Re: [dhcwg] Benjamin Kaduk's Discuss on draft-ietf-dhc-dhcpv6-yang-24: (with DISCUSS and COMMENT)

ian.farrer@telekom.de Mon, 07 March 2022 20:13 UTC

Return-Path: <ian.farrer@telekom.de>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 411C33A0C83; Mon, 7 Mar 2022 12:13:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uyqhhZOYd1IB; Mon, 7 Mar 2022 12:13:33 -0800 (PST)
Received: from mailout31.telekom.de (mailout31.telekom.de [194.25.225.143]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EFDD3A0AA3; Mon, 7 Mar 2022 12:13:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1646683996; x=1678219996; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=yY8perSn+7d2AdgrVHihOVlTWsilqr5pYrH3W7Lar4E=; b=RHQiWWX6+iiuUtNebWAWuvWBdZykBhAzrz/x/BKNq2s9xapyiioAeJ3e eRw8vGX8EpHruLnLsGbYWeIQsuKSxpWnjYujC6EBDyz6VUa7S4QRcpVvQ bMS3NkYRINM6j8uWvCnYMIsOlspYKn9iiWxayfKemX/L4s7Hg1xnLmFeF CsgDXhTynRe/Ayf734T/LabXvWO+RWz2R/k3Sav1CDOqTDeh7/Da4pchG K8yEA8aRD0yEZPeKcdghXdbMGQY7SH4FMokPAYPQeD+b+urhYpvPp9qL0 9wskfSZesI3yA6seAAyqQ+A21JxMdQsLeJ/l6XYNO8kOn8XFrf3K8NRp8 A==;
Received: from qde8e4.de.t-internal.com ([10.171.255.33]) by MAILOUT31.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 07 Mar 2022 21:13:13 +0100
IronPort-SDR: yGvSC8CjQG2XrRNW2S9+FE0alY/EdB937GJiL/P10f++fxlTORJM9J5rdG8gNys+SS/BW+g93f Il3+4KyiVfCeTmFaKYVwyAhJUNqf/B02w=
X-IronPort-AV: E=Sophos;i="5.90,163,1643670000"; d="scan'208,217";a="1175076843"
X-MGA-submission: MDEgglRl3yKG3HMFc+zi0tzpNpGUe6rc0AUG4JCXLLAuX4TUiMGK/9ykz0P6Nvex/XaxCIEUC+lLz5Qd4EAdK5DJkAVY1A8tDNY6kMole/+hZi83RwDxSvgNW+8OboWvKSI2oVKLANJ/SJRZZyQKEJkX09n9XCKqObG5OjxjEK+4aw==
Received: from he105715.emea1.cds.t-internal.com ([10.169.118.51]) by QDE8PP.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 07 Mar 2022 21:13:12 +0100
Received: from HE105715.EMEA1.cds.t-internal.com (10.169.118.51) by HE105715.emea1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Mon, 7 Mar 2022 21:13:12 +0100
Received: from HE104160.emea1.cds.t-internal.com (10.171.40.36) by HE105715.EMEA1.cds.t-internal.com (10.169.118.51) with Microsoft SMTP Server (TLS) id 15.0.1497.28 via Frontend Transport; Mon, 7 Mar 2022 21:13:12 +0100
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.175) by O365mail03.telekom.de (172.30.0.232) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Mon, 7 Mar 2022 21:13:12 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UJvkaFgsUgobnEEFZz+J4HDrjwLqq3gJPWNF6UcZUBtxPc6dO/YXF5HCnPm0iMreftdyFI6OpXz+cKS+tCgZ7k1Jpi1XAm+C8kuJEDdyuOKbbyIGmBETv8V6io98ndFktx4NE1JbPPJvKDV6oLZrcXaPG1wU61xvPpNRHvaBDn9YQfc+BK+8pfRRzLiBmxX/Y+Eu+ls2LMUwiw6txAAlQudRRWznv/5WcMf4E2koa6LpgDYnVx+iBx2ShCIYlLOlJ9M1f8gAPK7cFFhzEKFYTy5x3cAO8ESC1rNfpW4cSZfz4an5rMaBetwXbNH1YGdGkZ20PUDwnYjjeI1MRpyCfA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yY8perSn+7d2AdgrVHihOVlTWsilqr5pYrH3W7Lar4E=; b=J709e7gWe1UDMqilA0nbzL4L2tylzBMbwAVWoh/pn2f6TYU6BE2qBOrWtUUhGNY6QGZc5Kr7tDCa/hTrElPV0hFyPADuNRBLYuEF8DYOCuX7pD5xCegRItcDoL2v8oR0ms/CG/5LzLiCblj3ayIIPhcXV63UXKiz7NLvYOki50M7DydEFcY7kfEDF5UR4w1h1p8Spa/V42P4Gvk2vZzK8lfIbl9bdaKG9xGcdvIl4zq50NLMjR5BDo4Izofp00f3XbCo4s7FrpJhqKY+Wv8ALrnugHXEq3sPgNewehWKDG8xIkbAd1usNbiWloREnUKLfLEC3cyQvapychc+fjyjnQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR3P281MB0826.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:5a::10) by FRYP281MB0927.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:74::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.8; Mon, 7 Mar 2022 20:13:10 +0000
Received: from FR3P281MB0826.DEUP281.PROD.OUTLOOK.COM ([fe80::c8a9:eaf:5d69:6e8b]) by FR3P281MB0826.DEUP281.PROD.OUTLOOK.COM ([fe80::c8a9:eaf:5d69:6e8b%5]) with mapi id 15.20.5061.017; Mon, 7 Mar 2022 20:13:10 +0000
From: ian.farrer@telekom.de
To: kaduk@mit.edu, ianfarrer@gmx.com
CC: dhc-chairs@ietf.org, draft-ietf-dhc-dhcpv6-yang@ietf.org, iesg@ietf.org, dhcwg@ietf.org
Thread-Topic: [dhcwg] Benjamin Kaduk's Discuss on draft-ietf-dhc-dhcpv6-yang-24: (with DISCUSS and COMMENT)
Thread-Index: AQHX8UfTvTr84IuvQ0Clrd2eF6LhGqyWukOAgA6HdYCAD5qqGQ==
Date: Mon, 07 Mar 2022 20:13:10 +0000
Message-ID: <FR2P281MB08213F977140BCB324D4F19AFC089@FR2P281MB0821.DEUP281.PROD.OUTLOOK.COM>
References: <163952685584.6395.6879611267419166159@ietfa.amsl.com> <D2E5598C-7FDF-4740-9BE3-6F45A2763F81@gmx.com> <20220225215337.GW12881@kduck.mit.edu>
In-Reply-To: <20220225215337.GW12881@kduck.mit.edu>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2fa0fe4f-a32f-449b-a6c2-08da0076e702
x-ms-traffictypediagnostic: FRYP281MB0927:EE_
x-microsoft-antispam-prvs: <FRYP281MB0927A8E8BD542645A81916E5FC089@FRYP281MB0927.DEUP281.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR3P281MB0826.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(83380400001)(86362001)(5660300002)(82960400001)(122000001)(53546011)(71200400001)(6512007)(9686003)(6506007)(33656002)(6486002)(30864003)(966005)(508600001)(38100700002)(166002)(2906002)(52536014)(186003)(66556008)(66446008)(66476007)(66946007)(64756008)(76116006)(91956017)(4326008)(8936002)(8676002)(316002)(54906003)(38070700005)(110136005)(518174003)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_FR2P281MB08213F977140BCB324D4F19AFC089FR2P281MB0821DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR3P281MB0826.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 2fa0fe4f-a32f-449b-a6c2-08da0076e702
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Mar 2022 20:13:10.7416 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8DmjURV3FcvIJmmOvtE8D+1Tpt63dFS0/hFDCKIAyRubbOZJpiAEWYLkUCdQXnrNwxJt1WxHR2M/NNp0xf7XtA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRYP281MB0927
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/4-3eAjYzQebEPsp_sB6q1Do9jXA>
Subject: Re: [dhcwg] Benjamin Kaduk's Discuss on draft-ietf-dhc-dhcpv6-yang-24: (with DISCUSS and COMMENT)
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Dynamic Host Configuration <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 20:13:47 -0000

Hi Benjamin,

I’ve just uploaded a version with my described changes for both your DISCSUSS and other comments. It also addresses the other comments received during the IESG review.

Thanks,
Ian

From: dhcwg <dhcwg-bounces@ietf.org> on behalf of Benjamin Kaduk <kaduk@mit.edu>
Date: Friday, 25. February 2022 at 22:54
To: ianfarrer@gmx.com <ianfarrer@gmx.com>
Cc: dhc-chairs@ietf.org <dhc-chairs@ietf.org>, draft-ietf-dhc-dhcpv6-yang@ietf.org <draft-ietf-dhc-dhcpv6-yang@ietf.org>, The IESG <iesg@ietf.org>, dhcwg@ietf.org <dhcwg@ietf.org>
Subject: Re: [dhcwg] Benjamin Kaduk's Discuss on draft-ietf-dhc-dhcpv6-yang-24: (with DISCUSS and COMMENT)
Hi Ian,

My apologies for the rather slow response.

The changes below all look good to me -- thank you for the careful
attention and confirming with Tim/Bernie that they properly reflect the
protocol fields in question.

I will also go and reply to a couple topics in the COMMENT section from
your original reply, in a separate message.

Please go ahead and upload a new revision when you get a chance, and I can
update my ballot position accordingly.

Thanks again,

Ben

On Wed, Feb 16, 2022 at 05:01:09PM +0100, ianfarrer@gmx.com wrote:
> Hi Benjamin,
>
> Please see below regarding the changes that have been made to address your DISCUSS.
>
> Thanks,
> Ian
>
> > On 15. Dec 2021, at 01:07, Benjamin Kaduk via Datatracker <noreply@ietf.org> wrote:
> >
> > Benjamin Kaduk has entered the following ballot position for
> > draft-ietf-dhc-dhcpv6-yang-24: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
> > for more information about how to handle DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > https://datatracker.ietf.org/doc/draft-ietf-dhc-dhcpv6-yang/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > Roman's comment touched on a related point, but I'd like to (hopefully
> > briefly) discuss the way we encode certain opaque protocol fields.
> > There are some places where we clearly intend a hex representation (a
> > string with a pattern that's marked out as pairs of hex digits), but
> > there are others where we just say "type string" with no indication of
> > encoding, and even a "type binary".  If we want the specification to
> > admit interoperable implementation we need to be more clear about what
> > encoding we expect for all of these nodes.  I have noted most (possibly
> > all, but please double check) in the COMMENT section, with a preference
> > for "type binary" where we don't need to apply regex restrictions.  But
> > that's just a personal preference, and choosing to use hex (or base64,
> > or any other well-defined) encoding will suffice to resolve the discuss
> > point.
> >
> [if - In each of the cases that you identified (5 in total), the types have been changed to ‘binary’. I’ve checked through the models and you have identified all of the relevant instances in your review.
>
> Here is a summary of the changes that have been made:
>
>
> Ietf-dhcpv6-common.yang
> ----------------------------------
> Auth-option-group
> This is now modelled with a choice for the protocol type (conf-token or rkap). In both cases the relevant leaves (token-auth-information and auth-info-value respectively) are type binary.
>
> Vendor-specific-information-option-group/
> sub-option-data -> binary
>
> Ietf-dhcpv6-relay.yang
> ———————————————
> Interface-id-option-group
> interface-id -> binary
>
>
> ietf-dhcpv6-client.yang
> ——————————
> User-class-option-group
> -> user-class-data
>
> Vendor-class-option-group
> -> vendor-class-data
>
>
> For reference, here are the associated review comments:
>
>     grouping auth-option-group {
>     [...]
>       container auth-option {
>       [...]
>         leaf auth-information {
>           type string;
>           description
>             "The authentication information, as specified by the
>             protocol and algorithm used in this Authentication
>             option.";
>
> This should probably be binary, not a string.  Or, if it needs to be a
> string, it should specify an encoding (e.g., hex).
>
> ------------------
>
>
>             leaf sub-option-data {
>               type string {
>                 pattern '([0-9a-fA-F]{2}){0,}';
>               }
>               description
>                 "The data area for the sub-option.";
>
> Why does this need to be hex-encoded (vs. YANG binary)?
> And, if it is hex-encoded, we should probably say so explicitly in the
> description.
>
> —————————
>
>
>
>
> Section 4.3
>
>     grouping interface-id-option-group {
>       [...]
>        leaf interface-id {
>           type string;
>           description
>             "An opaque value of arbitrary length generated by the
>             relay agent to identify one of the relay agent's
>             interfaces.";
>
> I think this is better as a YANG "binary" type than a string.  If not,
> we should say something about the encoding.
>
> --------------------
>
>
>     grouping user-class-option-group {
>       [...]
>           leaf user-class-data {
>             type string;
>             description
>               "Opaque field representing a User Class
>               of which the client is a member.";
>
> I think this would be better as YANG binary than string.  If we keep it
> as string, we need to say what encoding is used.
>
> -------------------
>
>       container vendor-class-option {
>         [...]
>         list vendor-class-option-instances {
>         [...]
>           list vendor-class-data-element {
>            [...]
>             leaf vendor-class-data {
>               type string;
>               description
>                 "Opaque field representing a vendor class of which
>                 the client is a member.";
>
> (likewise here)
>
> -----------------
>
>
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > Thanks to the shepherd for answering the second part of question (1) in
> > the template, as well as the first; this part of the question is often
> > missed.  (There is, however, a third part as well...)
> >
> > Section 1.2.1
> >
> > Table 1 is described as showing "the DHCPv6 options that are modeled,
> > the element(s) they are sent by, and the relevant YANG module name".  In
> > my interpretation that means that:
> >
> > - the only options that are in the table are ones that are modeled
> > - the contents of the table shows which elements send those options
> >
> > But the contents of the table don't quite seem to match that -- it seems
> > that they only indicate which nodes have YANG modeling for how to send
> > the option, and not indicate nodes that send the option but do not need
> > YANG configuration to control how to populate the option.  (E.g.,
> > OPTION_AUTH and OPTION_USER_CLASS.)  If this is the intent, then perhaps
> > it's clearer to say "which YANG modules they are modeled for" or
> > something similar, rather than "the element(s) they are sent by".
> >
> > Section 3.1
> >
> >   *  address/prefix-pool-utilization-threshold-exceeded: Raised when
> >      the number of leased addresses or prefixes exceeds the configured
> >      usage threshold.
> >
> > The node that seems to be where the "configured usage threshold" is
> > configured is scoped to an address pool or prefix pool.  Should this
> > description say "number of leased [...] in an address pool exceeds the
> > configured usage threshold"?
> >
> > Section 4.1
> >
> >         +------+------+----------+--------------+
> >         | 0001 | 0006 | 28490058 | 00005E005300 |
> >         +------+------+----------+--------------+
> >
> >         This example includes the 2-octet DUID type of 1 (0x01), the
> >         hardware type is 0x06 (IEEE Hardware Types) the creation
> >         time is 0x028490058 (constructed as described above). Finally,
> >         the link-layer address is 0x5E005300 (EUI-48 address
> >         00-00-5E-00-53-00)";
> >
> > Should there be some more zeros in here (e.g., in the artwork before
> > 28490058)?
> >
> >     typedef duid-en {
> >       type duid-base {
> >         pattern '0002'
> >           + '[0-9a-fA-F]{4,}';
> >       }
> >       description
> >         "DUID type 2, assigned by vendor based on Enterprise
> >         Number (DUID-EN). This DUID consists of the 4-octet vendor's
> >         registered Private Enterprise Number as maintained by IANA
> >         followed by a unique identifier assigned by the vendor. For
> >         example:
> >
> > A 4-octet PEN would be 8 hex digits (the YANG allows as few as 4).
> >
> >     typedef duid-unstructured {
> >       type duid-base {
> >         pattern '(000[1-4].*|.*[^0-9a-fA-F].*)' {
> >           modifier invert-match;
> >         }
> >       }
> >
> > My understanding is that the "pattern" modifiers from the base type and
> > the derived type are "and"-ed together, so the "|.*[^0-9a-fA-F].*"
> > clause is redundant with the pattern in the base type and thus not
> > needed.
> >
> >       container status {
> >       [...]
> >         leaf message {
> >           type string;
> >           description
> >             "A UTF-8 encoded text string suitable for display to an
> >             end user. It MUST NOT be null-terminated.";
> >
> > (Related to Roman's comment)
> > This is probably more of a comment on RFC 8415 than this document, but
> > BCP 18 seems pretty clear that a string destined for display to a human
> > should be accompanied by a language indicator.
> > (This comment probably applies to every "leaf message" but I will just
> > mention it this once.)
> >
> >     grouping auth-option-group {
> >     [...]
> >       container auth-option {
> >       [...]
> >         leaf auth-information {
> >           type string;
> >           description
> >             "The authentication information, as specified by the
> >             protocol and algorithm used in this Authentication
> >             option.";
> >
> > This should probably be binary, not a string.  Or, if it needs to be a
> > string, it should specify an encoding (e.g., hex).
> >
> >     grouping status-code-option-group {
> >
> > FWIW, this grouping seems unused by the rest of the document.  (Perhaps
> > a remnant of a decision to move the status information out of the
> > options section and into a higher level of the relevant YANG trees?)
> >
> >             leaf sub-option-data {
> >               type string {
> >                 pattern '([0-9a-fA-F]{2}){0,}';
> >               }
> >               description
> >                 "The data area for the sub-option.";
> >
> > Why does this need to be hex-encoded (vs. YANG binary)?
> > And, if it is hex-encoded, we should probably say so explicitly in the
> > description.
> >
> > Section 4.2
> >
> >       leaf preferred-lifetime {
> >         type dhc6:timer-seconds32;
> >         description
> >           "Preferred lifetime for the Identity Association (IA).";
> >         reference "RFC 8415: Dynamic Host Configuration Protocol for
> >           IPv6 (DHCPv6), Section 6";
> >
> > Is Section 6 really the best section reference for this concept?
> >
> >     grouping message-stats {
> >
> > The relay module has a counter for discarded messages; would a similar
> > counter make sense here?  (Also for the server module, I think.)
> >
> > Also, YANG does have dedicated "counter" types to more precisely
> > indicate semantics than just "uint32".  They are by definition
> > monotonically increasing, though, and are their use is typically
> > accompanied by a "last discontinuity time" node to indicate when they
> > have been reset.
> >
> >     grouping info-refresh-time-option-group {
> >       [...]
> >         leaf info-refresh-time {
> >           type dhc6:timer-seconds32;
> >           description
> >             "Time duration relative to the current time, expressed
> >             in units of seconds.";
> >
> > Is this really "relative to the current time" for purposes of the YANG
> > module?  This is the description that RFC 8415 uses, yes, but that
> > refers to the current time when the protocol message is received, and
> > YANG interactions may be asynchronous to that.
> >
> >           container address-pools {
> >           [...]
> >             list address-pool {
> >               key pool-id;
> >               [...]
> >               leaf pool-id {
> >                 type string;
> >
> > What's the motivation for making the pool-id a string vs the option-set
> > and allocation-range lists that have an integer identifier?  (Also
> > applies to prefix pools.)
> >
> >               leaf pool-prefix {
> >                 type inet:ipv6-prefix;
> >                 mandatory true;
> >                 description
> >                   "IPv6 prefix for the pool.";
> >
> > Does this prefix need to be contained within the overall
> > "network-prefix"?  (Same question for prefix-pools' pool-prefix.)
> >
> >               leaf max-address-utilization {
> >                 type dhc6:threshold;
> >                 description
> >                   "Maximum amount of the addresses in the
> >                   pool which can be simultaneously allocated,
> >                   calculated as a percentage of the available
> >                   addresses (end-address minus start-address plus
> >                   one).";
> >
> > Do we want to mention the relationship between this node and the
> > "address-pool-utiliziation-threshold-exceeded" notification?  I see the
> > pointer the other direction, but since we don't use the word "threshold"
> > in the description here I wouldn't mind a more explicit linkage.
> > (Likewise for the prefix-allocation case.)
> >
> >                 list active-lease {
> >                   key leased-prefix;
> >                   description
> >                     "List of active prefix leases.";
> >                   leaf leased-prefix {
> >                     type inet:ipv6-prefix;
> >                     description
> >                       "Active leased prefix entry.";
> >
> > Is the prefix length available from some other information in the tree?
> > If not, should it be listed here?
> >
> >     notification decline-received {
> >       if-feature na-assignment;
> >       description
> >         "Notification sent when the server has received a
> >         Decline (9) message from a client.";
> >
> > Is this a potential DoS vector to the notification recipient (if a
> > malicious client just starts declining everything)?  Should we say
> > anything about rate-limiting?
> >
> >     notification non-success-code-sent {
> >       description
> >         "Notification sent when the server responded
> >         to a client with non-success status code.";
> >
> > (similarly here)
> >
> > Section 4.3
> >
> >     grouping interface-id-option-group {
> >       [...]
> >        leaf interface-id {
> >           type string;
> >           description
> >             "An opaque value of arbitrary length generated by the
> >             relay agent to identify one of the relay agent's
> >             interfaces.";
> >
> > I think this is better as a YANG "binary" type than a string.  If not,
> > we should say something about the encoding.
> >
> > Section 4.4
> >
> > Why do we use "prefix-del" for the feature name in this module but the
> > full "prefix-delegation" in the other modules?
> >
> >     grouping message-statistics {
> >
> > The relay module has a counter for discarded messages; should we?
> >
> >     grouping option-request-option-group {
> >       description
> >         "OPTION_ORO (6) Option Request Option. A client MUST include
> >         an Option Request option in a Solicit, Request, Renew,
> >            Rebind, or Information-request message to inform the server
> >              about options the client wants the server to send to the
> >              client.";
> >
> > If I understand correctly, there are further MUST-level requirements for
> > what options must be present in the ORO.  E.g., INFORMATION_REFRESH_TIME
> > is required in Information-Request.  Do we want to mention that here?
> > Are there any considerations for how that requirement interacts with the
> > values configured by YANG?  E.g., do we expect implementations to
> > forcibly add those required options on top of the configured ones, in
> > scenarios where they are required?
> >
> >     grouping user-class-option-group {
> >       [...]
> >           leaf user-class-data {
> >             type string;
> >             description
> >               "Opaque field representing a User Class
> >               of which the client is a member.";
> >
> > I think this would be better as YANG binary than string.  If we keep it
> > as string, we need to say what encoding is used.
> >
> >       container vendor-class-option {
> >         [...]
> >         list vendor-class-option-instances {
> >         [...]
> >           list vendor-class-data-element {
> >            [...]
> >             leaf vendor-class-data {
> >               type string;
> >               description
> >                 "Opaque field representing a vendor class of which
> >                 the client is a member.";
> >
> > (likewise here)
> >
> >       leaf client-duid {
> >         if-feature "non-temp-addr or prefix-del " +
> >           "or temp-addr and not anon-profile";
> >
> > Does the default YANG operator precedence do what we want with respect
> > to ((non-temp-addr or prefix-del or temp-addr) and not anon-profile) vs
> > (non-temp-addr or prefix-del or (temp-addr and not anon-profile))?
> >> From the context in the rest of the document, it's clear that we want
> > the former, but I'm not familiar enough with YANG minutiae to say if
> > that's what we actually are specifying.
> >
> >     notification invalid-ia-address-detected {
> >       if-feature "non-temp-addr or temp-addr";
> >       [...]
> >       leaf ia-id {
> >         type uint32;
> >         mandatory true;
> >         description
> >           "IA-ID";
> >
> > If I understand correctly, in DHCP the IA-ID is scoped per client DUID.
> > Does this notification convey enough information to disambiguate what
> > scope this IA-ID value belongs to?
> >
> >       [...]
> >       leaf ia-na-t1-timer {
> >         type uint32;
> >         description
> >           "The value of the T1 time field for non-temporary address
> >           allocations (OPTION_IA_NA).";
> >       }
> >       leaf ia-na-t2-timer {
> >         type uint32;
> >         description
> >           "The value of the preferred-lifetime field for non-temporary
> >           address allocations (OPTION_IA_NA).";
> >
> > Should these two be here without a feature conditional?  They seem to be
> > NA-specific but we could send this notification if NA is not
> > implemented.
> >
> >     notification transmission-failed {
> >         [...]
> >       leaf failure-type {
> >         type enumeration {
> >
> > (side note?) I get antsy about not leaving an extension point for other
> > types of (re)transmission failure, but I also don't have any specific
> > scenario in mind that's not already covered, so.
> >
> >     notification unsuccessful-status-code {
> >       description
> >         "Notification sent when the client receives a message that
> >         includes an unsuccessful Status Code option.";
> >
> > As for the other notifications on failure, is this a potential DoS
> > vector?
> >
> > Section 5
> >
> > It's probably worth mentioning the risk of notifications turning into a
> > DoS vector (absent rate-limiting) here.
> >
> > Can a misconfigured client cause problems for a (honest) server, e.g.,
> > by sending a lot of requests for a lot of things, very quickly?
> >
> >   All data nodes defined in the YANG modules which can be created,
> >   modified, and deleted (i.e., config true, which is the default) are
> >   considered sensitive.  Write operations (e.g., edit-config) to these
> >   data nodes without proper protection can have a negative effect on
> >   network operations.
> >
> > Do we want to go further and give some broad treatment of how the
> > negative effects would come about (e.g., by disrupting address
> > allocation and the routability of addresses/prefixes that clients
> > attempt to use)?
> >
> >   An attacker with read/write access the DHCPv6 relay can undertake
> >   various attacks, such as:
> >
> >   *  Modifying the relay's "destination-address" to send messages to a
> >      rogue DHCPv6 server.
> >
> >   *  Deleting information about a client's delegated prefix, causing a
> >      denial of service attack as traffic will no longer be routed to
> >      the client.
> >
> > I'd considering reiterating the "full denial of service" capability
> > (which is currently implicit in "send messages to a rouge DHCPv6 server"
> > combined with the list of attacks that a compromised server can
> > undertake).
> >
> >   Some of the readable data nodes in this YANG module may be considered
> >   sensitive or vulnerable in some network environments.  Therefore, it
> >   is important to control read access (e.g., only permitting get, get-
> >   config, or notifications) to these data nodes.  These subtrees and
> >   data nodes can be misused to track the activity of a host:
> >
> > First off, thank you for stating this consideration so clearly.
> >
> > Second, there may be an additional consideration for read-only access --
> > knowledge of what pools of addresses are available for allocation might
> > facilitate network reconaissance (viz. RFC 7707).
> >
> >   [RFC7824] covers privacy considerations for DHCPv6 and is applicable
> >   here.
> >
> > I'd suggest mentioning the RFC 7844 privacy profile as a partial
> > mitigation that is sometimes applicable.
> >
> > Section 9.2
> >
> > RFC 8987 is used as in a few YANG reference stanzas, but is not
> > mentioned in the preface before the containing YANG module.  It could
> > arguably be classified as normative based on that usage.
> >
> > Appendix D
> >
> >         case user-class-option-id {
> >           description
> >             "Client class selection based on the value of the
> >             OPTION_USER_CLASS(15) and its user-class-data field.";
> >           leaf user-class-data {
> >             type string;
> >             mandatory true;
> >             description
> >               "Value of the enterprise-number field.";
> >
> > This description doesn't look right.
> >
> > NITS
> >
> > We might check the spelling of "grouping message-stats" (vs "grouping
> > message-statistics") across modules.
> >
> > Section 4.2
> >
> >       leaf rapid-commit {
> >         type boolean;
> >         description
> >           "When set to 'true', Specifies that the pool supports
> >           client-server exchanges involving two messages.";
> >
> > This is in the "grouping resource-config" that may or may not be used
> > within a "pool" container.  A more generic phrasing might be in order.
> >
> >     grouping sol-max-rt-option-group {
> >       [...]
> >         leaf sol-max-rt-value {
> >           type dhc6:timer-seconds32;
> >           description
> >             "sol max rt value";
> >
> > That's a pretty sparse description.
> >
> >     grouping inf-max-rt-option-group {
> >       [...]
> >         leaf inf-max-rt-value {
> >           type dhc6:timer-seconds32;
> >           description
> >             "inf max rt value";
> >
> > (ditto)
> >
> >               leaf max-address-utilization {
> >                 type dhc6:threshold;
> >                 description
> >                   "Maximum amount of the addresses in the
> >                   pool which can be simultaneously allocated,
> >                   calculated as a percentage of the available
> >                   addresses (end-address minus start-address plus
> >                   one).";
> >
> > The analogous prefix-allocation node has "rounded up" stated
> > explicitly.  Should we do so here as well?
> >
> > Section 4.3
> >
> >       leaf reply-sent-count {
> >         type uint32;
> >         config "false";
> >         description
> >           "Number of Reply (7) messages received.";
> >       }
> >       leaf release-received-count {
> >         type uint32;
> >         config "false";
> >         description
> >           "Number of Release (8) messages sent.";
> >       }
> >       leaf decline-received-count {
> >         type uint32;
> >         config "false";
> >         description
> >           "Number of Decline (9) messages sent.";
> >
> > The descriptions seem out of sync about sent vs received, here.
> >
> > Section 5
> >
> >   As the RPCs for deleting/clearing active address and prefix entries
> >   in the server and relay modules are particularly sensitive, these use
> >   'nacm:default-deny-all'.
> >
> > This looks like a comma splice.
> >
> >   An attacker with read/write access the DHCPv6 server can undertake
> >   various attacks, such as:
> >   [...]
> >   An attacker with read/write access the DHCPv6 relay can undertake
> >   various attacks, such as:
> >
> > s/access/access to/
> >
> >   Some of the readable data nodes in this YANG module may be considered
> >   sensitive or vulnerable in some network environments.  Therefore, it
> >   is important to control read access (e.g., only permitting get, get-
> >   config, or notifications) to these data nodes.  These subtrees and
> >
> > This doesn't match the template at
> > https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines , where the
> > parenthetical is "(e.g., via get, get-config, or notification)" -- the
> > meaning is different!
> >
> > Appendix A.1
> >
> >   The 'max-pd-space-utilization' is set to 80 so that a 'prefix-pool-
> >   utilization-threshold-exceeded' notification will be raised if the
> >   number of prefix allocations exceeds this.
> >
> > the max-pd-space-utilitization is a percentage, so the "number of prefix
> > allocations" needs a unit conversion to be comparable to it.
> >
> > Appendix C
> >
> >         container lease-storage {
> >           description
> >             "Configures how the server will stores leases.";
> >           choice storage-type {
> >             description
> >               "The type storage that will be used for lease
> >               information.";
> >
> > s/type storage/type of storage/
> >
> >             case mysql {
> >               leaf mysql-name {
> >                 type string;
> >                 description
> >                   "Name of the database.";
> >               }
> >               [...]
> >
> > This seems to not have provision for configuring mandatory TLS usage for
> > connection to the mysql server.
> > (Same for the postgres case.)
> >
> >               leaf mysql-port {
> >                 type inet:port-number;
> >                 default 5432;
> >
> > mysql's registered port seems to be 3306 (5432 is assigned for
> > postgres).
> >
> > Appendix D
> >
> >   classifying clients.  So this standard does not try to provide full
> >   specification for class selection, it only shows an example how it
> >   could be defined.
> >
> > s/example/example of/
> >
> >     grouping client-class-id {
> >       description
> >         "Definitions of client message classification for
> >         authorization and assignment purposes.";
> >       leaf client-class-name {
> >         type string;
> >         description
> >           "Unique Identifier for client class identification list
> >           entries.";
> >
> > Shouldn't this be mandatory if it's going to be the only way we refer to
> > class IDs?  I guess the grouping is currently only used in one place,
> > and it's a list key there (so implicitly mandatory), but I still wonder
> > if the grouping is more reusable with "mandatory true".
> >
> >           leaf relay-interface {
> >             type string;
> >             description
> >               "Reference to the interface entry for the incoming
> >               DHCPv6 message.";
> >
> > Whatever we do in the main module for the encoding of the interface
> > entry should be reflected here as well.
> >
> >             leaf vendor-class-data {
> >               type string;
> >               mandatory true;
> >               description
> >                 "Vendor class data to match.";
> >
> > (likewise)
> >
> >             leaf remote-id {
> >               type string;
> >               mandatory true;
> >               description
> >                 "Remote-ID data to match.";
> >
> > (and here)
> >
> >
> >
> > _______________________________________________
> > dhcwg mailing list
> > dhcwg@ietf.org
> > https://www.ietf.org/mailman/listinfo/dhcwg
>

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www.ietf.org/mailman/listinfo/dhcwg