[Gen-art] Re: draft-ietf-opsawg-rfc5706bis-01 early Genart review

Joel Halpern <jmh@joelhalpern.com> Mon, 12 January 2026 21:52 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: gen-art@mail2.ietf.org
Delivered-To: gen-art@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 50C57A6AC0B7; Mon, 12 Jan 2026 13:52:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.796
X-Spam-Level:
X-Spam-Status: No, score=-2.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id drbm3VB-3_gT; Mon, 12 Jan 2026 13:52:32 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 80838A6AC0B0; Mon, 12 Jan 2026 13:52:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1768254743; bh=KR/h7Ynq7ghtc1NUEcMxFJq/c0r+JvziiJHSyp8PUng=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=Gg7e/R8uutWHMfVnj15h3UTI8Z/tD6DSlQj6uDM2UQtHLDUUxDGjZBQkl6Dgaps7L uFLEShcxKMb7VcVzaU+Wok/itqqZo0jtAHTl/h7PrqtWWhrWW8+zXobnGqMH83cAXw G4ohUw9b8dTHmYR/kzQOrdNk9TcOhBk8mycwlPiM=
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4dqmLv192Xz1qyx4; Mon, 12 Jan 2026 13:52:23 -0800 (PST)
X-Quarantine-ID: <0Lh8GVK3XxnO>
X-Virus-Scanned: Debian amavis at b2.tigertech.net
Received: from [IPV6:2600:8806:103:9500:4d46:7e82:68c7:2632] (unknown [IPv6:2600:8806:103:9500:4d46:7e82:68c7:2632]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4dqmLs6cSpz1nsV7; Mon, 12 Jan 2026 13:52:21 -0800 (PST)
Content-Type: multipart/alternative; boundary="------------reV3r3qEPhUyTZe0YhUNHAgm"
Message-ID: <619db583-2e8a-46d5-a5ec-010a10e546b0@joelhalpern.com>
Date: Mon, 12 Jan 2026 16:52:18 -0500
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: "Joe Clarke (jclarke)" <jclarke@cisco.com>, "gen-art@ietf.org" <gen-art@ietf.org>
References: <176807672940.342257.8154382682163727694@dt-datatracker-5656579b89-r5kdq> <CH2PR11MB886772B35A95EE274B74C8FAB881A@CH2PR11MB8867.namprd11.prod.outlook.com>
Content-Language: en-US
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <CH2PR11MB886772B35A95EE274B74C8FAB881A@CH2PR11MB8867.namprd11.prod.outlook.com>
Message-ID-Hash: VIRW33ED4NOQSPTJ4LICLVSZC72YW2N2
X-Message-ID-Hash: VIRW33ED4NOQSPTJ4LICLVSZC72YW2N2
X-MailFrom: jmh@joelhalpern.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-gen-art.ietf.org-0; header-match-gen-art.ietf.org-1; header-match-gen-art.ietf.org-2; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-opsawg-rfc5706bis.all@ietf.org" <draft-ietf-opsawg-rfc5706bis.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Gen-art] Re: draft-ietf-opsawg-rfc5706bis-01 early Genart review
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/B5GSaeb0nGZE3X9unfeoNHue7HI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Owner: <mailto:gen-art-owner@ietf.org>
List-Post: <mailto:gen-art@ietf.org>
List-Subscribe: <mailto:gen-art-join@ietf.org>
List-Unsubscribe: <mailto:gen-art-leave@ietf.org>

Thank you for the attentive responses.  I think you understood and are 
working to address my concerns.

Yours,

Joel

On 1/12/2026 4:11 PM, Joe Clarke (jclarke) wrote:
> Thanks for the review, Joel!  Comments in line below.
>
>
> Section 3.1 says that it applies to all technical specification to be 
> published
> as IETF RFCs.  As a general matter, I think it is correct that this is not
> limited to standards track, covering also informational, experimental, or
> technical BCPs.  On the other hand, I don't wee how these requirements can
> reasonably be applied to problem statements or gap analysis 
> documents.  I am
> not even sure they can be applied to gap analysis documents, although
> operability and manageability gaps are frequently relevant. It may be that
> "Technical Specification" is intended to be only "New Protocol, a Protocol
> Extension, or an architecture".  If so, the wording should probably be
> clarified.
>
> [JMC] We used the word “technical” to be specific enough as not to 
> cover things like policy or process documents, but we didn’t want to 
> be overly prescriptive otherwise.  If a gap analysis or problem 
> statement doesn’t need any management or operational considerations, 
> they could employ the text that simply states that.
>
> In section 5, there is text that asks the document authros to consider 
> where
> the managers are.  I find this expectation confusing.  For any 
> protocol I am
> familiar with, the managers can be in a variety of different places, 
> delivered
> via a variety of techniques.  None of which considerations are tied to the
> specific protocol being documented.  )e.g. for a routing protocol 
> document,
> whether the managers are on site or remote, whether the access is via 
> the data
> network or v=ia an out of band network, whether there are or are not
> intermediate controllers are all parameters outside the scope of the 
> routing
> protocol manageability considerations.)  While the text after the 
> bulleted list
> appears to be factual, it also does not appear to be related to the 
> protocol to
> be described.  I suppose one could recommend being careful not to 
> assume in
> managability that some single specific management approach will always be
> taken.  But that is not what the sections seems to ask us to do.
>
> [JMC] I believe the intent of that phrase was to have one consider the 
> case where managers might be geographically remote (thus latency and 
> bandwidth may become issues).  You’re right the subsequent bullets 
> don’t quite get to that.  I’ll raise a GH issue to track this.
>
> Section 5.3 paragraph 4 is more about how management protocols work 
> than it is
> about what information should be modeled.   I am not sure it belongs as a
> consideration for a protocol document management considerations 
> section.  I
> presume it would be in the advice to the designers of whatever management
> modeling language is used to define the management model, which is not 
> mandated
> to be part of this section.
>
> [JMC] You’re right.  Some of this is probably not needed for the core 
> Protocol designer.  That said, some of the text around a clear 
> separation of config and state might be useful.  I’ll raise an issue 
> so we can clean this up (and I’ve taken your nit in 5.3 as well).
>
> Similarly, in the middle of section 5.5 on configuration management 
> there is a
> discussion of coordinated configuration across devices.  While that 
> discussion
> appears to be technically accurate, I am unable to understand how it 
> relates to
> the managability considerations of a protocol.  Do you expect a 
> protocol to
> mandate such capabilities?  Those are NMS or OSS level capabilities, not
> protocol aspects as far as I can tell.
>
> [JMC] Likely for many (most?) new protocols, their configuration could 
> be modeled in such a way that *CONF protocols and their datastores 
> could accommodate them.  As such, I agree, there is little for the 
> Protocol Designer to consider here.  Still, is it bad to make them 
> consider that operators wish to think of things more at service levels?
>
> Nit: should there be a note in section 5.1 along with the reference to 
> RFC6632
> that SNMP is no longer recommended?
>
> [JMC] That would make sense to remind the reader in this context. 
>  I’ll create an issue for it.
>
> Joe
>
> Nit: 5.3 paragraph 2 is quite confusing.   It took me three readings 
> to realize
> that the text intends to say that the YANG Data Model amplifies the text
> information model.  Personally, I find that an odd thing to say, as 
> those are
> different levels of abstraction.
>
>