
From nobody Tue Jan 12 04:13:33 2021
Return-Path: <noreply@ietf.org>
X-Original-To: yang-doctors@ietf.org
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D6DC3A11DB; Tue, 12 Jan 2021 04:13:22 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: =?utf-8?q?J=C3=BCrgen_Sch=C3=B6nw=C3=A4lder_via_Datatracker?= <noreply@ietf.org>
To: <yang-doctors@ietf.org>
Cc: draft-ietf-netconf-crypto-types.all@ietf.org, last-call@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.24.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <161045360252.14510.16755799701987783827@ietfa.amsl.com>
Reply-To: =?utf-8?b?SsO8cmdlbiBTY2jDtm53w6RsZGVy?= <j.schoenwaelder@jacobs-university.de>
Date: Tue, 12 Jan 2021 04:13:22 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/qx8dol40kAO1gtEP9lRFGAtN2WY>
Subject: [yang-doctors] Yangdoctors last call review of draft-ietf-netconf-crypto-types-18
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jan 2021 12:13:23 -0000

Reviewer: Jürgen Schönwälder
Review result: Ready with Issues

The crypto modules aim at providing a flexible reusable infrastructure
of groupings for modeling cryptographic keys and related concepts. The
flexibility of the definitions provided of course comes with a certain
amount of complexity.

>From a YANG perspective, draft-ietf-netconf-crypto-types-18.txt is in
a good and close to publish state (a couple of minor issues left).  I
also tried to understand what is being modeled here and hence I also
have some questions concerning the concepts modeled and I hope these
are easy to answer/resolve as well.

- I have compiled the YANG modules using yanglint 0.16.105.

- s/ietf-crypt-types/ietf-crypto-types/

- Does it make sense to have a new notation like

      |  The diagram above uses syntax that is similar to but not
      |  defined in [RFC8340].

  or shall this simply become regular text?

- "Identities use to specify uncommon formats are enabled [...]" is
  this correct or should it be "used to specify"?

- Second bullet 2.1.4.1:

  Perhaps change
  
  [...] specified by the "format" identity Section 2.1.2 associated [...]

  to
  
  [...] specified by the "format" identity (see Section 2.1.2) associated [...]

  What is 'encoded in the format specified by the "format" identity' I
  assume this refers to the key value that is encrypted and stored in
  encrypted-value, no?

- Same bullet in 2.1.4.1:

      The "encrypted-value" node is the key, encrypted by the key
      referenced by the "encrypted-by" node, encoded in the format
      specified by the "format" identity Section 2.1.2 associated with
      the ancestor node using this grouping.

  Do I understand correctly that the encrypted-value always holds an
  encrypted key? If so, a better name for the leaf would perhaps have
  been encrypted-key and for the grouping encrypted-key-grouping. I
  assume you did not pick this name since you wanted to use
  encrypted-key for other purposes? This makes sense and may have led
  to encrypted-key-value-grouping, in the sense of an encrypted
  'key-value'? For the definition of the grouping, does it actually
  matter that the value encrypted is a key? Or would it make sense to
  rename the grouping to encrypted-value-grouping and then the second
  bullet becomes:

      The "encrypted-value" node holds the value, encrypted by the key
      referenced by the "encrypted-by" node, encoded in the format
      specified by the "format" identity (see Section 2.1.2) associated with
      the ancestor node using this grouping.

  Looking at the definition of encrypted-key-value-grouping, it seems
  that the name encrypted-value-grouping would actually be more
  appropriate, there is nothing in the definition that says that the
  value must be a key for something.

  And is it "the" ancestor node or "an" ancestor node? Perhaps the
  possible confusion here is that ancestor node may mean different
  things, schema tree versus data tree. What about this?

      The "encrypted-value" node holds the value, encrypted by the key
      referenced by the "encrypted-by" node, encoded in the format
      specified by the "format" identity (see Section 2.1.2) associated with
      the ancestor data node of the data node using this grouping.

  Hm. Did I reverse engineer this correctly?

- In 2.1.4.2 last item, where do I see that the encrypted-password
  node is encoded using the CMS EnvelopedData structure? There is no
  "format" identity here, so this is hard coded to always have the CMS
  EnvelopedData structure (or is it CMS EncryptedData structure, see
  below)? OK, if I lookup the definition, it seems to use a hardcoded
  format.

- Always use cleartext instead plain-text? I understand that some
  people make a distinction between plain text, plaintext, and
  cleartext. Does this document do that? I do not think so, and if so,
  we may reduce confusion by picking just one term. On the other hand,
  if there is a distinction made, then the document should perhaps be
  explicit about it somewhere and define how these terms are used.

- The example in section 2.2 is helpful and much appreciated.

- s/confugration/configuration/

- The encrypted-password description says that it uses a" CMS
  EnvelopedData structure, per Section 8 in RFC 5652, encoded using
  ASN.1 distinguished encoding rules (DER)". However, section 8 of RFC
  5652 defined EncryptedData and not EnvelopedData. So what is the
  intention here?

- Following up on the previous point, it seems that the EncryptedData
  format does not introduce a salt, i.e., if the same password is used
  multiple times and they are all protected by the same key, then this
  is visible since the encrypted formats will all be the same as well.
  Is this something to be concerned about? Well, this is not really
  a yang-doctor question...

- The encrypted-one-symmetric-key-format again refers to the
  EnvelopedData per Section 8 in RFC 5652 but section 8 only defines
  EncryptedData. So either the type name is wrong or the reference is
  wrong.

- The encrypted-password container description refers to the
  EnvelopedData and either the reference to section 8 is wrong or it
  should be EncryptedData (see above). Is it OK to have a fixed
  encrypted password format? Perhaps it is, I am just checking. (The
  password leaf in RFC 7317 uses the ianach:crypt-hash format, i.e.,
  it is somewhat extensible but then this module may target different
  use cases as it deals with encrypted passwords instead of hashed
  passwords.)

- I wonder why this is a SHOULD and not a MUST:

           "Identifies the symmetric key's format.  Implementations
            SHOULD ensure that the incoming symmetric key value is
            encoded in the specified format.";

  This statement shows up several times when the key-format identities
  are used. I wonder what this means to an implementer. If I receive a
  key format (say one-symmetric-key-format) and a corresponding blob
  of data, do I have to decode this to see whether the format works
  out? If later the key-format is changed to something else (lets say
  octet-string-key-format), do I reject such a change or is it OK as
  long as the binary data I have would be a valid value given the new
  format? Perhaps this is implementation specific? Well, since we deal
  with keys, ...

- The definitions of the features symmetric-key-encryption and
  private-key-encryption have copy and paste text from the definition
  of the feature password-encryption. I think they need to be changed
  to:

     feature symmetric-key-encryption {
       description
         "Indicates that the server supports encryption of
          symmetric keys.";
     }

     feature private-key-encryption {
       description
         "Indicates that the server supports encryption of
 	  private keys.";
     }

- If I have a 'octet-string-key-format' key and I use it to create an
  encrypted key. How do I know which crypto algorithm is used? I have
  not digged into it, but do the various CMS structures provide this
  information somewhere? In the case of asymmetric keys, the format
  gives a hint whether I am dealing with RSA keys or EC keys. For
  symmetric keys, I am not sure in call cases how the algorithm is
  determined.

- The asymmetric-key-pair-with-certs-grouping descriptions talk about
  'IDevID' and 'LDevID' and 'TPM-protected asymmetric keys'. This
  seems to call for additional references to explain what these are.

- s/is was unclear/it was unclear/

- RFC 8407 suggests that the XML registry Registrant Contact is:

  Registrant Contact: The IESG.

  This does not seem to be handled in a consistent manner if I look at
  recent RFCs but I think the idea was to give the responsibility to
  the IESG, assuming the IESG is a more stable entity than WGs.





From nobody Tue Jan 12 10:41:29 2021
Return-Path: <noreply@ietf.org>
X-Original-To: yang-doctors@ietf.org
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 851163A11BD; Tue, 12 Jan 2021 10:41:12 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: =?utf-8?q?J=C3=BCrgen_Sch=C3=B6nw=C3=A4lder_via_Datatracker?= <noreply@ietf.org>
To: <yang-doctors@ietf.org>
Cc: draft-ietf-netconf-trust-anchors.all@ietf.org, last-call@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.24.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <161047687248.13931.17900123352005904827@ietfa.amsl.com>
Reply-To: =?utf-8?b?SsO8cmdlbiBTY2jDtm53w6RsZGVy?= <j.schoenwaelder@jacobs-university.de>
Date: Tue, 12 Jan 2021 10:41:12 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/Zy6bHhccIf_sVlLY4-y37LqEpio>
Subject: [yang-doctors] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jan 2021 18:41:19 -0000

Reviewer: Jürgen Schönwälder
Review result: Ready with Issues

The crypto modules aim at providing a flexible reusable infrastructure
of groupings for modeling cryptographic keys and related concepts. The
flexibility of the definitions provided of course comes with a certain
amount of complexity.

>From a YANG perspective, draft-ietf-netconf-trust-anchors-13.txt is in
a good and close to publish state (a couple of minor issues left).  I
also tried to understand what is being modeled here and hence I also
have some questions concerning the concepts modeled and I hope these
are easy to answer/resolve as well.

- I have compiled the YANG modules using yanglint 0.16.105.

- The prefix 'ts' is rather short, the set of two letter prefixes is
  rather small limited. This comment also applies to the other
  documents, crypto-types uses 'ct. Perhaps this is not a problem
  since collisions can be handled but if we go for rather short
  prefixes, we will have to exercise the collision resolution. (I see
  that 'ct' has already been used by ietf-complex-types, RFC 6095.) A
  possible alternative could be to use sec-ct, sec-ts, sec-ks, ...).

  RFC 8407 provides the following guidelines (Section 4.2):

   Prefix values SHOULD be short but are also likely to be unique.
   Prefix values SHOULD NOT conflict with known modules that have been
   previously published.

  Well, having short and terse prefixes is actually nice and enhancing
  programmer readability.

- s/is defines a truststore/defines a truststore/

- s/to be grouped references/to be grouped and referenced/

- In 2.2.1, I was not sure what CA certificates are and what EE
  certificates are. I then tried to guess EE = end entity cert, but
  this does not explain CA since the term used in crypto types is
  trust anchor cert. The description in the XML clarified that my
  guess was kind of correct. Perhaps explain upfront what these
  acronyms mean? Or perhaps the acronyms can be avoided by simply
  spelling things out? They do not appear to be used frequently.

- s/<!-- Entity Certs/<!-- End Entity Certs/

- s/(Section 2.1.3.2), groupings/(Section 2.1.3.2) groupings/

- Is the feature truststore-supported really needed? Does the YANG
  library not already provide the information whether a module has
  been implemented or just imported to access type and grouping
  definitions?

- In the YANG module, you seem to use Truststore to refer to
  /ts:truststore but in the surrounding text you also use just
  truststore. I am not sure it is necessary to have the capitalized
  version but if people think its necessary, it makes sense to define
  the difference and to make sure the proper capitalization is used
  throughout the document. (If it is necessary somewhere to be
  explicit, I would rather use /ts:truststore but that may be my
  subjective preference. Well, I started to use 'central truststore'
  below, not sure this is better as the term also would benefit from
  being defined.)

- Does it make sense to be explicit about the fact that the cert/key
  references are all weak references in the sense that they can exist
  without the corresponding cert/key being present? In other words, in
  order to safely delete a cert/key, one would have to check that
  there are no dangling references left (which is difficult in case
  references are scattered over multiple (proprietary) data models).
  For YANG savvy people this may be obvious since there is no
  require-instance statement in the leafref type definition but not
  every implementer may recall this - and it would be good to document
  that using weak references was an explicit design decision and not
  an oversight.

- Does it make sense to spell out that using the grouping in other
  YANG modules requires to define additional reference types since the
  ones provided by this modules only work for the central truststore
  store? And this as a consequence may require multiple leafs to refer
  to keys that exist in different truststores, i.e., having multiple
  truststores is possible but comes with a cost.

- Would it make sense to add to all three documents an objectives
  section that summarizes the design objectives? For this module,
  a starting point might be this:

  2.1.  Objectives

  The design of the truststore data model was guided by the following
  design objectives:

  - provide a central truststore for storing keys or certificates
  - provide support for storing named bags of keys or certificates
  - provide types that can be used to reference keys or certificates
    stored in the central truststore
  - protect the truststore using suitable access control definitions
  - provide groupings that support locally configured keys or
    certificates or references to key or certificate bags in the
    central truststore
  - provide groupings that can be used to instantiate truststores
    in other data models (but this requires to introduce additional
    types to reference keys or certificates)

  I do not know whether this list is complete but I find it usually
  helpful to have the design objectives spelled out.

- Section 3 talks about populating <running> with built-in trust
  anchors.

   In order for the built-in trust anchors to be referenced by
   configuration, the referenced certificates MUST first be copied into
   <running>.  The certificates SHOULD be copied into <running> using
   the same "key" values, so that the server can bind them to the built-
   in entries.

  Is the idea that this copy operation is an explicit management
  operation or can implementations populate <running> with this
  data automatically?

- Section 4.2 says:

   This module does not define any RPCs, actions, or notifications, and
   thus the security consideration for such is not provided here.

  Well, the module actually instantiates certificate-expiration
  notifications.

- Registrant Contact: should be changed to the IESG.




From nobody Tue Jan 12 17:24:56 2021
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E79AA3A07E2; Tue, 12 Jan 2021 17:24:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nGj5lwt4qIAx; Tue, 12 Jan 2021 17:24:45 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65B573A046B; Tue, 12 Jan 2021 17:24:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 91EFB38982; Tue, 12 Jan 2021 20:26:13 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 2UEtQkuwWY3q; Tue, 12 Jan 2021 20:26:13 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 2A0273897F; Tue, 12 Jan 2021 20:26:13 -0500 (EST)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id B35701F9; Tue, 12 Jan 2021 20:24:42 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: =?us-ascii?Q?=3D=3Futf-8=3Fb=3FSsO8cmdlbiBTY2jDtm53w6RsZGVy=3F=3D?= <j.schoenwaelder@jacobs-university.de>
cc: yang-doctors@ietf.org, last-call@ietf.org, netconf@ietf.org, draft-ietf-netconf-trust-anchors.all@ietf.org
In-Reply-To: <161047687248.13931.17900123352005904827@ietfa.amsl.com>
References: <161047687248.13931.17900123352005904827@ietfa.amsl.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Tue, 12 Jan 2021 20:24:42 -0500
Message-ID: <22275.1610501082@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/XMYEX1AS5r5uU27XmRtWqgj7e4Q>
Subject: Re: [yang-doctors] [Last-Call] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jan 2021 01:24:47 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


J=C3=BCrgen Sch=C3=B6nw=C3=A4lder via Datatracker wrote:
    > - In 2.2.1, I was not sure what CA certificates are and what EE
    > certificates are. I then tried to guess EE =3D end entity cert, but
    > this does not explain CA since the term used in crypto types is
    > trust anchor cert. The description in the XML clarified that my
    > guess was kind of correct. Perhaps explain upfront what these
    > acronyms mean? Or perhaps the acronyms can be avoided by simply
    > spelling things out? They do not appear to be used frequently.

    > - s/<!-- Entity Certs/<!-- End Entity Certs/

"End Entity" goes back to RFC2510, and I don't think it's defined in any of
our documents.  I was expecting to see it in RFC4949 or RFC5280, but it's
used in 5280, but not defined.
I guess it comes from X509.v3, which is still behind the stupid paywall.

The term EE/End Entity is in my opinion a great term, but it also took me
awhile to learn it.

=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAl/+S9oACgkQgItw+93Q
3WVnuQgAtSh5WqSUlJ41rx77fXBYmAtRIkRX/v+u5kd3ZvYdIWHjYjM0gy5OZh3j
WdOC30Js3iZxHbgvS5p+nzW9GOyEbaGheyYbyLnSw9kz2iqWMYKkp+4YuL2CmrzR
/F3k0Yw8Ibf1cIa0r8+mZ554kvYp4iHsI5+wjfYu6eJ2JPGWdcEpFzre6WCwE+53
3e1cXlZ538Fy4/+WidbTNeKpv0LjbSPSfnwNOQmkaBIcm7ZSHKIRtpPpVeB13KI7
n9WC8B4piF31qphiuQQY5c0nvujgI2rB95lbWZgxARFgstAsEQm84TQ0wSRmJ+99
3SImIlByKAF3k3wG5VC/XZeotEoEUg==
=qs/B
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Wed Jan 13 02:56:30 2021
Return-Path: <ietfc@btconnect.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAE3D3A00D2; Wed, 13 Jan 2021 02:56:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bCilOgalemSQ; Wed, 13 Jan 2021 02:56:26 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2120.outbound.protection.outlook.com [40.107.20.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92B383A00F7; Wed, 13 Jan 2021 02:56:25 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CQab1znfXihGGe6SJZE93BLEjQ7AiFHfIjihBa2JOqyZz3Klndx7LCUQrwHlv/q++9spdI0dPYeoAoBv48cUul1iHrjaOVPOOke7P4rSro7CBJ9myPFI4hDo4qGqgL+HbcEyXYwOLY4rxbonot+mYwxC12t58erMq6eXEkUXCKn68Smsmw9M07HStB+F52NtOSkNttiESKzFnzQszRsTRj8OVQOY/8lBbYIYEZa8uGE0gIb1n6bSkecrgXIohna4gHRikNOL/aTPzZ+/Jzs6YY6z1ZXp1aHJQrVqigG1kH89gxuHFvC4k6Sx42PQrV/jTteHLqu6zGhvIITacTtgMw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l9+kk0RQzAVo1HCA/OAsQq72YEuOMjvvqjegzd8KDiA=; b=Dd3yuRlbP7Ar9s2aA0Tzl/3aNIW1JhKddrfpKotKiuKE5T8PlFnsofPGtqCEL+2v6MtNbdvj+pW7rDmDRaQ1iJd/8PHUuloVkFV9osdIenI+/IcFbaqYv11sUz5Ytt3Jn2cmhTKHp4YGsvthN+QkxtnMibp+jY7EbdwDUciTwVSsyudBSe97+Tc9LKvnBG1LKPJexnCFf8oS31dBJCBC8U+rYbfvgWlrAU8Pfqb47RZ9+n5x6cpdBMo5QKUX8ePAwOdP2vQV/eM7cGWerC/vq+cVBMggKjUvkoc8LFE1QiUuXQBJKdpYHKo0Tl9yx2b8P5IA8noOOMmskTvnd2KUNA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l9+kk0RQzAVo1HCA/OAsQq72YEuOMjvvqjegzd8KDiA=; b=R9XEvSI/07l5NHuLOeybF/wWSMeMnZjMJEsPTl0NQczUvdJi7HoB6oVdXdvVDgTrvSgIXxmhrD+UGjzie9B+CqMKPvSNnwrdbMcIaRenbsTWequRlhIr2hW0Pas7etQ2xt4mUVlAB5+YHJ9lem85GLsrS031nlLpaik1svXf4Zo=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM6PR07MB6167.eurprd07.prod.outlook.com (2603:10a6:20b:65::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.2; Wed, 13 Jan 2021 10:56:23 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849%5]) with mapi id 15.20.3763.009; Wed, 13 Jan 2021 10:56:23 +0000
From: tom petch <ietfc@btconnect.com>
To: "yang-doctors@ietf.org" <yang-doctors@ietf.org>, =?iso-8859-1?Q?J=FCrgen_Sch=F6nw=E4lder?= <j.schoenwaelder@jacobs-university.de>
CC: "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-trust-anchors.all@ietf.org" <draft-ietf-netconf-trust-anchors.all@ietf.org>
Thread-Topic: Short prefix Re: [netconf] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
Thread-Index: AQHW6RLOA86IN18iz0WS1xfHTKbb6aolYga9
Date: Wed, 13 Jan 2021 10:56:23 +0000
Message-ID: <AM7PR07MB624869BD8D84682C7C090CECA0A90@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <161047687248.13931.17900123352005904827@ietfa.amsl.com>
In-Reply-To: <161047687248.13931.17900123352005904827@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.146.121.140]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6affe13f-5cd6-4f90-a9c2-08d8b7b1ddf8
x-ms-traffictypediagnostic: AM6PR07MB6167:
x-microsoft-antispam-prvs: <AM6PR07MB6167680B78D5EA4C2490C0C8A0A90@AM6PR07MB6167.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE;  SFS:(396003)(136003)(366004)(376002)(39860400002)(346002)(8936002)(110136005)(52536014)(2906002)(86362001)(54906003)(186003)(83380400001)(8676002)(26005)(6506007)(71200400001)(5660300002)(66946007)(55016002)(76116006)(66574015)(4326008)(66476007)(66556008)(64756008)(66446008)(9686003)(478600001)(316002)(91956017)(33656002)(7696005)(19607625011); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata: =?iso-8859-1?Q?HWwgurli0T2oCWMIrZ4pD6pAJfJjK0EDwU6J7mbUCc72KnOklheRsXY/ld?= =?iso-8859-1?Q?1Fo2f+FVeGmMtqcmBnR0T4UVHGU4XjhukZy4RYxxU3VJjXXePerLT2rKpZ?= =?iso-8859-1?Q?Vg1AoYQatka6Q+VIExpaQoQ4/u21FztWkwy283agQU2NtgNOxLG4qYzbzR?= =?iso-8859-1?Q?W8DTKWHjoX58zQNFITPYbRy73xDtJJuVHB8/399kk8SGun2m2hrBvzR1x9?= =?iso-8859-1?Q?DrC9dBUzhRt5kB8NuDMcty4z8SocbjM0ByG8uP/LBjRu4qvn2NMZ3QpecJ?= =?iso-8859-1?Q?z2STmiH++1HNCb2oEMVmZ89/6b8jUylzXffRQXqThwXmpmJRkVILgD/J26?= =?iso-8859-1?Q?37906jp2BlAZlY9PEsusfsu7MFPD04JozfYztxmVAuwCOnpk0qhLkT+mLE?= =?iso-8859-1?Q?Zz4UWgU3E+L/3uteVkShb7kCERjsuQ73h6/ODBnYWpBdwtq2eFyz3GyWQs?= =?iso-8859-1?Q?jf+THKna+QITvTAcBye5NK67tVGUC//783DO2km29I3VDJu6BfdrCkPp1A?= =?iso-8859-1?Q?b3jfun5ilc40blhsKaZiZSzVrbqSA2XlKuZxg1NBxnWd6CUT3kkW4Zede2?= =?iso-8859-1?Q?u2NckEpdmoPpcrr2M2Ubxc3Firk0A1PB/ZxM5lNS6a8BHYZH0nR/cCdhFN?= =?iso-8859-1?Q?kEasLicpUr6UcWADQ8FW7e/2U+4mCasN66ikCW+19R0l8KS+4pxNU3H5ij?= =?iso-8859-1?Q?jmMDp7gpHOEtGG00BPWfZBVvGXEkkn4sn0sKpHX+I0Mtuq/f1O4gDFQK0S?= =?iso-8859-1?Q?+x8jhQB70PU+lxUgi5yUfoMISX/8uOlgzQV+xiL7QkNc9mQuTLrnuNZPUA?= =?iso-8859-1?Q?/SZAR3ufYM3Z4UMdpaqjsLBdaut7FLSE91XN3ox+mG+mgrDjLVUQBMumaF?= =?iso-8859-1?Q?vwWxjpk2XHlSr1YTzD8X8P2RBn3t5LCh4zdIcTTIz4H9CjS6Z8gSlCCz3l?= =?iso-8859-1?Q?Jk6lV3j7a2S9LCjBxnZOekqn/uWzQHmtJPBq+EYw1INpd4pY3kynp8cRwB?= =?iso-8859-1?Q?AfJoCF5CJfsReKrqw=3D?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6affe13f-5cd6-4f90-a9c2-08d8b7b1ddf8
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Jan 2021 10:56:23.2627 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TnR/ujiJmB3Bbm/hOEKN7nvfrav9JMZtCGsP+ISihdgCVFVKQvvp0FGnFlW/mt4iJ2BBDoVnGD+aKyfcI/B86Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR07MB6167
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/i_n4tXs_su9z416YTotN6EWTmX4>
Subject: [yang-doctors] Short prefix Re: [netconf] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jan 2021 10:56:29 -0000

From: netconf <netconf-bounces@ietf.org> on behalf of J=FCrgen Sch=F6nw=E4l=
der via Datatracker <noreply@ietf.org>=0A=
Sent: 12 January 2021 18:41=0A=
Cc: last-call@ietf.org; netconf@ietf.org; draft-ietf-netconf-trust-anchors.=
all@ietf.org=0A=
Subject: [netconf] Yangdoctors last call review of draft-ietf-netconf-trust=
-anchors-13=0A=
=0A=
Reviewer: J=FCrgen Sch=F6nw=E4lder=0A=
Review result: Ready with Issues=0A=
=0A=
The crypto modules aim at providing a flexible reusable infrastructure=0A=
of groupings for modeling cryptographic keys and related concepts. The=0A=
flexibility of the definitions provided of course comes with a certain=0A=
amount of complexity.=0A=
=0A=
>From a YANG perspective, draft-ietf-netconf-trust-anchors-13.txt is in=0A=
a good and close to publish state (a couple of minor issues left).  I=0A=
also tried to understand what is being modeled here and hence I also=0A=
have some questions concerning the concepts modeled and I hope these=0A=
are easy to answer/resolve as well.=0A=
=0A=
- I have compiled the YANG modules using yanglint 0.16.105.=0A=
=0A=
- The prefix 'ts' is rather short, the set of two letter prefixes is=0A=
  rather small limited. This comment also applies to the other=0A=
  documents, crypto-types uses 'ct. Perhaps this is not a problem=0A=
  since collisions can be handled but if we go for rather short=0A=
  prefixes, we will have to exercise the collision resolution. (I see=0A=
  that 'ct' has already been used by ietf-complex-types, RFC 6095.) A=0A=
  possible alternative could be to use sec-ct, sec-ts, sec-ks, ...).=0A=
=0A=
<tp>=0A=
I agree that two letter prefixes should be used sparingly, for widely deplo=
yed modules; interfaces is a good example.=0A=
=0A=
There is a bmwg module =0A=
draft-vassilev-bmwg-network-interconnect-tester  =0A=
which uses ta and tg;  I think that this is not a good example=0A=
=0A=
Tom Petch=0A=
=0A=
  RFC 8407 provides the following guidelines (Section 4.2):=0A=
=0A=
   Prefix values SHOULD be short but are also likely to be unique.=0A=
   Prefix values SHOULD NOT conflict with known modules that have been=0A=
   previously published.=0A=
=0A=
  Well, having short and terse prefixes is actually nice and enhancing=0A=
  programmer readability.=0A=
=0A=
- s/is defines a truststore/defines a truststore/=0A=
=0A=
- s/to be grouped references/to be grouped and referenced/=0A=
=0A=
- In 2.2.1, I was not sure what CA certificates are and what EE=0A=
  certificates are. I then tried to guess EE =3D end entity cert, but=0A=
  this does not explain CA since the term used in crypto types is=0A=
  trust anchor cert. The description in the XML clarified that my=0A=
  guess was kind of correct. Perhaps explain upfront what these=0A=
  acronyms mean? Or perhaps the acronyms can be avoided by simply=0A=
  spelling things out? They do not appear to be used frequently.=0A=
=0A=
- s/<!-- Entity Certs/<!-- End Entity Certs/=0A=
=0A=
- s/(Section 2.1.3.2), groupings/(Section 2.1.3.2) groupings/=0A=
=0A=
- Is the feature truststore-supported really needed? Does the YANG=0A=
  library not already provide the information whether a module has=0A=
  been implemented or just imported to access type and grouping=0A=
  definitions?=0A=
=0A=
- In the YANG module, you seem to use Truststore to refer to=0A=
  /ts:truststore but in the surrounding text you also use just=0A=
  truststore. I am not sure it is necessary to have the capitalized=0A=
  version but if people think its necessary, it makes sense to define=0A=
  the difference and to make sure the proper capitalization is used=0A=
  throughout the document. (If it is necessary somewhere to be=0A=
  explicit, I would rather use /ts:truststore but that may be my=0A=
  subjective preference. Well, I started to use 'central truststore'=0A=
  below, not sure this is better as the term also would benefit from=0A=
  being defined.)=0A=
=0A=
- Does it make sense to be explicit about the fact that the cert/key=0A=
  references are all weak references in the sense that they can exist=0A=
  without the corresponding cert/key being present? In other words, in=0A=
  order to safely delete a cert/key, one would have to check that=0A=
  there are no dangling references left (which is difficult in case=0A=
  references are scattered over multiple (proprietary) data models).=0A=
  For YANG savvy people this may be obvious since there is no=0A=
  require-instance statement in the leafref type definition but not=0A=
  every implementer may recall this - and it would be good to document=0A=
  that using weak references was an explicit design decision and not=0A=
  an oversight.=0A=
=0A=
- Does it make sense to spell out that using the grouping in other=0A=
  YANG modules requires to define additional reference types since the=0A=
  ones provided by this modules only work for the central truststore=0A=
  store? And this as a consequence may require multiple leafs to refer=0A=
  to keys that exist in different truststores, i.e., having multiple=0A=
  truststores is possible but comes with a cost.=0A=
=0A=
- Would it make sense to add to all three documents an objectives=0A=
  section that summarizes the design objectives? For this module,=0A=
  a starting point might be this:=0A=
=0A=
  2.1.  Objectives=0A=
=0A=
  The design of the truststore data model was guided by the following=0A=
  design objectives:=0A=
=0A=
  - provide a central truststore for storing keys or certificates=0A=
  - provide support for storing named bags of keys or certificates=0A=
  - provide types that can be used to reference keys or certificates=0A=
    stored in the central truststore=0A=
  - protect the truststore using suitable access control definitions=0A=
  - provide groupings that support locally configured keys or=0A=
    certificates or references to key or certificate bags in the=0A=
    central truststore=0A=
  - provide groupings that can be used to instantiate truststores=0A=
    in other data models (but this requires to introduce additional=0A=
    types to reference keys or certificates)=0A=
=0A=
  I do not know whether this list is complete but I find it usually=0A=
  helpful to have the design objectives spelled out.=0A=
=0A=
- Section 3 talks about populating <running> with built-in trust=0A=
  anchors.=0A=
=0A=
   In order for the built-in trust anchors to be referenced by=0A=
   configuration, the referenced certificates MUST first be copied into=0A=
   <running>.  The certificates SHOULD be copied into <running> using=0A=
   the same "key" values, so that the server can bind them to the built-=0A=
   in entries.=0A=
=0A=
  Is the idea that this copy operation is an explicit management=0A=
  operation or can implementations populate <running> with this=0A=
  data automatically?=0A=
=0A=
- Section 4.2 says:=0A=
=0A=
   This module does not define any RPCs, actions, or notifications, and=0A=
   thus the security consideration for such is not provided here.=0A=
=0A=
  Well, the module actually instantiates certificate-expiration=0A=
  notifications.=0A=
=0A=
- Registrant Contact: should be changed to the IESG.=0A=
=0A=
=0A=
=0A=
_______________________________________________=0A=
netconf mailing list=0A=
netconf@ietf.org=0A=
https://www.ietf.org/mailman/listinfo/netconf=0A=


From nobody Wed Jan 13 04:55:04 2021
Return-Path: <ietfc@btconnect.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06AD73A0CF5; Wed, 13 Jan 2021 04:55:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id imknCSOO0AEg; Wed, 13 Jan 2021 04:54:59 -0800 (PST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40126.outbound.protection.outlook.com [40.107.4.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2239F3A0CF2; Wed, 13 Jan 2021 04:54:57 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=I6stOD1NnmVMAGf8//lGLWsRMGNZNNawxng1S61Rypg24YQdYsDQrs1gTqegww9hD84LXK2Tsq5ZxMCqW2MRMjUP/tQFzoGgQBLKPxpFo33Ft2zlsMbqFAzth9ZaD+ciejKwmVpVMGk5iCcmMHttaJxlHO8UBrC99vq6uTzgdEmuFUduavL7szfTk4XPnRoKM1VWMK8rFY50zlwpOdQal0LxJUP9+Q0Q9y8PzCnTiSxlrxk8g9LoXMLYfviA4UbKU/Dox/WS/nCRh+wpJDjb3wQtlFCDcVtazH3lDpmYnwcRAtRYuBbegBUKPBo4O1Mnnfe+xmq77a74m7iGgEMVng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dA0gLORJorClnjI0MoO9YwBUkFacZ3LgvO5cuiBhOr4=; b=hhjRKpMTaH8wn5gkSlarZJ7gPzdpplQTsK0XSKm/5uz0+Ltm7zwNEPQwEg2WBjYhY2ht7Xb495rsTm4OFNmlcgrk1N/0k1FeY9l/+XAOqES4GEoklccpLY/uafEwJlRwCER/ES2Nknjwu6sQnb/if5y4Y3ixPp1N53Z8DqxYYfy6MZrbs28//31S4VLposjhNiGOz8TNqIw+b5dLC+QZenGSsTaeKypPfWEBS6OZMYEX3BZBqEiasUtiq+VjWPE4i1s/6Q5p+rtHiNO+4bWXhbfhaOOr9FviDI3pqy1XhBCL5pO6w5vEkQhcPJnMyX2mlwqsqJVWTP23IkBRKFarZA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dA0gLORJorClnjI0MoO9YwBUkFacZ3LgvO5cuiBhOr4=; b=faTN0UrIlmM/TtXTXppnX7viO4Bj/hTOTfD72vn19LZtFfUbeR30xBwv1oQ8n3BQehIS4rPKlhX+g2Wn5vgSoZ4ZpBtg/jxcAzRvfIxen7lMf4QDhqKu8pGxKvDEegw6NVrWWNPRA8gv548HSXR99qR/qoj+yoIJOXENYarWE40=
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com (2603:10a6:20b:134::11) by AM7PR07MB6946.eurprd07.prod.outlook.com (2603:10a6:20b:1b8::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3763.2; Wed, 13 Jan 2021 12:54:55 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849%5]) with mapi id 15.20.3763.009; Wed, 13 Jan 2021 12:54:55 +0000
From: tom petch <ietfc@btconnect.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, =?iso-8859-1?Q?J=FCrgen_Sch=F6nw=E4lder?= <j.schoenwaelder@jacobs-university.de>
CC: "yang-doctors@ietf.org" <yang-doctors@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-trust-anchors.all@ietf.org" <draft-ietf-netconf-trust-anchors.all@ietf.org>
Thread-Topic: [netconf] [Last-Call] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
Thread-Index: AQHW6UrnLVZ7LqdzE0eXiHa2CK+LLKolgllF
Date: Wed, 13 Jan 2021 12:54:55 +0000
Message-ID: <AM7PR07MB6248C1350BA7F52C08BE1C9DA0A90@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <161047687248.13931.17900123352005904827@ietfa.amsl.com>, <22275.1610501082@localhost>
In-Reply-To: <22275.1610501082@localhost>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: sandelman.ca; dkim=none (message not signed) header.d=none; sandelman.ca; dmarc=none action=none header.from=btconnect.com; 
x-originating-ip: [86.146.121.140]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9ed12dd0-75a0-4da8-fdf3-08d8b7c26d3e
x-ms-traffictypediagnostic: AM7PR07MB6946:
x-microsoft-antispam-prvs: <AM7PR07MB6946505C9C700ADA88540DCDA0A90@AM7PR07MB6946.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5797;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: MdiLUiIb/uc8CML74WWZ46woSOqR18VaOjBfbI4k6w6iViOzizcstW818I2vHHAMT7fhL6Y5uBZkwrPrDI6837gRff8yTl0cl2KXlHywaLDvRHhVy3qdt7oLWCFEAuE2LxhU17ZjMs6a1ZcOXHielU5E60Gzxf/LGycMxmATFj/fU4uIJ2KWCbs5omki8f+4vu4JzMn5/ra9hVOoAhpEGReovr4C293bolFDyjMLLyyNYcdsciGkhrXG1AKalBYLqbnL2s1iWyqpqhQ2Fc2rWDCRZZvDYi1TgiU15uAQgj4ti6ehoGMqbEyYBgJnsP8s9gMB57mT8cbDN1KK5hO45zcowH8VRORqcZypaJ114NKnQ7IgCM1X1TJhBWvwNGEWVR+cnej30o2HAjyhk18llLZmJAEnvwAfQ3twGGTwTWiRGLy8sWLwkNDeOe3b26BU
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE;  SFS:(346002)(376002)(136003)(366004)(396003)(39860400002)(86362001)(26005)(8676002)(66476007)(110136005)(4744005)(6506007)(316002)(9686003)(76116006)(55016002)(7696005)(66556008)(5660300002)(66446008)(54906003)(33656002)(66946007)(52536014)(478600001)(4326008)(8936002)(2906002)(186003)(71200400001)(91956017)(64756008)(19607625011); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata: =?iso-8859-1?Q?Al5e/iZa6+JLZSD7VmJC/mV7pCnnUUS2md2AJNsKzI//5Ydebwa8Uzg1Xa?= =?iso-8859-1?Q?1/YpFbyHdvIXkfWQZ9Rq9fgtb34LvtQpSL1xkL4jXK6sN+APrh59cP3xJe?= =?iso-8859-1?Q?TpbxuSIq+rMDwa3KkCJFsuo5VAB/w3/nHFxiIAytkmP6A6kERu92kS37H0?= =?iso-8859-1?Q?l9PKrT92e97TQ/FbtJXlVGcMm3l6MIVQRsWNljytXb3Ua3D0pS0AMgLsqj?= =?iso-8859-1?Q?K29ZmaeqYkEdYQ4k0RVuUm0uVidfjSQcmBh0hY3QaDmIOdBd65MedzVWcV?= =?iso-8859-1?Q?HaJ0zBS6XrJ3yjRjCZfQcQkYreZ8D+OHL/nbCSdRj2cROUNW/2wt4xb0ct?= =?iso-8859-1?Q?rJczr7b2AVFDeyYAVr1MQENOlJkMC/4oICzNRtshZPH0m13ZvpYGABwCVp?= =?iso-8859-1?Q?q9JnkEyNDaTgCOXE5reViB5NNsAvnookqkBWtL/3Ptrpf2YM9CGc+H8xsz?= =?iso-8859-1?Q?vpC0x26sa4LzzryRFjEtKcCJq5nMNEkpDxP/QnIilHHs6S/NrquUFBqyKL?= =?iso-8859-1?Q?UEqP9ms7ByiVPpVgsmTiGkJwPVrXoF1Pi/FSD81+7A2Wuy1pGyufAZ/Vbm?= =?iso-8859-1?Q?9ytqfJLJ1NskvHPuZPhNc6RDMQ2E3IktTD2dzacRXAvjKkX8OQetWBsbIq?= =?iso-8859-1?Q?NGO3G0u0t927SGYKcjPGkf2i8F6wfim9FFF7BNtbrlntIrnJipR8NdCa1I?= =?iso-8859-1?Q?y1JtvZ0M/lFmYykuUVxaV0XYrMKoRJ1CMDO5Zx2pWUI2MlXJGJ6FYZiRfQ?= =?iso-8859-1?Q?biNSqosmY+cYGWikIUqV5KB9dIK80rdujg1dk69emEMXA3tzQzPD18QVUJ?= =?iso-8859-1?Q?dumV1T1xr5t/kArN3UjMYH7vvlnfo4tp5pNszQv0PernYygBvkA8KcKmIw?= =?iso-8859-1?Q?Q3tfmRv7oTu4UwZQ1ER2MBsa28DX3ZcoesHFuYXvt3G6BkPD9ZfNGjjCz+?= =?iso-8859-1?Q?R8LNu3C2g4q88rm6jbwfyVJFY0PAtx4CrKifUw8He2XTDTzK44LSj7x48j?= =?iso-8859-1?Q?0ehpQlKhXsyichuRc=3D?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ed12dd0-75a0-4da8-fdf3-08d8b7c26d3e
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Jan 2021 12:54:55.6342 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: czjpgvqJDV3ImGRb0k68uy3E2knQixH89G5byqvNHGFOXDgvhGKz0ZhPEl+2C1oCAKZhA0YGC2EsX7PpZYG+AA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR07MB6946
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/to2maB0SOq7HJR9-YkyHtLNQBtI>
Subject: Re: [yang-doctors] [netconf] [Last-Call] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jan 2021 12:55:02 -0000

From: netconf <netconf-bounces@ietf.org> on behalf of Michael Richardson <m=
cr+ietf@sandelman.ca>=0A=
Sent: 13 January 2021 01:24=0A=
=0A=
J=FCrgen Sch=F6nw=E4lder via Datatracker wrote:=0A=
    > - In 2.2.1, I was not sure what CA certificates are and what EE=0A=
    > certificates are. I then tried to guess EE =3D end entity cert, but=
=0A=
    > this does not explain CA since the term used in crypto types is=0A=
    > trust anchor cert. The description in the XML clarified that my=0A=
    > guess was kind of correct. Perhaps explain upfront what these=0A=
    > acronyms mean? Or perhaps the acronyms can be avoided by simply=0A=
    > spelling things out? They do not appear to be used frequently.=0A=
=0A=
    > - s/<!-- Entity Certs/<!-- End Entity Certs/=0A=
=0A=
"End Entity" goes back to RFC2510, and I don't think it's defined in any of=
=0A=
our documents.  I was expecting to see it in RFC4949 or RFC5280, but it's=
=0A=
used in 5280, but not defined.=0A=
I guess it comes from X509.v3, which is still behind the stupid paywall.=0A=
=0A=
The term EE/End Entity is in my opinion a great term, but it also took me=
=0A=
awhile to learn it.=0A=
=0A=
<tp>=0A=
End Entity has been around TLS since at least RFC5246.=0A=
=0A=
Tom Petch=0A=
=0A=
=0A=
--=0A=
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=F8T consulting =
)=0A=
           Sandelman Software Works Inc, Ottawa and Worldwide=0A=
=0A=
=0A=
=0A=
=0A=


From nobody Wed Jan 13 05:17:19 2021
Return-Path: <j.schoenwaelder@jacobs-university.de>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4754C3A0D78; Wed, 13 Jan 2021 05:17:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sr_pbebxBD28; Wed, 13 Jan 2021 05:17:12 -0800 (PST)
Received: from atlas5.jacobs-university.de (atlas5.jacobs-university.de [212.201.44.20]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D661F3A0D70; Wed, 13 Jan 2021 05:17:11 -0800 (PST)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by atlas5.jacobs-university.de (Postfix) with ESMTP id 123BD670; Wed, 13 Jan 2021 14:17:09 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from atlas5.jacobs-university.de ([10.70.0.198]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10032) with ESMTP id 2pePKPDaHdbr; Wed, 13 Jan 2021 14:17:09 +0100 (CET)
Received: from hermes.jacobs-university.de (hermes.jacobs-university.de [212.201.44.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "hermes.jacobs-university.de", Issuer "DFN-Verein Global Issuing CA" (verified OK)) by atlas5.jacobs-university.de (Postfix) with ESMTPS; Wed, 13 Jan 2021 14:17:09 +0100 (CET)
Received: from localhost (demetrius5.irc-it.jacobs-university.de [10.70.0.222]) by hermes.jacobs-university.de (Postfix) with ESMTP id 8CB9D20166; Wed, 13 Jan 2021 14:17:09 +0100 (CET)
X-Virus-Scanned: amavisd-new at jacobs-university.de
Received: from hermes.jacobs-university.de ([212.201.44.23]) by localhost (demetrius5.jacobs-university.de [10.70.0.222]) (amavisd-new, port 10028) with ESMTP id 6blcjKJs-8DP; Wed, 13 Jan 2021 14:17:09 +0100 (CET)
Received: from localhost (anna.jacobs.jacobs-university.de [10.50.218.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by hermes.jacobs-university.de (Postfix) with ESMTPS id EB03A20164; Wed, 13 Jan 2021 14:17:08 +0100 (CET)
Date: Wed, 13 Jan 2021 14:17:08 +0100
From: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
To: tom petch <ietfc@btconnect.com>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-trust-anchors.all@ietf.org" <draft-ietf-netconf-trust-anchors.all@ietf.org>
Message-ID: <20210113131708.pkjh6rhbak2xnxlr@anna.jacobs.jacobs-university.de>
Reply-To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
Mail-Followup-To: tom petch <ietfc@btconnect.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-trust-anchors.all@ietf.org" <draft-ietf-netconf-trust-anchors.all@ietf.org>
References: <161047687248.13931.17900123352005904827@ietfa.amsl.com> <22275.1610501082@localhost> <AM7PR07MB6248C1350BA7F52C08BE1C9DA0A90@AM7PR07MB6248.eurprd07.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <AM7PR07MB6248C1350BA7F52C08BE1C9DA0A90@AM7PR07MB6248.eurprd07.prod.outlook.com>
X-Clacks-Overhead: GNU Terry Pratchett
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/8KVemA5itvZMd_jo2XNPhNIhJtQ>
Subject: Re: [yang-doctors] [netconf] [Last-Call] Yangdoctors last call review of draft-ietf-netconf-trust-anchors-13
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jan 2021 13:17:15 -0000

To clarify my comment: I was confused by the acronyms that were never
expanded, not by the expanded terms themselves. In other words, this
is mostly an editorial nit to get fixed.

/js

On Wed, Jan 13, 2021 at 12:54:55PM +0000, tom petch wrote:
> From: netconf <netconf-bounces@ietf.org> on behalf of Michael Richardso=
n <mcr+ietf@sandelman.ca>
> Sent: 13 January 2021 01:24
>=20
> J=FCrgen Sch=F6nw=E4lder via Datatracker wrote:
>     > - In 2.2.1, I was not sure what CA certificates are and what EE
>     > certificates are. I then tried to guess EE =3D end entity cert, b=
ut
>     > this does not explain CA since the term used in crypto types is
>     > trust anchor cert. The description in the XML clarified that my
>     > guess was kind of correct. Perhaps explain upfront what these
>     > acronyms mean? Or perhaps the acronyms can be avoided by simply
>     > spelling things out? They do not appear to be used frequently.
>=20
>     > - s/<!-- Entity Certs/<!-- End Entity Certs/
>=20
> "End Entity" goes back to RFC2510, and I don't think it's defined in an=
y of
> our documents.  I was expecting to see it in RFC4949 or RFC5280, but it=
's
> used in 5280, but not defined.
> I guess it comes from X509.v3, which is still behind the stupid paywall=
.
>=20
> The term EE/End Entity is in my opinion a great term, but it also took =
me
> awhile to learn it.
>=20
> <tp>
> End Entity has been around TLS since at least RFC5246.
>=20
> Tom Petch
>=20
>=20
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=F8T consult=
ing )
>            Sandelman Software Works Inc, Ottawa and Worldwide
>=20
>=20
>=20
>=20

--=20
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <https://www.jacobs-university.de/>


From nobody Thu Jan 14 02:13:38 2021
Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6DFCD3A1634; Thu, 14 Jan 2021 02:13:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.118
X-Spam-Level: 
X-Spam-Status: No, score=-2.118 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6EbRO1ihOwQF; Thu, 14 Jan 2021 02:13:32 -0800 (PST)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47F813A162E; Thu, 14 Jan 2021 02:13:29 -0800 (PST)
Received: from opfedar02.francetelecom.fr (unknown [xx.xx.xx.4]) by opfedar22.francetelecom.fr (ESMTP service) with ESMTP id 4DGgBH6Hnqz2y9M; Thu, 14 Jan 2021 11:13:27 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1610619207; bh=xPwZ8rVTQ0iFMz3VM0ONovlNwUIKtoWkGmD64zEr0nY=; h=From:To:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=JHwaVWRL2NszviimWemfyLahLgge3wT1eIUxxgRQUl+h6aLlYcXfQRGolWZE74pGF XKmmSpWX5gfbwcc9peqCmrdG3ZahA0y5rNhLGZQsYVUnDmFBckLkqCt864WXggH04Q UWr0M4wg3hEk4S5ww1Kd1PpRvCiX6N02yKwT4UboubedJNX8ICy750DUtpgXnvA3++ xG30XnFC9/tUtdQ65VdE1Quz4vSDIE2LISBj8AaKDgPzJOjFa28gNrHOwOswbX3PJZ LfYGSiXvcKo8dabauRczcGEXSEPCJPBeRyC5VQHvIRzLRRIpE+NhbTacy499QojS1f /P/ije7ahXeTg==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.101]) by opfedar02.francetelecom.fr (ESMTP service) with ESMTP id 4DGgBH5B4CzCqkh; Thu, 14 Jan 2021 11:13:27 +0100 (CET)
From: <mohamed.boucadair@orange.com>
To: =?utf-8?B?UmFkZWsgS3JlasSNw60=?= <rkrejci@cesnet.cz>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>
CC: "draft-ietf-opsawg-vpn-common.all@ietf.org" <draft-ietf-opsawg-vpn-common.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: Yangdoctors early review of draft-ietf-opsawg-vpn-common-02
Thread-Index: AQHW1TdUdpF5/StLZEa6DcccodwT8qonD3oQ
Date: Thu, 14 Jan 2021 10:13:26 +0000
Message-ID: <21141_1610619207_60001947_21141_380_5_787AE7BB302AE849A7480A190F8B9330315B9840@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <160829366323.14887.4241710682101990781@ietfa.amsl.com>
In-Reply-To: <160829366323.14887.4241710682101990781@ietfa.amsl.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.114.13.245]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/C0MgZYcv2ff8s0Cyq85Gd7Dbb2s>
Subject: Re: [yang-doctors] Yangdoctors early review of draft-ietf-opsawg-vpn-common-02
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2021 10:13:37 -0000
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From nobody Thu Jan 14 06:15:45 2021
Return-Path: <jclarke@cisco.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92F5B3A150B; Thu, 14 Jan 2021 06:15:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.62
X-Spam-Level: 
X-Spam-Status: No, score=-9.62 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kWNNRCcG; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gOZZrv4l
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CKL1fmAY3TLZ; Thu, 14 Jan 2021 06:15:42 -0800 (PST)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 124663A142E; Thu, 14 Jan 2021 06:15:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3818; q=dns/txt; s=iport; t=1610633742; x=1611843342; h=from:to:cc:subject:date:message-id:references: content-transfer-encoding:mime-version; bh=EVnb2oTVzkLWPMBzqMQSRFrDJ6qi02fu+fl6DB1PGb8=; b=kWNNRCcG7p6JAavrArD2WGtblszT+0HUXMVV/BvDjrawVvRtqUQZFBBs 1MW5skh/uh8+LX+YY0HsP2iS/l20Hi8i5Ixnxp2+MwvmHljKvRweCbu9f J7pDDp/EmpumPVVbUa3Gyn0Rwdv0k12u89juQzL1xF49w3qRHHbl82dJ+ Q=;
X-IPAS-Result: =?us-ascii?q?A0COAgCGTwBgmIMNJK1igQmBT4FTUYFYLy+IBwOOBAOZE?= =?us-ascii?q?oEugSUDVAsBAQENAQEtAgQBAYRKAoFtAiU1CA4CAwEBAQMCAwEBAQEFAQEBA?= =?us-ascii?q?gEGBBQBAQEBAQEBAYY2DIV0AQVAAQE3AQ8CAQgOCi4yJQIEAQ0NE4MLglYDL?= =?us-ascii?q?gGkaAKKJXSBNIMFAQEGhS0YghEJgTiCdYo+JhuBQT+BVIIhNT6EPgKDSoIKI?= =?us-ascii?q?oFZaRtPFywyUU8fGQcPYI9NiwGcRIEICoJ3kCyLXaJmlBicd4RSAgQCBAUCD?= =?us-ascii?q?gEBBoFYAzOBWXAVgyRQFwINjjIJCYNOilh0NwIGAQkBAQMJfI0sAQE?=
IronPort-PHdr: =?us-ascii?q?9a23=3Ak2nDjR1UCk33zPlbsmDT+zVfbzU7u7jyIg8e44?= =?us-ascii?q?YmjLQLaKm44pD+JxWGuadmgUTPUJmd4OAXw+bVsqW1X2sG7N7BtX0Za5VDWl?= =?us-ascii?q?cDjtlehA0vBsOJSCiZZP7nZiA3BoJOAVli+XzoOkVOHsviIVbA8TW+6DcIEU?= =?us-ascii?q?D5Mgx4bu3+Bo/ViZGx0Oa/s53eaglFnnyze7R3eR63tg7W8MIRhNhv?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.79,347,1602547200"; d="scan'208";a="628218042"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Jan 2021 14:15:40 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 10EEFe65011469 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 Jan 2021 14:15:40 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 Jan 2021 08:15:40 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 Jan 2021 08:15:40 -0600
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 14 Jan 2021 08:15:39 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eqW2Jqguz5/Kh2sTBEnWwx0Qk0SiLf6D83IFaXDFzEr8HQ66zUELQsx2kq/qOcIQFlP3KlChEeunKFWf5qEciopAzgm005XJWomp9HN3P/Evruix8D64sa6JurT1B8DeB0fgEgQe4S7RF/oBjIWN6YR5dCpVo7dUfahhdY1gvOtdot+dpDTy/XNbP3THez27sjII399t4R8tC694RwObyRFy5Uu4/Ng+pNYuHYJUsdTx2ZaHnMoxy4YJqduoAsPShm2mgO62/DKecF/7nbgP9FO8lFN9uz3tfJrTYTiHrDjVGF+QhQZ3BklrS2qcOISiEDJQQP8RlrNQgp2EXPLeAQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Enb42BrOK4qGZUUoWiSlD/PCVFpqTOIiMfYhVWzxyJk=; b=fPKljUN7c/Dxi3KnZQpXRLhvWLJPdNy+vdRWwJqyVCZikvfYvJJ774oiNJ1+2Zh3ozAEdHotlMk24XBtmqdnjQ4JMx0p8Gwi21LrslFcHIA6KfpP+RjARJCbzyqHg1ZNsa8I25R14cjGsCRwt5+2AIo1uQRv2r5xVO8rDTy0uJG+GMK9doAjsawkbXgBoyh22D8FQZvWkgeaMrIvrIlRTwMlEQIBVjl2J5wO/hGUeUedVwKyuaCpR6qaffLyljn5whzbLbX+MeoTLKRHeCDA2gvS7stT+40JukyFb0qZ58j8vj0deywEtOlRUmo0AJKioWX2644HK9xr7MDx55HjKw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;  s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Enb42BrOK4qGZUUoWiSlD/PCVFpqTOIiMfYhVWzxyJk=; b=gOZZrv4lDG0NxrsLACteqtHLS2q857YgHxyyTFB7q8f0Z8HaiOXy3oVTmvKGqLJ4j7A34kjuotOUdCOyzJJCbOl+Hp5nMfZvQwdIr4wjH2JOdUtY0ViOinu2aELnnu0itf4bErppeXuxGR9FJWm/7x1baRnnOQ0g6/u0S7i40ck=
Received: from BN6PR11MB1667.namprd11.prod.outlook.com (2603:10b6:405:e::12) by BN8PR11MB3731.namprd11.prod.outlook.com (2603:10b6:408:8b::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3742.9; Thu, 14 Jan 2021 14:15:38 +0000
Received: from BN6PR11MB1667.namprd11.prod.outlook.com ([fe80::fd07:517e:fe73:789d]) by BN6PR11MB1667.namprd11.prod.outlook.com ([fe80::fd07:517e:fe73:789d%12]) with mapi id 15.20.3763.011; Thu, 14 Jan 2021 14:15:38 +0000
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: =?iso-8859-2?Q?Radek_Krej=E8=ED?= <rkrejci@cesnet.cz>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>
CC: "draft-ietf-opsawg-vpn-common.all@ietf.org" <draft-ietf-opsawg-vpn-common.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: Yangdoctors early review of draft-ietf-opsawg-vpn-common-02
Thread-Index: AQHW1TdZeGp0tUxxGU6mT/UQhX/vXw==
Date: Thu, 14 Jan 2021 14:15:38 +0000
Message-ID: <BN6PR11MB16672BF1C625F7F846EA410EB8A80@BN6PR11MB1667.namprd11.prod.outlook.com>
References: <160829366323.14887.4241710682101990781@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: cesnet.cz; dkim=none (message not signed) header.d=none;cesnet.cz; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2001:420:2481:6:4d53:6c2a:3fdb:8986]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6f10fbb8-c289-4758-bb57-08d8b896de6e
x-ms-traffictypediagnostic: BN8PR11MB3731:
x-microsoft-antispam-prvs: <BN8PR11MB3731CE9274EAF5F262AE6A5EB8A80@BN8PR11MB3731.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: tl/JZZjESTDXYLZnSPjU/CAz6r/Hdoj+0PCPqFVTF3GSh7PDR4XUsMZsBZ/BalBCxIE3rd16mYvu4XAOVzG3FaHh3B8d5HTsTUNiq0ErXfHmHluHqca0mEhu76N/FRdy0cUdhyFKwN9Q3kurZ33NbZTw+ClPU7XIZCjowjyBpvhllEN4uK/+b/IxtMTLAerokLWuhej7hsfugWJGAfZLLz5bskh8qNc9kulPF44CX89IfyHIImHiCNePop14JhDbLYR5SzBQftqllpCm90SGZ2p7b4xxNN9sCdHaQPLoMAG3vGYagyr1B+HD59Yq4zA/pEl7In2gf+aqgJ75TaGa8RptfCpN8BQwt3gXqCjtTW/1SWG68Q9uuOySb35ILHiUu/LqoyMNHHEakJmGJ1BRbA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:BN6PR11MB1667.namprd11.prod.outlook.com; PTR:; CAT:NONE;  SFS:(136003)(396003)(366004)(376002)(346002)(39860400002)(66476007)(4326008)(8936002)(64756008)(110136005)(186003)(478600001)(316002)(86362001)(9686003)(66556008)(66946007)(6506007)(2906002)(71200400001)(83380400001)(5660300002)(53546011)(76116006)(7696005)(33656002)(8676002)(52536014)(55016002)(66446008)(91956017)(54906003); DIR:OUT; SFP:1101; 
x-ms-exchange-antispam-messagedata: =?iso-8859-2?Q?TYsPX/4dtztCI91gFa8BgH/p+FqozVy+lcbF+yhZVlpSQRF4l+W69a2HS9?= =?iso-8859-2?Q?6fQ7KcIEzlSO8HtTu67MpVXxTVWTqOjSt1ywLZAuWyrd6nENzmnry4Kwzu?= =?iso-8859-2?Q?foYXH5MN3m3bZQrro4NyLNYk0ckH5stfMk1EpHT1y/j0Iu+7s5FtIbG1Hf?= =?iso-8859-2?Q?GnY5xAdzV1Aae9GlQ7X0QBBs1INFF1rwAcDLiwpBa+e0GrAYH7AkDnyCx0?= =?iso-8859-2?Q?RmyH/jC/wRP5VNJ7pD7T1aHMf+1ost81upVjpfQIhKv1IyqyvuFb/RD6HE?= =?iso-8859-2?Q?wyCmgofr/vtv/sloHXthdMiQTsEN4cW3ySq5oKj9D6s1ljvbynVkTxfHCu?= =?iso-8859-2?Q?pTACmPU9WqOiAU0BWVmcGKtpS+q68HulM2OJJIk6qjjHUusg5/X/oPn6UP?= =?iso-8859-2?Q?poEeEjecXRsnIZaSkXjATAblYtSr9cS1GECdmjXaNSrkpPnAwlQE1yX9cg?= =?iso-8859-2?Q?LQnNg1OqSieF+GbKxbQlqrLOCDBfW+u8+k/9Cp9AEptqdbDTrJrUiflqjU?= =?iso-8859-2?Q?lKNjKaqzrosgXn59/1/qIfHcR34c5GmFF+qqSEcK/iEBIKZf58GVjrfkU9?= =?iso-8859-2?Q?rnkvNdOv7o9GubBxLXgh2Cm7ztSyGM+KQo5hU1YFArYed8xQuNS1RAnOnr?= =?iso-8859-2?Q?Fbwpz8AZ1pbFiYRx5sF10ZILXxXHYm6ifeb492jCNTZKxxm8QtLseIsvHH?= =?iso-8859-2?Q?8LX8FbY5Dh0XK+F6DSh52pZTLlMV8/vxrADg0If+HwK8EfB/gbPWcoI3x3?= =?iso-8859-2?Q?V0YdayJ2iA3tbLyEe3XHtpImEUWJBttg1ZGh8wjYTEjj11wC51srQESjNa?= =?iso-8859-2?Q?Jvlgj8oPMgGHPZ24SvI/r92H4CUm9JPwMg4T5t7kxZ5jAq9srodTAKDqFO?= =?iso-8859-2?Q?8cdgglHb5h+qxho4RbSbILnGoadcJPOB979PvMxR5BOnLiXOUViQRBX7zL?= =?iso-8859-2?Q?rT/WQSfhbxiv3Y8kehclHwEFJSopjqbswSWLR4KoiXtinMSwqR4DTiPSeA?= =?iso-8859-2?Q?D54Sf2JgUzfBbed7fBf5UmM6HYODx0IcPWaECSZsgPMDp5DC3bbgLjcLow?= =?iso-8859-2?Q?u/ROteARGLltHUrapavUr829eHzuzujTkCOlLGS7hcoW?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN6PR11MB1667.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6f10fbb8-c289-4758-bb57-08d8b896de6e
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2021 14:15:38.8229 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: wd2xz33AcLrk49m68dTGyCN6K/9waYjCymXyhRaLMRptBv3lGOoRH9pQDnBuMnKgPgtFn5NmU3zLvEnfsuvFfw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3731
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/oIS820biOPYeB_eS9AHXT30hUvE>
Subject: Re: [yang-doctors] Yangdoctors early review of draft-ietf-opsawg-vpn-common-02
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2021 14:15:45 -0000

I thought I had sent this out, Radek, but I guess it got missed with the=0A=
winter break.=0A=
=0A=
Thank you so much for your review!  This will help to shore up an=0A=
important piece of this overall network modeling work.=0A=
=0A=
Joe=0A=
=0A=
On 12/18/20 07:14, Radek Krej=E8=ED via Datatracker wrote:=0A=
> Reviewer: Radek Krej=E8=ED=0A=
> Review result: Ready with Issues=0A=
>=0A=
> *** draft ***=0A=
>=0A=
> Seems well written with a clear statement about its purpose and describin=
g the=0A=
> groupings of the module.=0A=
>=0A=
> *** module ***=0A=
>=0A=
> * layout=0A=
> Use pyang's `--yang-canonical` option to unify the order of the statement=
s and=0A=
> make the order canonical - e.g. starting the groupings with description=
=0A=
> improves readability of the module. Using pyang to print the module would=
 also=0A=
> remove probably forgotten comment `//L2xMs`.=0A=
>=0A=
> * typo=0A=
> - Module's description: s/Section 4.c/Section 4/=0A=
>=0A=
> * features=0A=
> Almost none of the features is actually used in the module, which might b=
e=0A=
> fine, but there are identities referring to the same areas as the feature=
s, so=0A=
> I believe that these identities should have if-feature statement referrin=
g to=0A=
> the appropriate feature defined in the module.=0A=
>=0A=
> * enumeration typedefs=0A=
> Since the enumeration cannot be extended, are you really sure, that the=
=0A=
> enumeration types you define are really complete forever? I would say tha=
t=0A=
> address families, negotiation modes and  control modes might need extensi=
ons in=0A=
> the modules that will use those types. Defining it as identityref with=0A=
> specified identities instead of enums would solve the problem.=0A=
>=0A=
> * `service-status` and `status-timestamp` groupings=0A=
> Both groupings seem to have config false meaning.  But only the=0A=
> service-status/status/oper-status container is defined as config false. T=
he=0A=
> uses statement doesn't have its own config statement, so if you want to p=
lace=0A=
> the mentioned groupings into config true data, an extra grouping or refin=
e will=0A=
> be required. The common sense of the groupings is config false, so define=
 them=0A=
> this way. If there will be some exception to make them config true, the u=
ses=0A=
> can refine it in such an exceptional case.=0A=
>=0A=
> * grouping rt-rd/rd-choice=0A=
> There are 2 cases (pool-assigned and full-autoassigned) which seem to hav=
e a=0A=
> node with the same meaning, but since there would be a name collision, th=
ey=0A=
> have different names `rd-assign` and `rd-assigneed`. I don't think that t=
his is=0A=
> a good solution. If they have the same meaning, they should have also the=
 same=0A=
> name. I see 2 possible solutions: - move the leafs in the cases into a=0A=
> container - it adds another level in data, but allows a common name=0A=
> `rd-assigned` - move the `rd-assigned` leaf outside the choice. If it mak=
es=0A=
> sense, it can be constrained by must/when to the (non)-presence of the no=
des=0A=
> from the choice. The main point here is that the rd-assigned status is th=
en=0A=
> always at the same place.=0A=
>=0A=
> * grouping group/=0A=
> The grouping seems odd to me, like it misses something or it might be jus=
t by=0A=
> too generic name. When looking into the `placement-constraint` grouping, =
it=0A=
> seems that it refers to the groupings, but since they are separated, it i=
s not=0A=
> possible to refer to the group-id explicitly. Is the `group` grouping int=
ended=0A=
> to be instantiated standalone, without `placement-constraint`? If not, jo=
in=0A=
> them together and refer the group-id from target-flavor via leafref.=0A=
>=0A=
>=0A=
>=0A=
>=0A=
=0A=


From nobody Thu Jan 14 09:00:33 2021
Return-Path: <noreply@ietf.org>
X-Original-To: yang-doctors@ietf.org
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B72873A15F3; Thu, 14 Jan 2021 09:00:27 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: =?utf-8?q?J=C3=BCrgen_Sch=C3=B6nw=C3=A4lder_via_Datatracker?= <noreply@ietf.org>
To: <yang-doctors@ietf.org>
Cc: draft-ietf-netconf-keystore.all@ietf.org, last-call@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.24.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <161064362767.26403.10249622617283363882@ietfa.amsl.com>
Reply-To: =?utf-8?b?SsO8cmdlbiBTY2jDtm53w6RsZGVy?= <j.schoenwaelder@jacobs-university.de>
Date: Thu, 14 Jan 2021 09:00:27 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/TXSozJxbSoMtvJOjaN1jj1jo7IQ>
Subject: [yang-doctors] Yangdoctors last call review of draft-ietf-netconf-keystore-20
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2021 17:00:28 -0000

Reviewer: Jürgen Schönwälder
Review result: Ready with Issues

The crypto modules aim at providing a flexible reusable infrastructure
of groupings for modeling cryptographic keys and related concepts. The
flexibility of the definitions provided of course comes with a certain
amount of complexity.

>From a YANG perspective, draft-ietf-netconf-keystore-20.txt is in a
good and close to publish state (a couple of minor issues left).  I
also tried to understand what is being modeled here and hence I also
have some questions concerning the concepts modeled and I hope these
are easy to answer/resolve as well.

- I have compiled the YANG modules using yanglint 0.16.105.

- Compared to the other two I-Ds in the batch, this I-D has a more
  verbose introduction (appreciated) and it also has a terminology
  section (which never hurts). I do not know whether Kent has the
  energy to align the I-Ds in their intro style.

- s/in Examples (Section 2.2)./in Section 2.2./

- Is the feature keystore-supported really needed? Does the YANG
  library not already provide the information whether a module has
  been implemented or just imported to access type and grouping
  definitions? OK, I know see that this is used to make definitions
  conditional, hence it makes sense. This means that my comment on
  truststore-supported in the other review can be ignored, I found
  the answer.

- My question concerning two-letter prefixes applies to this I-D as
  well.

- In the YANG module, you seem to use Keystore to refer to
  /ks:keystore but in the surrounding text you also use just
  keystore. I am not sure it is necessary to have the capitalized
  version but if people think its necessary, it makes sense to define
  the difference and to make sure the proper capitalization is used
  throughout the document. (If it is necessary somewhere to be
  explicit, I would rather use /ks:keystore but that may be my
  subjective preference. In the other I-D review, I used the term
  'central truststore', which is not a good term either, the term
  'well-known keystore' may be a better alternative.)

- Many of the groupings either symmetric-key-ref or asymmetric-key-ref
  and while the groupings seem to offer flexibility to instantiate
  other keystores, I have some doubts that this actually works unless
  you augment in other reference types. Looking at the
  ex-keystore-usage module, I find in there the usage of
  ks:symmetric-key-ref and ks:asymmetric-key-ref and they refer to the
  well-known keystore, not the one defined in the example module.

  YANG's reference mechanism via leafrefs is not really supporting
  well what you try to do. I understand the flexibility you want to
  achieve but it seems YANG 1.1 does not really support this well
  enough. What you would need is a leafref type that can be "anchored"
  at different places but we don't really have this...

  You hint at this in the definition of the keystore-grouping:

         "Grouping definition enables use in other contexts.  If ever
          done, implementations SHOULD augment new 'case' statements
          into local-or-keystore 'choice' statements to supply leafrefs
          to the new location.";

  It seems the SHOULD really is a 'must' (I do not care about
  capitalization); if you do not add your own leafrefs, things will
  not work or be majorly surprising.

  If I am correct, then there should be stronger warnings upfront that
  simply reusing the groupings is not enough and that the example
  module is actually an incomplete example...

  The same may apply to some of the groupings in the truststore
  drafts.

- There is a live discussion concerning the built-in keys, which
  obviously applies here as well. Perhaps the conclusion is that what
  we have is the best solution. This is just here as a reminder in
  case there are changes.

- Section 4 points to keys being compromised 'when in transit' but I
  think we also want to protect keys at rest, i.e., sitting in a
  backup.

- I am wondering whether key encryption also applies to the related
  truststore document.

- Expand RMA in "RMA scenarios" or simply avoid the acronym (its only
  used once).

- s/"default-deny-all)/"default-deny-all")/

- Section 4.3 talks about _highly_ restricted access mechanisms and
  _highly_ authorized clients and I am usually a bit confused what
  _highly_ means. But I am YANG doctor, not a security reviewer. ;-)

- Section 5.2 says:

   This module does not define any RPCs, actions, or notifications, and
   thus the security consideration for such is not provided here.

  Well, the module actually instantiates certificate-expiration
  notifications.

- Registrant Contact: should be changed to the IESG.




From nobody Thu Jan 21 01:56:36 2021
Return-Path: <Italo.Busi@huawei.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1B063A186D; Thu, 21 Jan 2021 01:56:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzPK9gV60DTo; Thu, 21 Jan 2021 01:56:19 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B08D3A0DFA; Thu, 21 Jan 2021 01:56:18 -0800 (PST)
Received: from fraeml708-chm.china.huawei.com (unknown [172.18.147.226]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4DLyPZ24Hbz67byT; Thu, 21 Jan 2021 17:53:06 +0800 (CST)
Received: from fraeml715-chm.china.huawei.com (10.206.15.34) by fraeml708-chm.china.huawei.com (10.206.15.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2106.2; Thu, 21 Jan 2021 10:56:16 +0100
Received: from fraeml715-chm.china.huawei.com ([10.206.15.34]) by fraeml715-chm.china.huawei.com ([10.206.15.34]) with mapi id 15.01.2106.006; Thu, 21 Jan 2021 10:56:16 +0100
From: Italo Busi <Italo.Busi@huawei.com>
To: 'tom petch' <ietfc@btconnect.com>, Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>, "'teas@ietf.org'" <teas@ietf.org>, "ccamp@ietf.org" <ccamp@ietf.org>
CC: "draft-ietf-ccamp-otn-topo-yang.all@ietf.org" <draft-ietf-ccamp-otn-topo-yang.all@ietf.org>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Thread-Topic: Common rules for TE-related YANG modules prefixes (was Yangdoctors last call review of draft-ietf-ccamp-otn-topo-yang-11)
Thread-Index: Adang/ShaCXr97p0RfGEvolIEdqtpAABzVwuAAHOM+ACWuGjJACn9dNgAVD61VENvdpQ0A==
Date: Thu, 21 Jan 2021 09:56:16 +0000
Message-ID: <271de72243bb4103a29357d7025a719b@huawei.com>
References: <2f249df343f14c0799cccb38574914fe@huawei.com> <AM7PR07MB62483BD8298654CA1B04BC59A01C0@AM7PR07MB6248.eurprd07.prod.outlook.com>, <HE1PR07MB4156E24671500EDE9A577C0DF01C0@HE1PR07MB4156.eurprd07.prod.outlook.com> <AM7PR07MB6248AD722A6AEE1478EA8D81A0100@AM7PR07MB6248.eurprd07.prod.outlook.com>, <54da8864271146b1acd857af12e07c22@huawei.com> <AM7PR07MB6248B35601A230875C19E3F7A0E70@AM7PR07MB6248.eurprd07.prod.outlook.com>
In-Reply-To: <AM7PR07MB6248B35601A230875C19E3F7A0E70@AM7PR07MB6248.eurprd07.prod.outlook.com>
Accept-Language: it-IT, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.47.88.74]
Content-Type: multipart/alternative; boundary="_000_271de72243bb4103a29357d7025a719bhuaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/Od9ix2B2TPvaOnQ3efH8aCgj6hg>
Subject: Re: [yang-doctors] Common rules for TE-related YANG modules prefixes (was Yangdoctors last call review of draft-ietf-ccamp-otn-topo-yang-11)
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2021 09:56:22 -0000

--_000_271de72243bb4103a29357d7025a719bhuaweicom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_271de72243bb4103a29357d7025a719bhuaweicom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_271de72243bb4103a29357d7025a719bhuaweicom_--


From nobody Thu Jan 21 04:37:55 2021
Return-Path: <ietfc@btconnect.com>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39E173A099F; Thu, 21 Jan 2021 04:37:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uEaYPbZArgmQ; Thu, 21 Jan 2021 04:37:40 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2128.outbound.protection.outlook.com [40.107.20.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3BF103A0990; Thu, 21 Jan 2021 04:37:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NT9xTYNxDfczSPw/SnD9nX6EKZNg2tIsNNbDsiilMbEaBKN3eRcMeTM6OqI9mmcCDBxAa5Vw3lLzhVlnrS7mrTAZCaaBZPdT5c/GgFtm+fw//bBFX52I5kNBl1Y8POLQZ92F5d9uN5C3GeaCgb3cPM0YzbAzre8Rrf3oxjOXiEGhGo+FWRu9m4F2U6Hd2YCWICxurvHbJDVt+pc+c1dahaBqf9JHqBasBf5t9Q7I3GZF2DcKUTiAxQ27xezXpPerMVW5ET6Ajfvh2R0Rf/DKxyn09C8jboo6e+Xpib3iRc3agCdbfusezHKRi1zuCNgNODmebKz0+OEf3zPwslUhXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cS1JDLEpaCyWjFS6WgSP0cwslXqf8oJY2cUg3nfu5+s=; b=SZ+j9yEQkl2Nscd5zJxr5/ggURlHG422XykNi0Jtq6Ha4oUv5+vdqfxpe7uGgwBzbgH7nKSCO0vHmzNFbeo1EeQIRv8Z7KjnkMqakrotMywutgrQN2pVSviLxE1bKHth0szXe5t61wktR251Sti08IDh+eMiaoWbwJsls4s1xhfeK2y8HpszIWEyo8kRSaXSuPu9R5mmAuaz5xiyPtGjQR4KAEQ9m0hA1agWj0YV2Oo/L68tPpURjwe+mWjPfaxzSIqshvaxmfDn1NR9hWcGFfjJ/pdRNU7laUGqxqOgFxtPcicfNgdI+xktjMgf1cKHeMr+4UmTvY9XDMVAMh9r7A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cS1JDLEpaCyWjFS6WgSP0cwslXqf8oJY2cUg3nfu5+s=; b=PNlr1N0pAAYS+rCT0wrND6PpkpFiaPBY4Xv2ZmLwEi+Qx0REnAKJ1GViEKEBNSsnDqFtCpowpd9IYHRUOyI8rAzs7uv7pSLWtyYEz+XoAXquLrS8sMOcKL3ZrEYDNr5Ik+HgpBRSlurUgYiwIfEOzm/wAeYpP6sM+g9C9joE3lU=
Received: from (2603:10a6:20b:134::11) by AM5PR0701MB2836.eurprd07.prod.outlook.com (2603:10a6:203:46::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3784.5; Thu, 21 Jan 2021 12:37:33 +0000
Received: from AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849]) by AM7PR07MB6248.eurprd07.prod.outlook.com ([fe80::6d46:4f3c:643:4849%5]) with mapi id 15.20.3763.014; Thu, 21 Jan 2021 12:37:33 +0000
From: tom petch <ietfc@btconnect.com>
To: Italo Busi <Italo.Busi@huawei.com>, Daniele Ceccarelli <daniele.ceccarelli@ericsson.com>, "'teas@ietf.org'" <teas@ietf.org>, "ccamp@ietf.org" <ccamp@ietf.org>
CC: "draft-ietf-ccamp-otn-topo-yang.all@ietf.org" <draft-ietf-ccamp-otn-topo-yang.all@ietf.org>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Thread-Topic: Common rules for TE-related YANG modules prefixes (was Yangdoctors last call review of draft-ietf-ccamp-otn-topo-yang-11)
Thread-Index: Adang/ShaCXr97p0RfGEvolIEdqtpAABzVwuAAHOM+ACWuGjJACn9dNgAVD61VENvdpQ0AAFOw5q
Date: Thu, 21 Jan 2021 12:37:33 +0000
Message-ID: <AM7PR07MB6248AD09582960B6A833399AA0A10@AM7PR07MB6248.eurprd07.prod.outlook.com>
References: <2f249df343f14c0799cccb38574914fe@huawei.com> <AM7PR07MB62483BD8298654CA1B04BC59A01C0@AM7PR07MB6248.eurprd07.prod.outlook.com>, <HE1PR07MB4156E24671500EDE9A577C0DF01C0@HE1PR07MB4156.eurprd07.prod.outlook.com> <AM7PR07MB6248AD722A6AEE1478EA8D81A0100@AM7PR07MB6248.eurprd07.prod.outlook.com>, <54da8864271146b1acd857af12e07c22@huawei.com> <AM7PR07MB6248B35601A230875C19E3F7A0E70@AM7PR07MB6248.eurprd07.prod.outlook.com>, <271de72243bb4103a29357d7025a719b@huawei.com>
In-Reply-To: <271de72243bb4103a29357d7025a719b@huawei.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=btconnect.com;
x-originating-ip: [86.146.121.140]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 511a6c21-a26c-4488-6723-08d8be095350
x-ms-traffictypediagnostic: AM5PR0701MB2836:
x-microsoft-antispam-prvs: <AM5PR0701MB2836C77A190602A862BE679FA0A10@AM5PR0701MB2836.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: kFmvhucoduHGvcBJr7546KUYFE4OFcEjjJyUSQ22Ds5n/I41ikjJPr35egxqhlByctd5D1qGvH2qWMh5Ph2udWzK6HIXjL7PexelVCHFi5Ar8YQl0WAxKBxkdfv7zyfou+XNSzWtv2P122kEsV2TjB5NUg2rzW7+HN4liYQ4tuPtV1f5n39znrrI6Lqeh7IypvFlLzsGXy6m9+L2u3+XOdT0iI592/bGU6s8vIAUo6j5K6toxtEpVRUxUdiRKLJAwMoTWuTCF63heOV87kYjpJHCvke3pN8YPcmwCf4H42BWb7u9e26C1aeI5mxDCfB+MCLftGF+5fSkPP/3FuUhsgXHIByQYNtKAmRUy3i5BPF7aAQgwKnjxVdjDBVLnlPkbd5Kx482QsnNfPlYTgnwZXubnhT/e8IJMRVsVOEwjEaAfJZxiY9KOpAvRleWIgnLtXsA0VLMW1RDjB2R0C8dkA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM7PR07MB6248.eurprd07.prod.outlook.com; PTR:; CAT:NONE;  SFS:(346002)(39860400002)(366004)(136003)(376002)(396003)(316002)(64756008)(66446008)(66556008)(5660300002)(8936002)(110136005)(91956017)(76116006)(7696005)(66946007)(30864003)(54906003)(52536014)(66476007)(71200400001)(478600001)(33656002)(186003)(9686003)(26005)(55016002)(4326008)(8676002)(2906002)(6506007)(86362001)(53546011)(83380400001)(491001)(357404004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata: =?utf-8?B?NElzV0ppN3VBZUFjTWcwemJESXdraUtabms3RnVIQ2dNVHlubHR6QjNuL3Ji?= =?utf-8?B?elI5RVVoUW9VSDNoTUc4aitTQW5PczFtUjQvL2ROd0ljQnBBWVlXaXdGdVVV?= =?utf-8?B?a0JQUmRkK29YeUJwQW9zcnJOZjdQcnNneXdUVHF6eG0xc1RuTG1xMTk0MmJT?= =?utf-8?B?R3NkcnBwbXNwYlVpWmMvN0MzVUd2VVNoeGdWbmxwTis0cmdCa1NEMnc3TVpE?= =?utf-8?B?QStkZ3RicENUZlBRQWxYZjJ3NytwWm5kL2p3cUhmdmNBT1MyZSt1NDBDQ1Nz?= =?utf-8?B?cklQQmJlR2s0d3VMWG04RkszOXZUWEd6cUJUSmlzTTdmelhFRUtsTC9Hbk5x?= =?utf-8?B?MlhEb29nNDZZcWVIT1ptdDd5THhkLzI0ZkFwZGwvTjRwYjRDSGRhRVFTMGFO?= =?utf-8?B?bzVqUmV1TU9oWTlZdnNad2x4eitGeVBzSCs4b2lIQzBMOGkzcGdHZlZ0cGhn?= =?utf-8?B?NW9Ea1I1MVFnNXNGR3VnMzlVTGp4eVorczRqcDFuZVpIWFZOTTBiU0VjZm82?= =?utf-8?B?dFVkTS9EcEZVVE4rRTlwb1V6TklReWQvTHRld2xqekN1UldjbDFNamF2a2NB?= =?utf-8?B?RlR5YlJETTBna0hnVHZjbnFXY1cyQ2JFSU1jellBM1NsYk1BNkRUY2NJVjhD?= =?utf-8?B?TTV1MXRNdm9Gdmp4ZzBZenVPOEdLSTlCdGNjNlI3ZEJXZGIxYkJYVmp4S3A2?= =?utf-8?B?b005ODFLRzVEdGlMa0RzWjNYdzFvVnFNQWdIK25FbTlicVdIenZzRlppbmJ2?= =?utf-8?B?S1U4Y2ZCOXJRU3VXUDN6WGo5YXhnUFJ1NURzRkViL0ZaVmd1dlZNYVRWVXIy?= =?utf-8?B?WThOUDJKT2dENFZ6bHc2QU1tU3dJR0xxT3BqSUljQ0h0SWNOMlFyc0QycHVS?= =?utf-8?B?RmxzU2NUSGdBSjdVVlJVSU1BVGQxNTZ6MHBCVE1aUmV2WEhsNFQxQ3BBNUNu?= =?utf-8?B?WFRndVBDZWFna214djJXRzllRTcxbWRxQWNvcjR2THFPaUFHWm4vNWp6djZz?= =?utf-8?B?NDVDYnAxSWJ4bXh5Mll6YjVtYWNERHEvYS8wZHJBRHM5QkNwU1FaZ1o0UTlY?= =?utf-8?B?OG91UldsQzlvdExRejhBckozTFZPWjJrRDBWS1drZmxueWxaaW1uZEpBRXcw?= =?utf-8?B?TVF4YXlZbk5scHR4YjBtVVJLM3JxMVdvMmxNdldVMzhPYXBvS3U0V3kxaHdt?= =?utf-8?B?aHNLWnk0MzJtODF2VDdSd3VQcEkvNXJUUEluaXU4QlI2eVFTandRZG9hTEZt?= =?utf-8?B?NXo5RDhSK3QxZHJPN1BlUEJwTU9oWmw1Rjh5Z3lKeFVTblVaa0dxZXpBS2M5?= =?utf-8?B?K1diaDNGeGc4Z1VlV1phMjZ4ZGhmOU5ZNVU1a1hkRkxXRG5hVDBtZmY4bmRh?= =?utf-8?B?ZmpUWi84enlaTW5RMXJtVVUzcmlQRFhDMkVoNWtmelQ4bXp5cTRvcWxXSWlF?= =?utf-8?Q?AjFrrHOK?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM7PR07MB6248.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 511a6c21-a26c-4488-6723-08d8be095350
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jan 2021 12:37:33.3531 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: BTPN05jqlijsaCfEpfIXLVJqURO3c2CgtnaxsNF8ARCAmVxwUyFFgzza+pOu6ob0qdsmaiPsfjRpwgHUKx6rTQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0701MB2836
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/3htHk-vs_GOPKrIWGuOIVthq-V8>
Subject: Re: [yang-doctors] Common rules for TE-related YANG modules prefixes (was Yangdoctors last call review of draft-ietf-ccamp-otn-topo-yang-11)
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2021 12:37:43 -0000
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From nobody Fri Jan 22 00:21:17 2021
Return-Path: <chopps@chopps.org>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F1613A0FC5 for <yang-doctors@ietfa.amsl.com>; Fri, 22 Jan 2021 00:21:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S-L_nEFBMTZS for <yang-doctors@ietfa.amsl.com>; Fri, 22 Jan 2021 00:21:13 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id B48473A0FC2 for <yang-doctors@ietf.org>; Fri, 22 Jan 2021 00:21:13 -0800 (PST)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 1448761668; Fri, 22 Jan 2021 08:21:12 +0000 (UTC)
From: Christian Hopps <chopps@chopps.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_DC338CE9-043D-424B-BA17-A4681A7ED034"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\))
Message-Id: <663C5375-3BCD-4A46-944D-716BF5764E34@chopps.org>
Date: Fri, 22 Jan 2021 03:21:11 -0500
Cc: Christian Hopps <chopps@chopps.org>
To: yang-doctors@ietf.org
X-Mailer: Apple Mail (2.3654.40.0.2.32)
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/be-Jg0h1SREhbqwXZx0eCsab8WU>
Subject: [yang-doctors] Question on when statment and container presence
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2021 08:21:15 -0000

--Apple-Mail=_DC338CE9-043D-424B-BA17-A4681A7ED034
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_6E04C80A-B4DD-4F54-B423-1891F9B8FC53"


--Apple-Mail=_6E04C80A-B4DD-4F54-B423-1891F9B8FC53
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi,

The libyang folks have made a change in their libyang2 branch. The =
chnage is causing containers to be implicitly marked as presence =
containers if they include a "when" statement i.e.,:

module main {
  yang-version 1.1;
  namespace "http://example.com/main";
  prefix m;

  leaf afi-safi-name {
    type string;
  }
  container ipv4-flowspec {
    when "../afi-safi-name =3D 'ipv4-flowspec'";
    leaf flowspec-config {
      type uint8;
    }
  }
}

So in this case "ipv4-flowspec" is being changed as if it had a presence =
statement.

On of the authors indicated that this was supported indirectly by some =
mail on netmod; however, my search is not turning anything up.

I think this is incorrect as the presence of the container based on the =
when is an "implicit" (some other leaf value is set) not "explicit" =
meaning.

Thoughts?

Thanks,
Chris.

--Apple-Mail=_6E04C80A-B4DD-4F54-B423-1891F9B8FC53
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Hi,<div class=3D""><br class=3D""></div><div class=3D"">The =
libyang folks have made a change in their libyang2 branch. The chnage is =
causing containers to be implicitly marked as presence containers if =
they include a "when" statement i.e.,:</div><div class=3D""><br =
class=3D""></div><blockquote style=3D"margin: 0 0 0 40px; border: none; =
padding: 0px;" class=3D""><div class=3D""><div class=3D""><font =
face=3D"Courier New" class=3D""><span style=3D"font-style: normal; =
font-size: 14px;" class=3D"">module main {</span></font></div></div><div =
class=3D""><div class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; =
yang-version 1.1;</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; =
namespace "<a href=3D"http://example.com/main" =
class=3D"">http://example.com/main</a>";</span></font></div></div><div =
class=3D""><div class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; prefix =
m;</span></font></div></div><div class=3D""><div class=3D""><font =
face=3D"Courier New" class=3D""><span style=3D"font-style: normal; =
font-size: 14px;" class=3D""><br class=3D""></span></font></div></div><div=
 class=3D""><div class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; leaf =
afi-safi-name {</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; &nbsp; =
type string;</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; =
}</span></font></div></div><div class=3D""><div class=3D""><font =
face=3D"Courier New" class=3D""><span style=3D"font-style: normal; =
font-size: 14px;" class=3D"">&nbsp; container ipv4-flowspec =
{</span></font></div></div><div class=3D""><div class=3D""><font =
face=3D"Courier New" class=3D""><span style=3D"font-style: normal; =
font-size: 14px;" class=3D"">&nbsp; &nbsp; when "../afi-safi-name =3D =
'ipv4-flowspec'";</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; &nbsp; =
leaf flowspec-config {</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; &nbsp; =
&nbsp; type uint8;</span></font></div></div><div class=3D""><div =
class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" class=3D"">&nbsp; &nbsp; =
}</span></font></div></div><div class=3D""><div class=3D""><font =
face=3D"Courier New" class=3D""><span style=3D"font-style: normal; =
font-size: 14px;" class=3D"">&nbsp; }</span></font></div></div><div =
class=3D""><div class=3D""><font face=3D"Courier New" class=3D""><span =
style=3D"font-style: normal; font-size: 14px;" =
class=3D"">}</span></font></div></div></blockquote><br class=3D""><div =
class=3D""><font color=3D"#000000" class=3D""><span style=3D"caret-color: =
rgb(0, 0, 0);" class=3D"">So in this case "ipv4-flowspec" is being =
changed as if it had a presence statement.</span></font></div><div =
class=3D""><font color=3D"#000000" class=3D""><span style=3D"caret-color: =
rgb(0, 0, 0);" class=3D""><br class=3D""></span></font></div><div =
class=3D""><font color=3D"#000000" class=3D""><span style=3D"caret-color: =
rgb(0, 0, 0);" class=3D"">On of the authors indicated that this was =
supported indirectly by some mail on netmod; however, my search is not =
turning anything up.</span></font></div><div class=3D""><br =
class=3D""></div><div class=3D""><font color=3D"#000000" class=3D""><span =
style=3D"caret-color: rgb(0, 0, 0);" class=3D"">I think this is =
incorrect as the presence of the container based on the when is an =
"implicit" (some other leaf value is set) not "explicit" =
meaning.</span></font></div><div class=3D""><font color=3D"#000000" =
class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" class=3D""><br =
class=3D""></span></font></div><div class=3D""><font color=3D"#000000" =
class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" =
class=3D"">Thoughts?</span></font></div><div class=3D""><font =
color=3D"#000000" class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" =
class=3D""><br class=3D""></span></font></div><div class=3D""><font =
color=3D"#000000" class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" =
class=3D"">Thanks,</span></font></div><div class=3D""><font =
color=3D"#000000" class=3D""><span style=3D"caret-color: rgb(0, 0, 0);" =
class=3D"">Chris.</span></font></div></body></html>=

--Apple-Mail=_6E04C80A-B4DD-4F54-B423-1891F9B8FC53--

--Apple-Mail=_DC338CE9-043D-424B-BA17-A4681A7ED034
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=h5VM
-----END PGP SIGNATURE-----

--Apple-Mail=_DC338CE9-043D-424B-BA17-A4681A7ED034--


From nobody Fri Jan 22 00:58:46 2021
Return-Path: <mbj+ietf@4668.se>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 522153A0B16 for <yang-doctors@ietfa.amsl.com>; Fri, 22 Jan 2021 00:58:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.123
X-Spam-Level: 
X-Spam-Status: No, score=-0.123 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, PDS_NAKED_TO_NUMERO=1.997, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=4668.se header.b=tSAC8z/z; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=cdEhYI2B
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2wYBHSg2KbHw for <yang-doctors@ietfa.amsl.com>; Fri, 22 Jan 2021 00:58:40 -0800 (PST)
Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C21EB3A11BF for <yang-doctors@ietf.org>; Fri, 22 Jan 2021 00:58:40 -0800 (PST)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id D89F85C0251; Fri, 22 Jan 2021 03:58:39 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Fri, 22 Jan 2021 03:58:39 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=4668.se; h=date :message-id:to:cc:subject:from:in-reply-to:references :mime-version:content-type:content-transfer-encoding; s=fm3; bh= qcPpQ4tljHk3vnQi3PCgcVNeaJpCNP2MTRbd59J8jKo=; b=tSAC8z/zR+D+DAIJ HDnyYf8B6oo/RMeU2x8hbyKnP7shn2e3ffJHxeL3bVppK2/v5SiAXhOUVexXTsih Q+nkuyyTgRr2dJ/1FGp+ZEiomvNdWW8ReWwJSgTEbVl4CR5nLFLUsuxZqQnkuwcu OMoTNzhHQceHvFez4eUmRC6tcVTT6KZbIfmWBMiR3K2o8vIxRYEEn8LGjk/oRS8C upGWI2YJfwrF+YU4uac0Dn9RAse3FX85FT6jMZ3GCI9x7rBtLhnnMZ16w9zZ+Kud bs35wLP6Va+7P/KlNk72fcuQi0RQBlo2bbej/xFIE7VchJF7MzyZKHa4hXVmdeG6 /hvWoA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=qcPpQ4tljHk3vnQi3PCgcVNeaJpCNP2MTRbd59J8j Ko=; b=cdEhYI2Bgin8jwHDCiZ0c7zau0+7ZkGuWElgp7DYgcQWcLmso5z6V5ZyG 4S7OL+Jgp/0I2w2O+LNGfOnoKPPcofIQp49zQ9X3jzdp08JinnJ+UeOkkbGSqd7l N+CuDTeswg+q1dgByM39vhOWo4sFTX8QBbKhmmRa6bzDZ3i2GXf+hNasl4x9+O24 kX3Dt4ibxfA8216D766gRKk4gc27rK9O/JdCJUZkr3iB5ZlFirGZ8eKGtKbdNUZ0 CgRIFRATKw9Sj96cREKATGJHQYf/7BEzGdPoajeQVIOIMQ3i2S7ak632WrPzNAjY WXOUG51/7ghN1k76TppX1Pq19Shfw==
X-ME-Sender: <xms:v5MKYHOntNeOsJhpC-iaD7KQTKzSJwd0cgXO5xuM26UL60fvNfEZgA> <xme:v5MKYB-6VoYV0qyJDaA6yW5HdQSO_lir5zs7Uf2HS3K_xbcWY3XULp2BXp1EDIeUT i0TDGsdeSf-Wct2WqY>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrudehgdduvdejucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpeffkffvuffhjghfofggtgfgsehtje ertdertddvnecuhfhrohhmpeforghrthhinhcuuehjnphrkhhluhhnugcuoehmsghjodhi vghtfhesgeeiieekrdhsvgeqnecuggftrfgrthhtvghrnhepjeetvdeggfeikeduffekue duledugeeftdegkeefveffveeuieejteejleevkeetnecuffhomhgrihhnpegvgigrmhhp lhgvrdgtohhmnecukfhppeduheekrddujeegrdegrddvudehnecuvehluhhsthgvrhfuih iivgeptdenucfrrghrrghmpehmrghilhhfrhhomhepmhgsjhdoihgvthhfseegieeikedr shgv
X-ME-Proxy: <xmx:v5MKYGRxGYxtwjZCMuQQ85fDCO8dvomZO1mXUewH6PHEyEnngJDdEg> <xmx:v5MKYLuLyAcs-7_bO-lCuZZWOG_dEu_ca3pw03IuE2axlJ-eF3ECww> <xmx:v5MKYPdElbQJGcq-DnQ03MmE5Rx4reyZWb9QHlZjVnqP62wqsl1zwg> <xmx:v5MKYNpxBsYfxihtAN56Uxg2MwInEaZnxbnC29bxuIoeH7NbCJY3ew>
Received: from localhost (unknown [158.174.4.215]) by mail.messagingengine.com (Postfix) with ESMTPA id C96ED108005B; Fri, 22 Jan 2021 03:58:38 -0500 (EST)
Date: Fri, 22 Jan 2021 09:58:37 +0100 (CET)
Message-Id: <20210122.095837.1347704679180639330.id@4668.se>
To: chopps@chopps.org
Cc: yang-doctors@ietf.org
From: Martin =?iso-8859-1?Q?Bj=F6rklund?= <mbj+ietf@4668.se>
In-Reply-To: <663C5375-3BCD-4A46-944D-716BF5764E34@chopps.org>
References: <663C5375-3BCD-4A46-944D-716BF5764E34@chopps.org>
X-Mailer: Mew version 6.8 on Emacs 26.3
Mime-Version: 1.0
Content-Type: Text/Plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/-h6VFaHejmxnW1EZs-lmpV2LGaE>
Subject: Re: [yang-doctors] Question on when statment and container presence
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2021 08:58:45 -0000

Hi,

Christian Hopps <chopps@chopps.org> wrote:
> Hi,
> 
> The libyang folks have made a change in their libyang2 branch. The
> chnage is causing containers to be implicitly marked as presence
> containers if they include a "when" statement i.e.,:
> 
> module main {
>   yang-version 1.1;
>   namespace "http://example.com/main";
>   prefix m;
> 
>   leaf afi-safi-name {
>     type string;
>   }
>   container ipv4-flowspec {
>     when "../afi-safi-name = 'ipv4-flowspec'";
>     leaf flowspec-config {
>       type uint8;
>     }
>   }
> }
> 
> So in this case "ipv4-flowspec" is being changed as if it had a
> presence statement.

This is not correct.  If the when evaluates to 'true', it should not
be possible to delete the ipv4-flowspec container - which would be
possible it if had a presence statement.


/martin



> 
> On of the authors indicated that this was supported indirectly by some
> mail on netmod; however, my search is not turning anything up.
> 
> I think this is incorrect as the presence of the container based on
> the when is an "implicit" (some other leaf value is set) not
> "explicit" meaning.
> 
> Thoughts?
> 
> Thanks,
> Chris.


From nobody Wed Jan 27 09:01:58 2021
Return-Path: <noreply@ietf.org>
X-Original-To: yang-doctors@ietf.org
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 84A6F3A0C8A; Wed, 27 Jan 2021 09:01:50 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Acee Lindem via Datatracker <noreply@ietf.org>
To: <yang-doctors@ietf.org>
Cc: draft-ietf-netconf-https-notif.all@ietf.org, last-call@ietf.org, netconf@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.24.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <161176691048.5494.2373231790931856179@ietfa.amsl.com>
Reply-To: Acee Lindem <acee@cisco.com>
Date: Wed, 27 Jan 2021 09:01:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/JM4-nAlcJpisua7DjmwLNQwbwiM>
Subject: [yang-doctors] Yangdoctors last call review of draft-ietf-netconf-https-notif-06
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Email list of the yang-doctors directorate  <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Jan 2021 17:01:51 -0000

Reviewer: Acee Lindem
Review result: Almost Ready

The document is almost ready for WG Last Call. I have the following comments:

Model ietf-sub-notif-recv-list:

    Seems odd to have a model that adds a choice statement without any
    valid options. I realize you expect other transports in the future but
    having a separate module the one defined in the same draft seems like a
    profligate design choice.

Model ietf-sub-notif-recv-list:
    1. The prefix "hn" seems inconsistent to lose the context. I'd use
        "snrlhn".  This wouldn't be an issue if you combined the modules.
    2. This comment is incomprehensible:

               // create the logical impossibility of enabling "tcp"
               // transport

In the IANA section, the security considerations for the media types
point to this draft's security considerations. However, they don't
include the referenced information. It seems these IANA references
should point to other RFCs.

It should be noted that ietf-subscribed-notifications has a number of YANG
errors and warnings.

I also have the following editorial comments:
Acee-Lindems-iMac-2:Desktop acee$ diff -c
draft-ietf-netconf-https-notif-06.txt.orig
draft-ietf-netconf-https-notif-06.txt ***
draft-ietf-netconf-https-notif-06.txt.orig  2021-01-27 10:06:29.000000000 -0500
--- draft-ietf-netconf-https-notif-06.txt       2021-01-27 11:57:13.000000000
-0500
***************
*** 17,23 ****
     This document defines a YANG data module for configuring HTTPS based
     configured subscription, as defined in RFC 8639.  The use of HTTPS
     maximizes transport-level interoperability, while allowing for
!    encoding selection from text, e.g.  XML or JSON, to binary.

  Status of This Memo

--- 17,23 ----
     This document defines a YANG data module for configuring HTTPS based
     configured subscription, as defined in RFC 8639.  The use of HTTPS
     maximizes transport-level interoperability, while allowing for
!    encoding selection from text, e.g.,  XML or JSON, to binary.

  Status of This Memo

***************
*** 103,109 ****
     documents.  This document defines two YANG 1.1 [RFC7950] data
     modules, one for augmenting the Subscription to YANG Notifications
     [RFC8639] to add a transport type, and another for configuring and
!    managing HTTPS based receivers for the notifications.

--- 103,109 ----
     documents.  This document defines two YANG 1.1 [RFC7950] data
     modules, one for augmenting the Subscription to YANG Notifications
     [RFC8639] to add a transport type, and another for configuring and
!    managing HTTPS-based receivers for the notifications.

***************
*** 118,124 ****
     the same receiver instance.  The second module describes how to
     enable the transmission of YANG modeled notifications, in the
     configured encoding (i.e., XML, JSON) over HTTPS.  Notifications are
!    delivered in the form of a HTTPS POST.  The use of HTTPS maximizes
     transport-level interoperability, while the encoding selection pivots
     between implementation simplicity (XML, JSON) and throughput (text
     versus binary).
--- 118,124 ----
     the same receiver instance.  The second module describes how to
     enable the transmission of YANG modeled notifications, in the
     configured encoding (i.e., XML, JSON) over HTTPS.  Notifications are
!    delivered in the form of an HTTPS POST.  The use of HTTPS maximizes
     transport-level interoperability, while the encoding selection pivots
     between implementation simplicity (XML, JSON) and throughput (text
     versus binary).
***************
*** 196,202 ****

     In the case of "pipelining", the flow of messages would look
     something like this.  This example shows the flow assuming that
!    Subscribed Notifications is used and therefore a <subscription-
     started> notification is sent before sending the first notification.
     The example would be the same for when Subscribed Notification is not
     used by removing the first POST message for <susbscription-started>.
--- 196,202 ----

     In the case of "pipelining", the flow of messages would look
     something like this.  This example shows the flow assuming that
!    Subscribed Notification is used and therefore a <subscription-
     started> notification is sent before sending the first notification.
     The example would be the same for when Subscribed Notification is not
     used by removing the first POST message for <susbscription-started>.
***************
*** 342,350 ****

  2.1.  Introduction

!    To learn the capabilities of the receiver, the publisher can issue a
     HTTPS GET request with Accept-Type set to application/ietf-https-
!    notif-cap+xml or application/ietf-https-notif-cap+json, with latter
     as the mandatory to implement, and the default in case the type is
     not specified.  If the receiver supports capabilities such as binary
     encoding of data, it can return that as a capability in a response.
--- 342,350 ----

  2.1.  Introduction

!    To learn the capabilities of the receiver, the publisher can issue an
     HTTPS GET request with Accept-Type set to application/ietf-https-
!    notif-cap+xml or application/ietf-https-notif-cap+json, with the latter
     as the mandatory to implement, and the default in case the type is
     not specified.  If the receiver supports capabilities such as binary
     encoding of data, it can return that as a capability in a response.
***************
*** 450,456 ****
  Internet-Draft        HTTPS Configured Subscription        November 2020

!      Copyright (c) 2018 IETF Trust and the persons identified as
       the document authors.  All rights reserved.
       Redistribution and use in source and binary forms, with or
       without modification, is permitted pursuant to, and subject
--- 450,456 ----
  Internet-Draft        HTTPS Configured Subscription        November 2020

!      Copyright (c) 2021 IETF Trust and the persons identified as
       the document authors.  All rights reserved.
       Redistribution and use in source and binary forms, with or
       without modification, is permitted pursuant to, and subject
***************
*** 536,545 ****

     This YANG module is a definition of a set of receivers that are
     interested in the notifications published by the publisher.  The
!    module contains the TCP, TLS and HTTPS parameters that are needed to
     communicate with the receiver.  The module augments the ietf-sub-
     notif-recv-list module to define a transport specific receiver.  As
!    mentioned earlier, it uses POST method to deliver the notification.
     The attribute 'path' defines the path for the resource on the
     receiver, as defined by 'path-absolute' in URI Generic Syntax
     [RFC3986].  The user-id used by Network Configuration Access Control
--- 536,545 ----

     This YANG module is a definition of a set of receivers that are
     interested in the notifications published by the publisher.  The
!    module contains the TCP, TLS, and HTTPS parameters that are needed to
     communicate with the receiver.  The module augments the ietf-sub-
     notif-recv-list module to define a transport specific receiver.  As
!    mentioned earlier, it uses the POST method to deliver the notification.
     The attribute 'path' defines the path for the resource on the
     receiver, as defined by 'path-absolute' in URI Generic Syntax
     [RFC3986].  The user-id used by Network Configuration Access Control
***************
*** 639,645 ****
       description
         "YANG module for configuring HTTPS base configuration.

!         Copyright (c) 2018 IETF Trust and the persons identified as
          the document authors.  All rights reserved.
          Redistribution and use in source and binary forms, with or
          without modification, is permitted pursuant to, and subject
--- 639,645 ----
       description
         "YANG module for configuring HTTPS base configuration.

!         Copyright (c) 2021 IETF Trust and the persons identified as
          the document authors.  All rights reserved.
          Redistribution and use in source and binary forms, with or
          without modification, is permitted pursuant to, and subject
***************
*** 704,710 ****

             container receiver-identity {
               description
!                "Specifies mechanism for identifying the receiver.
                  The publisher MUST NOT include any content in a
                  notification that the user is not authorized to view.";

--- 704,710 ----

             container receiver-identity {
               description
!                "Specifies the mechanism for identifying the receiver.
                  The publisher MUST NOT include any content in a
                  notification that the user is not authorized to view.";

***************
*** 791,801 ****

  6.  Receiving Event Notifications

!    Encoding notifications for the HTTPS notifications is the same as the
     encoding notifications as defined in RESTCONF [RFC8040] Section 6.4,
     with the following changes.  Instead of saying that for JSON-encoding
     purposes, the module name for "notification" element will be "ietf-
!    restconf, it will say that for JSON-encoding purposes, the module
     name for "notification" element will be "ietf-https-notif".

     With those changes, the SSE event notification encoded JSON example
--- 791,801 ----

  6.  Receiving Event Notifications

!    Encoding notifications for the HTTPS notifications is the same as for
     encoding notifications as defined in RESTCONF [RFC8040] Section 6.4,
     with the following changes.  Instead of saying that for JSON-encoding
     purposes, the module name for "notification" element will be "ietf-
!    restconf", it will say that for JSON-encoding purposes, the module
     name for "notification" element will be "ietf-https-notif".

     With those changes, the SSE event notification encoded JSON example
***************
*** 815,826 ****

  7.  IANA Considerations

!    This document registers two URI, two YANG module and two Media Types.

  7.1.  URI Registration

     in the IETF XML registry [RFC3688].  Following the format in RFC
!    3688, the following registration is requested to be made:

     URI: urn:ietf:params:xml:ns:yang:ietf-http-notif
     URI: urn:ietf:params:xml:ns:yang:ietf-sub-notif-recv-list
--- 815,826 ----

  7.  IANA Considerations

!    This document registers two URIs, two YANG modules, and two Media Types.

  7.1.  URI Registration

     in the IETF XML registry [RFC3688].  Following the format in RFC
!    3688, the following registrations are requested to be made:

     URI: urn:ietf:params:xml:ns:yang:ietf-http-notif
     URI: urn:ietf:params:xml:ns:yang:ietf-sub-notif-recv-list
***************
*** 854,860 ****

  7.3.  Media Types

! 7.3.1.  Media Type "application/ietf-https-notif-cap+xml

  Type name: application

--- 854,860 ----

  7.3.  Media Types

! 7.3.1.  Media Type "application/ietf-https-notif-cap+xml"

  Type name: application

***************
*** 917,923 ****

  Provisional registration? (standards tree only): no

! 7.3.2.  Media Type "application/ietf-https-notif-cap+json

  Type name: application

--- 917,923 ----

  Provisional registration? (standards tree only): no

! 7.3.2.  Media Type "application/ietf-https-notif-cap+json"

  Type name: application

***************
*** 1106,1112 ****
  </config>

! 8.2.  Non Subscribed Notification based Configuration

     In the case that it is desired to use HTTPS notif outside of
     Subscribed Notifications, there would have to be a module to define
--- 1106,1112 ----
  </config>

! 8.2.  Non-Subscribed Notification based Configuration

     In the case that it is desired to use HTTPS notif outside of
     Subscribed Notifications, there would have to be a module to define

Thanks,
Acee


