAgICAgICAgfCAgfCAgKy0tcm8gaXA6bGluay1sYXllci1h ZGRyZXNzPyAgIHlhbmc6cGh5cy1hZGRyZXNzDQo+ICAgICAgICAgfCAgfCAgKy0tcm8gaXA6b3Jp Z2luPyAgICAgICAgICAgICAgIG5laWdoYm9yLW9yaWdpbg0KPiAgICAgICAgIHwgIHwgICstLXJv IGlwOmlzLXJvdXRlcj8gICAgICAgICAgICBlbXB0eQ0KPiAgICAgICAgIHwgIHwgICstLXJvIGlw OnN0YXRlPyAgICAgICAgICAgICAgICBlbnVtZXJhdGlvbg0KPiAgICAgICAgIHwgICstLXJvIHY2 dXI6aXB2Ni1yb3V0ZXItYWR2ZXJ0aXNlbWVudHMNCj4gICAgICAgICB8ICAgICArLS1ybyB2NnVy OnNlbmQtYWR2ZXJ0aXNlbWVudHM/ICAgIGJvb2xlYW4NCj4gICAgICAgICB8ICAgICArLS1ybyB2 NnVyOm1heC1ydHItYWR2LWludGVydmFsPyAgIHVpbnQxNg0KPiAgICAgICAgIHwgICAgICstLXJv IHY2dXI6bWluLXJ0ci1hZHYtaW50ZXJ2YWw/ICAgdWludDE2DQo+ICAgICAgICAgfCAgICAgKy0t cm8gdjZ1cjptYW5hZ2VkLWZsYWc/ICAgICAgICAgICBib29sZWFuDQo+ICAgICAgICAgfCAgICAg Ky0tcm8gdjZ1cjpvdGhlci1jb25maWctZmxhZz8gICAgICBib29sZWFuDQo+ICAgICAgICAgfCAg ICAgKy0tcm8gdjZ1cjpsaW5rLW10dT8gICAgICAgICAgICAgICB1aW50MzINCj4gICAgICAgICB8 ICAgICArLS1ybyB2NnVyOnJlYWNoYWJsZS10aW1lPyAgICAgICAgIHVpbnQzMg0KPiAgICAgICAg IHwgICAgICstLXJvIHY2dXI6cmV0cmFucy10aW1lcj8gICAgICAgICAgdWludDMyDQo+ICAgICAg ICAgfCAgICAgKy0tcm8gdjZ1cjpjdXItaG9wLWxpbWl0PyAgICAgICAgICB1aW50OA0KPiAgICAg ICAgIHwgICAgICstLXJvIHY2dXI6ZGVmYXVsdC1saWZldGltZT8gICAgICAgdWludDE2DQo+ICAg ICAgICAgfCAgICAgKy0tcm8gdjZ1cjpwcmVmaXgtbGlzdA0KPiAgICAgICAgIHwgICAgICAgICst LXJvIHY2dXI6cHJlZml4KiBbcHJlZml4LXNwZWNdDQo+ICAgICAgICAgfCAgICAgICAgICAgKy0t cm8gdjZ1cjpwcmVmaXgtc3BlYyAgICAgICAgICAgaW5ldDppcHY2LXByZWZpeA0KPiAgICAgICAg IHwgICAgICAgICAgICstLXJvIHY2dXI6dmFsaWQtbGlmZXRpbWU/ICAgICAgIHVpbnQzMg0KPiAg ICAgICAgIHwgICAgICAgICAgICstLXJvIHY2dXI6b24tbGluay1mbGFnPyAgICAgICAgIGJvb2xl YW4NCj4gICAgICAgICB8ICAgICAgICAgICArLS1ybyB2NnVyOnByZWZlcnJlZC1saWZldGltZT8g ICB1aW50MzINCj4gICAgICAgICB8ICAgICAgICAgICArLS1ybyB2NnVyOmF1dG9ub21vdXMtZmxh Zz8gICAgICBib29sZWFuDQo+ICAgICAgICAgKy0tcm8gcnQ6cm91dGluZy1pbnN0YW5jZT8gICBy b3V0aW5nLWluc3RhbmNlLXN0YXRlLXJlZg0KPm1vZHVsZTogaWV0Zi1yb3V0aW5nDQo+ICAgKy0t cm8gcm91dGluZy1zdGF0ZQ0KPiAgIHwgICstLXJvIHJvdXRpbmctaW5zdGFuY2UqIFtuYW1lXQ0K PiAgIHwgICAgICstLXJvIG5hbWUgICAgICAgICAgICAgICAgIHN0cmluZw0KPiAgIHwgICAgICst LXJvIHR5cGU/ICAgICAgICAgICAgICAgIGlkZW50aXR5cmVmDQo+ICAgfCAgICAgKy0tcm8gcm91 dGVyLWlkPyAgICAgICAgICAgeWFuZzpkb3R0ZWQtcXVhZA0KPiAgIHwgICAgICstLXJvIGludGVy ZmFjZXMNCj4gICB8ICAgICB8ICArLS1ybyBpbnRlcmZhY2UqICAgaWY6aW50ZXJmYWNlLXN0YXRl LXJlZg0KPiAgIHwgICAgICstLXJvIHJvdXRpbmctcHJvdG9jb2xzDQo+ICAgfCAgICAgfCAgKy0t cm8gcm91dGluZy1wcm90b2NvbCogW3R5cGUgbmFtZV0NCj4gICB8ICAgICB8ICAgICArLS1ybyB0 eXBlICAgIGlkZW50aXR5cmVmDQo+ICAgfCAgICAgfCAgICAgKy0tcm8gbmFtZSAgICBzdHJpbmcN Cj4gICB8ICAgICArLS1ybyByaWJzDQo+ICAgfCAgICAgICAgKy0tcm8gcmliKiBbbmFtZV0NCj4g ICB8ICAgICAgICAgICArLS1ybyBuYW1lICAgICAgICAgICAgICBzdHJpbmcNCj4gICB8ICAgICAg ICAgICArLS1ybyBhZGRyZXNzLWZhbWlseSAgICBpZGVudGl0eXJlZg0KPiAgIHwgICAgICAgICAg ICstLXJvIGRlZmF1bHQtcmliPyAgICAgIGJvb2xlYW4ge211bHRpcGxlLXJpYnN9Pw0KPiAgIHwg ICAgICAgICAgICstLXJvIHJvdXRlcw0KPiAgIHwgICAgICAgICAgICAgICstLXJvIHJvdXRlKg0K PiAgIHwgICAgICAgICAgICAgICAgICstLXJvIHJvdXRlLXByZWZlcmVuY2U/ICAgICAgICAgIHJv dXRlLXByZWZlcmVuY2UNCj4gICB8ICAgICAgICAgICAgICAgICArLS1ybyBuZXh0LWhvcA0KPiAg IHwgICAgICAgICAgICAgICAgIHwgICstLXJvIChuZXh0LWhvcC1vcHRpb25zKQ0KPiAgIHwgICAg ICAgICAgICAgICAgIHwgICAgICstLToob3V0Z29pbmctaW50ZXJmYWNlKQ0KPiAgIHwgICAgICAg ICAgICAgICAgIHwgICAgIHwgICstLXJvIG91dGdvaW5nLWludGVyZmFjZT8NCj5pZjppbnRlcmZh Y2Utc3RhdGUtcmVmDQo+ICAgfCAgICAgICAgICAgICAgICAgfCAgICAgKy0tOihzcGVjaWFsLW5l eHQtaG9wKQ0KPiAgIHwgICAgICAgICAgICAgICAgIHwgICAgIHwgICstLXJvIHNwZWNpYWwtbmV4 dC1ob3A/ICAgICAgICBlbnVtZXJhdGlvbg0KPiAgIHwgICAgICAgICAgICAgICAgIHwgICAgICst LToobmV4dC1ob3AtYWRkcmVzcykNCj4gICB8ICAgICAgICAgICAgICAgICB8ICAgICB8ICArLS1y byB2NnVyOm5leHQtaG9wLWFkZHJlc3M/DQo+aW5ldDppcHY2LWFkZHJlc3MNCj4gICB8ICAgICAg ICAgICAgICAgICB8ICAgICArLS06KG5leHQtaG9wLWFkZHJlc3MpDQo+ICAgfCAgICAgICAgICAg ICAgICAgfCAgICAgICAgKy0tcm8gdjR1cjpuZXh0LWhvcC1hZGRyZXNzPw0KPmluZXQ6aXB2NC1h ZGRyZXNzDQo+ICAgfCAgICAgICAgICAgICAgICAgKy0tcm8gc291cmNlLXByb3RvY29sICAgICAg ICAgICAgaWRlbnRpdHlyZWYNCj4gICB8ICAgICAgICAgICAgICAgICArLS1ybyBhY3RpdmU/ICAg ICAgICAgICAgICAgICAgICBlbXB0eQ0KPiAgIHwgICAgICAgICAgICAgICAgICstLXJvIGxhc3Qt dXBkYXRlZD8gICAgICAgICAgICAgIHlhbmc6ZGF0ZS1hbmQtdGltZQ0KPiAgIHwgICAgICAgICAg ICAgICAgICstLXJvIHY2dXI6ZGVzdGluYXRpb24tcHJlZml4PyAgIGluZXQ6aXB2Ni1wcmVmaXgN Cj4gICB8ICAgICAgICAgICAgICAgICArLS1ybyB2NHVyOmRlc3RpbmF0aW9uLXByZWZpeD8gICBp bmV0OmlwdjQtcHJlZml4DQo+ICAgKy0tcncgcm91dGluZw0KPiAgICAgICstLXJ3IHJvdXRpbmct aW5zdGFuY2UqIFtuYW1lXQ0KPiAgICAgICAgICstLXJ3IG5hbWUgICAgICAgICAgICAgICAgIHN0 cmluZw0KPiAgICAgICAgICstLXJ3IHR5cGU/ICAgICAgICAgICAgICAgIGlkZW50aXR5cmVmDQo+ ICAgICAgICAgKy0tcncgZW5hYmxlZD8gICAgICAgICAgICAgYm9vbGVhbg0KPiAgICAgICAgICst LXJ3IHJvdXRlci1pZD8gICAgICAgICAgIHlhbmc6ZG90dGVkLXF1YWQNCj4gICAgICAgICArLS1y dyBkZXNjcmlwdGlvbj8gICAgICAgICBzdHJpbmcNCj4gICAgICAgICArLS1ydyByb3V0aW5nLXBy b3RvY29scw0KPiAgICAgICAgIHwgICstLXJ3IHJvdXRpbmctcHJvdG9jb2wqIFt0eXBlIG5hbWVd DQo+ICAgICAgICAgfCAgICAgKy0tcncgdHlwZSAgICAgICAgICAgICBpZGVudGl0eXJlZg0KPiAg ICAgICAgIHwgICAgICstLXJ3IG5hbWUgICAgICAgICAgICAgc3RyaW5nDQo+ICAgICAgICAgfCAg ICAgKy0tcncgZGVzY3JpcHRpb24/ICAgICBzdHJpbmcNCj4gICAgICAgICB8ICAgICArLS1ydyBz dGF0aWMtcm91dGVzDQo+ICAgICAgICAgfCAgICAgICAgKy0tcncgdjZ1cjppcHY2DQo+ICAgICAg ICAgfCAgICAgICAgfCAgKy0tcncgdjZ1cjpyb3V0ZSogW2Rlc3RpbmF0aW9uLXByZWZpeF0NCj4g ICAgICAgICB8ICAgICAgICB8ICAgICArLS1ydyB2NnVyOmRlc3RpbmF0aW9uLXByZWZpeCAgICBp bmV0OmlwdjYtcHJlZml4DQo+ICAgICAgICAgfCAgICAgICAgfCAgICAgKy0tcncgdjZ1cjpkZXNj cmlwdGlvbj8gICAgICAgICAgc3RyaW5nDQo+ICAgICAgICAgfCAgICAgICAgfCAgICAgKy0tcncg djZ1cjpuZXh0LWhvcA0KPiAgICAgICAgIHwgICAgICAgIHwgICAgICAgICstLXJ3IChuZXh0LWhv cC1vcHRpb25zKQ0KPiAgICAgICAgIHwgICAgICAgIHwgICAgICAgICAgICstLToob3V0Z29pbmct aW50ZXJmYWNlKQ0KPiAgICAgICAgIHwgICAgICAgIHwgICAgICAgICAgIHwgICstLXJ3IHY2dXI6 b3V0Z29pbmctaW50ZXJmYWNlPw0KPmlmOmludGVyZmFjZS1yZWYNCj4gICAgICAgICB8ICAgICAg ICB8ICAgICAgICAgICArLS06KHNwZWNpYWwtbmV4dC1ob3ApDQo+ICAgICAgICAgfCAgICAgICAg fCAgICAgICAgICAgfCAgKy0tcncgdjZ1cjpzcGVjaWFsLW5leHQtaG9wPw0KPmVudW1lcmF0aW9u DQo+ICAgICAgICAgfCAgICAgICAgfCAgICAgICAgICAgKy0tOihuZXh0LWhvcC1hZGRyZXNzKQ0K PiAgICAgICAgIHwgICAgICAgIHwgICAgICAgICAgICAgICstLXJ3IHY2dXI6bmV4dC1ob3AtYWRk cmVzcz8NCj5pbmV0OmlwdjYtYWRkcmVzcw0KPiAgICAgICAgIHwgICAgICAgICstLXJ3IHY0dXI6 aXB2NA0KPiAgICAgICAgIHwgICAgICAgICAgICstLXJ3IHY0dXI6cm91dGUqIFtkZXN0aW5hdGlv bi1wcmVmaXhdDQo+ICAgICAgICAgfCAgICAgICAgICAgICAgKy0tcncgdjR1cjpkZXN0aW5hdGlv bi1wcmVmaXggICAgaW5ldDppcHY0LXByZWZpeA0KPiAgICAgICAgIHwgICAgICAgICAgICAgICst LXJ3IHY0dXI6ZGVzY3JpcHRpb24/ICAgICAgICAgIHN0cmluZw0KPiAgICAgICAgIHwgICAgICAg ICAgICAgICstLXJ3IHY0dXI6bmV4dC1ob3ANCj4gICAgICAgICB8ICAgICAgICAgICAgICAgICAr LS1ydyAobmV4dC1ob3Atb3B0aW9ucykNCj4gICAgICAgICB8ICAgICAgICAgICAgICAgICAgICAr LS06KG91dGdvaW5nLWludGVyZmFjZSkNCj4gICAgICAgICB8ICAgICAgICAgICAgICAgICAgICB8 ICArLS1ydyB2NHVyOm91dGdvaW5nLWludGVyZmFjZT8NCj5pZjppbnRlcmZhY2UtcmVmDQo+ICAg ICAgICAgfCAgICAgICAgICAgICAgICAgICAgKy0tOihzcGVjaWFsLW5leHQtaG9wKQ0KPiAgICAg ICAgIHwgICAgICAgICAgICAgICAgICAgIHwgICstLXJ3IHY0dXI6c3BlY2lhbC1uZXh0LWhvcD8N Cj5lbnVtZXJhdGlvbg0KPiAgICAgICAgIHwgICAgICAgICAgICAgICAgICAgICstLToobmV4dC1o b3AtYWRkcmVzcykNCj4gICAgICAgICB8ICAgICAgICAgICAgICAgICAgICAgICArLS1ydyB2NHVy Om5leHQtaG9wLWFkZHJlc3M/DQo+aW5ldDppcHY0LWFkZHJlc3MNCj4gICAgICAgICArLS1ydyBy aWJzDQo+ICAgICAgICAgICAgKy0tcncgcmliKiBbbmFtZV0NCj4gICAgICAgICAgICAgICArLS1y dyBuYW1lICAgICAgICAgICAgICBzdHJpbmcNCj4gICAgICAgICAgICAgICArLS1ydyBhZGRyZXNz LWZhbWlseT8gICBpZGVudGl0eXJlZg0KPiAgICAgICAgICAgICAgICstLXJ3IGRlc2NyaXB0aW9u PyAgICAgIHN0cmluZw0KPg0KPiJBY2VlIExpbmRlbSAoYWNlZSkiIDxhY2VlQGNpc2NvLmNvbT4g d3JpdGVzOg0KPg0KPj4gT24gMTAvMTMvMTUsIDEyOjMwIFBNLCAiTGFkaXNsYXYgTGhvdGthIiA8 bGhvdGthQG5pYy5jej4gd3JvdGU6DQo+Pg0KPj4+DQo+Pj4+IE9uIDEzIE9jdCAyMDE1LCBhdCAx NzoyMCwgQWNlZSBMaW5kZW0gKGFjZWUpIDxhY2VlQGNpc2NvLmNvbT4gd3JvdGU6DQo+Pj4+IA0K Pj4+PiBIaSBMYWRhLCBORVRNT0QsDQo+Pj4+IA0KPj4+PiBTbyBJIHRoaW5rIHdlIHNob3VsZCBt b3ZlIGZvcndhcmQgdGhpcyBpZXRmLXJ0Zy1jZmcgc28gdGhhdCBpdCBjYW4gYmUNCj4+Pj4gYXVn bWVudGVkIGFuZCBvdGhlciB3b3JrIGNhbiBtb3ZlIGZvcndhcmQuIFdlIGFyZSBzdGlsbCBpbg0K Pj4+PmRpc2FncmVlbWVudA0KPj4+PiB3aXRoIHJlc3BlY3QgdG8gcm91dGluZy1pbnN0YW5jZS9p bnRlcmZhY2UgY29uZmlndXJhdGlvbi4NCj4+Pj4gDQo+Pj4+ICAgIC0gV2UgZmVlbCB0aGUgSVB2 NC9JUHY2IGludGVyZmFjZXMgc2hvdWxkIHJlZmVyZW5jZSB0aGUNCj4+Pj4gcm91dGluZy1pbnN0 YW5jZSBpbiB0aGVpciBjb25maWcgc3RhdGUuIFRoaXMgaXMgY29uc2lzdGVudCB3aXRoDQo+Pj4+ IGRyYWZ0LXJ0Z3lhbmdkdC1ydGd3Zy1kZXZpY2UtbW9kZWwtMDEudHh0Lg0KPj4+PiAgICAtIFlv dSBmZWVsIHRoYXQgdGhlIHJvdXRpbmctaW5zdGFuY2Ugc2hvdWxkIGhhdmUgYSBsaXN0IG9mDQo+ Pj4+bGVhZi1yZWbigJlzDQo+Pj4+IHRvIHRoZSBpbnRlcmZhY2UuIFlvdSBiZWxpZXZlIHRoZSBs ZWFmLXJlZiBwcm92aWRlcyBhIGxldmVsIG9mDQo+Pj4+dmFsaWRhdGlvbg0KPj4+PiBkdWUgdG8g dGhlIGZhY3QgdGhhdCByZWZlcmVuY2VzIGNhbiBiZSBjb25maW5lZCB0byByb3V0aW5nLWluc3Rh bmNlDQo+Pj4+IHJlZmVyZW5jZXMuIEhvd2V2ZXIsIGhlcmV0b2ZvcmUsIG5vIG1vZGVscyBhcmUg cmVmZXJlbmNpbmcgdGhlDQo+Pj4+aW50ZXJmYWNlDQo+Pj4+IGxlYWYtcmVmcyBpbiB0aGUgbGlz dC4NCj4+Pg0KPj4+VHJ1ZSwgdGhlc2UgbW9kZWxzIChpZXRmLWlzaXMsIGZvciBpbnN0YW5jZSkg dXNlIGxlYWZyZWZzIHdpdGgNCj4+PiJpZjppbnRlcmZhY2UtcmVmIiB0eXBlLiBIb3dldmVyLCBz dWNoIGxlYWZyZWZzIGFyZSB1bmRlci1jb25zdHJhaW5lZA0KPj4+YmVjYXVzZSB0aGV5IGNhbiBi ZSBjb25maWd1cmVkIHRvIHJlZmVyIHRvOg0KPj4+DQo+Pj4tIGludGVyZmFjZXMgb2YgYW55IGxh eWVyLCBpbmNsdWRpbmcgcGh5c2ljYWwgaW50ZXJmYWNlcywgVkxBTiB0cnVua3MNCj4+PmV0Yy4N Cj4+DQo+PiBBY3R1YWxseSwgcHV0dGluZyB0aGUgcm91dGluZy1pbnN0YW5jZSByZWZlcmVuY2Ug aW4gdGhlIElQdjQgYW5kIElQdjYNCj4+IGludGVyZmFjZSBtb2RlbHMgKGkuZS4sIFJGQyA3Mjc3 KSBjb25zdHJhaW5zIHRoZSByZWZlcmVuY2UgdG8gbGF5ZXIgMw0KPj5tb3JlDQo+PiBlZmZlY3Rp dmVseSB0aGFuIHRoZSBsaXN0IG9mIGxlYWYtcmVmcy4NCj4+DQo+Pj4NCj4+Pi0gaW50ZXJmYWNl cyBhc3NpZ25lZCB0byBhbnkgcm91dGluZyBpbnN0YW5jZS4NCj4+DQo+PiBCdXQgdGhlIGxpc3Qg b2YgbGVhZi1yZWZzIGRvZXNu4oCZdCBpbnN1cmUgYW4gSVB2NCBpbnRlcmZhY2Ugb3IgSVB2Ng0K Pj4gaW50ZXJmYWNlIGlzbuKAmXQgaW5jbHVkZWQgYnkgYSBzaW5nbGUgcm91dGluZy1pbnN0YW5j ZS4NCj4+DQo+Pj4NCj4+PkkgYmVsaWV2ZSBpbiBhbGwgdGhlc2UgY2FzZXMgdGhlIGNob2ljZSBo YXMgdG8gYmUgbGltaXRlZCB0byAoMSkgTDMNCj4+PmludGVyZmFjZXMsIGFuZCAoMikgYmVsb25n aW5nIHRvICJvd24iIHJvdXRpbmcgaW5zdGFuY2UuIFRoZXNlDQo+Pj5jb25zdHJhaW50cyB3aWxs IGhhdmUgdG8gYmUgY2hlY2tlZCBpbiBzZXJ2ZXIgY29kZSBzb21laG93IC0gSSB3b3VsZA0KPj4+ cHJlZmVyIHRvIGhhdmUgdGhlbSByZXByZXNlbnRlZCBpbiB0aGUgZGF0YSBtb2RlbC4NCj4+Pg0K Pj4+QnV0IGlmIG5vYm9keSBzaGFyZXMgdGhpcyBjb25jZXJuIHdpdGggbWUsIEkgYW0gbm90IGdv aW5nIHRvIGJsb2NrIHRoZQ0KPj4+ZG9jdW1lbnQgb24gdGhpcyBpc3N1ZS4NCj4+DQo+PiBJ4oCZ ZCBhbHNvIGJlIGludGVyZXN0ZWQgaWYgYW55b25lIHNoYXJlcyB0aGlzIGNvbmNlcm4uDQo+Pg0K Pj4gVGhhbmtzLA0KPj4gQWNlZSANCj4+DQo+Pg0KPj4+DQo+Pj5MYWRhIA0KPj4+DQo+Pj4+IA0K Pj4+PiBPdGhlciB0aGFuIHRoZSBSb3V0aW5nIFlBTkcgRGVzaWduIFRlYW0gaGF2aW5nIGNob3Nl biB0aGUgZmlyc3QNCj4+Pj5vcHRpb24gLQ0KPj4+PiBhcmUgdGhlcmUgYW55IG90aGVyIG9waW5p b25zPw0KPj4+PiANCj4+Pj4gVGhhbmtzLA0KPj4+PiBBY2VlDQo+Pj4+IA0KPj4+PiBPbiAxMC85 LzE1LCA5OjAwIEFNLCAibmV0bW9kIG9uIGJlaGFsZiBvZiBBY2VlIExpbmRlbSAoYWNlZSkiDQo+ Pj4+IDxuZXRtb2QtYm91bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgYWNlZUBjaXNjby5jb20+ IHdyb3RlOg0KPj4+PiANCj4+Pj4+IEhpIExhZGEsIA0KPj4+Pj4gSTJSUyBpcyBub3QgY2hhcnRl cmVkIHRvIGRvIHRoZSBiYXNlIG1vZGVscy4gVGhlcmUgYXJlIG90aGVyIHJvdXRpbmcNCj4+Pj4+ IG1vZGVscyB0aGF0IHJlZmVyZW5jZSByb3V0aW5nLWNmZyBhbmQgZXZlbiBpbi1wcm9ncmVzcw0K Pj4+Pj5pbXBsZW1lbnRhdGlvbnMuDQo+Pj4+PiANCj4+Pj4+IE9uIDEwLzkvMTUsIDQ6MTMgQU0s ICJuZXRtb2Qgb24gYmVoYWxmIG9mIExhZGlzbGF2IExob3RrYSINCj4+Pj4+IDxuZXRtb2QtYm91 bmNlc0BpZXRmLm9yZyBvbiBiZWhhbGYgb2YgbGhvdGthQG5pYy5jej4gd3JvdGU6DQo+Pj4+PiAN Cj4+Pj4+PiBIaSwNCj4+Pj4+PiANCj4+Pj4+PiBJIGFtIHNvcnJ5IGZvciBjcm9zcy1wb3N0aW5n IGJ1dCBJIHRoaW5rIGl0IGlzIGhpZ2ggdGltZSB0byBkZWNpZGUNCj4+Pj4+PnRoZQ0KPj4+Pj4+ IHJlbGF0aW9uc2hpcCBiZXR3ZWVuIHRoZSBkYXRhIG1vZGVscyBpbiBpMnJzLXJpYi1kYXRhLW1v ZGVsIGFuZA0KPj4+Pj4+IG5ldG1vZC1yb3V0aW5nLWNmZyBJLURzIGJlY2F1c2UgdGhleSBjbGVh cmx5IHRhcmdldCB0aGUgc2FtZQ0KPj4+Pj4+bWFuYWdlbWVudA0KPj4+Pj4+IGRhdGEgaW4gYSBy b3V0ZXIuIEkgY2FuIHNlZSB0aHJlZSBwb3NzaWJsZSBzY2VuYXJpb3M6DQo+Pj4+Pj4gDQo+Pj4+ Pj4gMS4gVGhlIGkycnMtcmliIG1vZHVsZSB3aWxsIGJlIG1vZGlmaWVkIHRvIGF1Z21lbnQNCj4+ Pj4+PiBpZXRmLXJvdXRpbmcvaWV0Zi1pcHZbNDZdLXVuaWNhc3Qtcm91dGluZy4NCj4+Pj4+IA0K Pj4+Pj4gVGhpcyB3b3VsZCBzZWVtIHRvIGJlIHRoZSBvYnZpb3VzIGNob2ljZS4NCj4+Pj4+IA0K Pj4+Pj4+IA0KPj4+Pj4+IDIuIFRoZSBzY29wZSBvZiBpZXRmLXJvdXRpbmcgd2lsbCBiZSBjaGFu Z2VkIHNvIHRoYXQgaXQgd291bGQNCj4+Pj4+PmFkZHJlc3MNCj4+Pj4+PiBvbmx5IGhvc3Qgcm91 dGluZyBhbmQgc2ltcGxlIHJvdXRlcnMuIFRoZSBtb2RlbGxpbmcgd29yayBmb3INCj4+Pj4+PmFk dmFuY2VkDQo+Pj4+Pj4gcm91dGVycyB3aWxsIGJlIGRvbmUgZWxzZXdoZXJlLg0KPj4+Pj4+IA0K Pj4+Pj4+IDMuIFRoZSB3b3JrIG9uIG5ldG1vZC1yb3V0aW5nLWNmZyB3aWxsIGJlIHN0b3BwZWQu DQo+Pj4+PiANCj4+Pj4+IEEgZm91cnRoIG9wdGlvbiB3b3VsZCBiZSBmb3IgbWUgdG8gdGFrZSBv dmVyIG93bmVyc2hpcCwgbW92ZSB0aGUgd29yaw0KPj4+Pj50bw0KPj4+Pj4gdGhlIFJURyBXRywg YW5kIHdl4oCZZCByZWNydWl0IHNvbWUgc3Ryb25nIGF1dGhvcnMvcmV2aWV3ZXJzIGZyb20NCj4+ Pj4+b3BlcmF0b3JzDQo+Pj4+PiBhbmQgb3RoZXIgdmVuZG9ycyAoaW52b2x2aW5nIHRoZSBBRHMg aW4gc2VsZWN0aW9uKS4NCj4+Pj4+IA0KPj4+Pj4gVGhhbmtzLA0KPj4+Pj4gQWNlZSANCj4+Pj4+ IA0KPj4+Pj4gDQo+Pj4+Pj4gDQo+Pj4+Pj4gT3BpbmlvbnM/DQo+Pj4+Pj4gDQo+Pj4+Pj4gVGhh bmtzLCBMYWRhDQo+Pj4+Pj4gDQo+Pj4+Pj4gLS0NCj4+Pj4+PiBMYWRpc2xhdiBMaG90a2EsIENa Lk5JQyBMYWJzDQo+Pj4+Pj4gUEdQIEtleSBJRDogRTc0RThDMEMNCj4+Pj4+PiANCj4+Pj4+PiAN Cj4+Pj4+PiANCj4+Pj4+PiANCj4+Pj4+PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fXw0KPj4+Pj4+IG5ldG1vZCBtYWlsaW5nIGxpc3QNCj4+Pj4+PiBuZXRt b2RAaWV0Zi5vcmcNCj4+Pj4+PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZv L25ldG1vZA0KPj4+Pj4gDQo+Pj4+PiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fXw0KPj4+Pj4gbmV0bW9kIG1haWxpbmcgbGlzdA0KPj4+Pj4gbmV0bW9kQGll dGYub3JnDQo+Pj4+PiBodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL25ldG1v ZA0KPj4+PiANCj4+Pg0KPj4+LS0NCj4+PkxhZGlzbGF2IExob3RrYSwgQ1ouTklDIExhYnMNCj4+ PlBHUCBLZXkgSUQ6IEU3NEU4QzBDDQo+Pj4NCj4+Pg0KPj4+DQo+Pj4NCj4+DQo+DQo+LS0gDQo+ TGFkaXNsYXYgTGhvdGthLCBDWi5OSUMgTGFicw0KPlBHUCBLZXkgSUQ6IEU3NEU4QzBDDQoNCg== From nobody Thu Oct 15 14:52:27 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97BBF1A6FE5 for ; Thu, 15 Oct 2015 14:52:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AmmPPY0B0iA7 for ; Thu, 15 Oct 2015 14:52:23 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F5551A6FA0 for ; Thu, 15 Oct 2015 14:52:23 -0700 (PDT) X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Joel M. Halpern'" , "'Joe Clarke'" , References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> <56200ECF.2080406@joelhalpern.com> In-Reply-To: <56200ECF.2080406@joelhalpern.com> Date: Thu, 15 Oct 2015 17:52:12 -0400 Message-ID: <005001d10793$c0842e10$418c8a30$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQEoIgrEBoPDtxDxKD7aeuKUQrt9ZAMAOITjAoWuDDkBs2I6OQK/qH8mAO0wvUgBxDT0+Z9ZkIxQ Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 21:52:24 -0000 Joel: +1 to Joel's comments. As always, thank you for clarifying my feeble words, Sue Hares -----Original Message----- From: Joel M. Halpern [mailto:jmh@joelhalpern.com] Sent: Thursday, October 15, 2015 4:39 PM To: Joe Clarke; Susan Hares; i2rs@ietf.org Cc: jhaas@pfrc.org; 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol In terms of making clear this constraint, I would expect whatever RFC describes the protocol to be used for I2RS would indicate that although the archtiecture requested the three behaviors, the current protocol only supports "all-or-none." Assuming we can find ways to use NetConf or RestConf, I presume that will be an applicability / usage document rather than a protocol definition document. Yours, Joel On 10/15/15 1:17 PM, Joe Clarke wrote: > On 10/15/15 11:45, Susan Hares wrote: >> Yes - multiple sub-operation in RESTCONF requires a PATCH, and the >> burden is on the client to handle the backing out of data in >> RESTCONF. You have hit upon the challenge. The I2RS client is >> bearing the burden of this back-out instead of the I2RS agent >> (Netconf "server" concept). >> >> Do you think this is reasonable to keep the I2RS agents simple? Will >> it make the I2RS clients unworkable? > > I can't answer an behalf of all I2RS Client implementors, but it > doesn't seem like an undue burden. It's just critical that they > understand that the burden is upon them. How is this decision to be > communicated? Will the architecture be updated? > > I assume that Agent implementors _could_ do the other two error > handling techniques if they wanted and advertise this to the Client? > > Joe > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 15 15:44:40 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06B1D1A87AF for ; Thu, 15 Oct 2015 15:44:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.055 X-Spam-Level: X-Spam-Status: No, score=-99.055 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gIBombb7HH9K for ; Thu, 15 Oct 2015 15:44:37 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D8DB1A87AD for ; Thu, 15 Oct 2015 15:44:37 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=195.53.52.170; From: "Susan Hares" To: "'Joel M. Halpern'" , "'Joe Clarke'" , References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> <001f01d10773$0da89300$28f9b900$@ndzh.com> <56200F65.7070102@joelhalpern.com> In-Reply-To: <56200F65.7070102@joelhalpern.com> Date: Thu, 15 Oct 2015 18:44:26 -0400 Message-ID: <006501d1079b$0c843010$258c9030$@ndzh.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQEoIgrEBoPDtxDxKD7aeuKUQrt9ZAMAOITjAoWuDDkBs2I6OQK/qH8mAO0wvUgBrXuk2gHxI50Fn0rLleA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 22:44:39 -0000 Joel: I OK with this approach as well - because we can note the reduction in the combined protocol requirements document. We will eventually get to the architecture full scope after getting experience. Joe - what do you think? Will this work for you? Sue -----Original Message----- From: Joel M. Halpern [mailto:jmh@joelhalpern.com] Sent: Thursday, October 15, 2015 4:41 PM To: Susan Hares; 'Joe Clarke'; i2rs@ietf.org Cc: jhaas@pfrc.org; 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol Actually Sue, I would strongly prefer NOT to update the archtiecture. My primary reason is stability. My secondary reason is that I believe the working group would still like to see the other behaviors, but is compromising on the protocol delivery. Which is why my email suggested that the protocol document is the right place to clearly state the choice. Yours, Joel On 10/15/15 1:58 PM, Susan Hares wrote: > Joe: > > Thank you for letting me know the "all-or-nothing" will be workable for you. > > > The I2RS architecture will be updated to indicate that the initial > pass on error handling for the I2RS client will only be required "all-or-nothing", > but may do "stop-on-error", or "continue-on-error". My understanding is > that the hello, module library, and other mechanisms in > netconf/restconf can signal this. > > Give me about 24 hours to check my answers on signaling support with > the NETCONF/RESTCONf methodology for indicating in the NETCONF Hello > or modules library with Andy, Kent and other NETCONF/RESTCONF experts. > > Sue > > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joe Clarke > Sent: Thursday, October 15, 2015 1:17 PM > To: Susan Hares; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling > simplification for initial I2RS protocol > > On 10/15/15 11:45, Susan Hares wrote: >> Yes - multiple sub-operation in RESTCONF requires a PATCH, and the >> burden is on the client to handle the backing out of data in RESTCONF. >> You have hit upon the challenge. The I2RS client is bearing the >> burden of this back-out instead of the I2RS agent (Netconf "server" > concept). >> >> Do you think this is reasonable to keep the I2RS agents simple? Will >> it make the I2RS clients unworkable? > > I can't answer an behalf of all I2RS Client implementors, but it > doesn't seem like an undue burden. It's just critical that they > understand that the burden is upon them. How is this decision to be > communicated? Will the architecture be updated? > > I assume that Agent implementors _could_ do the other two error > handling techniques if they wanted and advertise this to the Client? > > Joe > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Thu Oct 15 16:00:01 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4F261A049A for ; Thu, 15 Oct 2015 15:59:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nk5cMOJL1E9e for ; Thu, 15 Oct 2015 15:59:57 -0700 (PDT) Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C21821A03E1 for ; Thu, 15 Oct 2015 15:59:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5973; q=dns/txt; s=iport; t=1444949996; x=1446159596; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ENz6OkMxB3jPMON6RM0pIvOAZ33d4Y90tkvFfFXhFLQ=; b=mgv3aFk79FSDZk1ZKorfpExmNjGQ/MedgQvt7g17XBmYLbdHaUsgVt7D +sbS2HKh8SLlMwuLrKfdI0pHM3fRfN1leiuAIoPy8vLkVRLdG2BHAsjrY xKD2D0lLah5D3UlQvCzAbuOCqkNaUebxjwoT7g80wf1rY+8fFMQpHKKCE U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AEAgC7LyBW/4QNJK1bA4MmVG4GvTwBDYFZHYYBAoE3OBQBAQEBAQEBgQqEJgEBAQMBOj8FBwICAgEIDgIBBAEBARUJCQcbBhEUCQgBAQQOBQgTh34DCgi+Uw2FEQEBAQEBAQEBAQEBAQEBAQEBAQEBARcEi3CCUIFyIBsQBwIEBAiEHAWWHQGLJoFtgV+EOoMkixGDWoNuAR8BAUKCER2BVXGEICUcgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,687,1437436800"; d="scan'208";a="41174126" Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-2.cisco.com with ESMTP; 15 Oct 2015 22:59:46 +0000 Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id t9FMxk0q011883 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 15 Oct 2015 22:59:46 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Thu, 15 Oct 2015 17:59:31 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Thu, 15 Oct 2015 17:59:31 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQF84GqAABKj0ZABGXR2AAAWwBKg Date: Thu, 15 Oct 2015 22:59:31 +0000 Message-ID: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> In-Reply-To: <20151015063446.GB70280@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.93] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 15 Oct 2015 22:59:59 -0000 Hello Juergen,=20 responses inline, delimited with --- Alex -----Original Message----- From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]=20 Sent: Wednesday, October 14, 2015 11:35 PM To: Alexander Clemm (alex) Cc: Susan Hares ; Andy Bierman ; i2rs@= ietf.org; Martin Bjorklund ; Ladislav Lhotka ; 'Alia Atlas' ; 'Jeffrey Haas' Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) wrote: >=20 > The only item in the topology that is read-only concerns the=20 > "server-provided" flag, but this concerns a separate issue that was=20 > also discussed (I am not sure if this is what you are referring to). > It is analogous to the other discussion concerning distinguishing=20 > configuration that has been intended, versus one that is in effect etc=20 > . This concerns the issue that some topologies are populated by the=20 > server whereas some topologies can be populated by client=20 > applications. Yes, this is what the concern is about. > We have had discussions in the past whether to "split this up", having=20 > a (rw) branch to populate "intended" topologies and a (ro) branch for=20 > topologies "in effect". This is the normal way to do this in YANG. And this goes back to what was d= riving us for years, namely to clearly separate config from state. This mod= ule makes this distinction a runtime property controlled by a data model sp= ecific mechanism. None of the generic tools out there will be able to under= stand this. I think the issue is more related to the current discussion with regards to= openconfig and "intended configuration" and "applied configuration". If Y= ANG had an existing solution for this, we would not have this discussion. = The reason I believe this is similar is that you can view the "applied conf= iguration" as the "server-provided configuration" (network topology, in our= case), and the "intended configuration" as the, well, configured or intend= ed network topology in our case. That said, the issue is not identical - w= hereas in the openconfig case every "applied configuration" has an accompan= ying "intended configuration", in our case this is not necessarily the case= - you can have "applied" [network topologies] that were provided by the se= rver / the network itself, not configured by anybody. =20 > We decided against it for various reasons - every piece of information=20 > would essentially be duplicated inside the model (this is not your=20 > normal config vs oper data distinction, but would essentially reflect=20 > a limitation of the framework), leading to unnecessary additional=20 > complexity in the model (every augmentation has to be conducted in two=20 > places), more complex validation rules, etc. I do not understand why this is not a normal config vs oper data distinctio= n. Please explain. A normal distinction would be e.g. the type of model we have in RFC 7233 - = separate trees with distinct data, some clearly part of configuration, othe= r clearly operational data. =20 In this case, this is different. You have the same data. However, in some= cases it is populated by a client, in other cases by the server. YANG req= uires the categorization of data as config false or true. In this case, th= is categorization does not always apply - or, the categorization depends on= the particular instance. =20 =20 I do not understand how this leads to more complex validation rules. Please explain. One example concerns the supporting nodes/links/TPs. =20 We want to be able to express that, for example, a node in one network is s= upported by a node in an underlay network. For this purpose, we are refere= ncing a node in another (underlay) network. So that we cannot reference an= arbitrary node in an arbitrary network, we want to make sure that the supp= orting node is part of a "supporting-network" of the same network.=20 Currently, we have the following definition: list supporting-node { key "network-ref node-ref"; description "Represents another node, in an underlay network, that=20 this node is supported by. Used to represent layering=20 structure."; leaf network-ref { type leafref { path "../../../supporting-network/network-ref"; } description "References the underlay network that the=20 underlay node is part of."; } leaf node-ref { type leafref { path "/network/node/node-id"; } description "References the underlay node itself."; } } If we were to split the model, when we configure a node, we will have to ac= count for the fact that the supporting node could be either part of a "conf= igured" network itself, or of a network that has been "server-provided". T= hat is, we need to be able to allow for both possibilities. =20 To do this, we would no longer be able to have the network-ref to be part o= f the key for supporting-node - we would have to replace network-ref with a= choice of two nodes that reference either a server-provided network ("bran= ch 1"), or a configured network ("branch 2"). As a result, we will have to= introduce a separate way to reference elements in list supporting-node. A= ll of this results in considerable additional complexity. Or do you see an= easier way? =20 /js --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Fri Oct 16 05:26:24 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9DFD1A9244 for ; Fri, 16 Oct 2015 05:26:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kQK0vkWrUmiJ for ; Fri, 16 Oct 2015 05:26:21 -0700 (PDT) Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 011E31A901C for ; Fri, 16 Oct 2015 05:26:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3342; q=dns/txt; s=iport; t=1444998381; x=1446207981; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=yjTOOmKNNjVYpVhRvi5wM4XQhpTcRrhjqkDqMgF2OP8=; b=jzZOHZ/RpDgPEg6OX1gcN7ATG36Wy7/As8/bbBiTaOZYzINGDKWFgpf0 XdisFf1ERiMrtL8plCtA+OYrWwsGlbtjc7g8S5B/lVgPdArpiqcsT2kZU GMDtA900Rx+k4fLgckbBHw8lTUSLScwwcZwRqwj6tyiM6FYUSj+sit24Y M=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AWAgBy7CBW/40NJK1egyZUbr1sAQ2BWRcKhX0CgTU4FAEBAQEBAQGBCoQmAQEBAwEBAQEaGzMDCgEMBAsOAwEDAQEBCRYIBwkDAgECARUfAwYIBgEMBgIBAYgiCA3DNwEBAQEBAQEBAQEBAQEBAQEBAQEBARMEhnaEfoRCSwcGhCgBBJYdjRuBWIc7ijWISB8BAUKCRIFbIjOFZwEBAQ X-IronPort-AV: E=Sophos;i="5.17,688,1437436800"; d="scan'208";a="41336573" Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-2.cisco.com with ESMTP; 16 Oct 2015 12:26:20 +0000 Received: from [10.82.244.232] (rtp-vpn2-1256.cisco.com [10.82.244.232]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id t9GCQIU9012874; Fri, 16 Oct 2015 12:26:19 GMT To: Susan Hares , "'Joel M. Halpern'" , i2rs@ietf.org References: <005901d10595$3f1fce10$bd5f6a30$@ndzh.com> <561CFF59.3020604@cisco.com> <01b601d106f8$69c836c0$3d58a440$@ndzh.com> <561FC0C1.5070704@cisco.com> <016b01d10760$77cea020$676be060$@ndzh.com> <561FDF8F.70706@cisco.com> <001f01d10773$0da89300$28f9b900$@ndzh.com> <56200F65.7070102@joelhalpern.com> <006501d1079b$0c843010$258c9030$@ndzh.com> From: Joe Clarke Organization: Cisco Systems, Inc. Message-ID: <5620ECEB.3090600@cisco.com> Date: Fri, 16 Oct 2015 08:26:19 -0400 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <006501d1079b$0c843010$258c9030$@ndzh.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Archived-At: Cc: jhaas@pfrc.org, 'Alia Atlas' Subject: Re: [i2rs] Call for Input from WG: I2RS error handling simplification for initial I2RS protocol X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 16 Oct 2015 12:26:22 -0000 On 10/15/15 18:44, Susan Hares wrote: > Joel: > > I OK with this approach as well - because we can note the reduction in the > combined protocol requirements document. We will eventually get to the > architecture full scope after getting experience. > > Joe - what do you think? Will this work for you? Yes. This makes good sense. Joe > > Sue > > -----Original Message----- > From: Joel M. Halpern [mailto:jmh@joelhalpern.com] > Sent: Thursday, October 15, 2015 4:41 PM > To: Susan Hares; 'Joe Clarke'; i2rs@ietf.org > Cc: jhaas@pfrc.org; 'Alia Atlas' > Subject: Re: [i2rs] Call for Input from WG: I2RS error handling > simplification for initial I2RS protocol > > Actually Sue, I would strongly prefer NOT to update the archtiecture. > My primary reason is stability. > My secondary reason is that I believe the working group would still like to > see the other behaviors, but is compromising on the protocol delivery. > > Which is why my email suggested that the protocol document is the right > place to clearly state the choice. > > Yours, > Joel > > On 10/15/15 1:58 PM, Susan Hares wrote: >> Joe: >> >> Thank you for letting me know the "all-or-nothing" will be workable for > you. >> >> >> The I2RS architecture will be updated to indicate that the initial >> pass on error handling for the I2RS client will only be required > "all-or-nothing", >> but may do "stop-on-error", or "continue-on-error". My understanding is >> that the hello, module library, and other mechanisms in >> netconf/restconf can signal this. >> >> Give me about 24 hours to check my answers on signaling support with >> the NETCONF/RESTCONf methodology for indicating in the NETCONF Hello >> or modules library with Andy, Kent and other NETCONF/RESTCONF experts. >> >> Sue >> >> -----Original Message----- >> From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Joe Clarke >> Sent: Thursday, October 15, 2015 1:17 PM >> To: Susan Hares; i2rs@ietf.org >> Cc: jhaas@pfrc.org; 'Alia Atlas' >> Subject: Re: [i2rs] Call for Input from WG: I2RS error handling >> simplification for initial I2RS protocol >> >> On 10/15/15 11:45, Susan Hares wrote: >>> Yes - multiple sub-operation in RESTCONF requires a PATCH, and the >>> burden is on the client to handle the backing out of data in RESTCONF. >>> You have hit upon the challenge. The I2RS client is bearing the >>> burden of this back-out instead of the I2RS agent (Netconf "server" >> concept). >>> >>> Do you think this is reasonable to keep the I2RS agents simple? Will >>> it make the I2RS clients unworkable? >> >> I can't answer an behalf of all I2RS Client implementors, but it >> doesn't seem like an undue burden. It's just critical that they >> understand that the burden is upon them. How is this decision to be >> communicated? Will the architecture be updated? >> >> I assume that Agent implementors _could_ do the other two error >> handling techniques if they wanted and advertise this to the Client? >> >> Joe >> >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs >> >> _______________________________________________ >> i2rs mailing list >> i2rs@ietf.org >> https://www.ietf.org/mailman/listinfo/i2rs >> > From nobody Sun Oct 18 03:13:27 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C93121B2EB7 for ; Sun, 18 Oct 2015 03:13:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aic_5SdIjPVZ for ; Sun, 18 Oct 2015 03:13:23 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B5111B2EB6 for ; Sun, 18 Oct 2015 03:13:23 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 3CFA19F5; Sun, 18 Oct 2015 12:13:22 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id hHLzgNXonnm7; Sun, 18 Oct 2015 12:13:20 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Sun, 18 Oct 2015 12:13:20 +0200 (CEST) Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id 3B2F920053; Sun, 18 Oct 2015 12:13:20 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id uTuLTRPlJtUy; Sun, 18 Oct 2015 12:13:18 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id BABC82004E; Sun, 18 Oct 2015 12:13:17 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id AB3A737B787B; Sun, 18 Oct 2015 12:13:16 +0200 (CEST) Date: Sun, 18 Oct 2015 12:13:16 +0200 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151018101316.GC78503@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 18 Oct 2015 10:13:26 -0000 On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) wrote: > Hello Juergen, > > responses inline, delimited with > > --- Alex > > -----Original Message----- > From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Wednesday, October 14, 2015 11:35 PM > To: Alexander Clemm (alex) > Cc: Susan Hares ; Andy Bierman ; i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka ; 'Alia Atlas' ; 'Jeffrey Haas' > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) wrote: > > > > The only item in the topology that is read-only concerns the > > "server-provided" flag, but this concerns a separate issue that was > > also discussed (I am not sure if this is what you are referring to). > > It is analogous to the other discussion concerning distinguishing > > configuration that has been intended, versus one that is in effect etc > > . This concerns the issue that some topologies are populated by the > > server whereas some topologies can be populated by client > > applications. > > Yes, this is what the concern is about. > > > We have had discussions in the past whether to "split this up", having > > a (rw) branch to populate "intended" topologies and a (ro) branch for > > topologies "in effect". > > This is the normal way to do this in YANG. And this goes back to what was driving us for years, namely to clearly separate config from state. This module makes this distinction a runtime property controlled by a data model specific mechanism. None of the generic tools out there will be able to understand this. > > > I think the issue is more related to the current discussion with regards to openconfig and "intended configuration" and "applied configuration". If YANG had an existing solution for this, we would not have this discussion. The reason I believe this is similar is that you can view the "applied configuration" as the "server-provided configuration" (network topology, in our case), and the "intended configuration" as the, well, configured or intended network topology in our case. That said, the issue is not identical - whereas in the openconfig case every "applied configuration" has an accompanying "intended configuration", in our case this is not necessarily the case - you can have "applied" [network topologies] that were provided by the server / the network itself, not configured by anybody. > I think this has nothing to do with intended or applied config. Your 'server supplied topology' appears to me to be operational state and not configuration data. > > We decided against it for various reasons - every piece of information > > would essentially be duplicated inside the model (this is not your > > normal config vs oper data distinction, but would essentially reflect > > a limitation of the framework), leading to unnecessary additional > > complexity in the model (every augmentation has to be conducted in two > > places), more complex validation rules, etc. > > I do not understand why this is not a normal config vs oper data distinction. Please explain. > > > A normal distinction would be e.g. the type of model we have in RFC 7233 - separate trees with distinct data, some clearly part of configuration, other clearly operational data. > In this case, this is different. You have the same data. However, in some cases it is populated by a client, in other cases by the server. YANG requires the categorization of data as config false or true. In this case, this categorization does not always apply - or, the categorization depends on the particular instance. > So you have operational state which is partially populated by the server and partially populated from config. I fail to see how this is any different from other cases, including network interfaces as defined in RFC 7233. Recall also that YANG does not allow configuration data to depend on state data. > I do not understand how this leads to more complex validation rules. > Please explain. > > > > One example concerns the supporting nodes/links/TPs. > > We want to be able to express that, for example, a node in one network is supported by a node in an underlay network. For this purpose, we are referencing a node in another (underlay) network. So that we cannot reference an arbitrary node in an arbitrary network, we want to make sure that the supporting node is part of a "supporting-network" of the same network. > > Currently, we have the following definition: > > list supporting-node { > key "network-ref node-ref"; > description > "Represents another node, in an underlay network, that > this node is supported by. Used to represent layering > structure."; > leaf network-ref { > type leafref { > path "../../../supporting-network/network-ref"; > } > description > "References the underlay network that the > underlay node is part of."; > } > leaf node-ref { > type leafref { > path "/network/node/node-id"; > } > description > "References the underlay node itself."; > } / > } > > > If we were to split the model, when we configure a node, we will have to account for the fact that the supporting node could be either part of a "configured" network itself, or of a network that has been "server-provided". That is, we need to be able to allow for both possibilities. Again note that YANG requires that configuration data does not depend on state data. You seem to be breaking this rule, no? > To do this, we would no longer be able to have the network-ref to be part of the key for supporting-node - we would have to replace network-ref with a choice of two nodes that reference either a server-provided network ("branch 1"), or a configured network ("branch 2"). As a result, we will have to introduce a separate way to reference elements in list supporting-node. All of this results in considerable additional complexity. Or do you see an easier way? > > I do not think this is the solution. YANG requires that constraints on config true nodes can only refer to other config true nodes in the datastore where the node with the constraint exists. See section 7.5.3 and section 7.19.5. And concerning leafref, section 9.9 says that a leafref may only point to configuration. I believe this I-D is violating the distinction between configuration and state data. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Sun Oct 18 20:30:25 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D9081A0235; Sun, 18 Oct 2015 20:30:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZV1H3Zev_JZS; Sun, 18 Oct 2015 20:30:22 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A9D181A026A; Sun, 18 Oct 2015 20:30:21 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: X-Test-IDTracker: no X-IETF-IDTracker: 6.6.0 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20151019033021.30776.30417.idtracker@ietfa.amsl.com> Date: Sun, 18 Oct 2015 20:30:21 -0700 Archived-At: Cc: i2rs@ietf.org Subject: [i2rs] I-D Action: draft-ietf-i2rs-rib-data-model-02.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 03:30:23 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Interface to the Routing System Working Group of the IETF. Title : A YANG Data Model for Routing Information Base (RIB) Authors : Lixing Wang Hariharan Ananthakrishnan Mach(Guoyi) Chen Amit Dass Sriganesh Kini Nitin Bahadur Filename : draft-ietf-i2rs-rib-data-model-02.txt Pages : 60 Date : 2015-10-18 Abstract: This document defines a YANG data model for Routing Information Base (RIB) that aligns with the I2RS RIB information model. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-data-model/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-ietf-i2rs-rib-data-model-02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-rib-data-model-02 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Mon Oct 19 11:24:34 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA1B61ACEE4 for ; Mon, 19 Oct 2015 11:24:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uq2lBVoMbazd for ; Mon, 19 Oct 2015 11:24:30 -0700 (PDT) Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9DFC1ACD95 for ; Mon, 19 Oct 2015 11:24:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10191; q=dns/txt; s=iport; t=1445279070; x=1446488670; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=ihsin7xPTWzJE2wcYFoJhD20XOrYDeO+VihrCGt0wx4=; b=KaR2kNEBdfMkF7xwduwzhncaG4QEwDDXc9kAlXV4hBgMlzawQig9JibR qZYJqq5NJiTNIGp+N1FZ24dnw7PDLQWf+HsMQr+knFjvv8FwLvhfIitc2 bfVTCrZzzaVy4PL1YXtU20lP3caW6rhjYDEU8Tzqx9ByB3l1wtD9wtEd0 E=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D9AQDYNCVW/5xdJa1bA4M2VG8GvgkBDYFaHYYBAoE8OBQBAQEBAQEBgQqELQEBAQMBOjgHBQcCAgIBCA4CAQQBAQEVCQkHGwYRFAkIAgQOBQgTiAADCgi/QQ2EfAEBAQEBAQEBAQEBAQEBAQEBAQEBARgEi3GCUIFyIBsQBwIEBAiEHAWWIwGHQ4NkgW6BX4Q8gySLFoNbg24BHwEBQoIRHYFVcoQgJRyBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,703,1437436800"; d="scan'208";a="199403459" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-6.cisco.com with ESMTP; 19 Oct 2015 18:24:29 +0000 Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t9JIOSnU007926 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 19 Oct 2015 18:24:28 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 19 Oct 2015 13:24:10 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Mon, 19 Oct 2015 13:24:10 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQF84GqAABKj0ZABGXR2AAAWwBKgAIfBSAAAN4ZCEA== Date: Mon, 19 Oct 2015 18:24:10 +0000 Message-ID: References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> In-Reply-To: <20151018101316.GC78503@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.188] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 18:24:32 -0000 Hi Juergen, I think one of the key statements you make below is this: " Recall also that YANG does not allow configuration data to depend on stat= e data." Note that this is not the case in the current model. The current model is = essentially all configuration data. Of course, we have this flag to indica= te who supplied that data (and is hence maintaining it). =20 You argue that we should instead "split" the model and introduce operationa= l data to reflect what is populated by the server. However, doing that int= roduces precisely new issues - and you have just brought another argument w= hy this may be a bad idea and may not even work. Topologies _are_ layered,= and we need to be able to express that in the model. Now, if we have a to= pology that is server-provided, hence (per your statement) to be represente= d by operational data only, how do we build an overlay topology that is "co= nfigured" on top of it? If the answer is "we can't, unless we replicate th= e server-provided topology into the network configuration (which makes no s= ense)", we are screwed. Now, we might build it on top if we remove all ref= erences / dependencies on the underlay from the model and punt the problem = to the user. Basically, no longer have the model express vertical relation= ships. Not a good solution, IMHO. =20 How do you suggest we address this? The ability to express layering relati= onships between topologies, including cases where topologies originate from= different sources (discovered/server-provided vs configured), is a require= ment. It is not an artefact of our model, it is something that we need to = capture as part of the model. There may not be a "nice" way of doing this = within the YANG framework, yet it is important that we find a way to do thi= s. The current solution to this - having the model as configuration data, = and including a parameter to indicate who supplies the data and is maintain= ing it - appears to be cleanest and clearest solution (or perhaps the "leas= t bad") that results in the model of least complexity. =20 Perhaps there is something we can simply change about the "server-provided"= object to address your concerns? We can make it config (to address your i= ssue that triggered this, the presence of a r/o object in a tree that is ot= herwise r/w). =20 Thoughts? --- Alex -----Original Message----- From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]=20 Sent: Sunday, October 18, 2015 3:13 AM To: Alexander Clemm (alex) Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund ; Andy Bierman ; 'Alia Atlas' ; 'Jeffrey Haas' ; Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) wrote: > Hello Juergen, >=20 > responses inline, delimited with >=20 > --- Alex >=20 > -----Original Message----- > From: Juergen Schoenwaelder=20 > [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Wednesday, October 14, 2015 11:35 PM > To: Alexander Clemm (alex) > Cc: Susan Hares ; Andy Bierman ;=20 > i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka=20 > ; 'Alia Atlas' ; 'Jeffrey Haas'=20 > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) wrote: > >=20 > > The only item in the topology that is read-only concerns the=20 > > "server-provided" flag, but this concerns a separate issue that was=20 > > also discussed (I am not sure if this is what you are referring to). > > It is analogous to the other discussion concerning distinguishing=20 > > configuration that has been intended, versus one that is in effect=20 > > etc . This concerns the issue that some topologies are populated by=20 > > the server whereas some topologies can be populated by client=20 > > applications. >=20 > Yes, this is what the concern is about. >=20 > > We have had discussions in the past whether to "split this up",=20 > > having a (rw) branch to populate "intended" topologies and a (ro)=20 > > branch for topologies "in effect". >=20 > This is the normal way to do this in YANG. And this goes back to what was= driving us for years, namely to clearly separate config from state. This m= odule makes this distinction a runtime property controlled by a data model = specific mechanism. None of the generic tools out there will be able to und= erstand this. >=20 > > I think the issue is more related to the current discussion with regards = to openconfig and "intended configuration" and "applied configuration". If= YANG had an existing solution for this, we would not have this discussion.= The reason I believe this is similar is that you can view the "applied co= nfiguration" as the "server-provided configuration" (network topology, in o= ur case), and the "intended configuration" as the, well, configured or inte= nded network topology in our case. That said, the issue is not identical -= whereas in the openconfig case every "applied configuration" has an accomp= anying "intended configuration", in our case this is not necessarily the ca= se - you can have "applied" [network topologies] that were provided by the = server / the network itself, not configured by anybody. =20 > I think this has nothing to do with intended or applied config. Your 'serve= r supplied topology' appears to me to be operational state and not configur= ation data. =20 > > We decided against it for various reasons - every piece of=20 > > information would essentially be duplicated inside the model (this=20 > > is not your normal config vs oper data distinction, but would=20 > > essentially reflect a limitation of the framework), leading to=20 > > unnecessary additional complexity in the model (every augmentation=20 > > has to be conducted in two places), more complex validation rules, etc. >=20 > I do not understand why this is not a normal config vs oper data distinct= ion. Please explain. >=20 > > A normal distinction would be e.g. the type of model we have in RFC 7233 = - separate trees with distinct data, some clearly part of configuration, ot= her clearly operational data. =20 > In this case, this is different. You have the same data. However, in so= me cases it is populated by a client, in other cases by the server. YANG r= equires the categorization of data as config false or true. In this case, = this categorization does not always apply - or, the categorization depends = on the particular instance. =20 > So you have operational state which is partially populated by the server an= d partially populated from config. I fail to see how this is any different = from other cases, including network interfaces as defined in RFC 7233. Reca= ll also that YANG does not allow configuration data to depend on state data= . > I do not understand how this leads to more complex validation rules. > Please explain. >=20 > >=20 > One example concerns the supporting nodes/links/TPs. =20 >=20 > We want to be able to express that, for example, a node in one network is= supported by a node in an underlay network. For this purpose, we are refe= rencing a node in another (underlay) network. So that we cannot reference = an arbitrary node in an arbitrary network, we want to make sure that the su= pporting node is part of a "supporting-network" of the same network.=20 >=20 > Currently, we have the following definition: >=20 > list supporting-node { > key "network-ref node-ref"; > description > "Represents another node, in an underlay network, that=20 > this node is supported by. Used to represent layering=20 > structure."; > leaf network-ref { > type leafref { > path "../../../supporting-network/network-ref"; > } > description > "References the underlay network that the=20 > underlay node is part of."; > } > leaf node-ref { > type leafref { > path "/network/node/node-id"; > } > description > "References the underlay node itself."; > } / > } >=20 >=20 > If we were to split the model, when we configure a node, we will have to = account for the fact that the supporting node could be either part of a "co= nfigured" network itself, or of a network that has been "server-provided". = That is, we need to be able to allow for both possibilities. Again note that YANG requires that configuration data does not depend on st= ate data. You seem to be breaking this rule, no? > To do this, we would no longer be able to have the network-ref to be part= of the key for supporting-node - we would have to replace network-ref with= a choice of two nodes that reference either a server-provided network ("br= anch 1"), or a configured network ("branch 2"). As a result, we will have = to introduce a separate way to reference elements in list supporting-node. = All of this results in considerable additional complexity. Or do you see = an easier way? =20 >=20 > I do not think this is the solution. YANG requires that constraints on conf= ig true nodes can only refer to other config true nodes in the datastore wh= ere the node with the constraint exists. See section 7.5.3 and section 7.19= .5. And concerning leafref, section 9.9 says that a leafref may only point = to configuration. I believe this I-D is violating the distinction between c= onfiguration and state data. /js --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 19 11:28:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 692AA1B2B66 for ; Mon, 19 Oct 2015 11:28:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xg91v3VNdwRj for ; Mon, 19 Oct 2015 11:28:35 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 72E801B2A66 for ; Mon, 19 Oct 2015 11:28:31 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id 2F3491AE0959; Mon, 19 Oct 2015 20:28:21 +0200 (CEST) Date: Mon, 19 Oct 2015 20:32:16 +0200 (CEST) Message-Id: <20151019.203216.710736168596706388.mbj@tail-f.com> To: alex@cisco.com From: Martin Bjorklund In-Reply-To: References: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: andy@yumaworks.com, i2rs@ietf.org, j.schoenwaelder@jacobs-university.de, lhotka@nic.cz, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 18:28:38 -0000 Alex, Is the idea that the server-provided data is normal config? I.e., if the server wants to modify this data it behaves like a normal client? (conceptually...) And the server-provided data can be modified by anyone with proper access rights? /martin "Alexander Clemm (alex)" wrote: > Hi Juergen, > > I think one of the key statements you make below is this: > " Recall also that YANG does not allow configuration data to depend on > state data." > > Note that this is not the case in the current model. The current > model is essentially all configuration data. Of course, we have this > flag to indicate who supplied that data (and is hence maintaining it). > > You argue that we should instead "split" the model and introduce > operational data to reflect what is populated by the server. However, > doing that introduces precisely new issues - and you have just brought > another argument why this may be a bad idea and may not even work. > Topologies _are_ layered, and we need to be able to express that in > the model. Now, if we have a topology that is server-provided, hence > (per your statement) to be represented by operational data only, how > do we build an overlay topology that is "configured" on top of it? If > the answer is "we can't, unless we replicate the server-provided > topology into the network configuration (which makes no sense)", we > are screwed. Now, we might build it on top if we remove all > references / dependencies on the underlay from the model and punt the > problem to the user. Basically, no longer have the model express > vertical relationships. Not a good solution, IMHO. > > How do you suggest we address this? The ability to express layering > relationships between topologies, including cases where topologies > originate from different sources (discovered/server-provided vs > configured), is a requirement. It is not an artefact of our model, it > is something that we need to capture as part of the model. There may > not be a "nice" way of doing this within the YANG framework, yet it is > important that we find a way to do this. The current solution to this > - having the model as configuration data, and including a parameter to > indicate who supplies the data and is maintaining it - appears to be > cleanest and clearest solution (or perhaps the "least bad") that > results in the model of least complexity. > > Perhaps there is something we can simply change about the > "server-provided" object to address your concerns? We can make it > config (to address your issue that triggered this, the presence of a > r/o object in a tree that is otherwise r/w). > > Thoughts? > --- Alex > > > > -----Original Message----- > From: Juergen Schoenwaelder > [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Sunday, October 18, 2015 3:13 AM > To: Alexander Clemm (alex) > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund > ; Andy Bierman ; 'Alia Atlas' > ; 'Jeffrey Haas' ; Susan Hares > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > wrote: > > Hello Juergen, > > > > responses inline, delimited with > > > > --- Alex > > > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Wednesday, October 14, 2015 11:35 PM > > To: Alexander Clemm (alex) > > Cc: Susan Hares ; Andy Bierman ; > > i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka > > ; 'Alia Atlas' ; 'Jeffrey Haas' > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > wrote: > > > > > > The only item in the topology that is read-only concerns the > > > "server-provided" flag, but this concerns a separate issue that was > > > also discussed (I am not sure if this is what you are referring to). > > > It is analogous to the other discussion concerning distinguishing > > > configuration that has been intended, versus one that is in effect > > > etc . This concerns the issue that some topologies are populated by > > > the server whereas some topologies can be populated by client > > > applications. > > > > Yes, this is what the concern is about. > > > > > We have had discussions in the past whether to "split this up", > > > having a (rw) branch to populate "intended" topologies and a (ro) > > > branch for topologies "in effect". > > > > This is the normal way to do this in YANG. And this goes back to what > > was driving us for years, namely to clearly separate config from > > state. This module makes this distinction a runtime property > > controlled by a data model specific mechanism. None of the generic > > tools out there will be able to understand this. > > > > > > I think the issue is more related to the current discussion with > > regards to openconfig and "intended configuration" and "applied > > configuration". If YANG had an existing solution for this, we would > > not have this discussion. The reason I believe this is similar is > > that you can view the "applied configuration" as the "server-provided > > configuration" (network topology, in our case), and the "intended > > configuration" as the, well, configured or intended network topology > > in our case. That said, the issue is not identical - whereas in the > > openconfig case every "applied configuration" has an accompanying > > "intended configuration", in our case this is not necessarily the case > > - you can have "applied" [network topologies] that were provided by > > the server / the network itself, not configured by anybody. > > > > I think this has nothing to do with intended or applied config. Your > 'server supplied topology' appears to me to be operational state and > not configuration data. > > > > We decided against it for various reasons - every piece of > > > information would essentially be duplicated inside the model (this > > > is not your normal config vs oper data distinction, but would > > > essentially reflect a limitation of the framework), leading to > > > unnecessary additional complexity in the model (every augmentation > > > has to be conducted in two places), more complex validation rules, > > > etc. > > > > I do not understand why this is not a normal config vs oper data > > distinction. Please explain. > > > > > > A normal distinction would be e.g. the type of model we have in RFC > > 7233 - separate trees with distinct data, some clearly part of > > configuration, other clearly operational data. > > In this case, this is different. You have the same data. However, in > > some cases it is populated by a client, in other cases by the server. > > YANG requires the categorization of data as config false or true. In > > this case, this categorization does not always apply - or, the > > categorization depends on the particular instance. > > > > So you have operational state which is partially populated by the > server and partially populated from config. I fail to see how this is > any different from other cases, including network interfaces as > defined in RFC 7233. Recall also that YANG does not allow > configuration data to depend on state data. > > > I do not understand how this leads to more complex validation rules. > > Please explain. > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > We want to be able to express that, for example, a node in one network > > is supported by a node in an underlay network. For this purpose, we > > are referencing a node in another (underlay) network. So that we > > cannot reference an arbitrary node in an arbitrary network, we want to > > make sure that the supporting node is part of a "supporting-network" > > of the same network. > > > > Currently, we have the following definition: > > > > list supporting-node { > > key "network-ref node-ref"; > > description > > "Represents another node, in an underlay network, that > > this node is supported by. Used to represent layering > > structure."; > > leaf network-ref { > > type leafref { > > path "../../../supporting-network/network-ref"; > > } > > description > > "References the underlay network that the > > underlay node is part of."; > > } > > leaf node-ref { > > type leafref { > > path "/network/node/node-id"; > > } > > description > > "References the underlay node itself."; > > } > / > > } > > > > > > If we were to split the model, when we configure a node, we will have > > to account for the fact that the supporting node could be either part > > of a "configured" network itself, or of a network that has been > > "server-provided". That is, we need to be able to allow for both > > possibilities. > > Again note that YANG requires that configuration data does not depend > on state data. You seem to be breaking this rule, no? > > > To do this, we would no longer be able to have the network-ref to be > > part of the key for supporting-node - we would have to replace > > network-ref with a choice of two nodes that reference either a > > server-provided network ("branch 1"), or a configured network ("branch > > 2"). As a result, we will have to introduce a separate way to > > reference elements in list supporting-node. All of this results in > > considerable additional complexity. Or do you see an easier way? > > > > > > I do not think this is the solution. YANG requires that constraints on > config true nodes can only refer to other config true nodes in the > datastore where the node with the constraint exists. See section 7.5.3 > and section 7.19.5. And concerning leafref, section 9.9 says that a > leafref may only point to configuration. I believe this I-D is > violating the distinction between configuration and state data. > > /js > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 > From nobody Mon Oct 19 11:36:23 2015 Return-Path: X-Original-To: i2rs@ietf.org Delivered-To: i2rs@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FE421B2BAA; Mon, 19 Oct 2015 11:36:22 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: internet-drafts@ietf.org To: X-Test-IDTracker: no X-IETF-IDTracker: 6.6.1 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20151019183622.19810.47958.idtracker@ietfa.amsl.com> Date: Mon, 19 Oct 2015 11:36:22 -0700 Archived-At: Cc: i2rs@ietf.org Subject: [i2rs] I-D Action: draft-ietf-i2rs-rib-info-model-08.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 18:36:22 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Interface to the Routing System Working Group of the IETF. Title : Routing Information Base Info Model Authors : Nitin Bahadur Sriganesh Kini Jan Medved Filename : draft-ietf-i2rs-rib-info-model-08.txt Pages : 25 Date : 2015-10-19 Abstract: Routing and routing functions in enterprise and carrier networks are typically performed by network devices (routers and switches) using a routing information base (RIB). Protocols and configuration push data into the RIB and the RIB manager installs state into the hardware; for packet forwarding. This draft specifies an information model for the RIB to enable defining a standardized data model. Such a data model can be used to define an interface to the RIB from an entity that may even be external to the network device. This interface can be used to support new use-cases being defined by the IETF I2RS WG. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/ There's also a htmlized version available at: https://tools.ietf.org/html/draft-ietf-i2rs-rib-info-model-08 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-rib-info-model-08 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Mon Oct 19 12:06:03 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D13911B2BE3 for ; Mon, 19 Oct 2015 12:06:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L9GiPcIbhlNd for ; Mon, 19 Oct 2015 12:05:51 -0700 (PDT) Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 224AA1B2C3B for ; Mon, 19 Oct 2015 12:05:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12362; q=dns/txt; s=iport; t=1445281534; x=1446491134; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=3bhraRNap/RncyH0THj4CIATr1+e2i8M1mSF24Civ34=; b=B0bh9ZuIowpkG39VeIec0ZfxF+r8qg05e5gY/KSpv/8HMzPrGt547dXQ pHoGaR/QSzT3OQV7Qtd0K5YRJRsyFSyOz2Yz6nEkkzkvhtpaH89Aj3cD8 FhNq0/Hd0GH5YRabdX/Tilyxb7jHlNH6ZMhJsBv45VL+WRkIArqVLMkoO k=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D+AQC1PSVW/5RdJa1bA4M2VG8GvgkBDYFaFwqFfQKBPDgUAQEBAQEBAYEKhC0BAQEDAQEBATc0BAcMAgICAQgOAgEEAQEBFQkJBxsGBgsUCQgCBA4FCBOIAAMKCA2/Mw2EfAEBAQEBAQEBAQEBAQEBAQEBAQEBARgEi3GCUIFyIBsQBwIEBAiEHAWWIwGLJ4FugV+EPIMkixaDW4NuAR8BAUKCER2BVXKEICUcgQYBAQE X-IronPort-AV: E=Sophos;i="5.17,703,1437436800"; d="scan'208";a="42121180" Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-2.cisco.com with ESMTP; 19 Oct 2015 19:05:32 +0000 Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by rcdn-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id t9JJ5WQ0004707 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 19 Oct 2015 19:05:32 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 19 Oct 2015 14:05:14 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Mon, 19 Oct 2015 14:05:14 -0500 From: "Alexander Clemm (alex)" To: Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpv6tndvtjjPSkap4v4Aq5RqqJ5zI1yg Date: Mon, 19 Oct 2015 19:05:14 +0000 Message-ID: References: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019.203216.710736168596706388.mbj@tail-f.com> In-Reply-To: <20151019.203216.710736168596706388.mbj@tail-f.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.188] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "lhotka@nic.cz" , "i2rs@ietf.org" , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 19:06:01 -0000 Hi Martin, One model for the data that is server-provided is to assume an app (which c= ould be embedded on the same server) that knows how to discover the network= , then populates the data accordingly. =20 [Of course, we would not want any random client app just being able to "mes= s" with that data. The expectation is generally clearly access to this wil= l be restricted / controlled. The topology instances that were populated b= y the "server-provided app" should not be "touched" by other apps - it is t= he "server-provided" app that is responsible for maintaining them.] So I assume the answer to your question is "yes", but with a bunch of cavea= ts. =20 --- Alex -----Original Message----- From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund Sent: Monday, October 19, 2015 11:32 AM To: Alexander Clemm (alex) Cc: andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de= ; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Alex, Is the idea that the server-provided data is normal config? I.e., if the s= erver wants to modify this data it behaves like a normal client? (conceptually...) And the server-provided data can be modified by anyone w= ith proper access rights?=20 /martin "Alexander Clemm (alex)" wrote: > Hi Juergen, >=20 > I think one of the key statements you make below is this: > " Recall also that YANG does not allow configuration data to depend on=20 > state data." >=20 > Note that this is not the case in the current model. The current=20 > model is essentially all configuration data. Of course, we have this=20 > flag to indicate who supplied that data (and is hence maintaining it). >=20 > You argue that we should instead "split" the model and introduce=20 > operational data to reflect what is populated by the server. However,=20 > doing that introduces precisely new issues - and you have just brought=20 > another argument why this may be a bad idea and may not even work. > Topologies _are_ layered, and we need to be able to express that in=20 > the model. Now, if we have a topology that is server-provided, hence=20 > (per your statement) to be represented by operational data only, how=20 > do we build an overlay topology that is "configured" on top of it? If=20 > the answer is "we can't, unless we replicate the server-provided=20 > topology into the network configuration (which makes no sense)", we=20 > are screwed. Now, we might build it on top if we remove all=20 > references / dependencies on the underlay from the model and punt the=20 > problem to the user. Basically, no longer have the model express=20 > vertical relationships. Not a good solution, IMHO. >=20 > How do you suggest we address this? The ability to express layering=20 > relationships between topologies, including cases where topologies=20 > originate from different sources (discovered/server-provided vs=20 > configured), is a requirement. It is not an artefact of our model, it=20 > is something that we need to capture as part of the model. There may=20 > not be a "nice" way of doing this within the YANG framework, yet it is=20 > important that we find a way to do this. The current solution to this > - having the model as configuration data, and including a parameter to=20 > indicate who supplies the data and is maintaining it - appears to be=20 > cleanest and clearest solution (or perhaps the "least bad") that=20 > results in the model of least complexity. >=20 > Perhaps there is something we can simply change about the=20 > "server-provided" object to address your concerns? We can make it=20 > config (to address your issue that triggered this, the presence of a=20 > r/o object in a tree that is otherwise r/w). >=20 > Thoughts? > --- Alex >=20 >=20 >=20 > -----Original Message----- > From: Juergen Schoenwaelder > [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Sunday, October 18, 2015 3:13 AM > To: Alexander Clemm (alex) > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund=20 > ; Andy Bierman ; 'Alia Atlas' > ; 'Jeffrey Haas' ; Susan Hares=20 > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > wrote: > > Hello Juergen, > >=20 > > responses inline, delimited with > >=20 > > --- Alex > >=20 > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Wednesday, October 14, 2015 11:35 PM > > To: Alexander Clemm (alex) > > Cc: Susan Hares ; Andy Bierman=20 > > ; i2rs@ietf.org; Martin Bjorklund=20 > > ; Ladislav Lhotka ; 'Alia Atlas' ; 'Jeffrey Haas' > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > >=20 > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > wrote: > > >=20 > > > The only item in the topology that is read-only concerns the=20 > > > "server-provided" flag, but this concerns a separate issue that=20 > > > was also discussed (I am not sure if this is what you are referring t= o). > > > It is analogous to the other discussion concerning distinguishing=20 > > > configuration that has been intended, versus one that is in effect=20 > > > etc . This concerns the issue that some topologies are populated=20 > > > by the server whereas some topologies can be populated by client=20 > > > applications. > >=20 > > Yes, this is what the concern is about. > >=20 > > > We have had discussions in the past whether to "split this up",=20 > > > having a (rw) branch to populate "intended" topologies and a (ro)=20 > > > branch for topologies "in effect". > >=20 > > This is the normal way to do this in YANG. And this goes back to=20 > > what was driving us for years, namely to clearly separate config=20 > > from state. This module makes this distinction a runtime property=20 > > controlled by a data model specific mechanism. None of the generic=20 > > tools out there will be able to understand this. > >=20 > > > > I think the issue is more related to the current discussion with=20 > > regards to openconfig and "intended configuration" and "applied=20 > > configuration". If YANG had an existing solution for this, we would=20 > > not have this discussion. The reason I believe this is similar is=20 > > that you can view the "applied configuration" as the=20 > > "server-provided configuration" (network topology, in our case), and=20 > > the "intended configuration" as the, well, configured or intended=20 > > network topology in our case. That said, the issue is not identical=20 > > - whereas in the openconfig case every "applied configuration" has=20 > > an accompanying "intended configuration", in our case this is not=20 > > necessarily the case > > - you can have "applied" [network topologies] that were provided by=20 > > the server / the network itself, not configured by anybody. > > >=20 > I think this has nothing to do with intended or applied config. Your=20 > 'server supplied topology' appears to me to be operational state and=20 > not configuration data. > =20 > > > We decided against it for various reasons - every piece of=20 > > > information would essentially be duplicated inside the model (this=20 > > > is not your normal config vs oper data distinction, but would=20 > > > essentially reflect a limitation of the framework), leading to=20 > > > unnecessary additional complexity in the model (every augmentation=20 > > > has to be conducted in two places), more complex validation rules,=20 > > > etc. > >=20 > > I do not understand why this is not a normal config vs oper data=20 > > distinction. Please explain. > >=20 > > > > A normal distinction would be e.g. the type of model we have in RFC > > 7233 - separate trees with distinct data, some clearly part of=20 > > configuration, other clearly operational data. > > In this case, this is different. You have the same data. However,=20 > > in some cases it is populated by a client, in other cases by the server= . > > YANG requires the categorization of data as config false or true. =20 > > In this case, this categorization does not always apply - or, the=20 > > categorization depends on the particular instance. > > >=20 > So you have operational state which is partially populated by the=20 > server and partially populated from config. I fail to see how this is=20 > any different from other cases, including network interfaces as=20 > defined in RFC 7233. Recall also that YANG does not allow=20 > configuration data to depend on state data. >=20 > > I do not understand how this leads to more complex validation rules. > > Please explain. > >=20 > > > >=20 > > One example concerns the supporting nodes/links/TPs. =20 > >=20 > > We want to be able to express that, for example, a node in one=20 > > network is supported by a node in an underlay network. For this=20 > > purpose, we are referencing a node in another (underlay) network. =20 > > So that we cannot reference an arbitrary node in an arbitrary=20 > > network, we want to make sure that the supporting node is part of a "su= pporting-network" > > of the same network. > >=20 > > Currently, we have the following definition: > >=20 > > list supporting-node { > > key "network-ref node-ref"; > > description > > "Represents another node, in an underlay network, that=20 > > this node is supported by. Used to represent layering=20 > > structure."; > > leaf network-ref { > > type leafref { > > path "../../../supporting-network/network-ref"; > > } > > description > > "References the underlay network that the=20 > > underlay node is part of."; > > } > > leaf node-ref { > > type leafref { > > path "/network/node/node-id"; > > } > > description > > "References the underlay node itself."; > > } > / > > } > >=20 > >=20 > > If we were to split the model, when we configure a node, we will=20 > > have to account for the fact that the supporting node could be=20 > > either part of a "configured" network itself, or of a network that=20 > > has been "server-provided". That is, we need to be able to allow=20 > > for both possibilities. >=20 > Again note that YANG requires that configuration data does not depend=20 > on state data. You seem to be breaking this rule, no? >=20 > > To do this, we would no longer be able to have the network-ref to be=20 > > part of the key for supporting-node - we would have to replace=20 > > network-ref with a choice of two nodes that reference either a=20 > > server-provided network ("branch 1"), or a configured network=20 > > ("branch 2"). As a result, we will have to introduce a separate way=20 > > to reference elements in list supporting-node. All of this results=20 > > in considerable additional complexity. Or do you see an easier way? > >=20 > > >=20 > I do not think this is the solution. YANG requires that constraints on=20 > config true nodes can only refer to other config true nodes in the=20 > datastore where the node with the constraint exists. See section 7.5.3=20 > and section 7.19.5. And concerning leafref, section 9.9 says that a=20 > leafref may only point to configuration. I believe this I-D is=20 > violating the distinction between configuration and state data. >=20 > /js >=20 > --=20 > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 >=20 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 19 12:08:09 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 022D11B2BDD for ; Mon, 19 Oct 2015 12:08:08 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.201 X-Spam-Level: X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GFbebRC4yiGP for ; Mon, 19 Oct 2015 12:08:04 -0700 (PDT) Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 95D1C1B2BD3 for ; Mon, 19 Oct 2015 12:08:03 -0700 (PDT) X-AuditID: c618062d-f79ef6d000007f54-72-5624df11caaa Received: from EUSAAHC008.ericsson.se (Unknown_Domain [147.117.188.96]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 8E.51.32596.11FD4265; Mon, 19 Oct 2015 14:16:17 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC008.ericsson.se ([147.117.188.96]) with mapi id 14.03.0248.002; Mon, 19 Oct 2015 15:08:02 -0400 From: Xufeng Liu To: "Alexander Clemm (alex)" , Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpwAhpl39656jk2T7WlRhneW4p5zcAEA//+9flA= Date: Mon, 19 Oct 2015 19:08:01 +0000 Message-ID: References: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019.203216.710736168596706388.mbj@tail-f.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.10] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGIsWRmVeSWpSXmKPExsUyuXRPgq7gfZUwg1n/JS0+PbzEbDH/5GEm iwdHZrFbrJvxgcXi6safjBb7D75ltbiwai6bRXf3M3aLP29esThwekz5vZHVY+esu+weS5b8 ZPLYcMDTY/br66wemy7fYfS43LuV1WPjr8UsHi39F1kCOKO4bFJSczLLUov07RK4Mi7c7WYq uJleMbnrDVMD47yALkZODgkBE4k7686yQ9hiEhfurWfrYuTiEBI4yijxe/ZaVghnOaPE/7XP GbsYOTjYBLQkLj91BGkQEQiSaFr8lhmkhllgO5PEkQUfmUASwgJmEq8uvmCGKDKX2HH/FiuE bSXxeu8nsDksAqoSt0+7gIR5BXwldh1fCbVrBpPEnGdrweo5BVwlTh6axwJiMwJd9/3UGrD5 zALiEreezGeCuFpAYsme88wQtqjEy8f/WCFsJYlJS8+xQtTrSCzY/YkNwtaWWLbwNTPEYkGJ kzOfsExgFJuFZOwsJC2zkLTMQtKygJFlFSNHaXFqWW66kcEmRmDEHpNg093BuOel5SFGAQ5G JR7eBX4qYUKsiWXFlbmHGKU5WJTEefcvuR8qJJCeWJKanZpakFoUX1Sak1p8iJGJg1OqgdGr WXDBpQS5z29ztlTZXIhgjJii8HgVC8u169mrpbkvHvVsfdTqvvMZy5pGnST1Q0v+P9fuetYh 42/omc1zKkfp3bePU77yB6cVBNyuMIh5ahPB/lp0Gb9wN2cBb/h2a4P/3TIiuc+UGJgzbu1V mlTvuLavOe+JjO8ib8+L3ZvCb968zST3TYmlOCPRUIu5qDgRADrLIm25AgAA Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , "j.schoenwaelder@jacobs-university.de" , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 19:08:08 -0000 Hi Martin and Alex, Some of such objects might not be changeable, no matter what access right t= hat the client has. Such non-changeable objects are derived from other obje= cts in the system. Regards, - Xufeng > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Monday, October 19, 2015 3:05 PM > To: Martin Bjorklund > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Martin, >=20 > One model for the data that is server-provided is to assume an app (which= could > be embedded on the same server) that knows how to discover the network, t= hen > populates the data accordingly. >=20 > [Of course, we would not want any random client app just being able to "m= ess" > with that data. The expectation is generally clearly access to this will= be > restricted / controlled. The topology instances that were populated by t= he > "server-provided app" should not be "touched" by other apps - it is the "= server- > provided" app that is responsible for maintaining them.] >=20 > So I assume the answer to your question is "yes", but with a bunch of cav= eats. > --- Alex >=20 >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin Bjorklund > Sent: Monday, October 19, 2015 11:32 AM > To: Alexander Clemm (alex) > Cc: andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs- > university.de; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; > shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Alex, >=20 > Is the idea that the server-provided data is normal config? I.e., if the= server > wants to modify this data it behaves like a normal client? > (conceptually...) And the server-provided data can be modified by anyone= with > proper access rights? >=20 >=20 > /martin >=20 >=20 >=20 > "Alexander Clemm (alex)" wrote: > > Hi Juergen, > > > > I think one of the key statements you make below is this: > > " Recall also that YANG does not allow configuration data to depend on > > state data." > > > > Note that this is not the case in the current model. The current > > model is essentially all configuration data. Of course, we have this > > flag to indicate who supplied that data (and is hence maintaining it). > > > > You argue that we should instead "split" the model and introduce > > operational data to reflect what is populated by the server. However, > > doing that introduces precisely new issues - and you have just brought > > another argument why this may be a bad idea and may not even work. > > Topologies _are_ layered, and we need to be able to express that in > > the model. Now, if we have a topology that is server-provided, hence > > (per your statement) to be represented by operational data only, how > > do we build an overlay topology that is "configured" on top of it? If > > the answer is "we can't, unless we replicate the server-provided > > topology into the network configuration (which makes no sense)", we > > are screwed. Now, we might build it on top if we remove all > > references / dependencies on the underlay from the model and punt the > > problem to the user. Basically, no longer have the model express > > vertical relationships. Not a good solution, IMHO. > > > > How do you suggest we address this? The ability to express layering > > relationships between topologies, including cases where topologies > > originate from different sources (discovered/server-provided vs > > configured), is a requirement. It is not an artefact of our model, it > > is something that we need to capture as part of the model. There may > > not be a "nice" way of doing this within the YANG framework, yet it is > > important that we find a way to do this. The current solution to this > > - having the model as configuration data, and including a parameter to > > indicate who supplies the data and is maintaining it - appears to be > > cleanest and clearest solution (or perhaps the "least bad") that > > results in the model of least complexity. > > > > Perhaps there is something we can simply change about the > > "server-provided" object to address your concerns? We can make it > > config (to address your issue that triggered this, the presence of a > > r/o object in a tree that is otherwise r/w). > > > > Thoughts? > > --- Alex > > > > > > > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Sunday, October 18, 2015 3:13 AM > > To: Alexander Clemm (alex) > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund > > ; Andy Bierman ; 'Alia Atlas' > > ; 'Jeffrey Haas' ; Susan Hares > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > wrote: > > > Hello Juergen, > > > > > > responses inline, delimited with > > > > > > --- Alex > > > > > > -----Original Message----- > > > From: Juergen Schoenwaelder > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > To: Alexander Clemm (alex) > > > Cc: Susan Hares ; Andy Bierman > > > ; i2rs@ietf.org; Martin Bjorklund > > > ; Ladislav Lhotka ; 'Alia Atlas' > ; 'Jeffrey Haas' > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > wrote: > > > > > > > > The only item in the topology that is read-only concerns the > > > > "server-provided" flag, but this concerns a separate issue that > > > > was also discussed (I am not sure if this is what you are referring= to). > > > > It is analogous to the other discussion concerning distinguishing > > > > configuration that has been intended, versus one that is in effect > > > > etc . This concerns the issue that some topologies are populated > > > > by the server whereas some topologies can be populated by client > > > > applications. > > > > > > Yes, this is what the concern is about. > > > > > > > We have had discussions in the past whether to "split this up", > > > > having a (rw) branch to populate "intended" topologies and a (ro) > > > > branch for topologies "in effect". > > > > > > This is the normal way to do this in YANG. And this goes back to > > > what was driving us for years, namely to clearly separate config > > > from state. This module makes this distinction a runtime property > > > controlled by a data model specific mechanism. None of the generic > > > tools out there will be able to understand this. > > > > > > > > > I think the issue is more related to the current discussion with > > > regards to openconfig and "intended configuration" and "applied > > > configuration". If YANG had an existing solution for this, we would > > > not have this discussion. The reason I believe this is similar is > > > that you can view the "applied configuration" as the > > > "server-provided configuration" (network topology, in our case), and > > > the "intended configuration" as the, well, configured or intended > > > network topology in our case. That said, the issue is not identical > > > - whereas in the openconfig case every "applied configuration" has > > > an accompanying "intended configuration", in our case this is not > > > necessarily the case > > > - you can have "applied" [network topologies] that were provided by > > > the server / the network itself, not configured by anybody. > > > > > > > I think this has nothing to do with intended or applied config. Your > > 'server supplied topology' appears to me to be operational state and > > not configuration data. > > > > > > We decided against it for various reasons - every piece of > > > > information would essentially be duplicated inside the model (this > > > > is not your normal config vs oper data distinction, but would > > > > essentially reflect a limitation of the framework), leading to > > > > unnecessary additional complexity in the model (every augmentation > > > > has to be conducted in two places), more complex validation rules, > > > > etc. > > > > > > I do not understand why this is not a normal config vs oper data > > > distinction. Please explain. > > > > > > > > > A normal distinction would be e.g. the type of model we have in RFC > > > 7233 - separate trees with distinct data, some clearly part of > > > configuration, other clearly operational data. > > > In this case, this is different. You have the same data. However, > > > in some cases it is populated by a client, in other cases by the serv= er. > > > YANG requires the categorization of data as config false or true. > > > In this case, this categorization does not always apply - or, the > > > categorization depends on the particular instance. > > > > > > > So you have operational state which is partially populated by the > > server and partially populated from config. I fail to see how this is > > any different from other cases, including network interfaces as > > defined in RFC 7233. Recall also that YANG does not allow > > configuration data to depend on state data. > > > > > I do not understand how this leads to more complex validation rules. > > > Please explain. > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > We want to be able to express that, for example, a node in one > > > network is supported by a node in an underlay network. For this > > > purpose, we are referencing a node in another (underlay) network. > > > So that we cannot reference an arbitrary node in an arbitrary > > > network, we want to make sure that the supporting node is part of a > "supporting-network" > > > of the same network. > > > > > > Currently, we have the following definition: > > > > > > list supporting-node { > > > key "network-ref node-ref"; > > > description > > > "Represents another node, in an underlay network, that > > > this node is supported by. Used to represent layering > > > structure."; > > > leaf network-ref { > > > type leafref { > > > path "../../../supporting-network/network-ref"; > > > } > > > description > > > "References the underlay network that the > > > underlay node is part of."; > > > } > > > leaf node-ref { > > > type leafref { > > > path "/network/node/node-id"; > > > } > > > description > > > "References the underlay node itself."; > > > } > > / > > > } > > > > > > > > > If we were to split the model, when we configure a node, we will > > > have to account for the fact that the supporting node could be > > > either part of a "configured" network itself, or of a network that > > > has been "server-provided". That is, we need to be able to allow > > > for both possibilities. > > > > Again note that YANG requires that configuration data does not depend > > on state data. You seem to be breaking this rule, no? > > > > > To do this, we would no longer be able to have the network-ref to be > > > part of the key for supporting-node - we would have to replace > > > network-ref with a choice of two nodes that reference either a > > > server-provided network ("branch 1"), or a configured network > > > ("branch 2"). As a result, we will have to introduce a separate way > > > to reference elements in list supporting-node. All of this results > > > in considerable additional complexity. Or do you see an easier way? > > > > > > > > > > I do not think this is the solution. YANG requires that constraints on > > config true nodes can only refer to other config true nodes in the > > datastore where the node with the constraint exists. See section 7.5.3 > > and section 7.19.5. And concerning leafref, section 9.9 says that a > > leafref may only point to configuration. I believe this I-D is > > violating the distinction between configuration and state data. > > > > /js > > > > -- > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > Fax: +49 421 200 3103 > > >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 19 12:41:17 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D71BC1B2CA7 for ; Mon, 19 Oct 2015 12:41:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wg94-7lKlAXX for ; Mon, 19 Oct 2015 12:41:04 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AF951B2CA5 for ; Mon, 19 Oct 2015 12:41:04 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 338A31014; Mon, 19 Oct 2015 21:41:03 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id 6fgbm5XQc8cN; Mon, 19 Oct 2015 21:41:01 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 19 Oct 2015 21:41:01 +0200 (CEST) Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 8A74D20053; Mon, 19 Oct 2015 21:41:01 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id JV2z4QkclIqK; Mon, 19 Oct 2015 21:41:00 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 3D1D22004E; Mon, 19 Oct 2015 21:41:00 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id 08FA937B89BE; Mon, 19 Oct 2015 21:40:57 +0200 (CEST) Date: Mon, 19 Oct 2015 21:40:56 +0200 From: Juergen Schoenwaelder To: Xufeng Liu Message-ID: <20151019194054.GA81648@elstar.local> Mail-Followup-To: Xufeng Liu , "Alexander Clemm (alex)" , Martin Bjorklund , "andy@yumaworks.com" , "i2rs@ietf.org" , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" References: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019.203216.710736168596706388.mbj@tail-f.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "lhotka@nic.cz" , "i2rs@ietf.org" , Martin Bjorklund , "Alexander Clemm \(alex\)" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 19:41:06 -0000 On Mon, Oct 19, 2015 at 07:08:01PM +0000, Xufeng Liu wrote: > Hi Martin and Alex, > > Some of such objects might not be changeable, no matter what access right that the client has. Such non-changeable objects are derived from other objects in the system. > This sounds remarkably like operational state... /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 19 12:55:34 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 516391A9037 for ; Mon, 19 Oct 2015 12:55:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.201 X-Spam-Level: X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OWN-1uwvujgo for ; Mon, 19 Oct 2015 12:55:18 -0700 (PDT) Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCC8A1A902F for ; Mon, 19 Oct 2015 12:55:17 -0700 (PDT) X-AuditID: c618062d-f79ef6d000007f54-9d-5624ea2245fc Received: from EUSAAHC003.ericsson.se (Unknown_Domain [147.117.188.81]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id 61.54.32596.22AE4265; Mon, 19 Oct 2015 15:03:31 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC003.ericsson.se ([147.117.188.81]) with mapi id 14.03.0248.002; Mon, 19 Oct 2015 15:55:15 -0400 From: Xufeng Liu To: Juergen Schoenwaelder Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpwAhpl39656jk2T7WlRhneW4p5zcAEA//+9flCAAEx7AP//wElg Date: Mon, 19 Oct 2015 19:55:14 +0000 Message-ID: References: <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019.203216.710736168596706388.mbj@tail-f.com> <20151019194054.GA81648@elstar.local> In-Reply-To: <20151019194054.GA81648@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.10] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrOIsWRmVeSWpSXmKPExsUyuXRPoK7yK5Uwg+5JzBafHl5itph/8jCT xYMjs9gt1s34wGJxdeNPRov9B9+yWlxYNZfNorv7GbvFnzevWBw4Pab83sjqsXPWXXaPJUt+ MnlsOODpMfv1dVaPTZfvMHpc7t3K6rHx12IWj5b+iywBnFFcNimpOZllqUX6dglcGYue3WMu WMBZcWbuRcYGxg3sXYycHBICJhIXH1xmgrDFJC7cW8/WxcjFISRwlFHiyduvrBDOckaJWxsP sXQxcnCwCWhJXH7qCNIgIuAg0b+tG6yBWWAHk8Sb61tZQRLCAmYSry6+YIYoMpfYcf8WK4Tt JrH83h6wbSwCqhJPr09jBLF5BXwl7t17zASxrIVZomfJdrAGTgEjiQ0nu8BsRqDzvp9aA9bM LCAucevJfKizBSSW7DnPDGGLSrx8/I8VwlaSmLT0HCtEvY7Egt2f2CBsbYllC18zQywWlDg5 8wnLBEaxWUjGzkLSMgtJyywkLQsYWVYxcpQWp5blphsZbGIExuwxCTbdHYx7XloeYhTgYFTi 4V3gpxImxJpYVlyZe4hRmoNFSZx3/5L7oUIC6YklqdmpqQWpRfFFpTmpxYcYmTg4pRoYDZnr 8gw/MXX2rzVPNtZV77S7qLXs/mnzju+/eTqXc+W/vS5Rctn1Hs/fdQuzDJYUGHzn2tHXsXlR 7dGg9Wuzw+ULqh0SlOxVAzvmJV5+HviOPWLaDYNUP825H5i+av3ScIr7H3xob8eUN7m/8748 W301POT+UTO5WvOZL0QnSZUeOfj2naC4EktxRqKhFnNRcSIA0d+pN7oCAAA= Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , Martin Bjorklund , "Alexander Clemm \(alex\)" , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 19:55:20 -0000 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwael= der > Sent: Monday, October 19, 2015 3:41 PM > To: Xufeng Liu > Cc: lhotka@nic.cz; i2rs@ietf.org; Martin Bjorklund; Alexander Clemm (alex= ); > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > On Mon, Oct 19, 2015 at 07:08:01PM +0000, Xufeng Liu wrote: > > Hi Martin and Alex, > > > > Some of such objects might not be changeable, no matter what access rig= ht > that the client has. Such non-changeable objects are derived from other o= bjects > in the system. > > >=20 > This sounds remarkably like operational state... [Xufeng] But configuration objects can be built on top of these. >=20 > /js >=20 > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 19 12:56:32 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2AC41A902F for ; Mon, 19 Oct 2015 12:56:12 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IZFq1Z2ZNm-D for ; Mon, 19 Oct 2015 12:56:10 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C67881A9039 for ; Mon, 19 Oct 2015 12:56:08 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 8D3F8FA0; Mon, 19 Oct 2015 21:56:07 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id TTyoOgxaonz2; Mon, 19 Oct 2015 21:56:05 +0200 (CEST) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 19 Oct 2015 21:56:05 +0200 (CEST) Received: from localhost (demetrius4.jacobs-university.de [212.201.44.49]) by hermes.jacobs-university.de (Postfix) with ESMTP id DE0CE2004E; Mon, 19 Oct 2015 21:56:05 +0200 (CEST) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius4.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id CgJKxPe71Tca; Mon, 19 Oct 2015 21:56:04 +0200 (CEST) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 4CEE020054; Mon, 19 Oct 2015 21:56:03 +0200 (CEST) Received: by elstar.local (Postfix, from userid 501) id C2BB137B8A0E; Mon, 19 Oct 2015 21:56:01 +0200 (CEST) Date: Mon, 19 Oct 2015 21:56:00 +0200 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151019195558.GB81648@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.3i Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 19:56:12 -0000 On Mon, Oct 19, 2015 at 06:24:10PM +0000, Alexander Clemm (alex) wrote: > Hi Juergen, > > I think one of the key statements you make below is this: > " Recall also that YANG does not allow configuration data to depend on state data." > > Note that this is not the case in the current model. The current model is essentially all configuration data. Of course, we have this flag to indicate who supplied that data (and is hence maintaining it). > I expect that config true objects can be modified by clients. And I expect that client maintained config true objects do not depend on server provided operational state. The 'server-provided' leaf seems to 'overrule' both principles. > You argue that we should instead "split" the model and introduce operational data to reflect what is populated by the server. However, doing that introduces precisely new issues - and you have just brought another argument why this may be a bad idea and may not even work. Topologies _are_ layered, and we need to be able to express that in the model. Now, if we have a topology that is server-provided, hence (per your statement) to be represented by operational data only, how do we build an overlay topology that is "configured" on top of it? If the answer is "we can't, unless we replicate the server-provided topology into the network configuration (which makes no sense)", we are screwed. Now, we might build it on top if we remove all references / dependencies on the underlay from the model and punt the problem to the user. Basically, no longer have the model express vertical relationships. Not a good solution, IMHO. > How do you suggest we address this? The ability to express layering relationships between topologies, including cases where topologies originate from different sources (discovered/server-provided vs configured), is a requirement. It is not an artefact of our model, it is something that we need to capture as part of the model. There may not be a "nice" way of doing this within the YANG framework, yet it is important that we find a way to do this. The current solution to this - having the model as configuration data, and including a parameter to indicate who supplies the data and is maintaining it - appears to be cleanest and clearest solution (or perhaps the "least bad") that results in the model of least complexity. In the interfaces model, this problem got solved via name bindings. I can configure an interface but as long as the matching interface is not present, the config won't be applied to the interface. Translated to your domain, I can configure an overlay that refers by name to other layers. If those layers do not operationally exist, the overlay will exist in config but not in the operational state tree. > Perhaps there is something we can simply change about the "server-provided" object to address your concerns? We can make it config (to address your issue that triggered this, the presence of a r/o object in a tree that is otherwise r/w). You can address my concern by doing away with 'server-provided' and by properly separating config from operational state. ;-) Assuming proper authorization, a NC/RC client should be able to change any object in a configuration datastore. I am concerned about data model specific 'fences' that indicate that some portions of a configuration datastore are behaving in special ways. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 19 13:23:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F9861AC3C3 for ; Mon, 19 Oct 2015 13:23:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nIrEZ_8OQXXd for ; Mon, 19 Oct 2015 13:23:20 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 463011AC3AE for ; Mon, 19 Oct 2015 13:22:49 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id 021201AE0959; Mon, 19 Oct 2015 22:22:47 +0200 (CEST) Date: Mon, 19 Oct 2015 22:26:45 +0200 (CEST) Message-Id: <20151019.222645.2143496104887007825.mbj@tail-f.com> To: alex@cisco.com From: Martin Bjorklund In-Reply-To: References: <20151019.203216.710736168596706388.mbj@tail-f.com> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: andy@yumaworks.com, i2rs@ietf.org, j.schoenwaelder@jacobs-university.de, lhotka@nic.cz, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:23:27 -0000 "Alexander Clemm (alex)" wrote: > Hi Martin, > > One model for the data that is server-provided is to assume an app > (which could be embedded on the same server) that knows how to > discover the network, then populates the data accordingly. > > [Of course, we would not want any random client app just being able to > "mess" with that data. The expectation is generally clearly access to > this will be restricted / controlled. The topology instances that > were populated by the "server-provided app" should not be "touched" by > other apps - it is the "server-provided" app that is responsible for > maintaining them.] > > So I assume the answer to your question is "yes", but with a bunch of > caveats. So how is the server-provided leaf supposed to be implemented, and how is it supposed to be used? /martin > --- Alex > > > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > Bjorklund > Sent: Monday, October 19, 2015 11:32 AM > To: Alexander Clemm (alex) > Cc: andy@yumaworks.com; i2rs@ietf.org; > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > Alex, > > Is the idea that the server-provided data is normal config? I.e., if > the server wants to modify this data it behaves like a normal client? > (conceptually...) And the server-provided data can be modified by > anyone with proper access rights? > > > /martin > > > > "Alexander Clemm (alex)" wrote: > > Hi Juergen, > > > > I think one of the key statements you make below is this: > > " Recall also that YANG does not allow configuration data to depend on > > state data." > > > > Note that this is not the case in the current model. The current > > model is essentially all configuration data. Of course, we have this > > flag to indicate who supplied that data (and is hence maintaining it). > > > > You argue that we should instead "split" the model and introduce > > operational data to reflect what is populated by the server. However, > > doing that introduces precisely new issues - and you have just brought > > another argument why this may be a bad idea and may not even work. > > Topologies _are_ layered, and we need to be able to express that in > > the model. Now, if we have a topology that is server-provided, hence > > (per your statement) to be represented by operational data only, how > > do we build an overlay topology that is "configured" on top of it? If > > the answer is "we can't, unless we replicate the server-provided > > topology into the network configuration (which makes no sense)", we > > are screwed. Now, we might build it on top if we remove all > > references / dependencies on the underlay from the model and punt the > > problem to the user. Basically, no longer have the model express > > vertical relationships. Not a good solution, IMHO. > > > > How do you suggest we address this? The ability to express layering > > relationships between topologies, including cases where topologies > > originate from different sources (discovered/server-provided vs > > configured), is a requirement. It is not an artefact of our model, it > > is something that we need to capture as part of the model. There may > > not be a "nice" way of doing this within the YANG framework, yet it is > > important that we find a way to do this. The current solution to this > > - having the model as configuration data, and including a parameter to > > indicate who supplies the data and is maintaining it - appears to be > > cleanest and clearest solution (or perhaps the "least bad") that > > results in the model of least complexity. > > > > Perhaps there is something we can simply change about the > > "server-provided" object to address your concerns? We can make it > > config (to address your issue that triggered this, the presence of a > > r/o object in a tree that is otherwise r/w). > > > > Thoughts? > > --- Alex > > > > > > > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Sunday, October 18, 2015 3:13 AM > > To: Alexander Clemm (alex) > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund > > ; Andy Bierman ; 'Alia Atlas' > > ; 'Jeffrey Haas' ; Susan Hares > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > wrote: > > > Hello Juergen, > > > > > > responses inline, delimited with > > > > > > --- Alex > > > > > > -----Original Message----- > > > From: Juergen Schoenwaelder > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > To: Alexander Clemm (alex) > > > Cc: Susan Hares ; Andy Bierman > > > ; i2rs@ietf.org; Martin Bjorklund > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > ; 'Jeffrey Haas' > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > wrote: > > > > > > > > The only item in the topology that is read-only concerns the > > > > "server-provided" flag, but this concerns a separate issue that > > > > was also discussed (I am not sure if this is what you are referring > > > > to). > > > > It is analogous to the other discussion concerning distinguishing > > > > configuration that has been intended, versus one that is in effect > > > > etc . This concerns the issue that some topologies are populated > > > > by the server whereas some topologies can be populated by client > > > > applications. > > > > > > Yes, this is what the concern is about. > > > > > > > We have had discussions in the past whether to "split this up", > > > > having a (rw) branch to populate "intended" topologies and a (ro) > > > > branch for topologies "in effect". > > > > > > This is the normal way to do this in YANG. And this goes back to > > > what was driving us for years, namely to clearly separate config > > > from state. This module makes this distinction a runtime property > > > controlled by a data model specific mechanism. None of the generic > > > tools out there will be able to understand this. > > > > > > > > > I think the issue is more related to the current discussion with > > > regards to openconfig and "intended configuration" and "applied > > > configuration". If YANG had an existing solution for this, we would > > > not have this discussion. The reason I believe this is similar is > > > that you can view the "applied configuration" as the > > > "server-provided configuration" (network topology, in our case), and > > > the "intended configuration" as the, well, configured or intended > > > network topology in our case. That said, the issue is not identical > > > - whereas in the openconfig case every "applied configuration" has > > > an accompanying "intended configuration", in our case this is not > > > necessarily the case > > > - you can have "applied" [network topologies] that were provided by > > > the server / the network itself, not configured by anybody. > > > > > > > I think this has nothing to do with intended or applied config. Your > > 'server supplied topology' appears to me to be operational state and > > not configuration data. > > > > > > We decided against it for various reasons - every piece of > > > > information would essentially be duplicated inside the model (this > > > > is not your normal config vs oper data distinction, but would > > > > essentially reflect a limitation of the framework), leading to > > > > unnecessary additional complexity in the model (every augmentation > > > > has to be conducted in two places), more complex validation rules, > > > > etc. > > > > > > I do not understand why this is not a normal config vs oper data > > > distinction. Please explain. > > > > > > > > > A normal distinction would be e.g. the type of model we have in RFC > > > 7233 - separate trees with distinct data, some clearly part of > > > configuration, other clearly operational data. > > > In this case, this is different. You have the same data. However, > > > in some cases it is populated by a client, in other cases by the > > > server. > > > YANG requires the categorization of data as config false or true. > > > In this case, this categorization does not always apply - or, the > > > categorization depends on the particular instance. > > > > > > > So you have operational state which is partially populated by the > > server and partially populated from config. I fail to see how this is > > any different from other cases, including network interfaces as > > defined in RFC 7233. Recall also that YANG does not allow > > configuration data to depend on state data. > > > > > I do not understand how this leads to more complex validation rules. > > > Please explain. > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > We want to be able to express that, for example, a node in one > > > network is supported by a node in an underlay network. For this > > > purpose, we are referencing a node in another (underlay) network. > > > So that we cannot reference an arbitrary node in an arbitrary > > > network, we want to make sure that the supporting node is part of a > > > "supporting-network" > > > of the same network. > > > > > > Currently, we have the following definition: > > > > > > list supporting-node { > > > key "network-ref node-ref"; > > > description > > > "Represents another node, in an underlay network, that > > > this node is supported by. Used to represent layering > > > structure."; > > > leaf network-ref { > > > type leafref { > > > path "../../../supporting-network/network-ref"; > > > } > > > description > > > "References the underlay network that the > > > underlay node is part of."; > > > } > > > leaf node-ref { > > > type leafref { > > > path "/network/node/node-id"; > > > } > > > description > > > "References the underlay node itself."; > > > } > > / > > > } > > > > > > > > > If we were to split the model, when we configure a node, we will > > > have to account for the fact that the supporting node could be > > > either part of a "configured" network itself, or of a network that > > > has been "server-provided". That is, we need to be able to allow > > > for both possibilities. > > > > Again note that YANG requires that configuration data does not depend > > on state data. You seem to be breaking this rule, no? > > > > > To do this, we would no longer be able to have the network-ref to be > > > part of the key for supporting-node - we would have to replace > > > network-ref with a choice of two nodes that reference either a > > > server-provided network ("branch 1"), or a configured network > > > ("branch 2"). As a result, we will have to introduce a separate way > > > to reference elements in list supporting-node. All of this results > > > in considerable additional complexity. Or do you see an easier way? > > > > > > > > > > I do not think this is the solution. YANG requires that constraints on > > config true nodes can only refer to other config true nodes in the > > datastore where the node with the constraint exists. See section 7.5.3 > > and section 7.19.5. And concerning leafref, section 9.9 says that a > > leafref may only point to configuration. I believe this I-D is > > violating the distinction between configuration and state data. > > > > /js > > > > -- > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > Fax: +49 421 200 3103 > > > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Mon Oct 19 13:24:15 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92CA91AC3D1 for ; Mon, 19 Oct 2015 13:24:04 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZRBeTmfNQCme for ; Mon, 19 Oct 2015 13:24:01 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 66D241A9308 for ; Mon, 19 Oct 2015 13:23:15 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id 9A4561AE0977; Mon, 19 Oct 2015 22:23:14 +0200 (CEST) Date: Mon, 19 Oct 2015 22:27:13 +0200 (CEST) Message-Id: <20151019.222713.36064364836807174.mbj@tail-f.com> To: xufeng.liu@ericsson.com From: Martin Bjorklund In-Reply-To: References: <20151019.203216.710736168596706388.mbj@tail-f.com> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: lhotka@nic.cz, i2rs@ietf.org, alex@cisco.com, j.schoenwaelder@jacobs-university.de, andy@yumaworks.com, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:24:04 -0000 Xufeng Liu wrote: > Hi Martin and Alex, > > Some of such objects might not be changeable, no matter what access > right that the client has. Such non-changeable objects are derived > from other objects in the system. That would be config false nodes, right? /martin > > Regards, > > - Xufeng > > > > -----Original Message----- > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm > > (alex) > > Sent: Monday, October 19, 2015 3:05 PM > > To: Martin Bjorklund > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > j.schoenwaelder@jacobs-university.de; > > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > > shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > Hi Martin, > > > > One model for the data that is server-provided is to assume an app > > (which could > > be embedded on the same server) that knows how to discover the > > network, then > > populates the data accordingly. > > > > [Of course, we would not want any random client app just being able to > > "mess" > > with that data. The expectation is generally clearly access to this > > will be > > restricted / controlled. The topology instances that were populated > > by the > > "server-provided app" should not be "touched" by other apps - it is > > the "server- > > provided" app that is responsible for maintaining them.] > > > > So I assume the answer to your question is "yes", but with a bunch of > > caveats. > > --- Alex > > > > > > -----Original Message----- > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > > Bjorklund > > Sent: Monday, October 19, 2015 11:32 AM > > To: Alexander Clemm (alex) > > Cc: andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs- > > university.de; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; > > shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > Alex, > > > > Is the idea that the server-provided data is normal config? I.e., if > > the server > > wants to modify this data it behaves like a normal client? > > (conceptually...) And the server-provided data can be modified by > > anyone with > > proper access rights? > > > > > > /martin > > > > > > > > "Alexander Clemm (alex)" wrote: > > > Hi Juergen, > > > > > > I think one of the key statements you make below is this: > > > " Recall also that YANG does not allow configuration data to depend on > > > state data." > > > > > > Note that this is not the case in the current model. The current > > > model is essentially all configuration data. Of course, we have this > > > flag to indicate who supplied that data (and is hence maintaining it). > > > > > > You argue that we should instead "split" the model and introduce > > > operational data to reflect what is populated by the server. However, > > > doing that introduces precisely new issues - and you have just brought > > > another argument why this may be a bad idea and may not even work. > > > Topologies _are_ layered, and we need to be able to express that in > > > the model. Now, if we have a topology that is server-provided, hence > > > (per your statement) to be represented by operational data only, how > > > do we build an overlay topology that is "configured" on top of it? If > > > the answer is "we can't, unless we replicate the server-provided > > > topology into the network configuration (which makes no sense)", we > > > are screwed. Now, we might build it on top if we remove all > > > references / dependencies on the underlay from the model and punt the > > > problem to the user. Basically, no longer have the model express > > > vertical relationships. Not a good solution, IMHO. > > > > > > How do you suggest we address this? The ability to express layering > > > relationships between topologies, including cases where topologies > > > originate from different sources (discovered/server-provided vs > > > configured), is a requirement. It is not an artefact of our model, it > > > is something that we need to capture as part of the model. There may > > > not be a "nice" way of doing this within the YANG framework, yet it is > > > important that we find a way to do this. The current solution to this > > > - having the model as configuration data, and including a parameter to > > > indicate who supplies the data and is maintaining it - appears to be > > > cleanest and clearest solution (or perhaps the "least bad") that > > > results in the model of least complexity. > > > > > > Perhaps there is something we can simply change about the > > > "server-provided" object to address your concerns? We can make it > > > config (to address your issue that triggered this, the presence of a > > > r/o object in a tree that is otherwise r/w). > > > > > > Thoughts? > > > --- Alex > > > > > > > > > > > > -----Original Message----- > > > From: Juergen Schoenwaelder > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > Sent: Sunday, October 18, 2015 3:13 AM > > > To: Alexander Clemm (alex) > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund > > > ; Andy Bierman ; 'Alia Atlas' > > > ; 'Jeffrey Haas' ; Susan Hares > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > > wrote: > > > > Hello Juergen, > > > > > > > > responses inline, delimited with > > > > > > > > --- Alex > > > > > > > > -----Original Message----- > > > > From: Juergen Schoenwaelder > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > To: Alexander Clemm (alex) > > > > Cc: Susan Hares ; Andy Bierman > > > > ; i2rs@ietf.org; Martin Bjorklund > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > ; 'Jeffrey Haas' > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > > wrote: > > > > > > > > > > The only item in the topology that is read-only concerns the > > > > > "server-provided" flag, but this concerns a separate issue that > > > > > was also discussed (I am not sure if this is what you are referring > > > > > to). > > > > > It is analogous to the other discussion concerning distinguishing > > > > > configuration that has been intended, versus one that is in effect > > > > > etc . This concerns the issue that some topologies are populated > > > > > by the server whereas some topologies can be populated by client > > > > > applications. > > > > > > > > Yes, this is what the concern is about. > > > > > > > > > We have had discussions in the past whether to "split this up", > > > > > having a (rw) branch to populate "intended" topologies and a (ro) > > > > > branch for topologies "in effect". > > > > > > > > This is the normal way to do this in YANG. And this goes back to > > > > what was driving us for years, namely to clearly separate config > > > > from state. This module makes this distinction a runtime property > > > > controlled by a data model specific mechanism. None of the generic > > > > tools out there will be able to understand this. > > > > > > > > > > > > I think the issue is more related to the current discussion with > > > > regards to openconfig and "intended configuration" and "applied > > > > configuration". If YANG had an existing solution for this, we would > > > > not have this discussion. The reason I believe this is similar is > > > > that you can view the "applied configuration" as the > > > > "server-provided configuration" (network topology, in our case), and > > > > the "intended configuration" as the, well, configured or intended > > > > network topology in our case. That said, the issue is not identical > > > > - whereas in the openconfig case every "applied configuration" has > > > > an accompanying "intended configuration", in our case this is not > > > > necessarily the case > > > > - you can have "applied" [network topologies] that were provided by > > > > the server / the network itself, not configured by anybody. > > > > > > > > > > I think this has nothing to do with intended or applied config. Your > > > 'server supplied topology' appears to me to be operational state and > > > not configuration data. > > > > > > > > We decided against it for various reasons - every piece of > > > > > information would essentially be duplicated inside the model (this > > > > > is not your normal config vs oper data distinction, but would > > > > > essentially reflect a limitation of the framework), leading to > > > > > unnecessary additional complexity in the model (every augmentation > > > > > has to be conducted in two places), more complex validation rules, > > > > > etc. > > > > > > > > I do not understand why this is not a normal config vs oper data > > > > distinction. Please explain. > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have in RFC > > > > 7233 - separate trees with distinct data, some clearly part of > > > > configuration, other clearly operational data. > > > > In this case, this is different. You have the same data. However, > > > > in some cases it is populated by a client, in other cases by the > > > > server. > > > > YANG requires the categorization of data as config false or true. > > > > In this case, this categorization does not always apply - or, the > > > > categorization depends on the particular instance. > > > > > > > > > > So you have operational state which is partially populated by the > > > server and partially populated from config. I fail to see how this is > > > any different from other cases, including network interfaces as > > > defined in RFC 7233. Recall also that YANG does not allow > > > configuration data to depend on state data. > > > > > > > I do not understand how this leads to more complex validation rules. > > > > Please explain. > > > > > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > > > We want to be able to express that, for example, a node in one > > > > network is supported by a node in an underlay network. For this > > > > purpose, we are referencing a node in another (underlay) network. > > > > So that we cannot reference an arbitrary node in an arbitrary > > > > network, we want to make sure that the supporting node is part of a > > "supporting-network" > > > > of the same network. > > > > > > > > Currently, we have the following definition: > > > > > > > > list supporting-node { > > > > key "network-ref node-ref"; > > > > description > > > > "Represents another node, in an underlay network, that > > > > this node is supported by. Used to represent layering > > > > structure."; > > > > leaf network-ref { > > > > type leafref { > > > > path "../../../supporting-network/network-ref"; > > > > } > > > > description > > > > "References the underlay network that the > > > > underlay node is part of."; > > > > } > > > > leaf node-ref { > > > > type leafref { > > > > path "/network/node/node-id"; > > > > } > > > > description > > > > "References the underlay node itself."; > > > > } > > > / > > > > } > > > > > > > > > > > > If we were to split the model, when we configure a node, we will > > > > have to account for the fact that the supporting node could be > > > > either part of a "configured" network itself, or of a network that > > > > has been "server-provided". That is, we need to be able to allow > > > > for both possibilities. > > > > > > Again note that YANG requires that configuration data does not depend > > > on state data. You seem to be breaking this rule, no? > > > > > > > To do this, we would no longer be able to have the network-ref to be > > > > part of the key for supporting-node - we would have to replace > > > > network-ref with a choice of two nodes that reference either a > > > > server-provided network ("branch 1"), or a configured network > > > > ("branch 2"). As a result, we will have to introduce a separate way > > > > to reference elements in list supporting-node. All of this results > > > > in considerable additional complexity. Or do you see an easier way? > > > > > > > > > > > > > > I do not think this is the solution. YANG requires that constraints on > > > config true nodes can only refer to other config true nodes in the > > > datastore where the node with the constraint exists. See section 7.5.3 > > > and section 7.19.5. And concerning leafref, section 9.9 says that a > > > leafref may only point to configuration. I believe this I-D is > > > violating the distinction between configuration and state data. > > > > > > /js > > > > > > -- > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > > Fax: +49 421 200 3103 > > > > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs > From nobody Mon Oct 19 13:25:03 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F9091A90FA for ; Mon, 19 Oct 2015 13:24:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AWrZjL_Cc2ry for ; Mon, 19 Oct 2015 13:24:48 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 431DF1A90F9 for ; Mon, 19 Oct 2015 13:24:15 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id 76D971AE0959; Mon, 19 Oct 2015 22:24:14 +0200 (CEST) Date: Mon, 19 Oct 2015 22:28:13 +0200 (CEST) Message-Id: <20151019.222813.1969507265089144505.mbj@tail-f.com> To: xufeng.liu@ericsson.com From: Martin Bjorklund In-Reply-To: References: <20151019194054.GA81648@elstar.local> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: andy@yumaworks.com, i2rs@ietf.org, alex@cisco.com, j.schoenwaelder@jacobs-university.de, lhotka@nic.cz, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:24:49 -0000 Xufeng Liu wrote: > > > -----Original Message----- > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen Schoenwaelder > > Sent: Monday, October 19, 2015 3:41 PM > > To: Xufeng Liu > > Cc: lhotka@nic.cz; i2rs@ietf.org; Martin Bjorklund; Alexander Clemm (alex); > > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > > shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > On Mon, Oct 19, 2015 at 07:08:01PM +0000, Xufeng Liu wrote: > > > Hi Martin and Alex, > > > > > > Some of such objects might not be changeable, no matter what access right > > that the client has. Such non-changeable objects are derived from other objects > > in the system. > > > > > > > This sounds remarkably like operational state... > > [Xufeng] But configuration objects can be built on top of these. What does this mean? /martin From nobody Mon Oct 19 13:40:15 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73F981ACAD5 for ; Mon, 19 Oct 2015 13:40:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.201 X-Spam-Level: X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G5vL7E-Fwq2W for ; Mon, 19 Oct 2015 13:39:57 -0700 (PDT) Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07DB71ACCF4 for ; Mon, 19 Oct 2015 13:39:54 -0700 (PDT) X-AuditID: c618062d-f79ef6d000007f54-b5-5624f497a43d Received: from EUSAAHC001.ericsson.se (Unknown_Domain [147.117.188.75]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id A9.E6.32596.794F4265; Mon, 19 Oct 2015 15:48:08 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC001.ericsson.se ([147.117.188.75]) with mapi id 14.03.0248.002; Mon, 19 Oct 2015 16:39:53 -0400 From: Xufeng Liu To: Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpwAhpl39656jk2T7WlRhneW4p5zcAEA//+9flCAAFlqgP//wEaw Date: Mon, 19 Oct 2015 20:39:52 +0000 Message-ID: References: <20151019.203216.710736168596706388.mbj@tail-f.com> <20151019.222713.36064364836807174.mbj@tail-f.com> In-Reply-To: <20151019.222713.36064364836807174.mbj@tail-f.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.10] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrCIsWRmVeSWpSXmKPExsUyuXSPt+6MLyphBhvCLD49vMRsMf/kYSaL B0dmsVusm/GBxeLqxp+MFvsPvmW1uLBqLptFd/czdos/b16xOHB6TPm9kdVj56y77B5Llvxk 8thwwNNj9uvrrB6bLt9h9Ljcu5XVY+OvxSweLf0XWQI4o7hsUlJzMstSi/TtErgyPnz3LLhZ VvFw1geWBsY1kV2MnBwSAiYSf1qeMkLYYhIX7q1n62Lk4hASOMoo8fPbMxYIZzmjxKT935i7 GDk42AS0JC4/dQRpEBFQlXiycy1YDbPAHSaJS0fesIIkhAXMJF5dfMEMUWQuseP+LVYI201i c9tTNhCbBaj59Z8OsDivgK/EjbXzWCGWfWaU2Pu2EWwZp4C9xKvLyiA1jEDXfT+1hgnEZhYQ l7j1ZD4TxNUCEkv2nGeGsEUlXj7+xwphK0lMWnqOFaJeR2LB7k9sELa2xLKFr5kh9gpKnJz5 hGUCo9gsJGNnIWmZhaRlFpKWBYwsqxg5SotTy3LTjQw2MQKj9ZgEm+4Oxj0vLQ8xCnAwKvHw LvBTCRNiTSwrrsw9xCjNwaIkzrt/yf1QIYH0xJLU7NTUgtSi+KLSnNTiQ4xMHJxSDYze57lO eycL1el95FunW8yS/3jpepe0E2USM2rvsr7cYsZ6J3Keaa+qnGpy4r9ZFw4KT5C9KeTFfXeV lWlzzr4dzIq+Cdekv6ckVnbOWGkZEX4otHjpTDn5jft4L53q+dKdXun78WDqtQ3suUX7WVNz LoivD1a80Dq3aUuRW7vKx82Vd79WHFZiKc5INNRiLipOBABpf7XStwIAAA== Archived-At: Cc: "lhotka@nic.cz" , "i2rs@ietf.org" , "alex@cisco.com" , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:40:00 -0000 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com] > Sent: Monday, October 19, 2015 4:27 PM > To: Xufeng Liu > Cc: alex@cisco.com; andy@yumaworks.com; i2rs@ietf.org; > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; akatlas@gmail.com; > jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Xufeng Liu wrote: > > Hi Martin and Alex, > > > > Some of such objects might not be changeable, no matter what access > > right that the client has. Such non-changeable objects are derived > > from other objects in the system. >=20 > That would be config false nodes, right? [Xufeng] Yes. Agree. >=20 >=20 > /martin >=20 >=20 >=20 > > > > Regards, > > > > - Xufeng > > > > > > > -----Original Message----- > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander > > > Clemm > > > (alex) > > > Sent: Monday, October 19, 2015 3:05 PM > > > To: Martin Bjorklund > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; > > > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > > > shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > Hi Martin, > > > > > > One model for the data that is server-provided is to assume an app > > > (which could be embedded on the same server) that knows how to > > > discover the network, then populates the data accordingly. > > > > > > [Of course, we would not want any random client app just being able > > > to "mess" > > > with that data. The expectation is generally clearly access to this > > > will be restricted / controlled. The topology instances that were > > > populated by the "server-provided app" should not be "touched" by > > > other apps - it is the "server- provided" app that is responsible > > > for maintaining them.] > > > > > > So I assume the answer to your question is "yes", but with a bunch > > > of caveats. > > > --- Alex > > > > > > > > > -----Original Message----- > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > > > Bjorklund > > > Sent: Monday, October 19, 2015 11:32 AM > > > To: Alexander Clemm (alex) > > > Cc: andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs- > > > university.de; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; > > > shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > Alex, > > > > > > Is the idea that the server-provided data is normal config? I.e., > > > if the server wants to modify this data it behaves like a normal > > > client? > > > (conceptually...) And the server-provided data can be modified by > > > anyone with proper access rights? > > > > > > > > > /martin > > > > > > > > > > > > "Alexander Clemm (alex)" wrote: > > > > Hi Juergen, > > > > > > > > I think one of the key statements you make below is this: > > > > " Recall also that YANG does not allow configuration data to > > > > depend on state data." > > > > > > > > Note that this is not the case in the current model. The current > > > > model is essentially all configuration data. Of course, we have > > > > this flag to indicate who supplied that data (and is hence maintain= ing it). > > > > > > > > You argue that we should instead "split" the model and introduce > > > > operational data to reflect what is populated by the server. > > > > However, doing that introduces precisely new issues - and you have > > > > just brought another argument why this may be a bad idea and may no= t > even work. > > > > Topologies _are_ layered, and we need to be able to express that > > > > in the model. Now, if we have a topology that is server-provided, > > > > hence (per your statement) to be represented by operational data > > > > only, how do we build an overlay topology that is "configured" on > > > > top of it? If the answer is "we can't, unless we replicate the > > > > server-provided topology into the network configuration (which > > > > makes no sense)", we are screwed. Now, we might build it on top > > > > if we remove all references / dependencies on the underlay from > > > > the model and punt the problem to the user. Basically, no longer > > > > have the model express vertical relationships. Not a good solution= , IMHO. > > > > > > > > How do you suggest we address this? The ability to express > > > > layering relationships between topologies, including cases where > > > > topologies originate from different sources > > > > (discovered/server-provided vs configured), is a requirement. It > > > > is not an artefact of our model, it is something that we need to > > > > capture as part of the model. There may not be a "nice" way of > > > > doing this within the YANG framework, yet it is important that we > > > > find a way to do this. The current solution to this > > > > - having the model as configuration data, and including a > > > > parameter to indicate who supplies the data and is maintaining it > > > > - appears to be cleanest and clearest solution (or perhaps the > > > > "least bad") that results in the model of least complexity. > > > > > > > > Perhaps there is something we can simply change about the > > > > "server-provided" object to address your concerns? We can make it > > > > config (to address your issue that triggered this, the presence of > > > > a r/o object in a tree that is otherwise r/w). > > > > > > > > Thoughts? > > > > --- Alex > > > > > > > > > > > > > > > > -----Original Message----- > > > > From: Juergen Schoenwaelder > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > To: Alexander Clemm (alex) > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin > > > > Bjorklund ; Andy Bierman ; > 'Alia Atlas' > > > > ; 'Jeffrey Haas' ; Susan Hares > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > > > wrote: > > > > > Hello Juergen, > > > > > > > > > > responses inline, delimited with > > > > > > > > > > --- Alex > > > > > > > > > > -----Original Message----- > > > > > From: Juergen Schoenwaelder > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > To: Alexander Clemm (alex) > > > > > Cc: Susan Hares ; Andy Bierman > > > > > ; i2rs@ietf.org; Martin Bjorklund > > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > ; 'Jeffrey Haas' > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > > > wrote: > > > > > > > > > > > > The only item in the topology that is read-only concerns the > > > > > > "server-provided" flag, but this concerns a separate issue > > > > > > that was also discussed (I am not sure if this is what you are > > > > > > referring to). > > > > > > It is analogous to the other discussion concerning > > > > > > distinguishing configuration that has been intended, versus > > > > > > one that is in effect etc . This concerns the issue that some > > > > > > topologies are populated by the server whereas some topologies > > > > > > can be populated by client applications. > > > > > > > > > > Yes, this is what the concern is about. > > > > > > > > > > > We have had discussions in the past whether to "split this > > > > > > up", having a (rw) branch to populate "intended" topologies > > > > > > and a (ro) branch for topologies "in effect". > > > > > > > > > > This is the normal way to do this in YANG. And this goes back to > > > > > what was driving us for years, namely to clearly separate config > > > > > from state. This module makes this distinction a runtime > > > > > property controlled by a data model specific mechanism. None of > > > > > the generic tools out there will be able to understand this. > > > > > > > > > > > > > > > I think the issue is more related to the current discussion with > > > > > regards to openconfig and "intended configuration" and "applied > > > > > configuration". If YANG had an existing solution for this, we > > > > > would not have this discussion. The reason I believe this is > > > > > similar is that you can view the "applied configuration" as the > > > > > "server-provided configuration" (network topology, in our case), > > > > > and the "intended configuration" as the, well, configured or > > > > > intended network topology in our case. That said, the issue is > > > > > not identical > > > > > - whereas in the openconfig case every "applied configuration" > > > > > has an accompanying "intended configuration", in our case this > > > > > is not necessarily the case > > > > > - you can have "applied" [network topologies] that were provided > > > > > by the server / the network itself, not configured by anybody. > > > > > > > > > > > > > I think this has nothing to do with intended or applied config. > > > > Your 'server supplied topology' appears to me to be operational > > > > state and not configuration data. > > > > > > > > > > We decided against it for various reasons - every piece of > > > > > > information would essentially be duplicated inside the model > > > > > > (this is not your normal config vs oper data distinction, but > > > > > > would essentially reflect a limitation of the framework), > > > > > > leading to unnecessary additional complexity in the model > > > > > > (every augmentation has to be conducted in two places), more > > > > > > complex validation rules, etc. > > > > > > > > > > I do not understand why this is not a normal config vs oper data > > > > > distinction. Please explain. > > > > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have in > > > > > RFC > > > > > 7233 - separate trees with distinct data, some clearly part of > > > > > configuration, other clearly operational data. > > > > > In this case, this is different. You have the same data. > > > > > However, in some cases it is populated by a client, in other > > > > > cases by the server. > > > > > YANG requires the categorization of data as config false or true. > > > > > In this case, this categorization does not always apply - or, > > > > > the categorization depends on the particular instance. > > > > > > > > > > > > > So you have operational state which is partially populated by the > > > > server and partially populated from config. I fail to see how this > > > > is any different from other cases, including network interfaces as > > > > defined in RFC 7233. Recall also that YANG does not allow > > > > configuration data to depend on state data. > > > > > > > > > I do not understand how this leads to more complex validation rul= es. > > > > > Please explain. > > > > > > > > > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > > > > > We want to be able to express that, for example, a node in one > > > > > network is supported by a node in an underlay network. For this > > > > > purpose, we are referencing a node in another (underlay) network. > > > > > So that we cannot reference an arbitrary node in an arbitrary > > > > > network, we want to make sure that the supporting node is part > > > > > of a > > > "supporting-network" > > > > > of the same network. > > > > > > > > > > Currently, we have the following definition: > > > > > > > > > > list supporting-node { > > > > > key "network-ref node-ref"; > > > > > description > > > > > "Represents another node, in an underlay network, that > > > > > this node is supported by. Used to represent layering > > > > > structure."; > > > > > leaf network-ref { > > > > > type leafref { > > > > > path "../../../supporting-network/network-ref"; > > > > > } > > > > > description > > > > > "References the underlay network that the > > > > > underlay node is part of."; > > > > > } > > > > > leaf node-ref { > > > > > type leafref { > > > > > path "/network/node/node-id"; > > > > > } > > > > > description > > > > > "References the underlay node itself."; > > > > > } > > > > / > > > > > } > > > > > > > > > > > > > > > If we were to split the model, when we configure a node, we will > > > > > have to account for the fact that the supporting node could be > > > > > either part of a "configured" network itself, or of a network > > > > > that has been "server-provided". That is, we need to be able to > > > > > allow for both possibilities. > > > > > > > > Again note that YANG requires that configuration data does not > > > > depend on state data. You seem to be breaking this rule, no? > > > > > > > > > To do this, we would no longer be able to have the network-ref > > > > > to be part of the key for supporting-node - we would have to > > > > > replace network-ref with a choice of two nodes that reference > > > > > either a server-provided network ("branch 1"), or a configured > > > > > network ("branch 2"). As a result, we will have to introduce a > > > > > separate way to reference elements in list supporting-node. All > > > > > of this results in considerable additional complexity. Or do you= see an > easier way? > > > > > > > > > > > > > > > > > > I do not think this is the solution. YANG requires that > > > > constraints on config true nodes can only refer to other config > > > > true nodes in the datastore where the node with the constraint > > > > exists. See section 7.5.3 and section 7.19.5. And concerning > > > > leafref, section 9.9 says that a leafref may only point to > > > > configuration. I believe this I-D is violating the distinction betw= een > configuration and state data. > > > > > > > > /js > > > > > > > > -- > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germ= any > > > > Fax: +49 421 200 3103 > > > > > > > > > > _______________________________________________ > > > i2rs mailing list > > > i2rs@ietf.org > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > > > _______________________________________________ > > > i2rs mailing list > > > i2rs@ietf.org > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > From nobody Mon Oct 19 13:42:00 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CEF01ACC86 for ; Mon, 19 Oct 2015 13:41:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.201 X-Spam-Level: X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SEHLVQ0xLov6 for ; Mon, 19 Oct 2015 13:41:42 -0700 (PDT) Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D1901ACC8C for ; Mon, 19 Oct 2015 13:41:42 -0700 (PDT) X-AuditID: c6180641-f792c6d00000686a-ae-5624e8e31f9b Received: from EUSAAHC006.ericsson.se (Unknown_Domain [147.117.188.90]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id C8.33.26730.3E8E4265; Mon, 19 Oct 2015 14:58:12 +0200 (CEST) Received: from EUSAAMB107.ericsson.se ([147.117.188.124]) by EUSAAHC006.ericsson.se ([147.117.188.90]) with mapi id 14.03.0248.002; Mon, 19 Oct 2015 16:41:40 -0400 From: Xufeng Liu To: Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpwAhpl39656jk2T7WlRhneW4p5zcAEA//+9flCAAEx7AP//wElggABM7YD//8Bc0A== Date: Mon, 19 Oct 2015 20:41:39 +0000 Message-ID: References: <20151019194054.GA81648@elstar.local> <20151019.222813.1969507265089144505.mbj@tail-f.com> In-Reply-To: <20151019.222813.1969507265089144505.mbj@tail-f.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.10] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGIsWRmVeSWpSXmKPExsUyuXRPlO6TFyphBsuOMVp8eniJ2WL+ycNM Fg+OzGK3WDfjA4vF1Y0/GS32H3zLanFh1Vw2i+7uZ+wWf968YnHg9JjyeyOrx85Zd9k9liz5 yeSx4YCnx+zX11k9Nl2+w+hxuXcrq8fGX4tZPFr6L7IEcEZx2aSk5mSWpRbp2yVwZaxquMZU cIC74ualTpYGxnmcXYycHBICJhLzJz9ggrDFJC7cW8/WxcjFISRwlFGiq7mBBcJZzijRs/wm kMPBwSagJXH5qSNIg4iAqsSTnWvBapgF7jBJXN76nxEkISxgJvHq4gtmiCJziR33b7FC2GES f6ZsB6thAWq+9WQuWJxXwFfi3uyfYPVCAh8YJc5/9gGxOQUcJa48bGcHsRmBrvt+ag3YpcwC 4kC986GuFpBYsuc8M4QtKvHy8T9WCFtJYtLSc6wQ9ToSC3Z/YoOwtSWWLXzNDLFXUOLkzCcs ExjFZiEZOwtJyywkLbOQtCxgZFnFyFFanFqWm25kuIkRGLHHJNgcdzAu+GR5iFGAg1GJhzdB TCVMiDWxrLgy9xCjNAeLkjjvvBn3Q4UE0hNLUrNTUwtSi+KLSnNSiw8xMnFwSjUwLl6mHbLh 7++flzQPf8lW1viqrnx/cslU7+lH1mvz7Pn+3ZHP96xjfbDQ37h/Mie1219ViMxw9ouUy/jv xy347sSUDWIij/cK9z16Xm2x68Nrs2c3rq1YZ383pvqUeJbNtA3z0xWNBat+Pz//ZPHC5b5W exbr2G47UiC2XP9cttNxUcObx24eva/EUpyRaKjFXFScCABE310vuQIAAA== Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , "alex@cisco.com" , "j.schoenwaelder@jacobs-university.de" , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 20:41:44 -0000 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com] > Sent: Monday, October 19, 2015 4:28 PM > To: Xufeng Liu > Cc: j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; i2rs@ietf.org; > alex@cisco.com; andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Xufeng Liu wrote: > > > > > -----Original Message----- > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Juergen > > > Schoenwaelder > > > Sent: Monday, October 19, 2015 3:41 PM > > > To: Xufeng Liu > > > Cc: lhotka@nic.cz; i2rs@ietf.org; Martin Bjorklund; Alexander Clemm > > > (alex); andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > > > shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > On Mon, Oct 19, 2015 at 07:08:01PM +0000, Xufeng Liu wrote: > > > > Hi Martin and Alex, > > > > > > > > Some of such objects might not be changeable, no matter what > > > > access right > > > that the client has. Such non-changeable objects are derived from > > > other objects in the system. > > > > > > > > > > This sounds remarkably like operational state... > > > > [Xufeng] But configuration objects can be built on top of these. >=20 > What does this mean? [Xufeng] The client may need to configure some other objects that have refe= rences to these derived objects. >=20 >=20 > /martin From nobody Mon Oct 19 14:42:54 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39F1E1ACE45 for ; Mon, 19 Oct 2015 14:42:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d7qLCgAD92Ny for ; Mon, 19 Oct 2015 14:42:51 -0700 (PDT) Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCD231ACD81 for ; Mon, 19 Oct 2015 14:42:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6965; q=dns/txt; s=iport; t=1445290970; x=1446500570; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=vtfVuel9lMSRcJJIqFiSdtos4+W+Xk/tSlQxIq5DsFA=; b=Qb4vgDdTwN3csA32a7X3YoTsPYVyHc9wWD4xt96hIEhSErFmbX9tRzAu VMwLl2H/U6/Vu96Wm3YeIAgI3L1F1bVr0gX29RwzfFVCZA9ujBeKSvGKp 15QcGysI8f70gpk7JdvNetpOq4o8A66zoSVKCwsYT/C4W+tmm212cNiiI U=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D9AQC8YiVW/5FdJa1bA4M2VG8GvgoBDYFaHYYBAoE9OBQBAQEBAQEBgQqELQEBAQMBOjIGBAMFBwICAgEIDgIBBAEBAR4JBxsGERQJCAIEDgUIE4gAAwoIv2kNhH4BAQEBAQEBAQEBAQEBAQEBAQEBAQEYBItxglCBWhEBBjsQBwYMhBwFjRKJEQGHQ4NkgW6BX4Q8jjqDW4NuAR8BAUKEA3KEJzqBBgEBAQ X-IronPort-AV: E=Sophos;i="5.17,704,1437436800"; d="scan'208";a="38978635" Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-4.cisco.com with ESMTP; 19 Oct 2015 21:42:49 +0000 Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by rcdn-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id t9JLgnUG027425 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 19 Oct 2015 21:42:49 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 19 Oct 2015 16:42:31 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Mon, 19 Oct 2015 16:42:31 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AdD8mZtMK+5wN+PKRMK6Tyi1tCuIrQF84GqAABKj0ZABGXR2AAAWwBKgAIfBSAAAN4ZCEAAPHmMAAAoP1rA= Date: Mon, 19 Oct 2015 21:42:31 +0000 Message-ID: <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019195558.GB81648@elstar.local> In-Reply-To: <20151019195558.GB81648@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.188] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 21:42:53 -0000 Hello Juergen, can you please explain what you mean by name bindings? YANG does not provi= de support for name bindings (at least not a la GDMO). =20 Looking at RFC 7223, I can see the distinction between interface-ref and in= terface-state-ref. There certainly is an analogy between interfaces and to= pology, and the discussion section 3.1 of RFC 7223 and the discussion here.= Still, the interfaces model is different and follows different requiremen= ts/patterns that don't make it directly applicable. Layering etc are not i= ncluded as part of the base model, but supported via a design pattern where= it is added as part of augmentation specific to a given interface type, an= d being specific which type of interface to reference. I don't see anythin= g describing the analogy of having a (configured) set of data - e.g. a (con= figured) topology with a (configured) set of nodes, links, etc - and allowi= ng the items in this to refer to e.g. a (server-provided) topology. =20 In your email, you state "Translated to your domain, I can configure an ove= rlay that refers by name to other layers. If those layers do not operationa= lly exist, the overlay will exist in config but not in the operational stat= e tree". How would this work? With "refer by name" you don't mean an actu= al reference, you mean use "refer by name" to refer to data that is operati= onal state. In other words, you are punting the problem and leave it to th= e user and implementation to deal with it. Instead of using e.g. an actual= reference, you are using simply a string. The concern is that when using = a reference, a framework might have problems ensuring referential integrity= in case the referred object goes away etc - but this solution does not add= ress the concern, it simply pushes it to somewhere else. =20 At the same time, you do now have two parallel trees, providing additional = complexity as outlined earlier, specifically if we want to be able to expre= ss some of the integrity constraints (supporting nodes of a node have to be= part of a supporting topology, etc). Well, perhaps we no longer need to b= e concerned about these, since we are pushing this problem to the user anyw= ay. However, I am not sure why we would trust users to deal with all those= integrity problems, but not trust them e.g. with a "server-provided" attri= bute. Additional complexity in the model would be fine if it resulted in a= gain, but I don't think this would be the case - to the contrary. Introdu= cing what you call a "fence" instead seems to be the preferrable solution. = The ability to support this could be indicated by a feature, if that helps= . =20 --- Alex -----Original Message----- From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]=20 Sent: Monday, October 19, 2015 12:56 PM To: Alexander Clemm (alex) Cc: Andy Bierman ; i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka ; 'Alia Atlas' ; 'Jeffrey Haas' ; Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) On Mon, Oct 19, 2015 at 06:24:10PM +0000, Alexander Clemm (alex) wrote: > Hi Juergen, >=20 > I think one of the key statements you make below is this: > " Recall also that YANG does not allow configuration data to depend on st= ate data." >=20 > Note that this is not the case in the current model. The current model i= s essentially all configuration data. Of course, we have this flag to indi= cate who supplied that data (and is hence maintaining it). =20 > I expect that config true objects can be modified by clients. And I expect = that client maintained config true objects do not depend on server provided= operational state. The 'server-provided' leaf seems to 'overrule' both pri= nciples. > You argue that we should instead "split" the model and introduce operatio= nal data to reflect what is populated by the server. However, doing that i= ntroduces precisely new issues - and you have just brought another argument= why this may be a bad idea and may not even work. Topologies _are_ layere= d, and we need to be able to express that in the model. Now, if we have a = topology that is server-provided, hence (per your statement) to be represen= ted by operational data only, how do we build an overlay topology that is "= configured" on top of it? If the answer is "we can't, unless we replicate = the server-provided topology into the network configuration (which makes no= sense)", we are screwed. Now, we might build it on top if we remove all r= eferences / dependencies on the underlay from the model and punt the proble= m to the user. Basically, no longer have the model express vertical relati= onships. Not a good solution, IMHO. > How do you suggest we address this? The ability to express layering rela= tionships between topologies, including cases where topologies originate fr= om different sources (discovered/server-provided vs configured), is a requi= rement. It is not an artefact of our model, it is something that we need t= o capture as part of the model. There may not be a "nice" way of doing thi= s within the YANG framework, yet it is important that we find a way to do t= his. The current solution to this - having the model as configuration data= , and including a parameter to indicate who supplies the data and is mainta= ining it - appears to be cleanest and clearest solution (or perhaps the "le= ast bad") that results in the model of least complexity. In the interfaces model, this problem got solved via name bindings. I can c= onfigure an interface but as long as the matching interface is not present,= the config won't be applied to the interface. Translated to your domain, I= can configure an overlay that refers by name to other layers. If those lay= ers do not operationally exist, the overlay will exist in config but not in= the operational state tree. > Perhaps there is something we can simply change about the "server-provide= d" object to address your concerns? We can make it config (to address your= issue that triggered this, the presence of a r/o object in a tree that is = otherwise r/w). You can address my concern by doing away with 'server-provided' and by prop= erly separating config from operational state. ;-) Assuming proper authoriz= ation, a NC/RC client should be able to change any object in a configuratio= n datastore. I am concerned about data model specific 'fences' that indicat= e that some portions of a configuration datastore are behaving in special w= ays. /js --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 19 14:57:38 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39FAF1B2D03 for ; Mon, 19 Oct 2015 14:57:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tcilrzTst34B for ; Mon, 19 Oct 2015 14:57:33 -0700 (PDT) Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A5761B2D43 for ; Mon, 19 Oct 2015 14:57:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14502; q=dns/txt; s=iport; t=1445291845; x=1446501445; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=vX53J2aJym9IfeK5waQhDz4uemSvBnu4GX7wejeGDfY=; b=dY01iTM9IpeentxnhzuaNlhID73JRm4Ra5nNYgOSNkZCen95XvknDUkD PphsVzVElaCPffH2GQEJlhlTmkBvzJugONq9wCzMjPE/YK+kMQBRrtdHH Z4hQpSUgLD6tjMlaqgykFGnvjJ0uFi7ksVNZOEYp47DyRPrEq8X+IRnqo g=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D+AQAYZiVW/51dJa1bA4M2VG8GvgoBDYFaFwqFfQKBPTgUAQEBAQEBAYEKhC0BAQEEAQEBNzQEBwwCAgIBCA4CAQQBAQEVCQkHGwYGCxQJCAIEDgUIE4gAAxINv1sNhH4BAQEBAQEBAQEBAQEBAQEBAQEBAQEYBItxglCBciAbEAcCBAQIhBwFh0aGfIdhAYdDg2SBboFfhDyDJIsWg1uDbgEfAQFCghEdgVVyhCAlHIEGAQEB X-IronPort-AV: E=Sophos;i="5.17,704,1437436800"; d="scan'208";a="37168470" Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-8.cisco.com with ESMTP; 19 Oct 2015 21:57:24 +0000 Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id t9JLvO1O001035 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 19 Oct 2015 21:57:24 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 19 Oct 2015 16:57:06 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Mon, 19 Oct 2015 16:57:06 -0500 From: "Alexander Clemm (alex)" To: Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpv6tndvtjjPSkap4v4Aq5RqqJ5zI1yggAB0L4D//8MXQA== Date: Mon, 19 Oct 2015 21:57:05 +0000 Message-ID: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> References: <20151019.203216.710736168596706388.mbj@tail-f.com> <20151019.222645.2143496104887007825.mbj@tail-f.com> In-Reply-To: <20151019.222645.2143496104887007825.mbj@tail-f.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.204.188] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , "j.schoenwaelder@jacobs-university.de" , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Oct 2015 21:57:36 -0000 Hi Martin, "So how is the server-provided leaf supposed to be implemented, and how is = it supposed to be used?" When a network topology is populated by the server, the server-provided lea= f is supposed to be set to true. When a network topology is populated by a client app (through "regular" con= figuration), the server provided leaf is supposed to be set to false. =20 For any given network topology, when the corresponding "server-provided" le= af is set to "true", attempts to edit the configuration of that topology ar= e to be rejected. =20 Alternatives to the current design include making the leaf "config true", o= r moving it outside (just this leaf) for a list that indicates for each top= ology whether it is server-provided or not (in a separate "state" branch). = =20 --- Alex -----Original Message----- From: Martin Bjorklund [mailto:mbj@tail-f.com]=20 Sent: Monday, October 19, 2015 1:27 PM To: Alexander Clemm (alex) Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; and= y@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) "Alexander Clemm (alex)" wrote: > Hi Martin, >=20 > One model for the data that is server-provided is to assume an app=20 > (which could be embedded on the same server) that knows how to=20 > discover the network, then populates the data accordingly. >=20 > [Of course, we would not want any random client app just being able to=20 > "mess" with that data. The expectation is generally clearly access to=20 > this will be restricted / controlled. The topology instances that=20 > were populated by the "server-provided app" should not be "touched" by=20 > other apps - it is the "server-provided" app that is responsible for=20 > maintaining them.] >=20 > So I assume the answer to your question is "yes", but with a bunch of=20 > caveats. So how is the server-provided leaf supposed to be implemented, and how is i= t supposed to be used? /martin > --- Alex >=20 >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin=20 > Bjorklund > Sent: Monday, October 19, 2015 11:32 AM > To: Alexander Clemm (alex) > Cc: andy@yumaworks.com; i2rs@ietf.org;=20 > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz;=20 > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Alex, >=20 > Is the idea that the server-provided data is normal config? I.e., if=20 > the server wants to modify this data it behaves like a normal client? > (conceptually...) And the server-provided data can be modified by=20 > anyone with proper access rights? >=20 >=20 > /martin >=20 >=20 >=20 > "Alexander Clemm (alex)" wrote: > > Hi Juergen, > >=20 > > I think one of the key statements you make below is this: > > " Recall also that YANG does not allow configuration data to depend=20 > > on state data." > >=20 > > Note that this is not the case in the current model. The current=20 > > model is essentially all configuration data. Of course, we have=20 > > this flag to indicate who supplied that data (and is hence maintaining = it). > >=20 > > You argue that we should instead "split" the model and introduce=20 > > operational data to reflect what is populated by the server. =20 > > However, doing that introduces precisely new issues - and you have=20 > > just brought another argument why this may be a bad idea and may not ev= en work. > > Topologies _are_ layered, and we need to be able to express that in=20 > > the model. Now, if we have a topology that is server-provided,=20 > > hence (per your statement) to be represented by operational data=20 > > only, how do we build an overlay topology that is "configured" on=20 > > top of it? If the answer is "we can't, unless we replicate the=20 > > server-provided topology into the network configuration (which makes=20 > > no sense)", we are screwed. Now, we might build it on top if we=20 > > remove all references / dependencies on the underlay from the model=20 > > and punt the problem to the user. Basically, no longer have the=20 > > model express vertical relationships. Not a good solution, IMHO. > >=20 > > How do you suggest we address this? The ability to express layering=20 > > relationships between topologies, including cases where topologies=20 > > originate from different sources (discovered/server-provided vs=20 > > configured), is a requirement. It is not an artefact of our model,=20 > > it is something that we need to capture as part of the model. There=20 > > may not be a "nice" way of doing this within the YANG framework, yet=20 > > it is important that we find a way to do this. The current solution=20 > > to this > > - having the model as configuration data, and including a parameter=20 > > to indicate who supplies the data and is maintaining it - appears to=20 > > be cleanest and clearest solution (or perhaps the "least bad") that=20 > > results in the model of least complexity. > >=20 > > Perhaps there is something we can simply change about the=20 > > "server-provided" object to address your concerns? We can make it=20 > > config (to address your issue that triggered this, the presence of a=20 > > r/o object in a tree that is otherwise r/w). > >=20 > > Thoughts? > > --- Alex > >=20 > >=20 > >=20 > > -----Original Message----- > > From: Juergen Schoenwaelder > > [mailto:j.schoenwaelder@jacobs-university.de] > > Sent: Sunday, October 18, 2015 3:13 AM > > To: Alexander Clemm (alex) > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund=20 > > ; Andy Bierman ; 'Alia Atlas' > > ; 'Jeffrey Haas' ; Susan Hares=20 > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > >=20 > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > wrote: > > > Hello Juergen, > > >=20 > > > responses inline, delimited with > > >=20 > > > --- Alex > > >=20 > > > -----Original Message----- > > > From: Juergen Schoenwaelder > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > To: Alexander Clemm (alex) > > > Cc: Susan Hares ; Andy Bierman=20 > > > ; i2rs@ietf.org; Martin Bjorklund=20 > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > ; 'Jeffrey Haas' > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > >=20 > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > wrote: > > > >=20 > > > > The only item in the topology that is read-only concerns the=20 > > > > "server-provided" flag, but this concerns a separate issue that=20 > > > > was also discussed (I am not sure if this is what you are=20 > > > > referring to). > > > > It is analogous to the other discussion concerning=20 > > > > distinguishing configuration that has been intended, versus one=20 > > > > that is in effect etc . This concerns the issue that some=20 > > > > topologies are populated by the server whereas some topologies=20 > > > > can be populated by client applications. > > >=20 > > > Yes, this is what the concern is about. > > >=20 > > > > We have had discussions in the past whether to "split this up",=20 > > > > having a (rw) branch to populate "intended" topologies and a=20 > > > > (ro) branch for topologies "in effect". > > >=20 > > > This is the normal way to do this in YANG. And this goes back to=20 > > > what was driving us for years, namely to clearly separate config=20 > > > from state. This module makes this distinction a runtime property=20 > > > controlled by a data model specific mechanism. None of the generic=20 > > > tools out there will be able to understand this. > > >=20 > > > > > > I think the issue is more related to the current discussion with=20 > > > regards to openconfig and "intended configuration" and "applied=20 > > > configuration". If YANG had an existing solution for this, we=20 > > > would not have this discussion. The reason I believe this is=20 > > > similar is that you can view the "applied configuration" as the=20 > > > "server-provided configuration" (network topology, in our case),=20 > > > and the "intended configuration" as the, well, configured or=20 > > > intended network topology in our case. That said, the issue is=20 > > > not identical > > > - whereas in the openconfig case every "applied configuration" has=20 > > > an accompanying "intended configuration", in our case this is not=20 > > > necessarily the case > > > - you can have "applied" [network topologies] that were provided=20 > > > by the server / the network itself, not configured by anybody. > > > > >=20 > > I think this has nothing to do with intended or applied config. Your=20 > > 'server supplied topology' appears to me to be operational state and=20 > > not configuration data. > > =20 > > > > We decided against it for various reasons - every piece of=20 > > > > information would essentially be duplicated inside the model=20 > > > > (this is not your normal config vs oper data distinction, but=20 > > > > would essentially reflect a limitation of the framework),=20 > > > > leading to unnecessary additional complexity in the model (every=20 > > > > augmentation has to be conducted in two places), more complex=20 > > > > validation rules, etc. > > >=20 > > > I do not understand why this is not a normal config vs oper data=20 > > > distinction. Please explain. > > >=20 > > > > > > A normal distinction would be e.g. the type of model we have in=20 > > > RFC > > > 7233 - separate trees with distinct data, some clearly part of=20 > > > configuration, other clearly operational data. > > > In this case, this is different. You have the same data. =20 > > > However, in some cases it is populated by a client, in other cases=20 > > > by the server. > > > YANG requires the categorization of data as config false or true. =20 > > > In this case, this categorization does not always apply - or, the=20 > > > categorization depends on the particular instance. > > > > >=20 > > So you have operational state which is partially populated by the=20 > > server and partially populated from config. I fail to see how this=20 > > is any different from other cases, including network interfaces as=20 > > defined in RFC 7233. Recall also that YANG does not allow=20 > > configuration data to depend on state data. > >=20 > > > I do not understand how this leads to more complex validation rules. > > > Please explain. > > >=20 > > > > > >=20 > > > One example concerns the supporting nodes/links/TPs. =20 > > >=20 > > > We want to be able to express that, for example, a node in one=20 > > > network is supported by a node in an underlay network. For this=20 > > > purpose, we are referencing a node in another (underlay) network. > > > So that we cannot reference an arbitrary node in an arbitrary=20 > > > network, we want to make sure that the supporting node is part of=20 > > > a "supporting-network" > > > of the same network. > > >=20 > > > Currently, we have the following definition: > > >=20 > > > list supporting-node { > > > key "network-ref node-ref"; > > > description > > > "Represents another node, in an underlay network, that=20 > > > this node is supported by. Used to represent layering=20 > > > structure."; > > > leaf network-ref { > > > type leafref { > > > path "../../../supporting-network/network-ref"; > > > } > > > description > > > "References the underlay network that the=20 > > > underlay node is part of."; > > > } > > > leaf node-ref { > > > type leafref { > > > path "/network/node/node-id"; > > > } > > > description > > > "References the underlay node itself."; > > > } > > / > > > } > > >=20 > > >=20 > > > If we were to split the model, when we configure a node, we will=20 > > > have to account for the fact that the supporting node could be=20 > > > either part of a "configured" network itself, or of a network that=20 > > > has been "server-provided". That is, we need to be able to allow=20 > > > for both possibilities. > >=20 > > Again note that YANG requires that configuration data does not=20 > > depend on state data. You seem to be breaking this rule, no? > >=20 > > > To do this, we would no longer be able to have the network-ref to=20 > > > be part of the key for supporting-node - we would have to replace=20 > > > network-ref with a choice of two nodes that reference either a=20 > > > server-provided network ("branch 1"), or a configured network=20 > > > ("branch 2"). As a result, we will have to introduce a separate=20 > > > way to reference elements in list supporting-node. All of this=20 > > > results in considerable additional complexity. Or do you see an easi= er way? > > >=20 > > > > >=20 > > I do not think this is the solution. YANG requires that constraints=20 > > on config true nodes can only refer to other config true nodes in=20 > > the datastore where the node with the constraint exists. See section=20 > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9 says=20 > > that a leafref may only point to configuration. I believe this I-D=20 > > is violating the distinction between configuration and state data. > >=20 > > /js > >=20 > > --=20 > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > Fax: +49 421 200 3103 > >=20 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 From nobody Mon Oct 19 21:28:16 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B88381B2B1C for ; Mon, 19 Oct 2015 21:28:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.009 X-Spam-Level: X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, MALFORMED_FREEMAIL=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wv_3G6gw168Z for ; Mon, 19 Oct 2015 21:28:13 -0700 (PDT) Received: from nm1-vm1.bullet.mail.gq1.yahoo.com (nm1-vm1.bullet.mail.gq1.yahoo.com [98.136.218.80]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3D351A1A62 for ; Mon, 19 Oct 2015 21:28:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1445315291; bh=29Aea7bexmlw0FQrJj1j8cCDbuvqqA1KfspPZasR3T0=; h=Date:Subject:From:To:References:In-Reply-To:From:Subject; b=tlBc53Gv1qwJsadjtTHUV53h+N+IBzRQiF4tfTHuUp73LjV1u4Gz87gy2EsvuLap0Kpfgzo+SmRs8uf0NvkDSoOLk43MrX7tZrkMTcEeJ1Z44NX46RdZ069HZPkHP7SdWKuXPoNPZmcqJBhSi0Xj5XFe5UdImYRJUEPHZ+wFUUcWPksiBpsA1b6Y7T2Lo5zivr7AlX7pGKzxpIMuIFHU+KmpxyjfX+dl2UKi6zCIqeCvrreZQcC/1T/E7PULPb/aqEjuDd7SsbNfhcbhm5tTV18Z3/XNlAVFmlu3sVKRPz0dBQ+atRCnzASTySxEkJ0G6+1fyPwJlsNDr2Xmv1IW7A== Received: from [98.137.12.55] by nm1.bullet.mail.gq1.yahoo.com with NNFMP; 20 Oct 2015 04:28:11 -0000 Received: from [208.71.42.200] by tm15.bullet.mail.gq1.yahoo.com with NNFMP; 20 Oct 2015 04:28:11 -0000 Received: from [127.0.0.1] by smtp211.mail.gq1.yahoo.com with NNFMP; 20 Oct 2015 04:28:11 -0000 X-Yahoo-Newman-Id: 760974.92451.bm@smtp211.mail.gq1.yahoo.com X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: jHI8N5gVM1nf14RYbOUis6NaSgSwZxTuFgpFeVfuPEeaiUp 0YRLxMIjXV.6ml6lkOgfcz6Usn4RhXi64FkdGW95qwrx_nywQ0qhJNcSv7Ii XhA3P490j7_mzutKAxBLIBM5uHndRa8zyZTv0NUPIU1qxXIgKJMCYFcfKrm6 bXuXZw1UQYbc6qJTlw1DAC23WlrUJw4nf9FhDFVjjXsEPbat8s93rZly.orY eLYMJ8OR_UXDSnh1wV6MhsrE.Q67dGRfZaBak_VznOehR6C06rhNwNHFbc.r cd2fmMakFbrtVyZCunuHa1Qpqk.TH_GVkig4ylG_CFpVZUBjWEo0RAK2Ryn3 s8RjWDoB0X5R8ik5JXga9jO6kkiQDWml_bGNR787T.7U7tETbALYJRMREKBG L5HkSGaZtJN4SR3EwVIAMGfmMObQDErRhCziGsWoZbIs6fOHkpMDq825oYtq RDwOWzqrkVkZw2mg.Ny5RKZMbq7iYo3G4tulMZPkegxXnHEaMP9lHYertbzm XlYf.KxePppBhCEBe0MfSSq5T0C77QDyhKTE- X-Yahoo-SMTP: jU6Na92swBBdqSRkLOL9Cp_LhHZgQAQoL10- User-Agent: Microsoft-MacOutlook/14.4.4.140807 Date: Mon, 19 Oct 2015 21:28:04 -0700 From: Nitin Bahadur To: Message-ID: Thread-Topic: [i2rs] I-D Action: draft-ietf-i2rs-rib-info-model-08.txt References: <20151019183622.19810.47958.idtracker@ietfa.amsl.com> In-Reply-To: <20151019183622.19810.47958.idtracker@ietfa.amsl.com> Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Archived-At: Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-rib-info-model-08.txt X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Oct 2015 04:28:14 -0000 This change addresses all the (currently) raised issues on the mailing list as part of the LC. More specifically: - Simplifies the nexthop grammar, making programming of simple nexthops more straight-forward - Added more clarifying text around chain nexthops Thanks Nitin On 10/19/15, 11:36 AM, "internet-drafts@ietf.org" wrote: > >A New Internet-Draft is available from the on-line Internet-Drafts >directories. > This draft is a work item of the Interface to the Routing System Working >Group of the IETF. > > Title : Routing Information Base Info Model > Authors : Nitin Bahadur > Sriganesh Kini > Jan Medved > Filename : draft-ietf-i2rs-rib-info-model-08.txt > Pages : 25 > Date : 2015-10-19 > >Abstract: > Routing and routing functions in enterprise and carrier networks are > typically performed by network devices (routers and switches) using a > routing information base (RIB). Protocols and configuration push > data into the RIB and the RIB manager installs state into the > hardware; for packet forwarding. This draft specifies an information > model for the RIB to enable defining a standardized data model. Such > a data model can be used to define an interface to the RIB from an > entity that may even be external to the network device. This > interface can be used to support new use-cases being defined by the > IETF I2RS WG. > > >The IETF datatracker status page for this draft is: >https://datatracker.ietf.org/doc/draft-ietf-i2rs-rib-info-model/ > >There's also a htmlized version available at: >https://tools.ietf.org/html/draft-ietf-i2rs-rib-info-model-08 > >A diff from the previous version is available at: >https://www.ietf.org/rfcdiff?url2=draft-ietf-i2rs-rib-info-model-08 > > >Please note that it may take a couple of minutes from the time of >submission >until the htmlized version and diff are available at tools.ietf.org. > >Internet-Drafts are also available by anonymous FTP at: >ftp://ftp.ietf.org/internet-drafts/ > >_______________________________________________ >i2rs mailing list >i2rs@ietf.org >https://www.ietf.org/mailman/listinfo/i2rs From nobody Mon Oct 19 23:00:33 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36C4D1A1A4D for ; Mon, 19 Oct 2015 23:00:32 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nngRamJcjXR5 for ; Mon, 19 Oct 2015 23:00:26 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 65E3E1A1A3C for ; Mon, 19 Oct 2015 23:00:26 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id C65211AE044D; Tue, 20 Oct 2015 08:00:24 +0200 (CEST) Date: Tue, 20 Oct 2015 08:04:26 +0200 (CEST) Message-Id: <20151020.080426.1227842775405864528.mbj@tail-f.com> To: alex@cisco.com From: Martin Bjorklund In-Reply-To: <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> References: <20151019195558.GB81648@elstar.local> <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: lhotka@nic.cz, i2rs@ietf.org, j.schoenwaelder@jacobs-university.de, andy@yumaworks.com, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Oct 2015 06:00:32 -0000 "Alexander Clemm (alex)" wrote: > Hello Juergen, > > can you please explain what you mean by name bindings? YANG does not > provide support for name bindings (at least not a la GDMO). > > Looking at RFC 7223, I can see the distinction between interface-ref > and interface-state-ref. There certainly is an analogy between > interfaces and topology, and the discussion section 3.1 of RFC 7223 > and the discussion here. Still, the interfaces model is different and > follows different requirements/patterns that don't make it directly > applicable. Layering etc are not included as part of the base model, > but supported via a design pattern where it is added as part of > augmentation specific to a given interface type, and being specific > which type of interface to reference. I don't see anything describing > the analogy of having a (configured) set of data - e.g. a (configured) > topology with a (configured) set of nodes, links, etc - and allowing > the items in this to refer to e.g. a (server-provided) topology. > > In your email, you state "Translated to your domain, I can configure > an overlay that refers by name to other layers. If those layers do not > operationally exist, the overlay will exist in config but not in the > operational state tree". How would this work? With "refer by name" > you don't mean an actual reference, you mean use "refer by name" to > refer to data that is operational state. In other words, you are > punting the problem and leave it to the user and implementation to > deal with it. Instead of using e.g. an actual reference, you are > using simply a string. The concern is that when using a reference, a > framework might have problems ensuring referential integrity in case > the referred object goes away etc - but this solution does not address > the concern, it simply pushes it to somewhere else. What happens in your model if a user-defined network has a reference to a server-provided network, and the sever decides to remove its network? I see no special text in your document about this case. /martin > At the same time, you do now have two parallel trees, providing > additional complexity as outlined earlier, specifically if we want to > be able to express some of the integrity constraints (supporting nodes > of a node have to be part of a supporting topology, etc). Well, > perhaps we no longer need to be concerned about these, since we are > pushing this problem to the user anyway. However, I am not sure why > we would trust users to deal with all those integrity problems, but > not trust them e.g. with a "server-provided" attribute. Additional > complexity in the model would be fine if it resulted in a gain, but I > don't think this would be the case - to the contrary. Introducing > what you call a "fence" instead seems to be the preferrable solution. > The ability to support this could be indicated by a feature, if that > helps. > > --- Alex > > -----Original Message----- > From: Juergen Schoenwaelder > [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Monday, October 19, 2015 12:56 PM > To: Alexander Clemm (alex) > Cc: Andy Bierman ; i2rs@ietf.org; Martin Bjorklund > ; Ladislav Lhotka ; 'Alia Atlas' > ; 'Jeffrey Haas' ; Susan Hares > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > On Mon, Oct 19, 2015 at 06:24:10PM +0000, Alexander Clemm (alex) > wrote: > > Hi Juergen, > > > > I think one of the key statements you make below is this: > > " Recall also that YANG does not allow configuration data to depend on > > state data." > > > > Note that this is not the case in the current model. The current > > model is essentially all configuration data. Of course, we have this > > flag to indicate who supplied that data (and is hence maintaining it). > > > > I expect that config true objects can be modified by clients. And I > expect that client maintained config true objects do not depend on > server provided operational state. The 'server-provided' leaf seems to > 'overrule' both principles. > > > You argue that we should instead "split" the model and introduce > > operational data to reflect what is populated by the server. However, > > doing that introduces precisely new issues - and you have just brought > > another argument why this may be a bad idea and may not even work. > > Topologies _are_ layered, and we need to be able to express that in > > the model. Now, if we have a topology that is server-provided, hence > > (per your statement) to be represented by operational data only, how > > do we build an overlay topology that is "configured" on top of it? If > > the answer is "we can't, unless we replicate the server-provided > > topology into the network configuration (which makes no sense)", we > > are screwed. Now, we might build it on top if we remove all > > references / dependencies on the underlay from the model and punt the > > problem to the user. Basically, no longer have the model express > > vertical relationships. Not a good solution, IMHO. > > How do you suggest we address this? The ability to express layering > > relationships between topologies, including cases where topologies > > originate from different sources (discovered/server-provided vs > > configured), is a requirement. It is not an artefact of our model, it > > is something that we need to capture as part of the model. There may > > not be a "nice" way of doing this within the YANG framework, yet it is > > important that we find a way to do this. The current solution to this > > - having the model as configuration data, and including a parameter to > > indicate who supplies the data and is maintaining it - appears to be > > cleanest and clearest solution (or perhaps the "least bad") that > > results in the model of least complexity. > > In the interfaces model, this problem got solved via name bindings. I > can configure an interface but as long as the matching interface is > not present, the config won't be applied to the interface. Translated > to your domain, I can configure an overlay that refers by name to > other layers. If those layers do not operationally exist, the overlay > will exist in config but not in the operational state tree. > > > Perhaps there is something we can simply change about the > > "server-provided" object to address your concerns? We can make it > > config (to address your issue that triggered this, the presence of a > > r/o object in a tree that is otherwise r/w). > > You can address my concern by doing away with 'server-provided' and by > properly separating config from operational state. ;-) Assuming proper > authorization, a NC/RC client should be able to change any object in a > configuration datastore. I am concerned about data model specific > 'fences' that indicate that some portions of a configuration datastore > are behaving in special ways. > > /js > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 > From nobody Mon Oct 19 23:02:51 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84D1B1A1A57 for ; Mon, 19 Oct 2015 23:02:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.911 X-Spam-Level: X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6m8Due34SlVV for ; Mon, 19 Oct 2015 23:02:47 -0700 (PDT) Received: from mail.tail-f.com (mail.tail-f.com [46.21.102.45]) by ietfa.amsl.com (Postfix) with ESMTP id 1C79D1A1A43 for ; Mon, 19 Oct 2015 23:02:47 -0700 (PDT) Received: from localhost (unknown [213.136.39.104]) by mail.tail-f.com (Postfix) with ESMTPSA id 4EC0C1AE044D; Tue, 20 Oct 2015 08:02:46 +0200 (CEST) Date: Tue, 20 Oct 2015 08:06:48 +0200 (CEST) Message-Id: <20151020.080648.1633967998805732790.mbj@tail-f.com> To: alex@cisco.com From: Martin Bjorklund In-Reply-To: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> References: <20151019.222645.2143496104887007825.mbj@tail-f.com> <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Archived-At: Cc: andy@yumaworks.com, i2rs@ietf.org, j.schoenwaelder@jacobs-university.de, lhotka@nic.cz, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Oct 2015 06:02:50 -0000 "Alexander Clemm (alex)" wrote: > Hi Martin, > > "So how is the server-provided leaf supposed to be implemented, and > how is it supposed to be used?" > > When a network topology is populated by the server, the > server-provided leaf is supposed to be set to true. But you earlier wrote that when the server wants to change something it would behave as a normal client. > When a network topology is populated by a client app (through > "regular" configuration), the server provided leaf is supposed to be > set to false. > > For any given network topology, when the corresponding > "server-provided" leaf is set to "true", attempts to edit the > configuration of that topology are to be rejected. This also goes against what you acknowledged previously - "the server-provided data can be modified by anyone with proper access rights" /martin > > Alternatives to the current design include making the leaf "config > true", or moving it outside (just this leaf) for a list that indicates > for each topology whether it is server-provided or not (in a separate > "state" branch). > --- Alex > > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com] > Sent: Monday, October 19, 2015 1:27 PM > To: Alexander Clemm (alex) > Cc: lhotka@nic.cz; i2rs@ietf.org; > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > "Alexander Clemm (alex)" wrote: > > Hi Martin, > > > > One model for the data that is server-provided is to assume an app > > (which could be embedded on the same server) that knows how to > > discover the network, then populates the data accordingly. > > > > [Of course, we would not want any random client app just being able to > > "mess" with that data. The expectation is generally clearly access to > > this will be restricted / controlled. The topology instances that > > were populated by the "server-provided app" should not be "touched" by > > other apps - it is the "server-provided" app that is responsible for > > maintaining them.] > > > > So I assume the answer to your question is "yes", but with a bunch of > > caveats. > > So how is the server-provided leaf supposed to be implemented, and how > is it supposed to be used? > > > /martin > > > > > --- Alex > > > > > > -----Original Message----- > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > > Bjorklund > > Sent: Monday, October 19, 2015 11:32 AM > > To: Alexander Clemm (alex) > > Cc: andy@yumaworks.com; i2rs@ietf.org; > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > Alex, > > > > Is the idea that the server-provided data is normal config? I.e., if > > the server wants to modify this data it behaves like a normal client? > > (conceptually...) And the server-provided data can be modified by > > anyone with proper access rights? > > > > > > /martin > > > > > > > > "Alexander Clemm (alex)" wrote: > > > Hi Juergen, > > > > > > I think one of the key statements you make below is this: > > > " Recall also that YANG does not allow configuration data to depend > > > on state data." > > > > > > Note that this is not the case in the current model. The current > > > model is essentially all configuration data. Of course, we have > > > this flag to indicate who supplied that data (and is hence maintaining > > > it). > > > > > > You argue that we should instead "split" the model and introduce > > > operational data to reflect what is populated by the server. > > > However, doing that introduces precisely new issues - and you have > > > just brought another argument why this may be a bad idea and may not > > > even work. > > > Topologies _are_ layered, and we need to be able to express that in > > > the model. Now, if we have a topology that is server-provided, > > > hence (per your statement) to be represented by operational data > > > only, how do we build an overlay topology that is "configured" on > > > top of it? If the answer is "we can't, unless we replicate the > > > server-provided topology into the network configuration (which makes > > > no sense)", we are screwed. Now, we might build it on top if we > > > remove all references / dependencies on the underlay from the model > > > and punt the problem to the user. Basically, no longer have the > > > model express vertical relationships. Not a good solution, IMHO. > > > > > > How do you suggest we address this? The ability to express layering > > > relationships between topologies, including cases where topologies > > > originate from different sources (discovered/server-provided vs > > > configured), is a requirement. It is not an artefact of our model, > > > it is something that we need to capture as part of the model. There > > > may not be a "nice" way of doing this within the YANG framework, yet > > > it is important that we find a way to do this. The current solution > > > to this > > > - having the model as configuration data, and including a parameter > > > to indicate who supplies the data and is maintaining it - appears to > > > be cleanest and clearest solution (or perhaps the "least bad") that > > > results in the model of least complexity. > > > > > > Perhaps there is something we can simply change about the > > > "server-provided" object to address your concerns? We can make it > > > config (to address your issue that triggered this, the presence of a > > > r/o object in a tree that is otherwise r/w). > > > > > > Thoughts? > > > --- Alex > > > > > > > > > > > > -----Original Message----- > > > From: Juergen Schoenwaelder > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > Sent: Sunday, October 18, 2015 3:13 AM > > > To: Alexander Clemm (alex) > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin Bjorklund > > > ; Andy Bierman ; 'Alia Atlas' > > > ; 'Jeffrey Haas' ; Susan Hares > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > > wrote: > > > > Hello Juergen, > > > > > > > > responses inline, delimited with > > > > > > > > --- Alex > > > > > > > > -----Original Message----- > > > > From: Juergen Schoenwaelder > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > To: Alexander Clemm (alex) > > > > Cc: Susan Hares ; Andy Bierman > > > > ; i2rs@ietf.org; Martin Bjorklund > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > > ; 'Jeffrey Haas' > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm (alex) > > > > wrote: > > > > > > > > > > The only item in the topology that is read-only concerns the > > > > > "server-provided" flag, but this concerns a separate issue that > > > > > was also discussed (I am not sure if this is what you are > > > > > referring to). > > > > > It is analogous to the other discussion concerning > > > > > distinguishing configuration that has been intended, versus one > > > > > that is in effect etc . This concerns the issue that some > > > > > topologies are populated by the server whereas some topologies > > > > > can be populated by client applications. > > > > > > > > Yes, this is what the concern is about. > > > > > > > > > We have had discussions in the past whether to "split this up", > > > > > having a (rw) branch to populate "intended" topologies and a > > > > > (ro) branch for topologies "in effect". > > > > > > > > This is the normal way to do this in YANG. And this goes back to > > > > what was driving us for years, namely to clearly separate config > > > > from state. This module makes this distinction a runtime property > > > > controlled by a data model specific mechanism. None of the generic > > > > tools out there will be able to understand this. > > > > > > > > > > > > I think the issue is more related to the current discussion with > > > > regards to openconfig and "intended configuration" and "applied > > > > configuration". If YANG had an existing solution for this, we > > > > would not have this discussion. The reason I believe this is > > > > similar is that you can view the "applied configuration" as the > > > > "server-provided configuration" (network topology, in our case), > > > > and the "intended configuration" as the, well, configured or > > > > intended network topology in our case. That said, the issue is > > > > not identical > > > > - whereas in the openconfig case every "applied configuration" has > > > > an accompanying "intended configuration", in our case this is not > > > > necessarily the case > > > > - you can have "applied" [network topologies] that were provided > > > > by the server / the network itself, not configured by anybody. > > > > > > > > > > I think this has nothing to do with intended or applied config. Your > > > 'server supplied topology' appears to me to be operational state and > > > not configuration data. > > > > > > > > We decided against it for various reasons - every piece of > > > > > information would essentially be duplicated inside the model > > > > > (this is not your normal config vs oper data distinction, but > > > > > would essentially reflect a limitation of the framework), > > > > > leading to unnecessary additional complexity in the model (every > > > > > augmentation has to be conducted in two places), more complex > > > > > validation rules, etc. > > > > > > > > I do not understand why this is not a normal config vs oper data > > > > distinction. Please explain. > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have in > > > > RFC > > > > 7233 - separate trees with distinct data, some clearly part of > > > > configuration, other clearly operational data. > > > > In this case, this is different. You have the same data. > > > > However, in some cases it is populated by a client, in other cases > > > > by the server. > > > > YANG requires the categorization of data as config false or true. > > > > In this case, this categorization does not always apply - or, the > > > > categorization depends on the particular instance. > > > > > > > > > > So you have operational state which is partially populated by the > > > server and partially populated from config. I fail to see how this > > > is any different from other cases, including network interfaces as > > > defined in RFC 7233. Recall also that YANG does not allow > > > configuration data to depend on state data. > > > > > > > I do not understand how this leads to more complex validation rules. > > > > Please explain. > > > > > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > > > We want to be able to express that, for example, a node in one > > > > network is supported by a node in an underlay network. For this > > > > purpose, we are referencing a node in another (underlay) network. > > > > So that we cannot reference an arbitrary node in an arbitrary > > > > network, we want to make sure that the supporting node is part of > > > > a "supporting-network" > > > > of the same network. > > > > > > > > Currently, we have the following definition: > > > > > > > > list supporting-node { > > > > key "network-ref node-ref"; > > > > description > > > > "Represents another node, in an underlay network, that > > > > this node is supported by. Used to represent layering > > > > structure."; > > > > leaf network-ref { > > > > type leafref { > > > > path "../../../supporting-network/network-ref"; > > > > } > > > > description > > > > "References the underlay network that the > > > > underlay node is part of."; > > > > } > > > > leaf node-ref { > > > > type leafref { > > > > path "/network/node/node-id"; > > > > } > > > > description > > > > "References the underlay node itself."; > > > > } > > > / > > > > } > > > > > > > > > > > > If we were to split the model, when we configure a node, we will > > > > have to account for the fact that the supporting node could be > > > > either part of a "configured" network itself, or of a network that > > > > has been "server-provided". That is, we need to be able to allow > > > > for both possibilities. > > > > > > Again note that YANG requires that configuration data does not > > > depend on state data. You seem to be breaking this rule, no? > > > > > > > To do this, we would no longer be able to have the network-ref to > > > > be part of the key for supporting-node - we would have to replace > > > > network-ref with a choice of two nodes that reference either a > > > > server-provided network ("branch 1"), or a configured network > > > > ("branch 2"). As a result, we will have to introduce a separate > > > > way to reference elements in list supporting-node. All of this > > > > results in considerable additional complexity. Or do you see an > > > > easier way? > > > > > > > > > > > > > > I do not think this is the solution. YANG requires that constraints > > > on config true nodes can only refer to other config true nodes in > > > the datastore where the node with the constraint exists. See section > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9 says > > > that a leafref may only point to configuration. I believe this I-D > > > is violating the distinction between configuration and state data. > > > > > > /js > > > > > > -- > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > > Fax: +49 421 200 3103 > > > > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > > > _______________________________________________ > > i2rs mailing list > > i2rs@ietf.org > > https://www.ietf.org/mailman/listinfo/i2rs > > > From nobody Tue Oct 20 10:42:24 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C4E91ACDB7 for ; Tue, 20 Oct 2015 10:42:23 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Et9yd7nO4xFL for ; Tue, 20 Oct 2015 10:42:22 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 007FF1ACDBC for ; Tue, 20 Oct 2015 10:41:30 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.139; From: "Susan Hares" To: Date: Tue, 20 Oct 2015 13:41:30 -0400 Message-ID: <023a01d10b5e$8e32a490$aa97edb0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_023B_01D10B3D.0722D950" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdELXjgDKXOUNjFbTEC1FC+RZTOIwg== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: [i2rs] I2RS interim on October 21, 2015 at 10:00am - 12:00pm ET - Agenda and Web-ex info X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Oct 2015 17:42:23 -0000 This is a multipart message in MIME format. ------=_NextPart_000_023B_01D10B3D.0722D950 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit I2RS Interim Date: 10/21/2015 Time: 10:00am - 12:00pm ET I2RS Hackathon Plans [10:00-10:05] I2RS WG LC on Data Modules [10:05-10:20] - Topology Feedback/Changes [Alexander Clemm, 5 minutes] - RIB Feedback/Changes [Sue Hares, 5 minutes] - Discussion: 10 minutes I2RS Hackathon Plans [10:20-10:25] [Sue Hares ] I2RS WG LC Requirements [10:25-10:30] - Feedback Summary [Sue Hares, 5 minutes] I2RS WG Protocol: Initial Thoughts [10:30-11:00] - Protocol Overview [10:30 - 10:45] Sue Hares, Kent Watsen, Andy Bierman - Protocol Examples [10:45- 11:00] 1) I2RS Protocol Independent (RIB, Topology, FB-RIB) 2) BGP, OSPF Discussion [11:00 - 12:00pm ] Web-ex information: Join WebEx meeting https://ietf.webex.com/ietf/j.php?MTID=m7d2c19ef23b22f80144e739ffa59df69 Meeting number: 644 704 791 Meeting password: proto.fun.all Join by phone 1-877-668-4493 Call-in toll free number (US/Canada) 1-650-479-3208 Call-in toll number (US/Canada) Access code: 644 704 791 ------=_NextPart_000_023B_01D10B3D.0722D950 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

I2RS = Interim 

Date: = 10/21/2015 

Time: = 10:00am - 12:00pm ET

 

I2RS = Hackathon Plans [10:00-10:05]

 

I2RS WG LC = on Data Modules [10:05-10:20]

- Topology Feedback/Changes [Alexander Clemm, 5 = minutes] 

 - RIB = Feedback/Changes [Sue Hares, 5 minutes]

 - Discussion: 10 minutes

 

I2RS = Hackathon Plans [10:20-10:25]

  [Sue Hares ]

 

I2RS WG LC = Requirements [10:25-10:30]

  - Feedback Summary [Sue Hares, 5 minutes] =

  

I2RS WG Protocol: Initial Thoughts [10:30-11:00] =

 - = Protocol Overview [10:30 - 10:45]

    Sue Hares, Kent Watsen, Andy Bierman =

     

 - Protocol Examples [10:45- = 11:00]

   1) I2RS Protocol Independent =

   (RIB, Topology, = FB-RIB)

   2) BGP, OSPF

 

 Discussion  [11:00 - 12:00pm = ]

=

 Web-ex information:

 

Join WebEx = meeting

https://ietf.webex.com/ietf/j.php?MTID=3Dm7d2c19ef23b22f801= 44e739ffa59df69

 

Meeting = number:   644 704 791

Meeting password: proto.fun.all

 

Join by = phone

1-877-668-4493 Call-in toll free number = (US/Canada)

1-650-479-3208 Call-in toll number = (US/Canada)

Access = code: 644 704 791

 

=

 

------=_NextPart_000_023B_01D10B3D.0722D950-- From nobody Wed Oct 21 06:27:08 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87A7A1A8712; Wed, 21 Oct 2015 06:27:02 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.59 X-Spam-Level: X-Spam-Status: No, score=0.59 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_14=0.6, T_RP_MATCHES_RCVD=-0.01] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dS6y4aeAu4f3; Wed, 21 Oct 2015 06:27:01 -0700 (PDT) Received: from cappuccino.rob.sh (cappuccino.rob.sh [IPv6:2a03:9800:10:4c::cafe:b00c]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 176051A8711; Wed, 21 Oct 2015 06:26:59 -0700 (PDT) Received: from [2601:681:201:5165:3c38:7adb:87c3:3db8] (helo=piccolo.local) by cappuccino.rob.sh with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1ZotPX-00067T-V5; Wed, 21 Oct 2015 14:26:36 +0100 Date: Wed, 21 Oct 2015 07:26:49 -0600 From: Rob Shakir To: "Acee Lindem (acee)" , Ladislav Lhotka Message-ID: In-Reply-To: References: <7E24547E-B42B-46E2-AF76-F7639D61963F@nic.cz> X-Mailer: Airmail Beta (334) MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="56279299_465d6579_12fd" Archived-At: Cc: Routing YANG , "=?utf-8?Q?i2rs=40ietf.org?=" , NETMOD WG , Routing WG Subject: Re: [i2rs] [netmod] rib-data-model and routing-cfg X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 21 Oct 2015 13:27:02 -0000 --56279299_465d6579_12fd Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Content-Disposition: inline On 15 October 2015 at 15:13:38, Acee Lindem (acee) (acee@cisco.com) wrote: Do we really see associating the same interface with different routing-instances for IPv4 and IPv6? I can seem to remember the use case and it does add complexity forever. At least two of the operators for whom I have worked utilise this functionality (providing separate L3VPNs for IPv6 and IPv4) - so in my experience, it is not possible to make this simplification. r. --56279299_465d6579_12fd Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline

Topic:

I2RS = Interim: I2RS Protocol and Data Models-20151021 1401-1

Create time: =

10/21/15 11:30 am

File size: =

54.77MB

Duration: =

1 hour 23 minutes

Security: =

3D"https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif"&nb= sp; 3D"https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif"&nb= sp;

Description:

Streaming recording = link:

https://ietf.webex.com/ietf/ldr.php?RCID=3D0ae1555= 8e9ebaa1839ee129486e40c9c

Download recording link:

https://ietf.webex.com/ietf/lsr.php?RCID=3D0c9f667= 15e7add010bd352eb245d5540

 

Sue Hares =  

------=_NextPart_001_00F6_01D10F41.E296F590-- ------=_NextPart_000_00F5_01D10F41.E296F590 Content-Type: image/png; name="image001.png" Content-Transfer-Encoding: base64 Content-ID: iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAMAAAAolt3jAAAAAXNSR0ICQMB9xQAAAANQTFRFAAAA p3o92gAAAAF0Uk5TAEDm2GYAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAAZdEVYdFNvZnR3YXJlAE1p Y3Jvc29mdCBPZmZpY2V/7TVxAAAADElEQVQY02NgGG4AAADSAAE9ewGOAAAAAElFTkSuQmCC ------=_NextPart_000_00F5_01D10F41.E296F590-- From nobody Sun Oct 25 15:34:30 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43FBC1B32DA for ; Sun, 25 Oct 2015 15:34:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.91 X-Spam-Level: X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TSWY6dzkXz1P for ; Sun, 25 Oct 2015 15:34:28 -0700 (PDT) Received: from server.riw.us (server.riw.us [162.144.32.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 157AA1B32D9 for ; Sun, 25 Oct 2015 15:34:27 -0700 (PDT) Received: from 162-229-180-77.lightspeed.rlghnc.sbcglobal.net ([162.229.180.77]:57161 helo=Russ) by server.riw.us with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.86) (envelope-from ) id 1ZqTrt-0002AK-Pf for i2rs@ietf.org; Sun, 25 Oct 2015 22:34:25 +0000 From: "Russ White" To: References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> In-Reply-To: <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> Date: Sun, 25 Oct 2015 18:34:24 -0400 Message-ID: <003101d10f75$4d537380$e7fa5a80$@riw.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQIa+nl93GxCjlQL2WL76GNM6fnHGAIupcJKAr7FDe4BQ7rtzALImv4NAfZtHcc= Content-Language: en-us X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.riw.us X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - riw.us X-Get-Message-Sender-Via: server.riw.us: authenticated_id: russw@riw.us X-Authenticated-Sender: server.riw.us: russw@riw.us X-Source: X-Source-Args: X-Source-Dir: Archived-At: Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Oct 2015 22:34:29 -0000 > However, I still feel that we are dealing with a limitation of the YANG > framework here. I think we are dealing with a use case that was not really > foreseen in the YANG design, i.e. that we might run into data that has > instances that can indeed be authoritatively owned by a server versus others > representing more traditional configuration. I've not followed this entire thread, but I'm a bit baffled by the discussion at this point. I thought I2RS was based on an atomic/RESTful model, rather than being transactional. What's being discussed here, though, smells a lot like a transaction based model -- one device sets some part of the "configuration" (BTW, I object to the term "configuration" in the first place, as I2RS is not dealing with configuration, but rather ephemeral state -- completely different things) in such a way that no other controller can change it. This all seems contrary to the spirit of what we're working on here... There should be priorities to understand which controller/agent has priority over the others, and there should be callbacks when your piece of state is overwritten by some other device (whether local or another controller), but there shouldn't be this concept of a "completed transaction" that we seem to be talking about here. I get the distinct feeling we're trying to boil the ocean once again -- I2RS is not going to configure the entire device (minus some trivial stuff no-one cares about). I2RS should not be trying to build a fully transactional database on each device, with locks and such. This should be fast and light, operating at the speed of any other routing protocol (on the order of milliseconds), not on the order of minutes/days/weeks/months. Can someone please explain why we're talking about this sort of "configuration?" Russ From nobody Mon Oct 26 11:18:59 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73B041B4A16 for ; Mon, 26 Oct 2015 11:18:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FgpCOvMxRrzx for ; Mon, 26 Oct 2015 11:18:47 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4477C1B4A28 for ; Mon, 26 Oct 2015 11:18:47 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id 102331128; Mon, 26 Oct 2015 19:18:46 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id jMTjp7TpK3eb; Mon, 26 Oct 2015 19:18:41 +0100 (CET) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 26 Oct 2015 19:18:41 +0100 (CET) Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id 3D7DB2004E; Mon, 26 Oct 2015 19:18:41 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id O3P3vp0zBZKp; Mon, 26 Oct 2015 19:18:36 +0100 (CET) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 182B92003B; Mon, 26 Oct 2015 19:18:35 +0100 (CET) Received: by elstar.local (Postfix, from userid 501) id F2E8138669E8; Mon, 26 Oct 2015 19:18:34 +0100 (CET) Date: Mon, 26 Oct 2015 19:18:34 +0100 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151026181834.GB44567@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Martin Bjorklund , "lhotka@nic.cz" , "i2rs@ietf.org" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" , Kent Watsen References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Clacks-Overhead: GNU Terry Pratchett Content-Transfer-Encoding: quoted-printable In-Reply-To: <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , Martin Bjorklund , Kent Watsen , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 18:18:55 -0000 In YANG, it is assumed that config true nodes exist in a datastore where all config true nodes are treated the same. A datastore is the unit of validation and we don't want to have a valid configuration datatore become invalid arbitrarily. This is why config true nodes are not allowed to depend on config false nodes (state data that can change arbitrarily). /js On Sat, Oct 24, 2015 at 01:15:55AM +0000, Alexander Clemm (alex) wrote: > Hi Martin, >=20 > maybe option 1 provides a way out here. This also has the least impact o= n the existing design and implementation, hence preferable. =20 >=20 > However, I still feel that we are dealing with a limitation of the YANG f= ramework here. I think we are dealing with a use case that was not really = foreseen in the YANG design, i.e. that we might run into data that has inst= ances that can indeed be authoritatively owned by a server versus others re= presenting more traditional configuration. The one aspect that not really = address by making it regular config concerns your assertion that "any other= client can modify what this client wrote". Access rights could provide a = solution, but not in the way as currently defined via NACM, since we would = need to differentiate access rights at the instance level, not at the modul= e definition level. Rather than seeing how we can make our requirements so= mehow fit a rigid interpretation of the YANG framework (that does not allow= for special treatment / behavior of special cases), I would like to see wh= ether the YANG framework can be flexible enough to still support what we ar= e trying to do. =20 >=20 > Kent made what I thought was a very interesting suggestion at the interim= , asking whether this would be an application for metadata. I think this i= s something that we might leverage here. We could introduce a metadata ite= m that indicates for configuration information whether that was populated b= y a server, so really should not be modified by other clients (or, when mod= ified, will presumably be "changed back" by the server). Or, that might si= mply be locked by the server. =20 >=20 > Thoughts regarding that suggestion? >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com]=20 > Sent: Friday, October 23, 2015 12:17 AM > To: Alexander Clemm (alex) > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; a= ndy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > "Alexander Clemm (alex)" wrote: > > Hi Martin, > >=20 > > We can nitpick over how to best express this >=20 > This isn't nitpicking; I am trying to understand what you had in mind. >=20 > And it seems Juergen is correct. You essentially want to mix config and = operational state in a single list. This is not possible to express in YAN= G, so you change the semantics of the formal statements with descriptions. = I don't think this a good idea. >=20 > I can think of two alternatives to the current design that don't violate = YANG: >=20 > 1) Keep the single config true list, w/o the server-provided leaf, > and explain in text that there might be a client > "internal-to-the-server" that behaves just like any other client > (specifically respects locks, makes sure the end result is > valid, and any other client can modify what this client wrote > (module access rights)). >=20 > 2) Split the model into two, one config list and one oper list. > References in the config list can either be by name (implicit) or > use the new YANG 1.1 syntax "require-instance false"; >=20 >=20 > /martin >=20 > > , but hopefully the > > general sense of what the requirement is and what I was trying to=20 > > express is clear. You can have an outside client application maintain= =20 > > some topologies / list elements, and have others maintained an=20 > > populated by the server - or arguably an app embedded in the server. > > The difference from the "normal" client is that really it is that we=20 > > want the server / embedded app that is the authoritative owner of the= =20 > > information. > >=20 > > Cheers > > --- Alex > >=20 > > -----Original Message----- > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > Sent: Monday, October 19, 2015 11:07 PM > > To: Alexander Clemm (alex) > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > >=20 > > "Alexander Clemm (alex)" wrote: > > > Hi Martin, > > >=20 > > > "So how is the server-provided leaf supposed to be implemented, and= =20 > > > how is it supposed to be used?" > > >=20 > > > When a network topology is populated by the server, the=20 > > > server-provided leaf is supposed to be set to true. > >=20 > > But you earlier wrote that when the server wants to change something=20 > > it would behave as a normal client. > >=20 > > > When a network topology is populated by a client app (through=20 > > > "regular" configuration), the server provided leaf is supposed to be= =20 > > > set to false. > > >=20 > > > For any given network topology, when the corresponding=20 > > > "server-provided" leaf is set to "true", attempts to edit the=20 > > > configuration of that topology are to be rejected. > >=20 > > This also goes against what you acknowledged previously - "the=20 > > server-provided data can be modified by anyone with proper access=20 > > rights" > >=20 > >=20 > > /martin > >=20 > >=20 > > >=20 > > > Alternatives to the current design include making the leaf "config=20 > > > true", or moving it outside (just this leaf) for a list that=20 > > > indicates for each topology whether it is server-provided or not (in= =20 > > > a separate "state" branch). > > > --- Alex > > >=20 > > > -----Original Message----- > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > Sent: Monday, October 19, 2015 1:27 PM > > > To: Alexander Clemm (alex) > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > >=20 > > > "Alexander Clemm (alex)" wrote: > > > > Hi Martin, > > > >=20 > > > > One model for the data that is server-provided is to assume an app= =20 > > > > (which could be embedded on the same server) that knows how to=20 > > > > discover the network, then populates the data accordingly. > > > >=20 > > > > [Of course, we would not want any random client app just being=20 > > > > able to "mess" with that data. The expectation is generally=20 > > > > clearly access to this will be restricted / controlled. The=20 > > > > topology instances that were populated by the "server-provided=20 > > > > app" should not be "touched" by other apps - it is the=20 > > > > "server-provided" app that is responsible for maintaining them.] > > > >=20 > > > > So I assume the answer to your question is "yes", but with a bunch= =20 > > > > of caveats. > > >=20 > > > So how is the server-provided leaf supposed to be implemented, and=20 > > > how is it supposed to be used? > > >=20 > > >=20 > > > /martin > > >=20 > > >=20 > > >=20 > > > > --- Alex > > > >=20 > > > >=20 > > > > -----Original Message----- > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin=20 > > > > Bjorklund > > > > Sent: Monday, October 19, 2015 11:32 AM > > > > To: Alexander Clemm (alex) > > > > Cc: andy@yumaworks.com; i2rs@ietf.org;=20 > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz;=20 > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > >=20 > > > > Alex, > > > >=20 > > > > Is the idea that the server-provided data is normal config? I.e.,= =20 > > > > if the server wants to modify this data it behaves like a normal=20 > > > > client? > > > > (conceptually...) And the server-provided data can be modified by= =20 > > > > anyone with proper access rights? > > > >=20 > > > >=20 > > > > /martin > > > >=20 > > > >=20 > > > >=20 > > > > "Alexander Clemm (alex)" wrote: > > > > > Hi Juergen, > > > > >=20 > > > > > I think one of the key statements you make below is this: > > > > > " Recall also that YANG does not allow configuration data to=20 > > > > > depend on state data." > > > > >=20 > > > > > Note that this is not the case in the current model. The=20 > > > > > current model is essentially all configuration data. Of course,= =20 > > > > > we have this flag to indicate who supplied that data (and is=20 > > > > > hence maintaining it). > > > > >=20 > > > > > You argue that we should instead "split" the model and introduce= =20 > > > > > operational data to reflect what is populated by the server. > > > > > However, doing that introduces precisely new issues - and you=20 > > > > > have just brought another argument why this may be a bad idea=20 > > > > > and may not even work. > > > > > Topologies _are_ layered, and we need to be able to express that= =20 > > > > > in the model. Now, if we have a topology that is=20 > > > > > server-provided, hence (per your statement) to be represented by= =20 > > > > > operational data only, how do we build an overlay topology that= =20 > > > > > is "configured" on top of it? If the answer is "we can't,=20 > > > > > unless we replicate the server-provided topology into the=20 > > > > > network configuration (which makes no sense)", we are screwed. = =20 > > > > > Now, we might build it on top if we remove all references /=20 > > > > > dependencies on the underlay from the model and punt the problem= =20 > > > > > to the user. Basically, no longer have the model express=20 > > > > > vertical relationships. Not a good solution, IMHO. > > > > >=20 > > > > > How do you suggest we address this? The ability to express=20 > > > > > layering relationships between topologies, including cases where= =20 > > > > > topologies originate from different sources=20 > > > > > (discovered/server-provided vs configured), is a requirement. =20 > > > > > It is not an artefact of our model, it is something that we need= =20 > > > > > to capture as part of the model. There may not be a "nice" way= =20 > > > > > of doing this within the YANG framework, yet it is important=20 > > > > > that we find a way to do this. The current solution to this > > > > > - having the model as configuration data, and including a=20 > > > > > parameter to indicate who supplies the data and is maintaining=20 > > > > > it > > > > > - appears to be cleanest and clearest solution (or perhaps the=20 > > > > > "least bad") that results in the model of least complexity. > > > > >=20 > > > > > Perhaps there is something we can simply change about the=20 > > > > > "server-provided" object to address your concerns? We can make= =20 > > > > > it config (to address your issue that triggered this, the=20 > > > > > presence of a r/o object in a tree that is otherwise r/w). > > > > >=20 > > > > > Thoughts? > > > > > --- Alex > > > > >=20 > > > > >=20 > > > > >=20 > > > > > -----Original Message----- > > > > > From: Juergen Schoenwaelder > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > > To: Alexander Clemm (alex) > > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin=20 > > > > > Bjorklund ; Andy Bierman ;=20 > > > > > 'Alia Atlas' > > > > > ; 'Jeffrey Haas' ; Susan=20 > > > > > Hares > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > >=20 > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > > > > wrote: > > > > > > Hello Juergen, > > > > > >=20 > > > > > > responses inline, delimited with > > > > > >=20 > > > > > > --- Alex > > > > > >=20 > > > > > > -----Original Message----- > > > > > > From: Juergen Schoenwaelder > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > > To: Alexander Clemm (alex) > > > > > > Cc: Susan Hares ; Andy Bierman=20 > > > > > > ; i2rs@ietf.org; Martin Bjorklund=20 > > > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > > > > ; 'Jeffrey Haas' > > > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > >=20 > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm=20 > > > > > > (alex) > > > > > > wrote: > > > > > > >=20 > > > > > > > The only item in the topology that is read-only concerns the= =20 > > > > > > > "server-provided" flag, but this concerns a separate issue=20 > > > > > > > that was also discussed (I am not sure if this is what you=20 > > > > > > > are referring to). > > > > > > > It is analogous to the other discussion concerning=20 > > > > > > > distinguishing configuration that has been intended, versus= =20 > > > > > > > one that is in effect etc . This concerns the issue that=20 > > > > > > > some topologies are populated by the server whereas some=20 > > > > > > > topologies can be populated by client applications. > > > > > >=20 > > > > > > Yes, this is what the concern is about. > > > > > >=20 > > > > > > > We have had discussions in the past whether to "split this=20 > > > > > > > up", having a (rw) branch to populate "intended" topologies= =20 > > > > > > > and a > > > > > > > (ro) branch for topologies "in effect". > > > > > >=20 > > > > > > This is the normal way to do this in YANG. And this goes back= =20 > > > > > > to what was driving us for years, namely to clearly separate=20 > > > > > > config from state. This module makes this distinction a=20 > > > > > > runtime property controlled by a data model specific=20 > > > > > > mechanism. None of the generic tools out there will be able to = understand this. > > > > > >=20 > > > > > > > > > > > > I think the issue is more related to the current discussion=20 > > > > > > with regards to openconfig and "intended configuration" and=20 > > > > > > "applied configuration". If YANG had an existing solution for= =20 > > > > > > this, we would not have this discussion. The reason I believe= =20 > > > > > > this is similar is that you can view the "applied=20 > > > > > > configuration" as the "server-provided configuration" (network= =20 > > > > > > topology, in our case), and the "intended configuration" as=20 > > > > > > the, well, configured or intended network topology in our=20 > > > > > > case. That said, the issue is not identical > > > > > > - whereas in the openconfig case every "applied configuration"= =20 > > > > > > has an accompanying "intended configuration", in our case this= =20 > > > > > > is not necessarily the case > > > > > > - you can have "applied" [network topologies] that were=20 > > > > > > provided by the server / the network itself, not configured by = anybody. > > > > > > > > > > >=20 > > > > > I think this has nothing to do with intended or applied config.= =20 > > > > > Your 'server supplied topology' appears to me to be operational= =20 > > > > > state and not configuration data. > > > > > =20 > > > > > > > We decided against it for various reasons - every piece of=20 > > > > > > > information would essentially be duplicated inside the model= =20 > > > > > > > (this is not your normal config vs oper data distinction,=20 > > > > > > > but would essentially reflect a limitation of the=20 > > > > > > > framework), leading to unnecessary additional complexity in= =20 > > > > > > > the model (every augmentation has to be conducted in two=20 > > > > > > > places), more complex validation rules, etc. > > > > > >=20 > > > > > > I do not understand why this is not a normal config vs oper=20 > > > > > > data distinction. Please explain. > > > > > >=20 > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have=20 > > > > > > in RFC > > > > > > 7233 - separate trees with distinct data, some clearly part of= =20 > > > > > > configuration, other clearly operational data. > > > > > > In this case, this is different. You have the same data. =20 > > > > > > However, in some cases it is populated by a client, in other=20 > > > > > > cases by the server. > > > > > > YANG requires the categorization of data as config false or tru= e. =20 > > > > > > In this case, this categorization does not always apply - or,= =20 > > > > > > the categorization depends on the particular instance. > > > > > > > > > > >=20 > > > > > So you have operational state which is partially populated by=20 > > > > > the server and partially populated from config. I fail to see=20 > > > > > how this is any different from other cases, including network=20 > > > > > interfaces as defined in RFC 7233. Recall also that YANG does=20 > > > > > not allow configuration data to depend on state data. > > > > >=20 > > > > > > I do not understand how this leads to more complex validation r= ules. > > > > > > Please explain. > > > > > >=20 > > > > > > > > > > > >=20 > > > > > > One example concerns the supporting nodes/links/TPs. =20 > > > > > >=20 > > > > > > We want to be able to express that, for example, a node in one= =20 > > > > > > network is supported by a node in an underlay network. For=20 > > > > > > this purpose, we are referencing a node in another (underlay) n= etwork. > > > > > > So that we cannot reference an arbitrary node in an arbitrary= =20 > > > > > > network, we want to make sure that the supporting node is part= =20 > > > > > > of a "supporting-network" > > > > > > of the same network. > > > > > >=20 > > > > > > Currently, we have the following definition: > > > > > >=20 > > > > > > list supporting-node { > > > > > > key "network-ref node-ref"; > > > > > > description > > > > > > "Represents another node, in an underlay network, tha= t=20 > > > > > > this node is supported by. Used to represent layeri= ng=20 > > > > > > structure."; > > > > > > leaf network-ref { > > > > > > type leafref { > > > > > > path "../../../supporting-network/network-ref"; > > > > > > } > > > > > > description > > > > > > "References the underlay network that the=20 > > > > > > underlay node is part of."; > > > > > > } > > > > > > leaf node-ref { > > > > > > type leafref { > > > > > > path "/network/node/node-id"; > > > > > > } > > > > > > description > > > > > > "References the underlay node itself."; > > > > > > } > > > > > / > > > > > > } > > > > > >=20 > > > > > >=20 > > > > > > If we were to split the model, when we configure a node, we=20 > > > > > > will have to account for the fact that the supporting node=20 > > > > > > could be either part of a "configured" network itself, or of a= =20 > > > > > > network that has been "server-provided". That is, we need to= =20 > > > > > > be able to allow for both possibilities. > > > > >=20 > > > > > Again note that YANG requires that configuration data does not=20 > > > > > depend on state data. You seem to be breaking this rule, no? > > > > >=20 > > > > > > To do this, we would no longer be able to have the network-ref= =20 > > > > > > to be part of the key for supporting-node - we would have to=20 > > > > > > replace network-ref with a choice of two nodes that reference= =20 > > > > > > either a server-provided network ("branch 1"), or a configured= =20 > > > > > > network ("branch 2"). As a result, we will have to introduce= =20 > > > > > > a separate way to reference elements in list supporting-node. = =20 > > > > > > All of this results in considerable additional complexity. Or= =20 > > > > > > do you see an easier way? > > > > > >=20 > > > > > > > > > > >=20 > > > > > I do not think this is the solution. YANG requires that=20 > > > > > constraints on config true nodes can only refer to other config= =20 > > > > > true nodes in the datastore where the node with the constraint=20 > > > > > exists. See section > > > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9=20 > > > > > says that a leafref may only point to configuration. I believe=20 > > > > > this I-D is violating the distinction between configuration and s= tate data. > > > > >=20 > > > > > /js > > > > >=20 > > > > > --=20 > > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Ge= rmany > > > > > Fax: +49 421 200 3103 > > > > >=20 > > > >=20 > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > >=20 > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > >=20 > > >=20 > >=20 --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 26 11:25:09 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC2171B4A3F for ; Mon, 26 Oct 2015 11:25:07 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GFGeEATwzquB for ; Mon, 26 Oct 2015 11:25:05 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 035381B5056 for ; Mon, 26 Oct 2015 11:25:05 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id C703188D; Mon, 26 Oct 2015 19:25:03 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id t1JAILGevHvd; Mon, 26 Oct 2015 19:25:01 +0100 (CET) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 26 Oct 2015 19:25:01 +0100 (CET) Received: from localhost (demetrius3.jacobs-university.de [212.201.44.48]) by hermes.jacobs-university.de (Postfix) with ESMTP id 7961C2004E; Mon, 26 Oct 2015 19:25:01 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius3.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id 50Z6mjD8ssBq; Mon, 26 Oct 2015 19:24:59 +0100 (CET) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id 29D8B2003B; Mon, 26 Oct 2015 19:24:59 +0100 (CET) Received: by elstar.local (Postfix, from userid 501) id 33A143866A18; Mon, 26 Oct 2015 19:24:59 +0100 (CET) Date: Mon, 26 Oct 2015 19:24:59 +0100 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151026182459.GC44567@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Andy Bierman , "i2rs@ietf.org" , Martin Bjorklund , Ladislav Lhotka , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares References: <007701d0fc9a$537bcd90$fa7368b0$@ndzh.com> <20151009072207.GA56815@elstar.local> <20151015063446.GB70280@elstar.local> <7dd9f7cb8b3e428c8c0dcb649665762d@XCH-RCD-001.cisco.com> <20151018101316.GC78503@elstar.local> <20151019195558.GB81648@elstar.local> <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: Ladislav Lhotka , "i2rs@ietf.org" , Martin Bjorklund , Andy Bierman , 'Alia Atlas' , 'Jeffrey Haas' , Susan Hares Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 18:25:08 -0000 Alex, I can have config that applies to a node named 'foo'. If the node named 'foo' does not exist, the config will not be applied but it remains valid config. This is how we deal with interfaces. You write config for an interface with a certain name. As long as a corresponding interface does not exist, this config will be ignored. The point of this exercise is that it decouples the lifetime and validity of the config from the lifetime of something that may change arbitrarily. /js On Mon, Oct 19, 2015 at 09:42:31PM +0000, Alexander Clemm (alex) wrote: > Hello Juergen, > > can you please explain what you mean by name bindings? YANG does not provide support for name bindings (at least not a la GDMO). > > Looking at RFC 7223, I can see the distinction between interface-ref and interface-state-ref. There certainly is an analogy between interfaces and topology, and the discussion section 3.1 of RFC 7223 and the discussion here. Still, the interfaces model is different and follows different requirements/patterns that don't make it directly applicable. Layering etc are not included as part of the base model, but supported via a design pattern where it is added as part of augmentation specific to a given interface type, and being specific which type of interface to reference. I don't see anything describing the analogy of having a (configured) set of data - e.g. a (configured) topology with a (configured) set of nodes, links, etc - and allowing the items in this to refer to e.g. a (server-provided) topology. > > In your email, you state "Translated to your domain, I can configure an overlay that refers by name to other layers. If those layers do not operationally exist, the overlay will exist in config but not in the operational state tree". How would this work? With "refer by name" you don't mean an actual reference, you mean use "refer by name" to refer to data that is operational state. In other words, you are punting the problem and leave it to the user and implementation to deal with it. Instead of using e.g. an actual reference, you are using simply a string. The concern is that when using a reference, a framework might have problems ensuring referential integrity in case the referred object goes away etc - but this solution does not address the concern, it simply pushes it to somewhere else. > > At the same time, you do now have two parallel trees, providing additional complexity as outlined earlier, specifically if we want to be able to express some of the integrity constraints (supporting nodes of a node have to be part of a supporting topology, etc). Well, perhaps we no longer need to be concerned about these, since we are pushing this problem to the user anyway. However, I am not sure why we would trust users to deal with all those integrity problems, but not trust them e.g. with a "server-provided" attribute. Additional complexity in the model would be fine if it resulted in a gain, but I don't think this would be the case - to the contrary. Introducing what you call a "fence" instead seems to be the preferrable solution. The ability to support this could be indicated by a feature, if that helps. > > --- Alex > > -----Original Message----- > From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de] > Sent: Monday, October 19, 2015 12:56 PM > To: Alexander Clemm (alex) > Cc: Andy Bierman ; i2rs@ietf.org; Martin Bjorklund ; Ladislav Lhotka ; 'Alia Atlas' ; 'Jeffrey Haas' ; Susan Hares > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > On Mon, Oct 19, 2015 at 06:24:10PM +0000, Alexander Clemm (alex) wrote: > > Hi Juergen, > > > > I think one of the key statements you make below is this: > > " Recall also that YANG does not allow configuration data to depend on state data." > > > > Note that this is not the case in the current model. The current model is essentially all configuration data. Of course, we have this flag to indicate who supplied that data (and is hence maintaining it). > > > > I expect that config true objects can be modified by clients. And I expect that client maintained config true objects do not depend on server provided operational state. The 'server-provided' leaf seems to 'overrule' both principles. > > > You argue that we should instead "split" the model and introduce operational data to reflect what is populated by the server. However, doing that introduces precisely new issues - and you have just brought another argument why this may be a bad idea and may not even work. Topologies _are_ layered, and we need to be able to express that in the model. Now, if we have a topology that is server-provided, hence (per your statement) to be represented by operational data only, how do we build an overlay topology that is "configured" on top of it? If the answer is "we can't, unless we replicate the server-provided topology into the network configuration (which makes no sense)", we are screwed. Now, we might build it on top if we remove all references / dependencies on the underlay from the model and punt the problem to the user. Basically, no longer have the model express vertical relationships. Not a good solution, IMHO. > > How do you suggest we address this? The ability to express layering relationships between topologies, including cases where topologies originate from different sources (discovered/server-provided vs configured), is a requirement. It is not an artefact of our model, it is something that we need to capture as part of the model. There may not be a "nice" way of doing this within the YANG framework, yet it is important that we find a way to do this. The current solution to this - having the model as configuration data, and including a parameter to indicate who supplies the data and is maintaining it - appears to be cleanest and clearest solution (or perhaps the "least bad") that results in the model of least complexity. > > In the interfaces model, this problem got solved via name bindings. I can configure an interface but as long as the matching interface is not present, the config won't be applied to the interface. Translated to your domain, I can configure an overlay that refers by name to other layers. If those layers do not operationally exist, the overlay will exist in config but not in the operational state tree. > > > Perhaps there is something we can simply change about the "server-provided" object to address your concerns? We can make it config (to address your issue that triggered this, the presence of a r/o object in a tree that is otherwise r/w). > > You can address my concern by doing away with 'server-provided' and by properly separating config from operational state. ;-) Assuming proper authorization, a NC/RC client should be able to change any object in a configuration datastore. I am concerned about data model specific 'fences' that indicate that some portions of a configuration datastore are behaving in special ways. > > /js > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 26 12:11:31 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69E711B5108 for ; Mon, 26 Oct 2015 12:11:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a-a7r4GQDD8R for ; Mon, 26 Oct 2015 12:11:25 -0700 (PDT) Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56CCB1B511A for ; Mon, 26 Oct 2015 12:11:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=22691; q=dns/txt; s=iport; t=1445886683; x=1447096283; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=n3QfkMuE8uJrDSu7YfwqYxJd9CMwaAk4RvAFCQ+B17g=; b=jsXqytsg5MjvxvWg4HbdyDkXbCqN83/QwUmggsnUuJOP7ZhVSeB90CaB Q5kXOkLDSn0rthKXiXq/OZ44A4HBkGqWfGvXaZdcUMVxJTfe8S1xGjYfd Um9JevsIbPH5jYY82LavrUjxGcdTasNp8xDgaOAAEtg6RaF7hw1aMG0Nc Q=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AEAgBWei5W/4gNJK1WBQODNlRvBr4/AQ2BVwMXCoV8AoE3OBQBAQEBAQEBgQqEMgEBAQMBAQEBFyA0BAcFBwICAgEIDgIBBAEBARUJCQcbBgYLFAkIAgQOBQgTiAADCggNwQ0NhEUBAQEBAQEBAQEBAQEBAQEBAQEBAQEYBItxglCBZgwgGxAHAgQECIQcBYdLhU2BMIduAYssgW6BYIQ/gySLJINfg28BHwEBQoIRHYFVcoVRJRyBBgEBAQ X-IronPort-AV: E=Sophos;i="5.20,201,1444694400"; d="scan'208";a="202142736" Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 26 Oct 2015 19:11:21 +0000 Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id t9QJBKZj029290 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 26 Oct 2015 19:11:20 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Mon, 26 Oct 2015 14:10:57 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Mon, 26 Oct 2015 14:10:56 -0500 From: "Alexander Clemm (alex)" To: Juergen Schoenwaelder Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpv6tndvtjjPSkap4v4Aq5RqqJ5zI1yggAB0L4D//8MXQIAA3vkAgAP//wCAAMqwAIAA1KEggASbIQD//7j48A== Date: Mon, 26 Oct 2015 19:10:56 +0000 Message-ID: <8cda728006de456b8439114073c3ae4b@XCH-RCD-001.cisco.com> References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> <20151026181834.GB44567@elstar.local> In-Reply-To: <20151026181834.GB44567@elstar.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.205.254] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , Martin Bjorklund , Kent Watsen , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 19:11:29 -0000 Hi Juergen, Understood, but this doesn't really address our problem here. We want to s= ee how we can apply YANG to meet our needs, not the other way round. Hence= the suggestion to explore the use of metadata here. --- Alex -----Original Message----- From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]=20 Sent: Monday, October 26, 2015 11:19 AM To: Alexander Clemm (alex) Cc: Martin Bjorklund ; lhotka@nic.cz; i2rs@ietf.org; andy@y= umaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com; Kent Wats= en Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) In YANG, it is assumed that config true nodes exist in a datastore where al= l config true nodes are treated the same. A datastore is the unit of valida= tion and we don't want to have a valid configuration datatore become invali= d arbitrarily. This is why config true nodes are not allowed to depend on c= onfig false nodes (state data that can change arbitrarily). /js On Sat, Oct 24, 2015 at 01:15:55AM +0000, Alexander Clemm (alex) wrote: > Hi Martin, >=20 > maybe option 1 provides a way out here. This also has the least impact o= n the existing design and implementation, hence preferable. =20 >=20 > However, I still feel that we are dealing with a limitation of the YANG f= ramework here. I think we are dealing with a use case that was not really = foreseen in the YANG design, i.e. that we might run into data that has inst= ances that can indeed be authoritatively owned by a server versus others re= presenting more traditional configuration. The one aspect that not really = address by making it regular config concerns your assertion that "any other= client can modify what this client wrote". Access rights could provide a = solution, but not in the way as currently defined via NACM, since we would = need to differentiate access rights at the instance level, not at the modul= e definition level. Rather than seeing how we can make our requirements so= mehow fit a rigid interpretation of the YANG framework (that does not allow= for special treatment / behavior of special cases), I would like to see wh= ether the YANG framework can be flexible enough to still support what we ar= e trying to do. =20 >=20 > Kent made what I thought was a very interesting suggestion at the interim= , asking whether this would be an application for metadata. I think this i= s something that we might leverage here. We could introduce a metadata ite= m that indicates for configuration information whether that was populated b= y a server, so really should not be modified by other clients (or, when mod= ified, will presumably be "changed back" by the server). Or, that might si= mply be locked by the server. =20 >=20 > Thoughts regarding that suggestion? >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com] > Sent: Friday, October 23, 2015 12:17 AM > To: Alexander Clemm (alex) > Cc: lhotka@nic.cz; i2rs@ietf.org;=20 > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > "Alexander Clemm (alex)" wrote: > > Hi Martin, > >=20 > > We can nitpick over how to best express this >=20 > This isn't nitpicking; I am trying to understand what you had in mind. >=20 > And it seems Juergen is correct. You essentially want to mix config and = operational state in a single list. This is not possible to express in YAN= G, so you change the semantics of the formal statements with descriptions. = I don't think this a good idea. >=20 > I can think of two alternatives to the current design that don't violate = YANG: >=20 > 1) Keep the single config true list, w/o the server-provided leaf, > and explain in text that there might be a client > "internal-to-the-server" that behaves just like any other client > (specifically respects locks, makes sure the end result is > valid, and any other client can modify what this client wrote > (module access rights)). >=20 > 2) Split the model into two, one config list and one oper list. > References in the config list can either be by name (implicit) or > use the new YANG 1.1 syntax "require-instance false"; >=20 >=20 > /martin >=20 > > , but hopefully the > > general sense of what the requirement is and what I was trying to=20 > > express is clear. You can have an outside client application=20 > > maintain some topologies / list elements, and have others maintained=20 > > an populated by the server - or arguably an app embedded in the server. > > The difference from the "normal" client is that really it is that we=20 > > want the server / embedded app that is the authoritative owner of=20 > > the information. > >=20 > > Cheers > > --- Alex > >=20 > > -----Original Message----- > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > Sent: Monday, October 19, 2015 11:07 PM > > To: Alexander Clemm (alex) > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > >=20 > > "Alexander Clemm (alex)" wrote: > > > Hi Martin, > > >=20 > > > "So how is the server-provided leaf supposed to be implemented,=20 > > > and how is it supposed to be used?" > > >=20 > > > When a network topology is populated by the server, the=20 > > > server-provided leaf is supposed to be set to true. > >=20 > > But you earlier wrote that when the server wants to change something=20 > > it would behave as a normal client. > >=20 > > > When a network topology is populated by a client app (through=20 > > > "regular" configuration), the server provided leaf is supposed to=20 > > > be set to false. > > >=20 > > > For any given network topology, when the corresponding=20 > > > "server-provided" leaf is set to "true", attempts to edit the=20 > > > configuration of that topology are to be rejected. > >=20 > > This also goes against what you acknowledged previously - "the=20 > > server-provided data can be modified by anyone with proper access=20 > > rights" > >=20 > >=20 > > /martin > >=20 > >=20 > > >=20 > > > Alternatives to the current design include making the leaf "config=20 > > > true", or moving it outside (just this leaf) for a list that=20 > > > indicates for each topology whether it is server-provided or not=20 > > > (in a separate "state" branch). > > > --- Alex > > >=20 > > > -----Original Message----- > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > Sent: Monday, October 19, 2015 1:27 PM > > > To: Alexander Clemm (alex) > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > >=20 > > > "Alexander Clemm (alex)" wrote: > > > > Hi Martin, > > > >=20 > > > > One model for the data that is server-provided is to assume an=20 > > > > app (which could be embedded on the same server) that knows how=20 > > > > to discover the network, then populates the data accordingly. > > > >=20 > > > > [Of course, we would not want any random client app just being=20 > > > > able to "mess" with that data. The expectation is generally=20 > > > > clearly access to this will be restricted / controlled. The=20 > > > > topology instances that were populated by the "server-provided=20 > > > > app" should not be "touched" by other apps - it is the=20 > > > > "server-provided" app that is responsible for maintaining them.] > > > >=20 > > > > So I assume the answer to your question is "yes", but with a=20 > > > > bunch of caveats. > > >=20 > > > So how is the server-provided leaf supposed to be implemented, and=20 > > > how is it supposed to be used? > > >=20 > > >=20 > > > /martin > > >=20 > > >=20 > > >=20 > > > > --- Alex > > > >=20 > > > >=20 > > > > -----Original Message----- > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin=20 > > > > Bjorklund > > > > Sent: Monday, October 19, 2015 11:32 AM > > > > To: Alexander Clemm (alex) > > > > Cc: andy@yumaworks.com; i2rs@ietf.org;=20 > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz;=20 > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > >=20 > > > > Alex, > > > >=20 > > > > Is the idea that the server-provided data is normal config? =20 > > > > I.e., if the server wants to modify this data it behaves like a=20 > > > > normal client? > > > > (conceptually...) And the server-provided data can be modified=20 > > > > by anyone with proper access rights? > > > >=20 > > > >=20 > > > > /martin > > > >=20 > > > >=20 > > > >=20 > > > > "Alexander Clemm (alex)" wrote: > > > > > Hi Juergen, > > > > >=20 > > > > > I think one of the key statements you make below is this: > > > > > " Recall also that YANG does not allow configuration data to=20 > > > > > depend on state data." > > > > >=20 > > > > > Note that this is not the case in the current model. The=20 > > > > > current model is essentially all configuration data. Of=20 > > > > > course, we have this flag to indicate who supplied that data=20 > > > > > (and is hence maintaining it). > > > > >=20 > > > > > You argue that we should instead "split" the model and=20 > > > > > introduce operational data to reflect what is populated by the se= rver. > > > > > However, doing that introduces precisely new issues - and you=20 > > > > > have just brought another argument why this may be a bad idea=20 > > > > > and may not even work. > > > > > Topologies _are_ layered, and we need to be able to express=20 > > > > > that in the model. Now, if we have a topology that is=20 > > > > > server-provided, hence (per your statement) to be represented=20 > > > > > by operational data only, how do we build an overlay topology=20 > > > > > that is "configured" on top of it? If the answer is "we=20 > > > > > can't, unless we replicate the server-provided topology into=20 > > > > > the network configuration (which makes no sense)", we are screwed= . > > > > > Now, we might build it on top if we remove all references /=20 > > > > > dependencies on the underlay from the model and punt the=20 > > > > > problem to the user. Basically, no longer have the model=20 > > > > > express vertical relationships. Not a good solution, IMHO. > > > > >=20 > > > > > How do you suggest we address this? The ability to express=20 > > > > > layering relationships between topologies, including cases=20 > > > > > where topologies originate from different sources=20 > > > > > (discovered/server-provided vs configured), is a requirement. > > > > > It is not an artefact of our model, it is something that we=20 > > > > > need to capture as part of the model. There may not be a=20 > > > > > "nice" way of doing this within the YANG framework, yet it is=20 > > > > > important that we find a way to do this. The current solution=20 > > > > > to this > > > > > - having the model as configuration data, and including a=20 > > > > > parameter to indicate who supplies the data and is maintaining=20 > > > > > it > > > > > - appears to be cleanest and clearest solution (or perhaps the=20 > > > > > "least bad") that results in the model of least complexity. > > > > >=20 > > > > > Perhaps there is something we can simply change about the=20 > > > > > "server-provided" object to address your concerns? We can=20 > > > > > make it config (to address your issue that triggered this, the=20 > > > > > presence of a r/o object in a tree that is otherwise r/w). > > > > >=20 > > > > > Thoughts? > > > > > --- Alex > > > > >=20 > > > > >=20 > > > > >=20 > > > > > -----Original Message----- > > > > > From: Juergen Schoenwaelder > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > > To: Alexander Clemm (alex) > > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin=20 > > > > > Bjorklund ; Andy Bierman ;=20 > > > > > 'Alia Atlas' > > > > > ; 'Jeffrey Haas' ; Susan=20 > > > > > Hares > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > >=20 > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm=20 > > > > > (alex) > > > > > wrote: > > > > > > Hello Juergen, > > > > > >=20 > > > > > > responses inline, delimited with > > > > > >=20 > > > > > > --- Alex > > > > > >=20 > > > > > > -----Original Message----- > > > > > > From: Juergen Schoenwaelder > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > > To: Alexander Clemm (alex) > > > > > > Cc: Susan Hares ; Andy Bierman=20 > > > > > > ; i2rs@ietf.org; Martin Bjorklund=20 > > > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > > > > ; 'Jeffrey Haas' > > > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > >=20 > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm > > > > > > (alex) > > > > > > wrote: > > > > > > >=20 > > > > > > > The only item in the topology that is read-only concerns=20 > > > > > > > the "server-provided" flag, but this concerns a separate=20 > > > > > > > issue that was also discussed (I am not sure if this is=20 > > > > > > > what you are referring to). > > > > > > > It is analogous to the other discussion concerning=20 > > > > > > > distinguishing configuration that has been intended,=20 > > > > > > > versus one that is in effect etc . This concerns the=20 > > > > > > > issue that some topologies are populated by the server=20 > > > > > > > whereas some topologies can be populated by client applicatio= ns. > > > > > >=20 > > > > > > Yes, this is what the concern is about. > > > > > >=20 > > > > > > > We have had discussions in the past whether to "split this=20 > > > > > > > up", having a (rw) branch to populate "intended"=20 > > > > > > > topologies and a > > > > > > > (ro) branch for topologies "in effect". > > > > > >=20 > > > > > > This is the normal way to do this in YANG. And this goes=20 > > > > > > back to what was driving us for years, namely to clearly=20 > > > > > > separate config from state. This module makes this=20 > > > > > > distinction a runtime property controlled by a data model=20 > > > > > > specific mechanism. None of the generic tools out there will be= able to understand this. > > > > > >=20 > > > > > > > > > > > > I think the issue is more related to the current discussion=20 > > > > > > with regards to openconfig and "intended configuration" and=20 > > > > > > "applied configuration". If YANG had an existing solution=20 > > > > > > for this, we would not have this discussion. The reason I=20 > > > > > > believe this is similar is that you can view the "applied=20 > > > > > > configuration" as the "server-provided configuration"=20 > > > > > > (network topology, in our case), and the "intended=20 > > > > > > configuration" as the, well, configured or intended network=20 > > > > > > topology in our case. That said, the issue is not identical > > > > > > - whereas in the openconfig case every "applied configuration"= =20 > > > > > > has an accompanying "intended configuration", in our case=20 > > > > > > this is not necessarily the case > > > > > > - you can have "applied" [network topologies] that were=20 > > > > > > provided by the server / the network itself, not configured by = anybody. > > > > > > > > > > >=20 > > > > > I think this has nothing to do with intended or applied config.=20 > > > > > Your 'server supplied topology' appears to me to be=20 > > > > > operational state and not configuration data. > > > > > =20 > > > > > > > We decided against it for various reasons - every piece of=20 > > > > > > > information would essentially be duplicated inside the=20 > > > > > > > model (this is not your normal config vs oper data=20 > > > > > > > distinction, but would essentially reflect a limitation of=20 > > > > > > > the framework), leading to unnecessary additional=20 > > > > > > > complexity in the model (every augmentation has to be=20 > > > > > > > conducted in two places), more complex validation rules, etc. > > > > > >=20 > > > > > > I do not understand why this is not a normal config vs oper=20 > > > > > > data distinction. Please explain. > > > > > >=20 > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have=20 > > > > > > in RFC > > > > > > 7233 - separate trees with distinct data, some clearly part=20 > > > > > > of configuration, other clearly operational data. > > > > > > In this case, this is different. You have the same data. =20 > > > > > > However, in some cases it is populated by a client, in other=20 > > > > > > cases by the server. > > > > > > YANG requires the categorization of data as config false or tru= e. =20 > > > > > > In this case, this categorization does not always apply -=20 > > > > > > or, the categorization depends on the particular instance. > > > > > > > > > > >=20 > > > > > So you have operational state which is partially populated by=20 > > > > > the server and partially populated from config. I fail to see=20 > > > > > how this is any different from other cases, including network=20 > > > > > interfaces as defined in RFC 7233. Recall also that YANG does=20 > > > > > not allow configuration data to depend on state data. > > > > >=20 > > > > > > I do not understand how this leads to more complex validation r= ules. > > > > > > Please explain. > > > > > >=20 > > > > > > > > > > > >=20 > > > > > > One example concerns the supporting nodes/links/TPs. =20 > > > > > >=20 > > > > > > We want to be able to express that, for example, a node in=20 > > > > > > one network is supported by a node in an underlay network. =20 > > > > > > For this purpose, we are referencing a node in another (underla= y) network. > > > > > > So that we cannot reference an arbitrary node in an=20 > > > > > > arbitrary network, we want to make sure that the supporting=20 > > > > > > node is part of a "supporting-network" > > > > > > of the same network. > > > > > >=20 > > > > > > Currently, we have the following definition: > > > > > >=20 > > > > > > list supporting-node { > > > > > > key "network-ref node-ref"; > > > > > > description > > > > > > "Represents another node, in an underlay network, tha= t=20 > > > > > > this node is supported by. Used to represent layeri= ng=20 > > > > > > structure."; > > > > > > leaf network-ref { > > > > > > type leafref { > > > > > > path "../../../supporting-network/network-ref"; > > > > > > } > > > > > > description > > > > > > "References the underlay network that the=20 > > > > > > underlay node is part of."; > > > > > > } > > > > > > leaf node-ref { > > > > > > type leafref { > > > > > > path "/network/node/node-id"; > > > > > > } > > > > > > description > > > > > > "References the underlay node itself."; > > > > > > } > > > > > / > > > > > > } > > > > > >=20 > > > > > >=20 > > > > > > If we were to split the model, when we configure a node, we=20 > > > > > > will have to account for the fact that the supporting node=20 > > > > > > could be either part of a "configured" network itself, or of=20 > > > > > > a network that has been "server-provided". That is, we need=20 > > > > > > to be able to allow for both possibilities. > > > > >=20 > > > > > Again note that YANG requires that configuration data does not=20 > > > > > depend on state data. You seem to be breaking this rule, no? > > > > >=20 > > > > > > To do this, we would no longer be able to have the=20 > > > > > > network-ref to be part of the key for supporting-node - we=20 > > > > > > would have to replace network-ref with a choice of two nodes=20 > > > > > > that reference either a server-provided network ("branch=20 > > > > > > 1"), or a configured network ("branch 2"). As a result, we=20 > > > > > > will have to introduce a separate way to reference elements in = list supporting-node. > > > > > > All of this results in considerable additional complexity. =20 > > > > > > Or do you see an easier way? > > > > > >=20 > > > > > > > > > > >=20 > > > > > I do not think this is the solution. YANG requires that=20 > > > > > constraints on config true nodes can only refer to other=20 > > > > > config true nodes in the datastore where the node with the=20 > > > > > constraint exists. See section > > > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9=20 > > > > > says that a leafref may only point to configuration. I believe=20 > > > > > this I-D is violating the distinction between configuration and s= tate data. > > > > >=20 > > > > > /js > > > > >=20 > > > > > --=20 > > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Ge= rmany > > > > > Fax: +49 421 200 3103 > > > > >=20 > > > >=20 > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > >=20 > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > >=20 > > >=20 > >=20 --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Mon Oct 26 12:13:47 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7105B1B5125 for ; Mon, 26 Oct 2015 12:13:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.86 X-Spam-Level: X-Spam-Status: No, score=-3.86 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YfoMy9RH0LW1 for ; Mon, 26 Oct 2015 12:13:36 -0700 (PDT) Received: from atlas3.jacobs-university.de (atlas3.jacobs-university.de [212.201.44.18]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 261E31B5112 for ; Mon, 26 Oct 2015 12:13:23 -0700 (PDT) Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas3.jacobs-university.de (Postfix) with ESMTP id DFE7510C0; Mon, 26 Oct 2015 20:13:21 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from atlas3.jacobs-university.de ([10.70.0.220]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10030) with ESMTP id X6dtC7hti8lP; Mon, 26 Oct 2015 20:13:17 +0100 (CET) Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "Jacobs University CA - G01" (verified OK)) by atlas3.jacobs-university.de (Postfix) with ESMTPS; Mon, 26 Oct 2015 20:13:17 +0100 (CET) Received: from localhost (demetrius2.jacobs-university.de [212.201.44.47]) by hermes.jacobs-university.de (Postfix) with ESMTP id C70CB2004E; Mon, 26 Oct 2015 20:13:16 +0100 (CET) X-Virus-Scanned: amavisd-new at jacobs-university.de Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius2.jacobs-university.de [212.201.44.32]) (amavisd-new, port 10024) with ESMTP id 6zWdTmoJzu6O; Mon, 26 Oct 2015 20:13:12 +0100 (CET) Received: from elstar.local (elstar.jacobs.jacobs-university.de [10.50.231.133]) by hermes.jacobs-university.de (Postfix) with ESMTP id C6D6C2003B; Mon, 26 Oct 2015 20:13:11 +0100 (CET) Received: by elstar.local (Postfix, from userid 501) id 55DEC3866BD0; Mon, 26 Oct 2015 20:13:08 +0100 (CET) Date: Mon, 26 Oct 2015 20:13:07 +0100 From: Juergen Schoenwaelder To: "Alexander Clemm (alex)" Message-ID: <20151026191305.GA44943@elstar.local> Mail-Followup-To: "Alexander Clemm (alex)" , Martin Bjorklund , "lhotka@nic.cz" , "i2rs@ietf.org" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" , Kent Watsen References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> <20151026181834.GB44567@elstar.local> <8cda728006de456b8439114073c3ae4b@XCH-RCD-001.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Clacks-Overhead: GNU Terry Pratchett Content-Transfer-Encoding: quoted-printable In-Reply-To: <8cda728006de456b8439114073c3ae4b@XCH-RCD-001.cisco.com> User-Agent: Mutt/1.4.2.3i Archived-At: Cc: "andy@yumaworks.com" , "i2rs@ietf.org" , Martin Bjorklund , Kent Watsen , "lhotka@nic.cz" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list Reply-To: Juergen Schoenwaelder List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 19:13:44 -0000 I do not think metadata changes the way configuration datastore validation works. /js On Mon, Oct 26, 2015 at 07:10:56PM +0000, Alexander Clemm (alex) wrote: > Hi Juergen, > Understood, but this doesn't really address our problem here. We want to= see how we can apply YANG to meet our needs, not the other way round. Hen= ce the suggestion to explore the use of metadata here. > --- Alex >=20 > -----Original Message----- > From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]= =20 > Sent: Monday, October 26, 2015 11:19 AM > To: Alexander Clemm (alex) > Cc: Martin Bjorklund ; lhotka@nic.cz; i2rs@ietf.org; andy= @yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com; Kent Wa= tsen > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > In YANG, it is assumed that config true nodes exist in a datastore where = all config true nodes are treated the same. A datastore is the unit of vali= dation and we don't want to have a valid configuration datatore become inva= lid arbitrarily. This is why config true nodes are not allowed to depend on= config false nodes (state data that can change arbitrarily). >=20 > /js >=20 > On Sat, Oct 24, 2015 at 01:15:55AM +0000, Alexander Clemm (alex) wrote: > > Hi Martin, > >=20 > > maybe option 1 provides a way out here. This also has the least impact= on the existing design and implementation, hence preferable. =20 > >=20 > > However, I still feel that we are dealing with a limitation of the YANG= framework here. I think we are dealing with a use case that was not reall= y foreseen in the YANG design, i.e. that we might run into data that has in= stances that can indeed be authoritatively owned by a server versus others = representing more traditional configuration. The one aspect that not reall= y address by making it regular config concerns your assertion that "any oth= er client can modify what this client wrote". Access rights could provide = a solution, but not in the way as currently defined via NACM, since we woul= d need to differentiate access rights at the instance level, not at the mod= ule definition level. Rather than seeing how we can make our requirements = somehow fit a rigid interpretation of the YANG framework (that does not all= ow for special treatment / behavior of special cases), I would like to see = whether the YANG framework can be flexible enough to still support what we = are trying to do. =20 > >=20 > > Kent made what I thought was a very interesting suggestion at the inter= im, asking whether this would be an application for metadata. I think this= is something that we might leverage here. We could introduce a metadata i= tem that indicates for configuration information whether that was populated= by a server, so really should not be modified by other clients (or, when m= odified, will presumably be "changed back" by the server). Or, that might = simply be locked by the server. =20 > >=20 > > Thoughts regarding that suggestion? > >=20 > > --- Alex > >=20 > > -----Original Message----- > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > Sent: Friday, October 23, 2015 12:17 AM > > To: Alexander Clemm (alex) > > Cc: lhotka@nic.cz; i2rs@ietf.org;=20 > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > >=20 > > "Alexander Clemm (alex)" wrote: > > > Hi Martin, > > >=20 > > > We can nitpick over how to best express this > >=20 > > This isn't nitpicking; I am trying to understand what you had in mind. > >=20 > > And it seems Juergen is correct. You essentially want to mix config an= d operational state in a single list. This is not possible to express in Y= ANG, so you change the semantics of the formal statements with descriptions= . I don't think this a good idea. > >=20 > > I can think of two alternatives to the current design that don't violat= e YANG: > >=20 > > 1) Keep the single config true list, w/o the server-provided leaf, > > and explain in text that there might be a client > > "internal-to-the-server" that behaves just like any other client > > (specifically respects locks, makes sure the end result is > > valid, and any other client can modify what this client wrote > > (module access rights)). > >=20 > > 2) Split the model into two, one config list and one oper list. > > References in the config list can either be by name (implicit) or > > use the new YANG 1.1 syntax "require-instance false"; > >=20 > >=20 > > /martin > >=20 > > > , but hopefully the > > > general sense of what the requirement is and what I was trying to=20 > > > express is clear. You can have an outside client application=20 > > > maintain some topologies / list elements, and have others maintained= =20 > > > an populated by the server - or arguably an app embedded in the serve= r. > > > The difference from the "normal" client is that really it is that we= =20 > > > want the server / embedded app that is the authoritative owner of=20 > > > the information. > > >=20 > > > Cheers > > > --- Alex > > >=20 > > > -----Original Message----- > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > Sent: Monday, October 19, 2015 11:07 PM > > > To: Alexander Clemm (alex) > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > >=20 > > > "Alexander Clemm (alex)" wrote: > > > > Hi Martin, > > > >=20 > > > > "So how is the server-provided leaf supposed to be implemented,=20 > > > > and how is it supposed to be used?" > > > >=20 > > > > When a network topology is populated by the server, the=20 > > > > server-provided leaf is supposed to be set to true. > > >=20 > > > But you earlier wrote that when the server wants to change something= =20 > > > it would behave as a normal client. > > >=20 > > > > When a network topology is populated by a client app (through=20 > > > > "regular" configuration), the server provided leaf is supposed to= =20 > > > > be set to false. > > > >=20 > > > > For any given network topology, when the corresponding=20 > > > > "server-provided" leaf is set to "true", attempts to edit the=20 > > > > configuration of that topology are to be rejected. > > >=20 > > > This also goes against what you acknowledged previously - "the=20 > > > server-provided data can be modified by anyone with proper access=20 > > > rights" > > >=20 > > >=20 > > > /martin > > >=20 > > >=20 > > > >=20 > > > > Alternatives to the current design include making the leaf "config= =20 > > > > true", or moving it outside (just this leaf) for a list that=20 > > > > indicates for each topology whether it is server-provided or not=20 > > > > (in a separate "state" branch). > > > > --- Alex > > > >=20 > > > > -----Original Message----- > > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > > Sent: Monday, October 19, 2015 1:27 PM > > > > To: Alexander Clemm (alex) > > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;=20 > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > >=20 > > > > "Alexander Clemm (alex)" wrote: > > > > > Hi Martin, > > > > >=20 > > > > > One model for the data that is server-provided is to assume an=20 > > > > > app (which could be embedded on the same server) that knows how= =20 > > > > > to discover the network, then populates the data accordingly. > > > > >=20 > > > > > [Of course, we would not want any random client app just being=20 > > > > > able to "mess" with that data. The expectation is generally=20 > > > > > clearly access to this will be restricted / controlled. The=20 > > > > > topology instances that were populated by the "server-provided=20 > > > > > app" should not be "touched" by other apps - it is the=20 > > > > > "server-provided" app that is responsible for maintaining them.] > > > > >=20 > > > > > So I assume the answer to your question is "yes", but with a=20 > > > > > bunch of caveats. > > > >=20 > > > > So how is the server-provided leaf supposed to be implemented, and= =20 > > > > how is it supposed to be used? > > > >=20 > > > >=20 > > > > /martin > > > >=20 > > > >=20 > > > >=20 > > > > > --- Alex > > > > >=20 > > > > >=20 > > > > > -----Original Message----- > > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin=20 > > > > > Bjorklund > > > > > Sent: Monday, October 19, 2015 11:32 AM > > > > > To: Alexander Clemm (alex) > > > > > Cc: andy@yumaworks.com; i2rs@ietf.org;=20 > > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz;=20 > > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > >=20 > > > > > Alex, > > > > >=20 > > > > > Is the idea that the server-provided data is normal config? =20 > > > > > I.e., if the server wants to modify this data it behaves like a= =20 > > > > > normal client? > > > > > (conceptually...) And the server-provided data can be modified= =20 > > > > > by anyone with proper access rights? > > > > >=20 > > > > >=20 > > > > > /martin > > > > >=20 > > > > >=20 > > > > >=20 > > > > > "Alexander Clemm (alex)" wrote: > > > > > > Hi Juergen, > > > > > >=20 > > > > > > I think one of the key statements you make below is this: > > > > > > " Recall also that YANG does not allow configuration data to=20 > > > > > > depend on state data." > > > > > >=20 > > > > > > Note that this is not the case in the current model. The=20 > > > > > > current model is essentially all configuration data. Of=20 > > > > > > course, we have this flag to indicate who supplied that data=20 > > > > > > (and is hence maintaining it). > > > > > >=20 > > > > > > You argue that we should instead "split" the model and=20 > > > > > > introduce operational data to reflect what is populated by the = server. > > > > > > However, doing that introduces precisely new issues - and you= =20 > > > > > > have just brought another argument why this may be a bad idea= =20 > > > > > > and may not even work. > > > > > > Topologies _are_ layered, and we need to be able to express=20 > > > > > > that in the model. Now, if we have a topology that is=20 > > > > > > server-provided, hence (per your statement) to be represented= =20 > > > > > > by operational data only, how do we build an overlay topology= =20 > > > > > > that is "configured" on top of it? If the answer is "we=20 > > > > > > can't, unless we replicate the server-provided topology into=20 > > > > > > the network configuration (which makes no sense)", we are screw= ed. > > > > > > Now, we might build it on top if we remove all references /=20 > > > > > > dependencies on the underlay from the model and punt the=20 > > > > > > problem to the user. Basically, no longer have the model=20 > > > > > > express vertical relationships. Not a good solution, IMHO. > > > > > >=20 > > > > > > How do you suggest we address this? The ability to express=20 > > > > > > layering relationships between topologies, including cases=20 > > > > > > where topologies originate from different sources=20 > > > > > > (discovered/server-provided vs configured), is a requirement. > > > > > > It is not an artefact of our model, it is something that we=20 > > > > > > need to capture as part of the model. There may not be a=20 > > > > > > "nice" way of doing this within the YANG framework, yet it is= =20 > > > > > > important that we find a way to do this. The current solution= =20 > > > > > > to this > > > > > > - having the model as configuration data, and including a=20 > > > > > > parameter to indicate who supplies the data and is maintaining= =20 > > > > > > it > > > > > > - appears to be cleanest and clearest solution (or perhaps the= =20 > > > > > > "least bad") that results in the model of least complexity. > > > > > >=20 > > > > > > Perhaps there is something we can simply change about the=20 > > > > > > "server-provided" object to address your concerns? We can=20 > > > > > > make it config (to address your issue that triggered this, the= =20 > > > > > > presence of a r/o object in a tree that is otherwise r/w). > > > > > >=20 > > > > > > Thoughts? > > > > > > --- Alex > > > > > >=20 > > > > > >=20 > > > > > >=20 > > > > > > -----Original Message----- > > > > > > From: Juergen Schoenwaelder > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > > > To: Alexander Clemm (alex) > > > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin=20 > > > > > > Bjorklund ; Andy Bierman ;= =20 > > > > > > 'Alia Atlas' > > > > > > ; 'Jeffrey Haas' ; Susan=20 > > > > > > Hares > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > >=20 > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm=20 > > > > > > (alex) > > > > > > wrote: > > > > > > > Hello Juergen, > > > > > > >=20 > > > > > > > responses inline, delimited with > > > > > > >=20 > > > > > > > --- Alex > > > > > > >=20 > > > > > > > -----Original Message----- > > > > > > > From: Juergen Schoenwaelder > > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > > > To: Alexander Clemm (alex) > > > > > > > Cc: Susan Hares ; Andy Bierman=20 > > > > > > > ; i2rs@ietf.org; Martin Bjorklund=20 > > > > > > > ; Ladislav Lhotka ; 'Alia Atla= s' > > > > > > > ; 'Jeffrey Haas' > > > > > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > >=20 > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm > > > > > > > (alex) > > > > > > > wrote: > > > > > > > >=20 > > > > > > > > The only item in the topology that is read-only concerns=20 > > > > > > > > the "server-provided" flag, but this concerns a separate=20 > > > > > > > > issue that was also discussed (I am not sure if this is=20 > > > > > > > > what you are referring to). > > > > > > > > It is analogous to the other discussion concerning=20 > > > > > > > > distinguishing configuration that has been intended,=20 > > > > > > > > versus one that is in effect etc . This concerns the=20 > > > > > > > > issue that some topologies are populated by the server=20 > > > > > > > > whereas some topologies can be populated by client applicat= ions. > > > > > > >=20 > > > > > > > Yes, this is what the concern is about. > > > > > > >=20 > > > > > > > > We have had discussions in the past whether to "split this= =20 > > > > > > > > up", having a (rw) branch to populate "intended"=20 > > > > > > > > topologies and a > > > > > > > > (ro) branch for topologies "in effect". > > > > > > >=20 > > > > > > > This is the normal way to do this in YANG. And this goes=20 > > > > > > > back to what was driving us for years, namely to clearly=20 > > > > > > > separate config from state. This module makes this=20 > > > > > > > distinction a runtime property controlled by a data model=20 > > > > > > > specific mechanism. None of the generic tools out there will = be able to understand this. > > > > > > >=20 > > > > > > > > > > > > > > I think the issue is more related to the current discussion= =20 > > > > > > > with regards to openconfig and "intended configuration" and= =20 > > > > > > > "applied configuration". If YANG had an existing solution=20 > > > > > > > for this, we would not have this discussion. The reason I=20 > > > > > > > believe this is similar is that you can view the "applied=20 > > > > > > > configuration" as the "server-provided configuration"=20 > > > > > > > (network topology, in our case), and the "intended=20 > > > > > > > configuration" as the, well, configured or intended network= =20 > > > > > > > topology in our case. That said, the issue is not identical > > > > > > > - whereas in the openconfig case every "applied configuration= "=20 > > > > > > > has an accompanying "intended configuration", in our case=20 > > > > > > > this is not necessarily the case > > > > > > > - you can have "applied" [network topologies] that were=20 > > > > > > > provided by the server / the network itself, not configured b= y anybody. > > > > > > > > > > > > >=20 > > > > > > I think this has nothing to do with intended or applied config.= =20 > > > > > > Your 'server supplied topology' appears to me to be=20 > > > > > > operational state and not configuration data. > > > > > > =20 > > > > > > > > We decided against it for various reasons - every piece of= =20 > > > > > > > > information would essentially be duplicated inside the=20 > > > > > > > > model (this is not your normal config vs oper data=20 > > > > > > > > distinction, but would essentially reflect a limitation of= =20 > > > > > > > > the framework), leading to unnecessary additional=20 > > > > > > > > complexity in the model (every augmentation has to be=20 > > > > > > > > conducted in two places), more complex validation rules, et= c. > > > > > > >=20 > > > > > > > I do not understand why this is not a normal config vs oper= =20 > > > > > > > data distinction. Please explain. > > > > > > >=20 > > > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have= =20 > > > > > > > in RFC > > > > > > > 7233 - separate trees with distinct data, some clearly part= =20 > > > > > > > of configuration, other clearly operational data. > > > > > > > In this case, this is different. You have the same data. =20 > > > > > > > However, in some cases it is populated by a client, in other= =20 > > > > > > > cases by the server. > > > > > > > YANG requires the categorization of data as config false or t= rue. =20 > > > > > > > In this case, this categorization does not always apply -=20 > > > > > > > or, the categorization depends on the particular instance. > > > > > > > > > > > > >=20 > > > > > > So you have operational state which is partially populated by= =20 > > > > > > the server and partially populated from config. I fail to see= =20 > > > > > > how this is any different from other cases, including network= =20 > > > > > > interfaces as defined in RFC 7233. Recall also that YANG does= =20 > > > > > > not allow configuration data to depend on state data. > > > > > >=20 > > > > > > > I do not understand how this leads to more complex validation= rules. > > > > > > > Please explain. > > > > > > >=20 > > > > > > > > > > > > > >=20 > > > > > > > One example concerns the supporting nodes/links/TPs. =20 > > > > > > >=20 > > > > > > > We want to be able to express that, for example, a node in=20 > > > > > > > one network is supported by a node in an underlay network. = =20 > > > > > > > For this purpose, we are referencing a node in another (under= lay) network. > > > > > > > So that we cannot reference an arbitrary node in an=20 > > > > > > > arbitrary network, we want to make sure that the supporting= =20 > > > > > > > node is part of a "supporting-network" > > > > > > > of the same network. > > > > > > >=20 > > > > > > > Currently, we have the following definition: > > > > > > >=20 > > > > > > > list supporting-node { > > > > > > > key "network-ref node-ref"; > > > > > > > description > > > > > > > "Represents another node, in an underlay network, t= hat=20 > > > > > > > this node is supported by. Used to represent laye= ring=20 > > > > > > > structure."; > > > > > > > leaf network-ref { > > > > > > > type leafref { > > > > > > > path "../../../supporting-network/network-ref"; > > > > > > > } > > > > > > > description > > > > > > > "References the underlay network that the=20 > > > > > > > underlay node is part of."; > > > > > > > } > > > > > > > leaf node-ref { > > > > > > > type leafref { > > > > > > > path "/network/node/node-id"; > > > > > > > } > > > > > > > description > > > > > > > "References the underlay node itself."; > > > > > > > } > > > > > > / > > > > > > > } > > > > > > >=20 > > > > > > >=20 > > > > > > > If we were to split the model, when we configure a node, we= =20 > > > > > > > will have to account for the fact that the supporting node=20 > > > > > > > could be either part of a "configured" network itself, or of= =20 > > > > > > > a network that has been "server-provided". That is, we need= =20 > > > > > > > to be able to allow for both possibilities. > > > > > >=20 > > > > > > Again note that YANG requires that configuration data does not= =20 > > > > > > depend on state data. You seem to be breaking this rule, no? > > > > > >=20 > > > > > > > To do this, we would no longer be able to have the=20 > > > > > > > network-ref to be part of the key for supporting-node - we=20 > > > > > > > would have to replace network-ref with a choice of two nodes= =20 > > > > > > > that reference either a server-provided network ("branch=20 > > > > > > > 1"), or a configured network ("branch 2"). As a result, we= =20 > > > > > > > will have to introduce a separate way to reference elements i= n list supporting-node. > > > > > > > All of this results in considerable additional complexity. = =20 > > > > > > > Or do you see an easier way? > > > > > > >=20 > > > > > > > > > > > > >=20 > > > > > > I do not think this is the solution. YANG requires that=20 > > > > > > constraints on config true nodes can only refer to other=20 > > > > > > config true nodes in the datastore where the node with the=20 > > > > > > constraint exists. See section > > > > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9= =20 > > > > > > says that a leafref may only point to configuration. I believe= =20 > > > > > > this I-D is violating the distinction between configuration and= state data. > > > > > >=20 > > > > > > /js > > > > > >=20 > > > > > > --=20 > > > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | = Germany > > > > > > Fax: +49 421 200 3103 > > > > > >=20 > > > > >=20 > > > > > _______________________________________________ > > > > > i2rs mailing list > > > > > i2rs@ietf.org > > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > >=20 > > > > > _______________________________________________ > > > > > i2rs mailing list > > > > > i2rs@ietf.org > > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > >=20 > > > >=20 > > >=20 >=20 > --=20 > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 --=20 Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 From nobody Tue Oct 27 10:34:06 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B44A1ACD22 for ; Tue, 27 Oct 2015 10:34:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.889 X-Spam-Level: X-Spam-Status: No, score=-101.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_DOS_OUTLOOK_TO_MX_IMAGE=0.01, USER_IN_WHITELIST=-100] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qQRw90Wubbzs for ; Tue, 27 Oct 2015 10:34:03 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C3AE1ACD21 for ; Tue, 27 Oct 2015 10:34:02 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177; From: "Susan Hares" To: "'Nikolay Milovanov'" References: <023a01d10b5e$8e32a490$aa97edb0$@ndzh.com> In-Reply-To: Date: Tue, 27 Oct 2015 13:34:00 -0400 Message-ID: <03a401d110dd$aafbcaa0$00f35fe0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_NextPart_000_03A5_01D110BC.23EEBE80" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AQIloq7P/aLEdA32Tzpgap3XBXIoAQHye6UTncbiEuA= Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , i2rs@ietf.org, 'Alia Atlas' Subject: Re: [i2rs] I2RS interim on October 21, 2015 at 10:00am - 12:00pm ET - Agenda and Web-ex info X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Oct 2015 17:34:05 -0000 This is a multipart message in MIME format. ------=_NextPart_000_03A5_01D110BC.23EEBE80 Content-Type: multipart/alternative; boundary="----=_NextPart_001_03A6_01D110BC.23EEBE80" ------=_NextPart_001_03A6_01D110BC.23EEBE80 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Topic:=20 I2RS Interim: I2RS Protocol and Data Models-20151021 1401-1=20 Create time:=20 10/21/15 11:30 am=20 File size:=20 54.77MB=20 Duration:=20 1 hour 23 minutes=20 Security:=20 https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif = https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif =20 Description:=20 Streaming recording link:=20 https://ietf.webex.com/ietf/ldr.php?RCID=3D0ae15558e9ebaa1839ee129486e40c= 9c=20 Download recording link:=20 https://ietf.webex.com/ietf/lsr.php?RCID=3D0c9f66715e7add010bd352eb245d55= 40=20 =20 Sue Hares =20 =20 =20 =20 From: Nikolay Milovanov [mailto:n.milovanov@gmail.com]=20 Sent: Saturday, October 24, 2015 5:18 AM To: Susan Hares Cc: i2rs@ietf.org; Jeffrey Haas; Alia Atlas Subject: Re: [i2rs] I2RS interim on October 21, 2015 at 10:00am - = 12:00pm ET - Agenda and Web-ex info =20 Hi,=20 Is there a webex recording from that session?=20 Nikolay =20 On Tue, Oct 20, 2015 at 8:41 PM, Susan Hares wrote: I2RS Interim =20 Date: 10/21/2015 =20 Time: 10:00am - 12:00pm ET=20 =20 I2RS Hackathon Plans [10:00-10:05] =20 I2RS WG LC on Data Modules [10:05-10:20] - Topology Feedback/Changes [Alexander Clemm, 5 minutes] =20 - RIB Feedback/Changes [Sue Hares, 5 minutes]=20 - Discussion: 10 minutes=20 =20 I2RS Hackathon Plans [10:20-10:25]=20 [Sue Hares ] =20 I2RS WG LC Requirements [10:25-10:30]=20 - Feedback Summary [Sue Hares, 5 minutes]=20 =20 I2RS WG Protocol: Initial Thoughts [10:30-11:00]=20 - Protocol Overview [10:30 - 10:45] Sue Hares, Kent Watsen, Andy Bierman=20 =20 - Protocol Examples [10:45- 11:00] 1) I2RS Protocol Independent=20 (RIB, Topology, FB-RIB) 2) BGP, OSPF=20 =20 Discussion [11:00 - 12:00pm ] Web-ex information:=20 =20 Join WebEx meeting=20 https://ietf.webex.com/ietf/j.php?MTID=3Dm7d2c19ef23b22f80144e739ffa59df6= 9 =20 Meeting number: 644 704 791=20 Meeting password: proto.fun.all =20 Join by phone 1-877-668-4493 Call-in toll free number (US/Canada) 1-650-479-3208 Call-in toll number (US/Canada) Access code: 644 704 791 =20 =20 _______________________________________________ i2rs mailing list i2rs@ietf.org https://www.ietf.org/mailman/listinfo/i2rs --=20 BR,=20 Nikolay Milovanov=20 Network Engineer Email: n.milovanov@gmail.com ------=_NextPart_001_03A6_01D110BC.23EEBE80 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable

Topic:

I2RS = Interim: I2RS Protocol and Data Models-20151021 1401-1

Create time: =

10/21/15 11:30 am

File size: =

54.77MB

Duration: =

1 hour 23 minutes

Security: =

3D"https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif"&nb= sp; 3D"https://ietf.webex.com/tc3000/trainingcenter/html/img/1x1.gif"&nb= sp;

Description:

Streaming recording = link:

https://ietf.webex.com/ietf/ldr.php?RCID=3D0ae1555= 8e9ebaa1839ee129486e40c9c

Download recording link:

https://ietf.webex.com/ietf/lsr.php?RCID=3D0c9f667= 15e7add010bd352eb245d5540

 

Sue Hares  

 

 

 

From:= = Nikolay Milovanov [mailto:n.milovanov@gmail.com]
Sent: = Saturday, October 24, 2015 5:18 AM
To: Susan = Hares
Cc: i2rs@ietf.org; Jeffrey Haas; Alia = Atlas
Subject: Re: [i2rs] I2RS interim on October 21, 2015 at = 10:00am - 12:00pm ET - Agenda and Web-ex info

 

Hi, =

Is there a webex recording from that = session?

Nikolay

 

On Tue, = Oct 20, 2015 at 8:41 PM, Susan Hares <shares@ndzh.com> = wrote:

I2RS Interim  =

Date: = 10/21/2015 

Time: 10:00am - = 12:00pm ET

 

I2RS Hackathon = Plans [10:00-10:05]

 

I2RS WG LC on Data = Modules [10:05-10:20]

- Topology = Feedback/Changes [Alexander Clemm, 5 minutes]  =

 - RIB = Feedback/Changes [Sue Hares, 5 minutes]

 - Discussion: = 10 minutes

 

I2RS Hackathon = Plans [10:20-10:25]

  [Sue = Hares ]

 

I2RS WG LC = Requirements [10:25-10:30]

  - = Feedback Summary [Sue Hares, 5 minutes]

  

I2RS WG Protocol: = Initial Thoughts [10:30-11:00]

 - Protocol = Overview [10:30 - 10:45]

    = Sue Hares, Kent Watsen, Andy Bierman

     

 - Protocol = Examples [10:45- 11:00]

   1) = I2RS Protocol Independent

   (RIB, Topology, FB-RIB)

   2) = BGP, OSPF

 

 Discussion  [11:00 - 12:00pm ]

 Web-ex = information:

 

Join WebEx meeting =

https://ietf.webex.com/ietf/j.php?MTID=3Dm7d2c19ef23b22= f80144e739ffa59df69

 

Meeting number: =   644 704 791

Meeting password: = proto.fun.all

 

Join by = phone

1-877-668-4493 = Call-in toll free number (US/Canada)

1-650-479-3208 = Call-in toll number (US/Canada)

Access code: 644 = 704 791

 <= /o:p>

 <= /o:p>


______________________________________= _________
i2rs mailing list
i2rs@ietf.org
https://www.ietf.org/mailman/listinfo/i2rs




-- =

BR,

Nikolay Milovanov =
Network Engineer
Email: n.milovanov@gmail.com

------=_NextPart_001_03A6_01D110BC.23EEBE80-- ------=_NextPart_000_03A5_01D110BC.23EEBE80 Content-Type: image/png; name="image001.png" Content-Transfer-Encoding: base64 Content-ID: iVBORw0KGgoAAAANSUhEUgAAAA4AAAAOCAMAAAAolt3jAAAAAXNSR0ICQMB9xQAAAANQTFRFAAAA p3o92gAAAAF0Uk5TAEDm2GYAAAAJcEhZcwAADsQAAA7EAZUrDhsAAAAZdEVYdFNvZnR3YXJlAE1p Y3Jvc29mdCBPZmZpY2V/7TVxAAAADElEQVQY02NgGG4AAADSAAE9ewGOAAAAAElFTkSuQmCC ------=_NextPart_000_03A5_01D110BC.23EEBE80-- From nobody Wed Oct 28 05:47:26 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECAC21B54D5 for ; Wed, 28 Oct 2015 05:47:24 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f9FVf1J60LVi for ; Wed, 28 Oct 2015 05:47:23 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B9F11B54D1 for ; Wed, 28 Oct 2015 05:47:23 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177; From: "Susan Hares" To: Date: Wed, 28 Oct 2015 08:47:16 -0400 Message-ID: <01bd01d1117e$c7db3b00$5791b100$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_01BE_01D1115D.40CCA840" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdERfjXXCa9tJaDOQpuOK4QqSVas0g== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: [i2rs] WG LC on Requirements X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Oct 2015 12:47:25 -0000 This is a multipart message in MIME format. ------=_NextPart_000_01BE_01D1115D.40CCA840 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit In October we had WG LC on 4 requirements documents draft-ietf-i2rs-ephemeral-state-02.txt draft-ietf-i2rs-protocol-security-requirements-01.txt draft-ietf-i2rs-pub-sub-requirements-03.txt draft-ietf-i2rs-traceability-03.txt The pub-sub and traceability were WG LC in June 2015. All the requirements will go to the IESG at the same time so this check was to see if there was any inconsistency in the requirements. The comments on the requirements focus on the requirements for Ephemeral state (draft-ietf-i2rs-ephemeral-state-02.txt). The changes involved some editorial issues and the minimum amount of changes to the NETCONF or RESTCONF. On Monday, a new ephemeral state document will be released along with a new architecture model to address the editorial issues. At IETF 94, the I2RS meeting and NETCONF meeting will discuss initial input on the I2RS protocol. The result of these discussions will be input into the ephemeral document for the minimal state requirements for NETCONF and RESTCONF. A WG LC will for the ephemeral state will changes will begin on 11/6 and complete on 11/20. At that time, the 4 requirements documents will be passed to the IESG. Sue Hares 1) ------=_NextPart_000_01BE_01D1115D.40CCA840 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

In October = we had WG LC on 4 requirements documents  

 

draft-ietf-i2rs-ephemeral-state-02.txt

draft-ietf-i2rs-protocol-security-requirements= -01.txt

draft-ietf-i2rs-pub-sub-requirements-03.txt

draft-ietf-i2rs-traceability-03.txt=

         &= nbsp;   

The pub-sub = and traceability were WG LC in June 2015.

All the requirements will go to the IESG at the same = time

so this check was to see if = there was any inconsistency in

the = requirements.  

 

The comments = on the requirements focus on the requirements for

Ephemeral state = (draft-ietf-i2rs-ephemeral-state-02.txt).

The changes involved some editorial issues and the = minimum amount of

changes to the = NETCONF or RESTCONF. 

 

On Monday, a = new ephemeral state document will be released along

with a new architecture model to address the editorial = issues.

 

At IETF 94, the I2RS meeting and NETCONF meeting will = discuss initial input on the I2RS protocol.  The result of these = discussions will be input into the ephemeral document for the minimal = state requirements for NETCONF and RESTCONF.   A WG LC will = for the ephemeral state will changes will begin on 11/6 and complete on = 11/20.  At that time, the 4 requirements documents will be passed = to the IESG.

 

Sue Hares

 

1)      =  

------=_NextPart_000_01BE_01D1115D.40CCA840-- From nobody Wed Oct 28 05:51:42 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 024221B54FB for ; Wed, 28 Oct 2015 05:51:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -97.654 X-Spam-Level: X-Spam-Status: No, score=-97.654 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Uf4JLI-WMYYG for ; Wed, 28 Oct 2015 05:51:36 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABB541B54FF for ; Wed, 28 Oct 2015 05:51:36 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177; From: "Susan Hares" To: Date: Wed, 28 Oct 2015 08:51:31 -0400 Message-ID: <01ca01d1117f$5f4792e0$1dd6b8a0$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_01CB_01D1115D.D835F2E0" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdERfxn4aMOBK5kiSWCCdjYT+MxIOA== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Cc: 'Jeffrey Haas' , 'Alia Atlas' Subject: [i2rs] WG LC on RIB Information Model X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Oct 2015 12:51:41 -0000 This is a multipart message in MIME format. ------=_NextPart_000_01CB_01D1115D.D835F2E0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit The I2RS WG LC on the RIB Informational Model has completed. The WG has reached consensus on this document. The next steps for this document are Shepherd reviews and routing-area reviews prior to submission to the IESG. Sue ------=_NextPart_000_01CB_01D1115D.D835F2E0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

The I2RS = WG LC on the RIB Informational Model has completed. The WG has reached = consensus on this document. 

 

The next = steps for this document are Shepherd reviews and routing-area reviews = prior to submission to the IESG.

 

Sue =

------=_NextPart_000_01CB_01D1115D.D835F2E0-- From nobody Wed Oct 28 05:55:39 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCAFF1B371F for ; Wed, 28 Oct 2015 05:55:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.054 X-Spam-Level: X-Spam-Status: No, score=-99.054 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DOS_OUTLOOK_TO_MX=2.845, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ytd5pUWwwPIN for ; Wed, 28 Oct 2015 05:55:35 -0700 (PDT) Received: from hickoryhill-consulting.com (hhc-web3.hickoryhill-consulting.com [64.9.205.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD9941A87BE for ; Wed, 28 Oct 2015 05:55:35 -0700 (PDT) X-Default-Received-SPF: pass (skip=loggedin (res=PASS)) x-ip-name=74.43.47.177; From: "Susan Hares" To: Date: Wed, 28 Oct 2015 08:55:31 -0400 Message-ID: <01e301d1117f$ee4a98c0$cadfca40$@ndzh.com> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_01E4_01D1115E.673A0A30" X-Mailer: Microsoft Outlook 14.0 Thread-Index: AdERf2h0uhW06NpyR3SF8jdruVxlWg== Content-Language: en-us X-Authenticated-User: skh@ndzh.com Archived-At: Subject: [i2rs] WG LC on Topology Data models X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Oct 2015 12:55:36 -0000 This is a multipart message in MIME format. ------=_NextPart_000_01E4_01D1115E.673A0A30 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit The WG LC on topology data models included: draft-ietf-i2rs-yang-network-topo-01 draft-ietf-i2rs-yang-l3-topology-00 draft-ietf-i2rs-yang-l2-topology-00 The discussion on the WG list is continuing so there is no consensus at this time. A second WG LC will be called in November. Sue ------=_NextPart_000_01E4_01D1115E.673A0A30 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

The WG LC = on topology data models included:

 

draft-ietf-i2rs-yang-network-topo-01

draft-ietf-i2rs-yang-l3-topology-00

draft-ietf-i2rs-yang-l2-topology-00

 

The = discussion on the WG list is continuing so there is no consensus at this = time.

A second WG LC will be called = in November.

 

Sue

------=_NextPart_000_01E4_01D1115E.673A0A30-- From nobody Sat Oct 31 09:32:09 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32B481A90A0 for ; Fri, 23 Oct 2015 13:51:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.91 X-Spam-Level: X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HotC-IusMLgc for ; Fri, 23 Oct 2015 13:51:33 -0700 (PDT) Received: from mail3.advaoptical.com (mail3.advaoptical.com [74.202.24.82]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD0571A9095 for ; Fri, 23 Oct 2015 13:51:33 -0700 (PDT) Received: from atl-srv-mail10.atl.advaoptical.com (atl-srv-mail10.atl.advaoptical.com [172.16.5.39]) by atl-vs-fsmail.advaoptical.com (8.14.5/8.14.5) with ESMTP id t9NKpSlk013647 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 23 Oct 2015 16:51:28 -0400 Received: from ATL-SRV-MBX2.advaoptical.com (172.16.5.46) by atl-srv-mail10.atl.advaoptical.com (172.16.5.39) with Microsoft SMTP Server (TLS) id 14.3.235.1; Fri, 23 Oct 2015 16:51:28 -0400 Received: from ATL-SRV-MBX1.advaoptical.com (172.16.5.45) by ATL-SRV-MBX2.advaoptical.com (172.16.5.46) with Microsoft SMTP Server (TLS) id 15.0.1130.7; Fri, 23 Oct 2015 16:51:27 -0400 Received: from ATL-SRV-MBX1.advaoptical.com ([fe80::6433:f8f:ea41:a6e1]) by ATL-SRV-MBX1.advaoptical.com ([fe80::6433:f8f:ea41:a6e1%14]) with mapi id 15.00.1130.005; Fri, 23 Oct 2015 16:51:27 -0400 From: Igor Bryskin To: Gert Grammel Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCvyljviOgW4frUSu74ok3kAJ4554e+CAgACQIqCAAMBsAP//wC4A Date: Fri, 23 Oct 2015 20:51:26 +0000 Message-ID: <52d07bf5ecc64f6ab55442e1ff5344b4@ATL-SRV-MBX1.advaoptical.com> References: <20151019195558.GB81648@elstar.local> <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> <20151020.080426.1227842775405864528.mbj@tail-f.com> <9735f78c1b654837812606f26591bfaa@XCH-RCD-001.cisco.com>, <71060292c9a84e0eab36475a5b7c3827@ATL-SRV-MBX1.advaoptical.com> <124E6C4C-0258-41B1-B1FF-C770361E4802@juniper.net> In-Reply-To: <124E6C4C-0258-41B1-B1FF-C770361E4802@juniper.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [172.16.5.49] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151, 1.0.33, 0.0.0000 definitions=2015-10-23_13:2015-10-23,2015-10-23,1970-01-01 signatures=0 Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 09:32:06 -0700 Cc: "i2rs@ietf.org" , Martin Bjorklund , "Alexander Clemm \(alex\)" , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "lhotka@nic.cz" , "jhaas@pfrc.org" , "akatlas@gmail.com" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 20:51:36 -0000 Gert, You are right. When the user configures an abstract link specifying the und= erlay topology path, the user essentially provides a set of inclusion const= raints for the trail supporting the link. Although it is not reflected yet = in the TE-TOPO model, it should be possible to specify whether it is accept= able or not to deviate from said constraints on the trail setup and/or duri= ng its lifetime (e.g. in case of restoration). One server side implementati= on you and I are aware of has this capability already. Kind regards, Igor -----Original Message----- From: Gert Grammel [mailto:ggrammel@juniper.net]=20 Sent: Friday, October 23, 2015 4:16 PM To: Igor Bryskin Cc: Alexander Clemm (alex) ; Martin Bjorklund ; andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs-university.d= e; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Hi Igor, It would be advisable to let the client decide whether a different underlay= shall invalidate the intended config.=20 Best Gert Sent from my Apple ][ > On 23 Oct 2015, at 15:00, Igor Bryskin wrote: >=20 > Hi Martin, >=20 > It is possible that a user configures a link of a customized (user define= d) topology providing also the path defined in underlay server defined topo= logy. Said underlay path needs to be considered as intended configuration. = Actual underlay path will be state data in this case ( personally I also do= not see a difference between state and server provided data), which may or= may not match the intended underlay path. The actual underlay path may als= o change over time due, for example, network failure restoration procedures= affecting the underlay topology. > The link of the user defined topology is not invalidated in this case. Us= er just has to deal with the fact that the intended configuration may not n= ecessarily match the actual configuration and state data. >=20 > Cheers, > Igor >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Thursday, October 22, 2015 8:12 PM > To: Martin Bjorklund > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; a= ndy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Martin, >=20 > Agree, we need to add text for this. Good catch. =20 >=20 > The reality is that the integrity of the links between overlay and underl= ay will be broken. The fact that those links will be invalidated is someth= ing that ultimately needs to be indicated. =20 >=20 > Since the interface analogy was brought up, this problem is actually face= d by layered interfaces that are user controlled as as well. What is the s= olution that is applied there? (I guess it is basically left up to the app= lication, correct?) >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com]=20 > Sent: Monday, October 19, 2015 11:04 PM >=20 > ..... >=20 >=20 > What happens in your model if a user-defined network has a reference to a= server-provided network, and the sever decides to remove its network? I s= ee no special text in your document about this case. >=20 >=20 >=20 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Sat Oct 31 09:32:10 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 83BC91B2BAB for ; Fri, 23 Oct 2015 17:58:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.511 X-Spam-Level: X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KGwq77yOZtlj for ; Fri, 23 Oct 2015 17:58:20 -0700 (PDT) Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B5871B2BA3 for ; Fri, 23 Oct 2015 17:58:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4775; q=dns/txt; s=iport; t=1445648300; x=1446857900; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=BPiLdcJSyeFvmujIBNsxxAJEvXhAsdYf7RqJu8NoGPY=; b=mdhsYKySguptC8jWX4ZtBOReyvFbOkJNKauP+gUTvfVveaqDbQ0xgqiJ aCykGKENbBgIv2EFGbUcmhebvxt47ZORJIcEHRj+E2q6ytE5Hl6+RfSz6 S4y+K0Bt61NzKa0Je+gYfsYThJoUJpW8x7fWZ27aARugUrQvc7As8L9dW I=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0D9AQC11ipW/5xdJa1egzZUbwa+LwENgVoXCoV8AoE4OBQBAQEBAQEBgQqEMgEBAQMBAQEBNzQEBwUHBAIBCA4CAQQBAQEeCQchBgsUCQgCBAENBQgTiAADCggNwSINhFYBAQEBAQEBAQEBAQEBAQEBAQEBAQEUBIt1glCBciArBwaEKAWWMAGLKoFugV+TA4Ndg28BHwEBQoIRHYFVcoVRJRyBBgEBAQ X-IronPort-AV: E=Sophos;i="5.20,189,1444694400"; d="scan'208";a="201395919" Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 24 Oct 2015 00:58:19 +0000 Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t9O0wJ00016999 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 24 Oct 2015 00:58:19 GMT Received: from xch-rcd-001.cisco.com (173.37.102.11) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Fri, 23 Oct 2015 19:57:58 -0500 Received: from xch-rcd-001.cisco.com ([173.37.102.11]) by XCH-RCD-001.cisco.com ([173.37.102.11]) with mapi id 15.00.1104.000; Fri, 23 Oct 2015 19:57:58 -0500 From: "Alexander Clemm (alex)" To: Igor Bryskin , Gert Grammel Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCvyW/kuRuGBpeEOwmI81xAetCJ54NaeQgAEtqwCAAHngAIAACdEA///tSjA= Date: Sat, 24 Oct 2015 00:57:57 +0000 Message-ID: <973765c94263495cb82d810e71a108e5@XCH-RCD-001.cisco.com> References: <20151019195558.GB81648@elstar.local> <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> <20151020.080426.1227842775405864528.mbj@tail-f.com> <9735f78c1b654837812606f26591bfaa@XCH-RCD-001.cisco.com>, <71060292c9a84e0eab36475a5b7c3827@ATL-SRV-MBX1.advaoptical.com> <124E6C4C-0258-41B1-B1FF-C770361E4802@juniper.net> <52d07bf5ecc64f6ab55442e1ff5344b4@ATL-SRV-MBX1.advaoptical.com> In-Reply-To: <52d07bf5ecc64f6ab55442e1ff5344b4@ATL-SRV-MBX1.advaoptical.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.154.205.105] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 09:32:06 -0700 Cc: "lhotka@nic.cz" , "i2rs@ietf.org" , Martin Bjorklund , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 24 Oct 2015 00:58:22 -0000 This is an interesting suggestion. Taking this a little further rises the = question how this would be represented.=20 One option would be the introduction of another flag indicating the "valida= tion policy" that should be applied. Or, perhaps preferrably, introducing = a separate state (can be in a separate subtree) to indicate the current int= egrity state with regards to layering relationships, where any changes in t= he underlay that have not been properly tracked in configured layering rela= tionships would be tracked/flagged. =20 --- Alex -----Original Message----- From: Igor Bryskin [mailto:IBryskin@advaoptical.com]=20 Sent: Friday, October 23, 2015 1:51 PM To: Gert Grammel Cc: Alexander Clemm (alex) ; Martin Bjorklund ; andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs-university.d= e; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com Subject: RE: [i2rs] WG LC for Topology (10/1 to 10/14) Gert, You are right. When the user configures an abstract link specifying the und= erlay topology path, the user essentially provides a set of inclusion const= raints for the trail supporting the link. Although it is not reflected yet = in the TE-TOPO model, it should be possible to specify whether it is accept= able or not to deviate from said constraints on the trail setup and/or duri= ng its lifetime (e.g. in case of restoration). One server side implementati= on you and I are aware of has this capability already. Kind regards, Igor -----Original Message----- From: Gert Grammel [mailto:ggrammel@juniper.net]=20 Sent: Friday, October 23, 2015 4:16 PM To: Igor Bryskin Cc: Alexander Clemm (alex) ; Martin Bjorklund ; andy@yumaworks.com; i2rs@ietf.org; j.schoenwaelder@jacobs-university.d= e; lhotka@nic.cz; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) Hi Igor, It would be advisable to let the client decide whether a different underlay= shall invalidate the intended config.=20 Best Gert Sent from my Apple ][ > On 23 Oct 2015, at 15:00, Igor Bryskin wrote: >=20 > Hi Martin, >=20 > It is possible that a user configures a link of a customized (user define= d) topology providing also the path defined in underlay server defined topo= logy. Said underlay path needs to be considered as intended configuration. = Actual underlay path will be state data in this case ( personally I also do= not see a difference between state and server provided data), which may or= may not match the intended underlay path. The actual underlay path may als= o change over time due, for example, network failure restoration procedures= affecting the underlay topology. > The link of the user defined topology is not invalidated in this case. Us= er just has to deal with the fact that the intended configuration may not n= ecessarily match the actual configuration and state data. >=20 > Cheers, > Igor >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Thursday, October 22, 2015 8:12 PM > To: Martin Bjorklund > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; a= ndy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Martin, >=20 > Agree, we need to add text for this. Good catch. =20 >=20 > The reality is that the integrity of the links between overlay and underl= ay will be broken. The fact that those links will be invalidated is someth= ing that ultimately needs to be indicated. =20 >=20 > Since the interface analogy was brought up, this problem is actually face= d by layered interfaces that are user controlled as as well. What is the s= olution that is applied there? (I guess it is basically left up to the app= lication, correct?) >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com]=20 > Sent: Monday, October 19, 2015 11:04 PM >=20 > ..... >=20 >=20 > What happens in your model if a user-defined network has a reference to a= server-provided network, and the sever decides to remove its network? I s= ee no special text in your document about this case. >=20 >=20 >=20 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Sat Oct 31 09:32:12 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 639C41B3283 for ; Sun, 25 Oct 2015 15:17:00 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: 0.79 X-Spam-Level: X-Spam-Status: No, score=0.79 tagged_above=-999 required=5 tests=[BAYES_50=0.8, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I4QkJ6B6mgA3 for ; Sun, 25 Oct 2015 15:16:59 -0700 (PDT) Received: from server.riw.us (server.riw.us [162.144.32.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E65D11B3282 for ; Sun, 25 Oct 2015 15:16:58 -0700 (PDT) Received: from 162-229-180-77.lightspeed.rlghnc.sbcglobal.net ([162.229.180.77]:56741 helo=Russ) by server.riw.us with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.86) (envelope-from ) id 1ZqTaF-000249-N7; Sun, 25 Oct 2015 22:16:11 +0000 From: "Russ White" To: "'Alexander Clemm \(alex\)'" , "'Martin Bjorklund'" References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> In-Reply-To: <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> Date: Sun, 25 Oct 2015 18:16:09 -0400 Message-ID: <001101d10f72$c1359e20$43a0da60$@riw.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQIa+nl93GxCjlQL2WL76GNM6fnHGAIupcJKAr7FDe4BQ7rtzALImv4NnaEhJwA= Content-Language: en-us X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - server.riw.us X-AntiAbuse: Original Domain - ietf.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - riw.us X-Get-Message-Sender-Via: server.riw.us: authenticated_id: russw@riw.us X-Authenticated-Sender: server.riw.us: russw@riw.us X-Source: X-Source-Args: X-Source-Dir: Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 09:32:06 -0700 Cc: lhotka@nic.cz, i2rs@ietf.org, 'Kent Watsen' , j.schoenwaelder@jacobs-university.de, andy@yumaworks.com, akatlas@gmail.com, jhaas@pfrc.org, shares@ndzh.com Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 25 Oct 2015 22:17:00 -0000 > However, I still feel that we are dealing with a limitation of the YANG > framework here. I think we are dealing with a use case that was not really > foreseen in the YANG design, i.e. that we might run into data that has > instances that can indeed be authoritatively owned by a server versus others > representing more traditional configuration. I've not followed this entire thread, but I'm a bit baffled by the discussion at this point. I thought I2RS was based on an atomic/RESTful model, rather than being transactional. What's being discussed here, though, smells a lot like a transaction based model -- one device sets some part of the "configuration" (BTW, I object to the term "configuration" in the first place, as I2RS is not dealing with configuration, but rather ephemeral state -- completely different things) in such a way that no other controller can change it. This all seems contrary to the spirit of what we're working on here... There should be priorities to understand which controller/agent has priority over the others, and there should be callbacks when your piece of state is overwritten by some other device (whether local or another controller), but there shouldn't be this concept of a "completed transaction" that we seem to be talking about here. I get the distinct feeling we're trying to boil the ocean once again -- I2RS is not going to configure the entire device (minus some trivial stuff no-one cares about). I2RS should not be trying to build a fully transactional database on each device, with locks and such. This should be fast and light, operating at the speed of any other routing protocol (on the order of milliseconds), not on the order of minutes/days/weeks/months. Can someone please explain why we're talking about this sort of "configuration?" Russ From nobody Sat Oct 31 09:32:13 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2C051B5168 for ; Mon, 26 Oct 2015 12:30:01 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.678 X-Spam-Level: X-Spam-Status: No, score=-0.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_64=0.6, SPF_PASS=-0.001] autolearn=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xxUd9bujAKsv for ; Mon, 26 Oct 2015 12:29:55 -0700 (PDT) Received: from mail-lf0-x235.google.com (mail-lf0-x235.google.com [IPv6:2a00:1450:4010:c07::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00BD21B510F for ; Mon, 26 Oct 2015 12:29:53 -0700 (PDT) Received: by lfbn126 with SMTP id n126so126393028lfb.2 for ; Mon, 26 Oct 2015 12:29:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks_com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=0XplCKzvu6iS4/+m1ZFz1SMpiKfiBv6mALatgwFbGMk=; b=einQmOlKP7guSJBWh3h12tWn9KvBw+jtmf129GazWVgnyvt2cK7XoZ0HJCElogoLhQ mw6qYMUM+mjkXjtjF6aiJAas0daNiLx8hZ0gaKLeeQ/vIouC6bDV3r8fNirzTZpfe2MH I6oIGUihzmBTk0V4H7NXkKI2JKslX0FUUWlfLMj8vZPg8ProCgdUcOk/H6YjqDR+bRw2 QkikrHQam+K213OjQ8lV+TGygz0bcyCPaTMrFdJ6RmAym5wwRAfzQ11E5S2ooNPl+vWv or2XB53DVtCFxI/N8Xly+XYddrn95kC38JdrNhBW8+bZ9iXxSIYdp85HcTxZ6eOFfNLp 0SSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=0XplCKzvu6iS4/+m1ZFz1SMpiKfiBv6mALatgwFbGMk=; b=NTxWdHQZcexluDhBVeAPgAx0chHk2R1RHo3LuMKkPW2Vb5zBf2NRDQ9cUgQcDPFn0K 9NppyEwFRaRU3nD9NyFsOJzGfuRIBWgpNj5dUj3HN6NfbhadkI12irpb9krWQ4Ym7Wpn DmakpaovKBWrqekw+cAA6FTWYC1C44PYBh2je5XuEMphzhAV8V9rOv0Ej9pXlwARS1fm L1zQtDwl1D6XDNqc6zH3rPNAlplzJr6owQlBgNCXbuGzuv0TPtlesZyj+XrfoqrNw4s6 m2yRgN3SITyozZ9slTJiNEcj+ouFSPIzW4YYsN6IleUZhMxAL8vUnSHOtaf30ndRea3e Hn+g== X-Gm-Message-State: ALoCoQm6ViMaUf4mDUpjgKt4H/H6twNp5dvbXzjAWz79uu3AmdVcWZsP1Lhf5qND4RNcm2QYJ14K MIME-Version: 1.0 X-Received: by 10.112.200.229 with SMTP id jv5mr17856316lbc.123.1445887792081; Mon, 26 Oct 2015 12:29:52 -0700 (PDT) Received: by 10.112.138.72 with HTTP; Mon, 26 Oct 2015 12:29:51 -0700 (PDT) In-Reply-To: <20151026191305.GA44943@elstar.local> References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> <20151026181834.GB44567@elstar.local> <8cda728006de456b8439114073c3ae4b@XCH-RCD-001.cisco.com> <20151026191305.GA44943@elstar.local> Date: Mon, 26 Oct 2015 12:29:51 -0700 Message-ID: From: Andy Bierman To: Juergen Schoenwaelder , "Alexander Clemm (alex)" , Martin Bjorklund , "lhotka@nic.cz" , "i2rs@ietf.org" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" , Kent Watsen Content-Type: multipart/alternative; boundary=001a11c266503b89b0052306fcc9 Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 09:32:06 -0700 Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Oct 2015 19:30:02 -0000 --001a11c266503b89b0052306fcc9 Content-Type: text/plain; charset=UTF-8 Hi, I agree that adding meta-data will have no affect on a client that thinks it can edit config=true. Especially when the knob that overrides the semantics of the config-stmt is in the configuration itself. So why can't the interfaces + interfaces-state design be applied here? Given that charter explicitly states read-only topology, why is this even in there? You can define objects in a grouping later. It is OK to reorg objects into/out of groupings if the same "final" syntax and semantics is maintained. Andy On Mon, Oct 26, 2015 at 12:13 PM, Juergen Schoenwaelder < j.schoenwaelder@jacobs-university.de> wrote: > I do not think metadata changes the way configuration datastore > validation works. > > /js > > On Mon, Oct 26, 2015 at 07:10:56PM +0000, Alexander Clemm (alex) wrote: > > Hi Juergen, > > Understood, but this doesn't really address our problem here. We want > to see how we can apply YANG to meet our needs, not the other way round. > Hence the suggestion to explore the use of metadata here. > > --- Alex > > > > -----Original Message----- > > From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de > ] > > Sent: Monday, October 26, 2015 11:19 AM > > To: Alexander Clemm (alex) > > Cc: Martin Bjorklund ; lhotka@nic.cz; i2rs@ietf.org; > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com; > Kent Watsen > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > In YANG, it is assumed that config true nodes exist in a datastore where > all config true nodes are treated the same. A datastore is the unit of > validation and we don't want to have a valid configuration datatore become > invalid arbitrarily. This is why config true nodes are not allowed to > depend on config false nodes (state data that can change arbitrarily). > > > > /js > > > > On Sat, Oct 24, 2015 at 01:15:55AM +0000, Alexander Clemm (alex) wrote: > > > Hi Martin, > > > > > > maybe option 1 provides a way out here. This also has the least > impact on the existing design and implementation, hence preferable. > > > > > > However, I still feel that we are dealing with a limitation of the > YANG framework here. I think we are dealing with a use case that was not > really foreseen in the YANG design, i.e. that we might run into data that > has instances that can indeed be authoritatively owned by a server versus > others representing more traditional configuration. The one aspect that > not really address by making it regular config concerns your assertion that > "any other client can modify what this client wrote". Access rights could > provide a solution, but not in the way as currently defined via NACM, since > we would need to differentiate access rights at the instance level, not at > the module definition level. Rather than seeing how we can make our > requirements somehow fit a rigid interpretation of the YANG framework (that > does not allow for special treatment / behavior of special cases), I would > like to see whether the YANG framework can be flexible enough to still > support what we are trying to do. > > > > > > Kent made what I thought was a very interesting suggestion at the > interim, asking whether this would be an application for metadata. I think > this is something that we might leverage here. We could introduce a > metadata item that indicates for configuration information whether that was > populated by a server, so really should not be modified by other clients > (or, when modified, will presumably be "changed back" by the server). Or, > that might simply be locked by the server. > > > > > > Thoughts regarding that suggestion? > > > > > > --- Alex > > > > > > -----Original Message----- > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > Sent: Friday, October 23, 2015 12:17 AM > > > To: Alexander Clemm (alex) > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > "Alexander Clemm (alex)" wrote: > > > > Hi Martin, > > > > > > > > We can nitpick over how to best express this > > > > > > This isn't nitpicking; I am trying to understand what you had in mind. > > > > > > And it seems Juergen is correct. You essentially want to mix config > and operational state in a single list. This is not possible to express in > YANG, so you change the semantics of the formal statements with > descriptions. I don't think this a good idea. > > > > > > I can think of two alternatives to the current design that don't > violate YANG: > > > > > > 1) Keep the single config true list, w/o the server-provided leaf, > > > and explain in text that there might be a client > > > "internal-to-the-server" that behaves just like any other client > > > (specifically respects locks, makes sure the end result is > > > valid, and any other client can modify what this client wrote > > > (module access rights)). > > > > > > 2) Split the model into two, one config list and one oper list. > > > References in the config list can either be by name (implicit) or > > > use the new YANG 1.1 syntax "require-instance false"; > > > > > > > > > /martin > > > > > > > , but hopefully the > > > > general sense of what the requirement is and what I was trying to > > > > express is clear. You can have an outside client application > > > > maintain some topologies / list elements, and have others maintained > > > > an populated by the server - or arguably an app embedded in the > server. > > > > The difference from the "normal" client is that really it is that we > > > > want the server / embedded app that is the authoritative owner of > > > > the information. > > > > > > > > Cheers > > > > --- Alex > > > > > > > > -----Original Message----- > > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > > Sent: Monday, October 19, 2015 11:07 PM > > > > To: Alexander Clemm (alex) > > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > "Alexander Clemm (alex)" wrote: > > > > > Hi Martin, > > > > > > > > > > "So how is the server-provided leaf supposed to be implemented, > > > > > and how is it supposed to be used?" > > > > > > > > > > When a network topology is populated by the server, the > > > > > server-provided leaf is supposed to be set to true. > > > > > > > > But you earlier wrote that when the server wants to change something > > > > it would behave as a normal client. > > > > > > > > > When a network topology is populated by a client app (through > > > > > "regular" configuration), the server provided leaf is supposed to > > > > > be set to false. > > > > > > > > > > For any given network topology, when the corresponding > > > > > "server-provided" leaf is set to "true", attempts to edit the > > > > > configuration of that topology are to be rejected. > > > > > > > > This also goes against what you acknowledged previously - "the > > > > server-provided data can be modified by anyone with proper access > > > > rights" > > > > > > > > > > > > /martin > > > > > > > > > > > > > > > > > > Alternatives to the current design include making the leaf "config > > > > > true", or moving it outside (just this leaf) for a list that > > > > > indicates for each topology whether it is server-provided or not > > > > > (in a separate "state" branch). > > > > > --- Alex > > > > > > > > > > -----Original Message----- > > > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > > > Sent: Monday, October 19, 2015 1:27 PM > > > > > To: Alexander Clemm (alex) > > > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > "Alexander Clemm (alex)" wrote: > > > > > > Hi Martin, > > > > > > > > > > > > One model for the data that is server-provided is to assume an > > > > > > app (which could be embedded on the same server) that knows how > > > > > > to discover the network, then populates the data accordingly. > > > > > > > > > > > > [Of course, we would not want any random client app just being > > > > > > able to "mess" with that data. The expectation is generally > > > > > > clearly access to this will be restricted / controlled. The > > > > > > topology instances that were populated by the "server-provided > > > > > > app" should not be "touched" by other apps - it is the > > > > > > "server-provided" app that is responsible for maintaining them.] > > > > > > > > > > > > So I assume the answer to your question is "yes", but with a > > > > > > bunch of caveats. > > > > > > > > > > So how is the server-provided leaf supposed to be implemented, and > > > > > how is it supposed to be used? > > > > > > > > > > > > > > > /martin > > > > > > > > > > > > > > > > > > > > > --- Alex > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > > > > > > Bjorklund > > > > > > Sent: Monday, October 19, 2015 11:32 AM > > > > > > To: Alexander Clemm (alex) > > > > > > Cc: andy@yumaworks.com; i2rs@ietf.org; > > > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; > > > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > > > Alex, > > > > > > > > > > > > Is the idea that the server-provided data is normal config? > > > > > > I.e., if the server wants to modify this data it behaves like a > > > > > > normal client? > > > > > > (conceptually...) And the server-provided data can be modified > > > > > > by anyone with proper access rights? > > > > > > > > > > > > > > > > > > /martin > > > > > > > > > > > > > > > > > > > > > > > > "Alexander Clemm (alex)" wrote: > > > > > > > Hi Juergen, > > > > > > > > > > > > > > I think one of the key statements you make below is this: > > > > > > > " Recall also that YANG does not allow configuration data to > > > > > > > depend on state data." > > > > > > > > > > > > > > Note that this is not the case in the current model. The > > > > > > > current model is essentially all configuration data. Of > > > > > > > course, we have this flag to indicate who supplied that data > > > > > > > (and is hence maintaining it). > > > > > > > > > > > > > > You argue that we should instead "split" the model and > > > > > > > introduce operational data to reflect what is populated by the > server. > > > > > > > However, doing that introduces precisely new issues - and you > > > > > > > have just brought another argument why this may be a bad idea > > > > > > > and may not even work. > > > > > > > Topologies _are_ layered, and we need to be able to express > > > > > > > that in the model. Now, if we have a topology that is > > > > > > > server-provided, hence (per your statement) to be represented > > > > > > > by operational data only, how do we build an overlay topology > > > > > > > that is "configured" on top of it? If the answer is "we > > > > > > > can't, unless we replicate the server-provided topology into > > > > > > > the network configuration (which makes no sense)", we are > screwed. > > > > > > > Now, we might build it on top if we remove all references / > > > > > > > dependencies on the underlay from the model and punt the > > > > > > > problem to the user. Basically, no longer have the model > > > > > > > express vertical relationships. Not a good solution, IMHO. > > > > > > > > > > > > > > How do you suggest we address this? The ability to express > > > > > > > layering relationships between topologies, including cases > > > > > > > where topologies originate from different sources > > > > > > > (discovered/server-provided vs configured), is a requirement. > > > > > > > It is not an artefact of our model, it is something that we > > > > > > > need to capture as part of the model. There may not be a > > > > > > > "nice" way of doing this within the YANG framework, yet it is > > > > > > > important that we find a way to do this. The current solution > > > > > > > to this > > > > > > > - having the model as configuration data, and including a > > > > > > > parameter to indicate who supplies the data and is maintaining > > > > > > > it > > > > > > > - appears to be cleanest and clearest solution (or perhaps the > > > > > > > "least bad") that results in the model of least complexity. > > > > > > > > > > > > > > Perhaps there is something we can simply change about the > > > > > > > "server-provided" object to address your concerns? We can > > > > > > > make it config (to address your issue that triggered this, the > > > > > > > presence of a r/o object in a tree that is otherwise r/w). > > > > > > > > > > > > > > Thoughts? > > > > > > > --- Alex > > > > > > > > > > > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > > From: Juergen Schoenwaelder > > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > > > > To: Alexander Clemm (alex) > > > > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin > > > > > > > Bjorklund ; Andy Bierman ; > > > > > > > 'Alia Atlas' > > > > > > > ; 'Jeffrey Haas' ; Susan > > > > > > > Hares > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm > > > > > > > (alex) > > > > > > > wrote: > > > > > > > > Hello Juergen, > > > > > > > > > > > > > > > > responses inline, delimited with > > > > > > > > > > > > > > > > --- Alex > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > > > From: Juergen Schoenwaelder > > > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > > > > To: Alexander Clemm (alex) > > > > > > > > Cc: Susan Hares ; Andy Bierman > > > > > > > > ; i2rs@ietf.org; Martin Bjorklund > > > > > > > > ; Ladislav Lhotka ; 'Alia > Atlas' > > > > > > > > ; 'Jeffrey Haas' > > > > > > > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm > > > > > > > > (alex) > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > The only item in the topology that is read-only concerns > > > > > > > > > the "server-provided" flag, but this concerns a separate > > > > > > > > > issue that was also discussed (I am not sure if this is > > > > > > > > > what you are referring to). > > > > > > > > > It is analogous to the other discussion concerning > > > > > > > > > distinguishing configuration that has been intended, > > > > > > > > > versus one that is in effect etc . This concerns the > > > > > > > > > issue that some topologies are populated by the server > > > > > > > > > whereas some topologies can be populated by client > applications. > > > > > > > > > > > > > > > > Yes, this is what the concern is about. > > > > > > > > > > > > > > > > > We have had discussions in the past whether to "split this > > > > > > > > > up", having a (rw) branch to populate "intended" > > > > > > > > > topologies and a > > > > > > > > > (ro) branch for topologies "in effect". > > > > > > > > > > > > > > > > This is the normal way to do this in YANG. And this goes > > > > > > > > back to what was driving us for years, namely to clearly > > > > > > > > separate config from state. This module makes this > > > > > > > > distinction a runtime property controlled by a data model > > > > > > > > specific mechanism. None of the generic tools out there will > be able to understand this. > > > > > > > > > > > > > > > > > > > > > > > > I think the issue is more related to the current discussion > > > > > > > > with regards to openconfig and "intended configuration" and > > > > > > > > "applied configuration". If YANG had an existing solution > > > > > > > > for this, we would not have this discussion. The reason I > > > > > > > > believe this is similar is that you can view the "applied > > > > > > > > configuration" as the "server-provided configuration" > > > > > > > > (network topology, in our case), and the "intended > > > > > > > > configuration" as the, well, configured or intended network > > > > > > > > topology in our case. That said, the issue is not identical > > > > > > > > - whereas in the openconfig case every "applied > configuration" > > > > > > > > has an accompanying "intended configuration", in our case > > > > > > > > this is not necessarily the case > > > > > > > > - you can have "applied" [network topologies] that were > > > > > > > > provided by the server / the network itself, not configured > by anybody. > > > > > > > > > > > > > > > > > > > > > > I think this has nothing to do with intended or applied config. > > > > > > > Your 'server supplied topology' appears to me to be > > > > > > > operational state and not configuration data. > > > > > > > > > > > > > > > > We decided against it for various reasons - every piece of > > > > > > > > > information would essentially be duplicated inside the > > > > > > > > > model (this is not your normal config vs oper data > > > > > > > > > distinction, but would essentially reflect a limitation of > > > > > > > > > the framework), leading to unnecessary additional > > > > > > > > > complexity in the model (every augmentation has to be > > > > > > > > > conducted in two places), more complex validation rules, > etc. > > > > > > > > > > > > > > > > I do not understand why this is not a normal config vs oper > > > > > > > > data distinction. Please explain. > > > > > > > > > > > > > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have > > > > > > > > in RFC > > > > > > > > 7233 - separate trees with distinct data, some clearly part > > > > > > > > of configuration, other clearly operational data. > > > > > > > > In this case, this is different. You have the same data. > > > > > > > > However, in some cases it is populated by a client, in other > > > > > > > > cases by the server. > > > > > > > > YANG requires the categorization of data as config false or > true. > > > > > > > > In this case, this categorization does not always apply - > > > > > > > > or, the categorization depends on the particular instance. > > > > > > > > > > > > > > > > > > > > > > So you have operational state which is partially populated by > > > > > > > the server and partially populated from config. I fail to see > > > > > > > how this is any different from other cases, including network > > > > > > > interfaces as defined in RFC 7233. Recall also that YANG does > > > > > > > not allow configuration data to depend on state data. > > > > > > > > > > > > > > > I do not understand how this leads to more complex > validation rules. > > > > > > > > Please explain. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > > > > > > > > > > > We want to be able to express that, for example, a node in > > > > > > > > one network is supported by a node in an underlay network. > > > > > > > > For this purpose, we are referencing a node in another > (underlay) network. > > > > > > > > So that we cannot reference an arbitrary node in an > > > > > > > > arbitrary network, we want to make sure that the supporting > > > > > > > > node is part of a "supporting-network" > > > > > > > > of the same network. > > > > > > > > > > > > > > > > Currently, we have the following definition: > > > > > > > > > > > > > > > > list supporting-node { > > > > > > > > key "network-ref node-ref"; > > > > > > > > description > > > > > > > > "Represents another node, in an underlay network, > that > > > > > > > > this node is supported by. Used to represent > layering > > > > > > > > structure."; > > > > > > > > leaf network-ref { > > > > > > > > type leafref { > > > > > > > > path "../../../supporting-network/network-ref"; > > > > > > > > } > > > > > > > > description > > > > > > > > "References the underlay network that the > > > > > > > > underlay node is part of."; > > > > > > > > } > > > > > > > > leaf node-ref { > > > > > > > > type leafref { > > > > > > > > path "/network/node/node-id"; > > > > > > > > } > > > > > > > > description > > > > > > > > "References the underlay node itself."; > > > > > > > > } > > > > > > > / > > > > > > > > } > > > > > > > > > > > > > > > > > > > > > > > > If we were to split the model, when we configure a node, we > > > > > > > > will have to account for the fact that the supporting node > > > > > > > > could be either part of a "configured" network itself, or of > > > > > > > > a network that has been "server-provided". That is, we need > > > > > > > > to be able to allow for both possibilities. > > > > > > > > > > > > > > Again note that YANG requires that configuration data does not > > > > > > > depend on state data. You seem to be breaking this rule, no? > > > > > > > > > > > > > > > To do this, we would no longer be able to have the > > > > > > > > network-ref to be part of the key for supporting-node - we > > > > > > > > would have to replace network-ref with a choice of two nodes > > > > > > > > that reference either a server-provided network ("branch > > > > > > > > 1"), or a configured network ("branch 2"). As a result, we > > > > > > > > will have to introduce a separate way to reference elements > in list supporting-node. > > > > > > > > All of this results in considerable additional complexity. > > > > > > > > Or do you see an easier way? > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I do not think this is the solution. YANG requires that > > > > > > > constraints on config true nodes can only refer to other > > > > > > > config true nodes in the datastore where the node with the > > > > > > > constraint exists. See section > > > > > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9 > > > > > > > says that a leafref may only point to configuration. I believe > > > > > > > this I-D is violating the distinction between configuration > and state data. > > > > > > > > > > > > > > /js > > > > > > > > > > > > > > -- > > > > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | > Germany > > > > > > > Fax: +49 421 200 3103 < > http://www.jacobs-university.de/> > > > > > > > > > > > > > > > > > > > _______________________________________________ > > > > > > i2rs mailing list > > > > > > i2rs@ietf.org > > > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > > > > > > > > > _______________________________________________ > > > > > > i2rs mailing list > > > > > > i2rs@ietf.org > > > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > > > > > > > > > > > > > > > > -- > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > > Fax: +49 421 200 3103 > > -- > Juergen Schoenwaelder Jacobs University Bremen gGmbH > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany > Fax: +49 421 200 3103 > --001a11c266503b89b0052306fcc9 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Hi,

I agree that adding meta-data will = have no affect on
a client that thinks it can edit config=3Dtrue.= =C2=A0 Especially
when the knob that overrides the semantics of t= he config-stmt
is in the configuration itself.

So why can't the interfaces + interfaces-state design be applied= here?
Given that charter explicitly states read-only topology, w= hy is this
even in there?

You can define= objects in a grouping later.
It is OK to reorg objects into/out = of groupings if the
same "final" syntax and semantics i= s maintained.


Andy


On Mon, Oct 26, 201= 5 at 12:13 PM, Juergen Schoenwaelder <j.schoenwaelder@j= acobs-university.de> wrote:
I do not think metadata changes the way configuration datastore
validation works.

/js

On Mon, Oct 26, 2015 at 07:10:56PM +0000, Alexander Clemm (alex) wrote:
> Hi Juergen,
> Understood, but this doesn't really address our problem here.=C2= =A0 We want to see how we can apply YANG to meet our needs, not the other w= ay round.=C2=A0 Hence the suggestion to explore the use of metadata here. > --- Alex
>
> -----Original Message-----
> From: Juergen Schoenwaelder [mailto:j.schoenwaelder@jacobs-university.de]
> Sent: Monday, October 26, 2015 11:19 AM
> To: Alexander Clemm (alex) <alex@= cisco.com>
> Cc: Martin Bjorklund <mbj@tail-f.= com>; lhotka@nic.cz; i2rs@ietf.org; andy@yumaworks.com; akatlas@g= mail.com; jhaas@pfrc.org; shares@ndzh.com; Kent Watsen <kwatsen@juniper.net>
> Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)
>
> In YANG, it is assumed that config true nodes exist in a datastore whe= re all config true nodes are treated the same. A datastore is the unit of v= alidation and we don't want to have a valid configuration datatore beco= me invalid arbitrarily. This is why config true nodes are not allowed to de= pend on config false nodes (state data that can change arbitrarily).
>
> /js
>
> On Sat, Oct 24, 2015 at 01:15:55AM +0000, Alexander Clemm (alex) wrote= :
> > Hi Martin,
> >
> > maybe option 1 provides a way out here.=C2=A0 This also has the l= east impact on the existing design and implementation, hence preferable. > >
> > However, I still feel that we are dealing with a limitation of th= e YANG framework here.=C2=A0 I think we are dealing with a use case that wa= s not really foreseen in the YANG design, i.e. that we might run into data = that has instances that can indeed be authoritatively owned by a server ver= sus others representing more traditional configuration.=C2=A0 The one aspec= t that not really address by making it regular config concerns your asserti= on that "any other client can modify what this client wrote".=C2= =A0 Access rights could provide a solution, but not in the way as currently= defined via NACM, since we would need to differentiate access rights at th= e instance level, not at the module definition level.=C2=A0 Rather than see= ing how we can make our requirements somehow fit a rigid interpretation of = the YANG framework (that does not allow for special treatment / behavior of= special cases), I would like to see whether the YANG framework can be flex= ible enough to still support what we are trying to do.
> >
> > Kent made what I thought was a very interesting suggestion at the= interim, asking whether this would be an application for metadata.=C2=A0 I= think this is something that we might leverage here.=C2=A0 We could introd= uce a metadata item that indicates for configuration information whether th= at was populated by a server, so really should not be modified by other cli= ents (or, when modified, will presumably be "changed back" by the= server).=C2=A0 Or, that might simply be locked by the server.
> >
> > Thoughts regarding that suggestion?
> >
> > --- Alex
> >
> > -----Original Message-----
> > From: Martin Bjorklund [mailto:= mbj@tail-f.com]
> > Sent: Friday, October 23, 2015 12:17 AM
> > To: Alexander Clemm (alex) <= alex@cisco.com>
> > Cc: lhotka@nic.cz; i2rs@ietf.org;
> > j.schoenw= aelder@jacobs-university.de; andy= @yumaworks.com;
> > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com
> > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)
> >
> > "Alexander Clemm (alex)" <alex@cisco.com> wrote:
> > > Hi Martin,
> > >
> > > We can nitpick over how to best express this
> >
> > This isn't nitpicking; I am trying to understand what you had= in mind.
> >
> > And it seems Juergen is correct.=C2=A0 You essentially want to mi= x config and operational state in a single list.=C2=A0 This is not possible= to express in YANG, so you change the semantics of the formal statements w= ith descriptions.=C2=A0 I don't think this a good idea.
> >
> > I can think of two alternatives to the current design that don= 9;t violate YANG:
> >
> > 1)=C2=A0 Keep the single config true list, w/o the server-provide= d leaf,
> >=C2=A0 =C2=A0 =C2=A0and explain in text that there might be a clie= nt
> >=C2=A0 =C2=A0 =C2=A0"internal-to-the-server" that behave= s just like any other client
> >=C2=A0 =C2=A0 =C2=A0(specifically respects locks, makes sure the e= nd result is
> >=C2=A0 =C2=A0 =C2=A0valid, and any other client can modify what th= is client wrote
> >=C2=A0 =C2=A0 =C2=A0(module access rights)).
> >
> > 2)=C2=A0 Split the model into two, one config list and one oper l= ist.
> >=C2=A0 =C2=A0 =C2=A0References in the config list can either be by= name (implicit) or
> >=C2=A0 =C2=A0 =C2=A0use the new YANG 1.1 syntax "require-inst= ance false";
> >
> >
> > /martin
> >
> > > , but hopefully the
> > > general sense of what the requirement is and what I was tryi= ng to
> > > express is clear.=C2=A0 You can have an outside client appli= cation
> > > maintain some topologies / list elements, and have others ma= intained
> > > an populated by the server - or arguably an app embedded in = the server.
> > > The difference from the "normal" client is that re= ally it is that we
> > > want the server / embedded app that is the authoritative own= er of
> > > the information.
> > >
> > > Cheers
> > > --- Alex
> > >
> > > -----Original Message-----
> > > From: Martin Bjorklund [mailto:mbj@tail-f.com]
> > > Sent: Monday, October 19, 2015 11:07 PM
> > > To: Alexander Clemm (alex) <alex@cisco.com>
> > > Cc: lhotka@nic.cz; i2rs@ietf.org;
> > > j.sc= hoenwaelder@jacobs-university.de; andy@yumaworks.com;
> > > akatlas@gmail.com; = jhaas@pfrc.org; shares@ndzh.com
> > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)
> > >
> > > "Alexander Clemm (alex)" <alex@cisco.com> wrote:
> > > > Hi Martin,
> > > >
> > > > "So how is the server-provided leaf supposed to be= implemented,
> > > > and how is it supposed to be used?"
> > > >
> > > > When a network topology is populated by the server, the=
> > > > server-provided leaf is supposed to be set to true.
> > >
> > > But you earlier wrote that when the server wants to change s= omething
> > > it would behave as a normal client.
> > >
> > > > When a network topology is populated by a client app (t= hrough
> > > > "regular" configuration), the server provided= leaf is supposed to
> > > > be set to false.
> > > >
> > > > For any given network topology, when the corresponding<= br> > > > > "server-provided" leaf is set to "true&q= uot;, attempts to edit the
> > > > configuration of that topology are to be rejected.
> > >
> > > This also goes against what you acknowledged previously - &q= uot;the
> > > server-provided data can be modified by anyone with proper a= ccess
> > > rights"
> > >
> > >
> > > /martin
> > >
> > >
> > > >
> > > > Alternatives to the current design include making the l= eaf "config
> > > > true", or moving it outside (just this leaf) for a= list that
> > > > indicates for each topology whether it is server-provid= ed or not
> > > > (in a separate "state" branch).
> > > > --- Alex
> > > >
> > > > -----Original Message-----
> > > > From: Martin Bjorklund [mailto:mbj@tail-f.com]
> > > > Sent: Monday, October 19, 2015 1:27 PM
> > > > To: Alexander Clemm (alex) <alex@cisco.com>
> > > > Cc: lhotka@nic.cz;= i2rs@ietf.org;
> > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com;
> > > > akatlas@gmail.com<= /a>; jhaas@pfrc.org; shares@ndzh.com
> > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14)<= br> > > > >
> > > > "Alexander Clemm (alex)" <alex@cisco.com> wrote:
> > > > > Hi Martin,
> > > > >
> > > > > One model for the data that is server-provided is = to assume an
> > > > > app (which could be embedded on the same server) t= hat knows how
> > > > > to discover the network, then populates the data a= ccordingly.
> > > > >
> > > > > [Of course, we would not want any random client ap= p just being
> > > > > able to "mess" with that data.=C2=A0 The= expectation is generally
> > > > > clearly access to this will be restricted / contro= lled.=C2=A0 The
> > > > > topology instances that were populated by the &quo= t;server-provided
> > > > > app" should not be "touched" by oth= er apps - it is the
> > > > > "server-provided" app that is responsibl= e for maintaining them.]
> > > > >
> > > > > So I assume the answer to your question is "y= es", but with a
> > > > > bunch of caveats.
> > > >
> > > > So how is the server-provided leaf supposed to be imple= mented, and
> > > > how is it supposed to be used?
> > > >
> > > >
> > > > /martin
> > > >
> > > >
> > > >
> > > > > --- Alex
> > > > >
> > > > >
> > > > > -----Original Message-----
> > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin
> > > > > Bjorklund
> > > > > Sent: Monday, October 19, 2015 11:32 AM
> > > > > To: Alexander Clemm (alex) <alex@cisco.com>
> > > > > Cc: andy@yum= aworks.com; i2rs@ietf.org;
> > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz;
> > > > > akatlas@gmail= .com; jhaas@pfrc.org; shares@ndzh.com
> > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10= /14)
> > > > >
> > > > > Alex,
> > > > >
> > > > > Is the idea that the server-provided data is norma= l config?
> > > > > I.e., if the server wants to modify this data it b= ehaves like a
> > > > > normal client?
> > > > > (conceptually...)=C2=A0 And the server-provided da= ta can be modified
> > > > > by anyone with proper access rights?
> > > > >
> > > > >
> > > > > /martin
> > > > >
> > > > >
> > > > >
> > > > > "Alexander Clemm (alex)" <alex@cisco.com> wrote:
> > > > > > Hi Juergen,
> > > > > >
> > > > > > I think one of the key statements you make be= low is this:
> > > > > > " Recall also that YANG does not allow c= onfiguration data to
> > > > > > depend on state data."
> > > > > >
> > > > > > Note that this is not the case in the current= model.=C2=A0 The
> > > > > > current model is essentially all configuratio= n data.=C2=A0 Of
> > > > > > course, we have this flag to indicate who sup= plied that data
> > > > > > (and is hence maintaining it).
> > > > > >
> > > > > > You argue that we should instead "split&= quot; the model and
> > > > > > introduce operational data to reflect what is= populated by the server.
> > > > > > However, doing that introduces precisely new = issues - and you
> > > > > > have just brought another argument why this m= ay be a bad idea
> > > > > > and may not even work.
> > > > > > Topologies _are_ layered, and we need to be a= ble to express
> > > > > > that in the model.=C2=A0 Now, if we have a to= pology that is
> > > > > > server-provided, hence (per your statement) t= o be represented
> > > > > > by operational data only, how do we build an = overlay topology
> > > > > > that is "configured" on top of it?= =C2=A0 If the answer is "we
> > > > > > can't, unless we replicate the server-pro= vided topology into
> > > > > > the network configuration (which makes no sen= se)", we are screwed.
> > > > > > Now, we might build it on top if we remove al= l references /
> > > > > > dependencies on the underlay from the model a= nd punt the
> > > > > > problem to the user.=C2=A0 Basically, no long= er have the model
> > > > > > express vertical relationships.=C2=A0 Not a g= ood solution, IMHO.
> > > > > >
> > > > > > How do you suggest we address this?=C2=A0 The= ability to express
> > > > > > layering relationships between topologies, in= cluding cases
> > > > > > where topologies originate from different sou= rces
> > > > > > (discovered/server-provided vs configured), i= s a requirement.
> > > > > > It is not an artefact of our model, it is som= ething that we
> > > > > > need to capture as part of the model.=C2=A0 T= here may not be a
> > > > > > "nice" way of doing this within the= YANG framework, yet it is
> > > > > > important that we find a way to do this.=C2= =A0 The current solution
> > > > > > to this
> > > > > > - having the model as configuration data, and= including a
> > > > > > parameter to indicate who supplies the data a= nd is maintaining
> > > > > > it
> > > > > > - appears to be cleanest and clearest solutio= n (or perhaps the
> > > > > > "least bad") that results in the mo= del of least complexity.
> > > > > >
> > > > > > Perhaps there is something we can simply chan= ge about the
> > > > > > "server-provided" object to address= your concerns?=C2=A0 We can
> > > > > > make it config (to address your issue that tr= iggered this, the
> > > > > > presence of a r/o object in a tree that is ot= herwise r/w).
> > > > > >
> > > > > > Thoughts?
> > > > > > --- Alex
> > > > > >
> > > > > >
> > > > > >
> > > > > > -----Original Message-----
> > > > > > From: Juergen Schoenwaelder
> > > > > > [mailto:j.schoenwaelder@jacobs-university.de]
> > > > > > Sent: Sunday, October 18, 2015 3:13 AM
> > > > > > To: Alexander Clemm (alex) <alex@cisco.com>
> > > > > > Cc: Ladislav Lhotka <lhotka@nic.cz>; i2rs@ie= tf.org; Martin
> > > > > > Bjorklund <mbj@tail-f.com>; Andy Bierman <andy@yumaworks.com>;
> > > > > > 'Alia Atlas'
> > > > > > <akat= las@gmail.com>; 'Jeffrey Haas' <jhaas@pfrc.org>; Susan
> > > > > > Hares <= shares@ndzh.com>
> > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 = to 10/14)
> > > > > >
> > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Ale= xander Clemm
> > > > > > (alex)
> > > > > > wrote:
> > > > > > > Hello Juergen,
> > > > > > >
> > > > > > > responses inline, delimited with <ALE= X>
> > > > > > >
> > > > > > > --- Alex
> > > > > > >
> > > > > > > -----Original Message-----
> > > > > > > From: Juergen Schoenwaelder
> > > > > > > [mailto:j.schoenwaelder@jacobs-university.de]
> > > > > > > Sent: Wednesday, October 14, 2015 11:35 = PM
> > > > > > > To: Alexander Clemm (alex) <alex@cisco.com>
> > > > > > > Cc: Susan Hares <shares@ndzh.com>; Andy Bierman
> > > > > > > <andy@yumaworks.com>; i2rs@ietf.or= g; Martin Bjorklund
> > > > > > > <mb= j@tail-f.com>; Ladislav Lhotka <= lhotka@nic.cz>; 'Alia Atlas'
> > > > > > > <akatlas@gmail.com>; 'Jeffrey Haas'
> > > > > > > <jh= aas@pfrc.org>
> > > > > > > Subject: Re: [i2rs] WG LC for Topology (= 10/1 to 10/14)
> > > > > > >
> > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000= , Alexander Clemm
> > > > > > > (alex)
> > > > > > > wrote:
> > > > > > > >
> > > > > > > > The only item in the topology that = is read-only concerns
> > > > > > > > the "server-provided" fla= g, but this concerns a separate
> > > > > > > > issue that was also discussed (I am= not sure if this is
> > > > > > > > what you are referring to).
> > > > > > > > It is analogous to the other discus= sion concerning
> > > > > > > > distinguishing configuration that h= as been intended,
> > > > > > > > versus one that is in effect etc .= =C2=A0 This concerns the
> > > > > > > > issue that some topologies are popu= lated by the server
> > > > > > > > whereas some topologies can be popu= lated by client applications.
> > > > > > >
> > > > > > > Yes, this is what the concern is about.<= br> > > > > > > >
> > > > > > > > We have had discussions in the past= whether to "split this
> > > > > > > > up", having a (rw) branch to p= opulate "intended"
> > > > > > > > topologies and a
> > > > > > > > (ro) branch for topologies "in= effect".
> > > > > > >
> > > > > > > This is the normal way to do this in YAN= G. And this goes
> > > > > > > back to what was driving us for years, n= amely to clearly
> > > > > > > separate config from state. This module = makes this
> > > > > > > distinction a runtime property controlle= d by a data model
> > > > > > > specific mechanism. None of the generic = tools out there will be able to understand this.
> > > > > > >
> > > > > > > <ALEX>
> > > > > > > I think the issue is more related to the= current discussion
> > > > > > > with regards to openconfig and "int= ended configuration" and
> > > > > > > "applied configuration".=C2=A0= If YANG had an existing solution
> > > > > > > for this, we would not have this discuss= ion.=C2=A0 The reason I
> > > > > > > believe this is similar is that you can = view the "applied
> > > > > > > configuration" as the "server-= provided configuration"
> > > > > > > (network topology, in our case), and the= "intended
> > > > > > > configuration" as the, well, config= ured or intended network
> > > > > > > topology in our case.=C2=A0 That said, t= he issue is not identical
> > > > > > > - whereas in the openconfig case every &= quot;applied configuration"
> > > > > > > has an accompanying "intended confi= guration", in our case
> > > > > > > this is not necessarily the case
> > > > > > > - you can have "applied" [netw= ork topologies] that were
> > > > > > > provided by the server / the network its= elf, not configured by anybody.
> > > > > > > </ALEX>
> > > > > >
> > > > > > I think this has nothing to do with intended = or applied config.
> > > > > > Your 'server supplied topology' appea= rs to me to be
> > > > > > operational state and not configuration data.=
> > > > > >
> > > > > > > > We decided against it for various r= easons - every piece of
> > > > > > > > information would essentially be du= plicated inside the
> > > > > > > > model (this is not your normal conf= ig vs oper data
> > > > > > > > distinction, but would essentially = reflect a limitation of
> > > > > > > > the framework), leading to unnecess= ary additional
> > > > > > > > complexity in the model (every augm= entation has to be
> > > > > > > > conducted in two places), more comp= lex validation rules, etc.
> > > > > > >
> > > > > > > I do not understand why this is not a no= rmal config vs oper
> > > > > > > data distinction. Please explain.
> > > > > > >
> > > > > > > <ALEX>
> > > > > > > A normal distinction would be e.g. the t= ype of model we have
> > > > > > > in RFC
> > > > > > > 7233 - separate trees with distinct data= , some clearly part
> > > > > > > of configuration, other clearly operatio= nal data.
> > > > > > > In this case, this is different.=C2=A0 Y= ou have the same data.
> > > > > > > However, in some cases it is populated b= y a client, in other
> > > > > > > cases by the server.
> > > > > > > YANG requires the categorization of data= as config false or true.
> > > > > > > In this case, this categorization does n= ot always apply -
> > > > > > > or, the categorization depends on the pa= rticular instance.
> > > > > > > </ALEX>
> > > > > >
> > > > > > So you have operational state which is partia= lly populated by
> > > > > > the server and partially populated from confi= g. I fail to see
> > > > > > how this is any different from other cases, i= ncluding network
> > > > > > interfaces as defined in RFC 7233. Recall als= o that YANG does
> > > > > > not allow configuration data to depend on sta= te data.
> > > > > >
> > > > > > > I do not understand how this leads to mo= re complex validation rules.
> > > > > > > Please explain.
> > > > > > >
> > > > > > > <ALEX>
> > > > > > >
> > > > > > > One example concerns the supporting node= s/links/TPs.
> > > > > > >
> > > > > > > We want to be able to express that, for = example, a node in
> > > > > > > one network is supported by a node in an= underlay network.
> > > > > > > For this purpose, we are referencing a n= ode in another (underlay) network.
> > > > > > > So that we cannot reference an arbitrary= node in an
> > > > > > > arbitrary network, we want to make sure = that the supporting
> > > > > > > node is part of a "supporting-netwo= rk"
> > > > > > > of the same network.
> > > > > > >
> > > > > > > Currently, we have the following definit= ion:
> > > > > > >
> > > > > > >=C2=A0 =C2=A0 list supporting-node {
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0key &qu= ot;network-ref node-ref";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0descrip= tion
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= "Represents another node, in an underlay network, that
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= this node is supported by.=C2=A0 Used to represent layering
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= structure.";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0leaf ne= twork-ref {
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= type leafref {
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0path "../../../supporting-network/network-ref";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= }
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= description
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0"References the underlay network that the
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0 underlay node is part of.";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0leaf no= de-ref {
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= type leafref {
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0path "/network/node/node-id";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= }
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= description
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0= =C2=A0"References the underlay node itself.";
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0}
> > > > > > /
> > > > > > >=C2=A0 =C2=A0 =C2=A0 =C2=A0}
> > > > > > >
> > > > > > >
> > > > > > > If we were to split the model, when we c= onfigure a node, we
> > > > > > > will have to account for the fact that t= he supporting node
> > > > > > > could be either part of a "configur= ed" network itself, or of
> > > > > > > a network that has been "server-pro= vided".=C2=A0 That is, we need
> > > > > > > to be able to allow for both possibiliti= es.
> > > > > >
> > > > > > Again note that YANG requires that configurat= ion data does not
> > > > > > depend on state data. You seem to be breaking= this rule, no?
> > > > > >
> > > > > > > To do this, we would no longer be able t= o have the
> > > > > > > network-ref to be part of the key for su= pporting-node - we
> > > > > > > would have to replace network-ref with a= choice of two nodes
> > > > > > > that reference either a server-provided = network ("branch
> > > > > > > 1"), or a configured network ("= ;branch 2").=C2=A0 As a result, we
> > > > > > > will have to introduce a separate way to= reference elements in list supporting-node.
> > > > > > > All of this results in considerable addi= tional complexity.
> > > > > > > Or do you see an easier way?
> > > > > > >
> > > > > > > </ALEX>
> > > > > >
> > > > > > I do not think this is the solution. YANG req= uires that
> > > > > > constraints on config true nodes can only ref= er to other
> > > > > > config true nodes in the datastore where the = node with the
> > > > > > constraint exists. See section
> > > > > > 7.5.3 and section 7.19.5. And concerning leaf= ref, section 9.9
> > > > > > says that a leafref may only point to configu= ration. I believe
> > > > > > this I-D is violating the distinction between= configuration and state data.
> > > > > >
> > > > > > /js
> > > > > >
> > > > > > --
> > > > > > Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2= =A0 =C2=A0 =C2=A0Jacobs University Bremen gGmbH
> > > > > > Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 = =C2=A0 =C2=A0Campus Ring 1 | 28759 Bremen | Germany
> > > > > > Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2= =A0 =C2=A0 =C2=A0 =C2=A0<http://www.jacobs-university.de/>=
> > > > > >
> > > > >
> > > > > _______________________________________________ > > > > > i2rs mailing list
> > > > > i2rs@ietf.org=
> > > > > https://www.ietf.org/mailman/list= info/i2rs
> > > > >
> > > > > _______________________________________________ > > > > > i2rs mailing list
> > > > > i2rs@ietf.org=
> > > > > https://www.ietf.org/mailman/list= info/i2rs
> > > > >
> > > >
> > >
>
> --
> Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs U= niversity Bremen gGmbH
> Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1= | 28759 Bremen | Germany
> Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<= ;http://www.jacobs-university.de/>

--
Juergen Schoenwaelder=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Jacobs Univer= sity Bremen gGmbH
Phone: +49 421 200 3587=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0Campus Ring 1 | 28= 759 Bremen | Germany
Fax:=C2=A0 =C2=A0+49 421 200 3103=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<http://www.jacobs-university.de/>

--001a11c266503b89b0052306fcc9-- From nobody Sat Oct 31 09:32:15 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 961DB1B33CC for ; Tue, 27 Oct 2015 20:22:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.211 X-Spam-Level: X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fJ3m9cuMQcCs for ; Tue, 27 Oct 2015 20:22:46 -0700 (PDT) Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7E761B33C8 for ; Tue, 27 Oct 2015 20:22:45 -0700 (PDT) Received: from 172.18.7.190 (EHLO lhreml402-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CDE12194; Wed, 28 Oct 2015 03:22:25 +0000 (GMT) Received: from NKGEML404-HUB.china.huawei.com (10.98.56.35) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.235.1; Wed, 28 Oct 2015 03:22:23 +0000 Received: from NKGEML512-MBX.china.huawei.com ([169.254.7.203]) by nkgeml404-hub.china.huawei.com ([10.98.56.35]) with mapi id 14.03.0235.001; Wed, 28 Oct 2015 11:22:18 +0800 From: "Dongjie (Jimmy)" To: "Alexander Clemm (alex)" , Martin Bjorklund Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCpwHk+8qXTnuqUS3JjdiepgBwJ5yptcAgAAWxoCAABk9gIAAiNMAgARYgQCAAHIuAIABLV+AgAbVY+A= Date: Wed, 28 Oct 2015 03:22:17 +0000 Message-ID: <76CD132C3ADEF848BD84D028D243C927743C3176@nkgeml512-mbx.china.huawei.com> References: <11e694a1b29148faa718d9b361046883@XCH-RCD-001.cisco.com> <20151020.080648.1633967998805732790.mbj@tail-f.com> <616b94c8983c47ec94d4c70b68b355b5@XCH-RCD-001.cisco.com> <20151023.091716.2207109577809091732.mbj@tail-f.com> <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> In-Reply-To: <2e36fc507228491987634f960fa433e9@XCH-RCD-001.cisco.com> Accept-Language: en-US, zh-CN Content-Language: zh-CN X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.111.97.131] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-CFilter-Loop: Reflected Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 09:32:06 -0700 Cc: "lhotka@nic.cz" , "i2rs@ietf.org" , Kent Watsen , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "akatlas@gmail.com" , "jhaas@pfrc.org" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 Oct 2015 03:22:50 -0000 Hi Alex,=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Saturday, October 24, 2015 9:16 AM > To: Martin Bjorklund > Cc: andy@yumaworks.com; i2rs@ietf.org; Kent Watsen; > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; akatlas@gmail.com; > jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Martin, >=20 > maybe option 1 provides a way out here. This also has the least impact o= n the > existing design and implementation, hence preferable. >=20 > However, I still feel that we are dealing with a limitation of the YANG > framework here. I think we are dealing with a use case that was not real= ly > foreseen in the YANG design, i.e. that we might run into data that has in= stances > that can indeed be authoritatively owned by a server versus others repres= enting > more traditional configuration. The one aspect that not really address b= y > making it regular config concerns your assertion that "any other client c= an > modify what this client wrote". Access rights could provide a solution, = but not > in the way as currently defined via NACM, since we would need to differen= tiate > access rights at the instance level, not at the module definition level. = Rather > than seeing how we can make our requirements somehow fit a rigid > interpretation of the YANG framework (that does not allow for special > treatment / behavior of special cases), I would like to see whether the Y= ANG > framework can be flexible enough to still support what we are trying to d= o. I'd agree that representation of the layered architecture of network topolo= gy models/instances is different from traditional Yang models, thus we need= to explore the appropriate solution under the Yang framework. > Kent made what I thought was a very interesting suggestion at the interim= , > asking whether this would be an application for metadata. I think this i= s > something that we might leverage here. We could introduce a metadata ite= m > that indicates for configuration information whether that was populated b= y a > server, so really should not be modified by other clients (or, when modif= ied, will > presumably be "changed back" by the server). Or, that might simply be lo= cked > by the server. Metadata seems like a possible mechanism as it can specify instance-specifi= c data. If metadata is used to indicate whether the instance is server-prov= ided or client-provided, one question is does an instance with annotation "= server-provided" still belong to configuration datastore? Best regards, Jie > Thoughts regarding that suggestion? >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com] > Sent: Friday, October 23, 2015 12:17 AM > To: Alexander Clemm (alex) > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; > andy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; > shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > "Alexander Clemm (alex)" wrote: > > Hi Martin, > > > > We can nitpick over how to best express this >=20 > This isn't nitpicking; I am trying to understand what you had in mind. >=20 > And it seems Juergen is correct. You essentially want to mix config and > operational state in a single list. This is not possible to express in Y= ANG, so you > change the semantics of the formal statements with descriptions. I don't= think > this a good idea. >=20 > I can think of two alternatives to the current design that don't violate = YANG: >=20 > 1) Keep the single config true list, w/o the server-provided leaf, > and explain in text that there might be a client > "internal-to-the-server" that behaves just like any other client > (specifically respects locks, makes sure the end result is > valid, and any other client can modify what this client wrote > (module access rights)). >=20 > 2) Split the model into two, one config list and one oper list. > References in the config list can either be by name (implicit) or > use the new YANG 1.1 syntax "require-instance false"; >=20 >=20 > /martin >=20 > > , but hopefully the > > general sense of what the requirement is and what I was trying to > > express is clear. You can have an outside client application maintain > > some topologies / list elements, and have others maintained an > > populated by the server - or arguably an app embedded in the server. > > The difference from the "normal" client is that really it is that we > > want the server / embedded app that is the authoritative owner of the > > information. > > > > Cheers > > --- Alex > > > > -----Original Message----- > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > Sent: Monday, October 19, 2015 11:07 PM > > To: Alexander Clemm (alex) > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > "Alexander Clemm (alex)" wrote: > > > Hi Martin, > > > > > > "So how is the server-provided leaf supposed to be implemented, and > > > how is it supposed to be used?" > > > > > > When a network topology is populated by the server, the > > > server-provided leaf is supposed to be set to true. > > > > But you earlier wrote that when the server wants to change something > > it would behave as a normal client. > > > > > When a network topology is populated by a client app (through > > > "regular" configuration), the server provided leaf is supposed to be > > > set to false. > > > > > > For any given network topology, when the corresponding > > > "server-provided" leaf is set to "true", attempts to edit the > > > configuration of that topology are to be rejected. > > > > This also goes against what you acknowledged previously - "the > > server-provided data can be modified by anyone with proper access > > rights" > > > > > > /martin > > > > > > > > > > Alternatives to the current design include making the leaf "config > > > true", or moving it outside (just this leaf) for a list that > > > indicates for each topology whether it is server-provided or not (in > > > a separate "state" branch). > > > --- Alex > > > > > > -----Original Message----- > > > From: Martin Bjorklund [mailto:mbj@tail-f.com] > > > Sent: Monday, October 19, 2015 1:27 PM > > > To: Alexander Clemm (alex) > > > Cc: lhotka@nic.cz; i2rs@ietf.org; > > > j.schoenwaelder@jacobs-university.de; andy@yumaworks.com; > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > "Alexander Clemm (alex)" wrote: > > > > Hi Martin, > > > > > > > > One model for the data that is server-provided is to assume an app > > > > (which could be embedded on the same server) that knows how to > > > > discover the network, then populates the data accordingly. > > > > > > > > [Of course, we would not want any random client app just being > > > > able to "mess" with that data. The expectation is generally > > > > clearly access to this will be restricted / controlled. The > > > > topology instances that were populated by the "server-provided > > > > app" should not be "touched" by other apps - it is the > > > > "server-provided" app that is responsible for maintaining them.] > > > > > > > > So I assume the answer to your question is "yes", but with a bunch > > > > of caveats. > > > > > > So how is the server-provided leaf supposed to be implemented, and > > > how is it supposed to be used? > > > > > > > > > /martin > > > > > > > > > > > > > --- Alex > > > > > > > > > > > > -----Original Message----- > > > > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Martin > > > > Bjorklund > > > > Sent: Monday, October 19, 2015 11:32 AM > > > > To: Alexander Clemm (alex) > > > > Cc: andy@yumaworks.com; i2rs@ietf.org; > > > > j.schoenwaelder@jacobs-university.de; lhotka@nic.cz; > > > > akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > Alex, > > > > > > > > Is the idea that the server-provided data is normal config? I.e., > > > > if the server wants to modify this data it behaves like a normal > > > > client? > > > > (conceptually...) And the server-provided data can be modified by > > > > anyone with proper access rights? > > > > > > > > > > > > /martin > > > > > > > > > > > > > > > > "Alexander Clemm (alex)" wrote: > > > > > Hi Juergen, > > > > > > > > > > I think one of the key statements you make below is this: > > > > > " Recall also that YANG does not allow configuration data to > > > > > depend on state data." > > > > > > > > > > Note that this is not the case in the current model. The > > > > > current model is essentially all configuration data. Of course, > > > > > we have this flag to indicate who supplied that data (and is > > > > > hence maintaining it). > > > > > > > > > > You argue that we should instead "split" the model and introduce > > > > > operational data to reflect what is populated by the server. > > > > > However, doing that introduces precisely new issues - and you > > > > > have just brought another argument why this may be a bad idea > > > > > and may not even work. > > > > > Topologies _are_ layered, and we need to be able to express that > > > > > in the model. Now, if we have a topology that is > > > > > server-provided, hence (per your statement) to be represented by > > > > > operational data only, how do we build an overlay topology that > > > > > is "configured" on top of it? If the answer is "we can't, > > > > > unless we replicate the server-provided topology into the > > > > > network configuration (which makes no sense)", we are screwed. > > > > > Now, we might build it on top if we remove all references / > > > > > dependencies on the underlay from the model and punt the problem > > > > > to the user. Basically, no longer have the model express > > > > > vertical relationships. Not a good solution, IMHO. > > > > > > > > > > How do you suggest we address this? The ability to express > > > > > layering relationships between topologies, including cases where > > > > > topologies originate from different sources > > > > > (discovered/server-provided vs configured), is a requirement. > > > > > It is not an artefact of our model, it is something that we need > > > > > to capture as part of the model. There may not be a "nice" way > > > > > of doing this within the YANG framework, yet it is important > > > > > that we find a way to do this. The current solution to this > > > > > - having the model as configuration data, and including a > > > > > parameter to indicate who supplies the data and is maintaining > > > > > it > > > > > - appears to be cleanest and clearest solution (or perhaps the > > > > > "least bad") that results in the model of least complexity. > > > > > > > > > > Perhaps there is something we can simply change about the > > > > > "server-provided" object to address your concerns? We can make > > > > > it config (to address your issue that triggered this, the > > > > > presence of a r/o object in a tree that is otherwise r/w). > > > > > > > > > > Thoughts? > > > > > --- Alex > > > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > From: Juergen Schoenwaelder > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > Sent: Sunday, October 18, 2015 3:13 AM > > > > > To: Alexander Clemm (alex) > > > > > Cc: Ladislav Lhotka ; i2rs@ietf.org; Martin > > > > > Bjorklund ; Andy Bierman ; > > > > > 'Alia Atlas' > > > > > ; 'Jeffrey Haas' ; Susan > > > > > Hares > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > On Thu, Oct 15, 2015 at 10:59:31PM +0000, Alexander Clemm (alex) > > > > > wrote: > > > > > > Hello Juergen, > > > > > > > > > > > > responses inline, delimited with > > > > > > > > > > > > --- Alex > > > > > > > > > > > > -----Original Message----- > > > > > > From: Juergen Schoenwaelder > > > > > > [mailto:j.schoenwaelder@jacobs-university.de] > > > > > > Sent: Wednesday, October 14, 2015 11:35 PM > > > > > > To: Alexander Clemm (alex) > > > > > > Cc: Susan Hares ; Andy Bierman > > > > > > ; i2rs@ietf.org; Martin Bjorklund > > > > > > ; Ladislav Lhotka ; 'Alia Atlas' > > > > > > ; 'Jeffrey Haas' > > > > > > > > > > > > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) > > > > > > > > > > > > On Fri, Oct 09, 2015 at 09:55:19PM +0000, Alexander Clemm > > > > > > (alex) > > > > > > wrote: > > > > > > > > > > > > > > The only item in the topology that is read-only concerns the > > > > > > > "server-provided" flag, but this concerns a separate issue > > > > > > > that was also discussed (I am not sure if this is what you > > > > > > > are referring to). > > > > > > > It is analogous to the other discussion concerning > > > > > > > distinguishing configuration that has been intended, versus > > > > > > > one that is in effect etc . This concerns the issue that > > > > > > > some topologies are populated by the server whereas some > > > > > > > topologies can be populated by client applications. > > > > > > > > > > > > Yes, this is what the concern is about. > > > > > > > > > > > > > We have had discussions in the past whether to "split this > > > > > > > up", having a (rw) branch to populate "intended" topologies > > > > > > > and a > > > > > > > (ro) branch for topologies "in effect". > > > > > > > > > > > > This is the normal way to do this in YANG. And this goes back > > > > > > to what was driving us for years, namely to clearly separate > > > > > > config from state. This module makes this distinction a > > > > > > runtime property controlled by a data model specific > > > > > > mechanism. None of the generic tools out there will be able to > understand this. > > > > > > > > > > > > > > > > > > I think the issue is more related to the current discussion > > > > > > with regards to openconfig and "intended configuration" and > > > > > > "applied configuration". If YANG had an existing solution for > > > > > > this, we would not have this discussion. The reason I believe > > > > > > this is similar is that you can view the "applied > > > > > > configuration" as the "server-provided configuration" (network > > > > > > topology, in our case), and the "intended configuration" as > > > > > > the, well, configured or intended network topology in our > > > > > > case. That said, the issue is not identical > > > > > > - whereas in the openconfig case every "applied configuration" > > > > > > has an accompanying "intended configuration", in our case this > > > > > > is not necessarily the case > > > > > > - you can have "applied" [network topologies] that were > > > > > > provided by the server / the network itself, not configured by = anybody. > > > > > > > > > > > > > > > > I think this has nothing to do with intended or applied config. > > > > > Your 'server supplied topology' appears to me to be operational > > > > > state and not configuration data. > > > > > > > > > > > > We decided against it for various reasons - every piece of > > > > > > > information would essentially be duplicated inside the model > > > > > > > (this is not your normal config vs oper data distinction, > > > > > > > but would essentially reflect a limitation of the > > > > > > > framework), leading to unnecessary additional complexity in > > > > > > > the model (every augmentation has to be conducted in two > > > > > > > places), more complex validation rules, etc. > > > > > > > > > > > > I do not understand why this is not a normal config vs oper > > > > > > data distinction. Please explain. > > > > > > > > > > > > > > > > > > A normal distinction would be e.g. the type of model we have > > > > > > in RFC > > > > > > 7233 - separate trees with distinct data, some clearly part of > > > > > > configuration, other clearly operational data. > > > > > > In this case, this is different. You have the same data. > > > > > > However, in some cases it is populated by a client, in other > > > > > > cases by the server. > > > > > > YANG requires the categorization of data as config false or tru= e. > > > > > > In this case, this categorization does not always apply - or, > > > > > > the categorization depends on the particular instance. > > > > > > > > > > > > > > > > So you have operational state which is partially populated by > > > > > the server and partially populated from config. I fail to see > > > > > how this is any different from other cases, including network > > > > > interfaces as defined in RFC 7233. Recall also that YANG does > > > > > not allow configuration data to depend on state data. > > > > > > > > > > > I do not understand how this leads to more complex validation r= ules. > > > > > > Please explain. > > > > > > > > > > > > > > > > > > > > > > > > One example concerns the supporting nodes/links/TPs. > > > > > > > > > > > > We want to be able to express that, for example, a node in one > > > > > > network is supported by a node in an underlay network. For > > > > > > this purpose, we are referencing a node in another (underlay) n= etwork. > > > > > > So that we cannot reference an arbitrary node in an arbitrary > > > > > > network, we want to make sure that the supporting node is part > > > > > > of a "supporting-network" > > > > > > of the same network. > > > > > > > > > > > > Currently, we have the following definition: > > > > > > > > > > > > list supporting-node { > > > > > > key "network-ref node-ref"; > > > > > > description > > > > > > "Represents another node, in an underlay network, tha= t > > > > > > this node is supported by. Used to represent layeri= ng > > > > > > structure."; > > > > > > leaf network-ref { > > > > > > type leafref { > > > > > > path "../../../supporting-network/network-ref"; > > > > > > } > > > > > > description > > > > > > "References the underlay network that the > > > > > > underlay node is part of."; > > > > > > } > > > > > > leaf node-ref { > > > > > > type leafref { > > > > > > path "/network/node/node-id"; > > > > > > } > > > > > > description > > > > > > "References the underlay node itself."; > > > > > > } > > > > > / > > > > > > } > > > > > > > > > > > > > > > > > > If we were to split the model, when we configure a node, we > > > > > > will have to account for the fact that the supporting node > > > > > > could be either part of a "configured" network itself, or of a > > > > > > network that has been "server-provided". That is, we need to > > > > > > be able to allow for both possibilities. > > > > > > > > > > Again note that YANG requires that configuration data does not > > > > > depend on state data. You seem to be breaking this rule, no? > > > > > > > > > > > To do this, we would no longer be able to have the network-ref > > > > > > to be part of the key for supporting-node - we would have to > > > > > > replace network-ref with a choice of two nodes that reference > > > > > > either a server-provided network ("branch 1"), or a configured > > > > > > network ("branch 2"). As a result, we will have to introduce > > > > > > a separate way to reference elements in list supporting-node. > > > > > > All of this results in considerable additional complexity. Or > > > > > > do you see an easier way? > > > > > > > > > > > > > > > > > > > > > > I do not think this is the solution. YANG requires that > > > > > constraints on config true nodes can only refer to other config > > > > > true nodes in the datastore where the node with the constraint > > > > > exists. See section > > > > > 7.5.3 and section 7.19.5. And concerning leafref, section 9.9 > > > > > says that a leafref may only point to configuration. I believe > > > > > this I-D is violating the distinction between configuration and s= tate data. > > > > > > > > > > /js > > > > > > > > > > -- > > > > > Juergen Schoenwaelder Jacobs University Bremen gGmbH > > > > > Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | > Germany > > > > > Fax: +49 421 200 3103 > > > > > > > > > > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > > > > > _______________________________________________ > > > > i2rs mailing list > > > > i2rs@ietf.org > > > > https://www.ietf.org/mailman/listinfo/i2rs > > > > > > > > > >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs From nobody Sat Oct 31 12:42:57 2015 Return-Path: X-Original-To: i2rs@ietfa.amsl.com Delivered-To: i2rs@ietfa.amsl.com Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8BF11A8A62 for ; Fri, 23 Oct 2015 13:16:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.902 X-Spam-Level: X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lD0ROSi4w7iw for ; Fri, 23 Oct 2015 13:16:20 -0700 (PDT) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0119.outbound.protection.outlook.com [207.46.100.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E5291A8A55 for ; Fri, 23 Oct 2015 13:16:20 -0700 (PDT) Received: from BN1PR05MB041.namprd05.prod.outlook.com (10.255.202.140) by BN1PR05MB043.namprd05.prod.outlook.com (10.255.202.148) with Microsoft SMTP Server (TLS) id 15.1.306.13; Fri, 23 Oct 2015 20:16:18 +0000 Received: from BN1PR05MB041.namprd05.prod.outlook.com ([169.254.14.65]) by BN1PR05MB041.namprd05.prod.outlook.com ([169.254.14.65]) with mapi id 15.01.0306.003; Fri, 23 Oct 2015 20:16:18 +0000 From: Gert Grammel To: Igor Bryskin Thread-Topic: [i2rs] WG LC for Topology (10/1 to 10/14) Thread-Index: AQHRCvylnzyip/aiv0eBADTjL35ISp54ONGAgADWrwCAAHnhZA== Date: Fri, 23 Oct 2015 20:16:18 +0000 Message-ID: <124E6C4C-0258-41B1-B1FF-C770361E4802@juniper.net> References: <20151019195558.GB81648@elstar.local> <6f21254dc3a04c1ca961b455017c9e29@XCH-RCD-001.cisco.com> <20151020.080426.1227842775405864528.mbj@tail-f.com> <9735f78c1b654837812606f26591bfaa@XCH-RCD-001.cisco.com>, <71060292c9a84e0eab36475a5b7c3827@ATL-SRV-MBX1.advaoptical.com> In-Reply-To: <71060292c9a84e0eab36475a5b7c3827@ATL-SRV-MBX1.advaoptical.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=ggrammel@juniper.net; x-originating-ip: [77.2.216.124] x-microsoft-exchange-diagnostics: 1; BN1PR05MB043; 5:Unw+O0JHpOBbsUQkYQVP0DNdeqAKe0xJwQVlMCvY3v/CzZgGHKx7b70jlZcNZwUnAztqXOm3hJ5emk7jq5jU/yt5LtKuW0H+CzSz0ajSrlDbYB4GPsktPtTrp/NOExRDiqp7VGJoHL1FH0DVNmJCyQ==; 24:mBGyEpI4enr+K/28t8jOPJNPdRRPmpVIkw8WO4BOiMOkTNSBnB3NElmmwLiPj2DwWWmPGO+FXReVJvOjpIs0DzsIk5CEgV/tqXQM/3/FV1E=; 20:dlcUoETalalUGRfLsts9Bt5TpQtVupSQuGbkHefWDAFGGvEXv8H4vEm8MhTUx2kvjiBAEoRjCEnEOKHpgdW7jA== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BN1PR05MB043; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(520078)(3002001)(102215026); SRVR:BN1PR05MB043; BCL:0; PCL:0; RULEID:; SRVR:BN1PR05MB043; x-forefront-prvs: 0738AF4208 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(377454003)(199003)(13464003)(24454002)(189002)(81156007)(106356001)(40100003)(189998001)(19580395003)(19580405001)(122556002)(66066001)(101416001)(33656002)(5002640100001)(5004730100002)(110136002)(2950100001)(11100500001)(97736004)(5001960100002)(2900100001)(76176999)(86362001)(54356999)(83716003)(15975445007)(92566002)(87936001)(102836002)(50986999)(93886004)(5007970100001)(10400500002)(36756003)(106116001)(105586002)(82746002)(99286002)(5008740100001)(104396002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN1PR05MB043; H:BN1PR05MB041.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts) spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Oct 2015 20:16:18.7759 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1PR05MB043 Archived-At: X-Mailman-Approved-At: Sat, 31 Oct 2015 12:42:56 -0700 Cc: "i2rs@ietf.org" , Martin Bjorklund , "Alexander Clemm \(alex\)" , "j.schoenwaelder@jacobs-university.de" , "andy@yumaworks.com" , "lhotka@nic.cz" , "jhaas@pfrc.org" , "akatlas@gmail.com" , "shares@ndzh.com" Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) X-BeenThere: i2rs@ietf.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Interface to The Internet Routing System \(IRS\)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Oct 2015 20:16:22 -0000 Hi Igor, It would be advisable to let the client decide whether a different underlay= shall invalidate the intended config.=20 Best Gert Sent from my Apple ][ > On 23 Oct 2015, at 15:00, Igor Bryskin wrote: >=20 > Hi Martin, >=20 > It is possible that a user configures a link of a customized (user define= d) topology providing also the path defined in underlay server defined topo= logy. Said underlay path needs to be considered as intended configuration. = Actual underlay path will be state data in this case ( personally I also do= not see a difference between state and server provided data), which may or= may not match the intended underlay path. The actual underlay path may als= o change over time due, for example, network failure restoration procedures= affecting the underlay topology. > The link of the user defined topology is not invalidated in this case. Us= er just has to deal with the fact that the intended configuration may not n= ecessarily match the actual configuration and state data. >=20 > Cheers, > Igor >=20 > -----Original Message----- > From: i2rs [mailto:i2rs-bounces@ietf.org] On Behalf Of Alexander Clemm (a= lex) > Sent: Thursday, October 22, 2015 8:12 PM > To: Martin Bjorklund > Cc: lhotka@nic.cz; i2rs@ietf.org; j.schoenwaelder@jacobs-university.de; a= ndy@yumaworks.com; akatlas@gmail.com; jhaas@pfrc.org; shares@ndzh.com > Subject: Re: [i2rs] WG LC for Topology (10/1 to 10/14) >=20 > Hi Martin, >=20 > Agree, we need to add text for this. Good catch. =20 >=20 > The reality is that the integrity of the links between overlay and underl= ay will be broken. The fact that those links will be invalidated is someth= ing that ultimately needs to be indicated. =20 >=20 > Since the interface analogy was brought up, this problem is actually face= d by layered interfaces that are user controlled as as well. What is the s= olution that is applied there? (I guess it is basically left up to the app= lication, correct?) >=20 > --- Alex >=20 > -----Original Message----- > From: Martin Bjorklund [mailto:mbj@tail-f.com]=20 > Sent: Monday, October 19, 2015 11:04 PM >=20 > ..... >=20 >=20 > What happens in your model if a user-defined network has a reference to a= server-provided network, and the sever decides to remove its network? I s= ee no special text in your document about this case. >=20 >=20 >=20 >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs >=20 > _______________________________________________ > i2rs mailing list > i2rs@ietf.org > https://www.ietf.org/mailman/listinfo/i2rs