Re: [Gen-art] [Last-Call] Genart last call review of draft-ietf-opsawg-l2nm-15

Lars Eggert <lars@eggert.org> Mon, 30 May 2022 10:11 UTC

Return-Path: <lars@eggert.org>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26E4AC15BFF3; Mon, 30 May 2022 03:11:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.109
X-Spam-Level:
X-Spam-Status: No, score=-7.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eggert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cwm2sA61W22V; Mon, 30 May 2022 03:11:34 -0700 (PDT)
Received: from mail.eggert.org (mail.eggert.org [91.190.195.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE120C15BFF1; Mon, 30 May 2022 03:11:33 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2a00:ac00:4000:400:f819:17d2:74e:ec1c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.eggert.org (Postfix) with ESMTPSA id 3B0781D2D9D; Mon, 30 May 2022 13:11:18 +0300 (EEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=eggert.org; s=dkim; t=1653905478; bh=bysWZcEmF37OyWt5qiddADulmtvpCNYWHS3HebB9MI0=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=vrGfmVVycZMygbTKLreVZG5j1Mgh/hdmvKiabsg+WgTDxf7yLuAu4HLmnUWPpr+66 PwZbGdyXkA8iuqNPG6Y3pAWPBb8CaakXb16DEKfukLnf93XYfJfS+/99nI+ftZRLMO UiHbMvkpAaBlf7phE23zszT03ae+l2M57Dk23iR0=
Content-Type: multipart/signed; boundary="Apple-Mail=_52C27ADB-66CE-4EC4-AC95-308EDAF39CDE"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.100.31\))
From: Lars Eggert <lars@eggert.org>
In-Reply-To: <165223349452.32947.16768955581927525076@ietfa.amsl.com>
Date: Mon, 30 May 2022 13:11:07 +0300
Cc: gen-art@ietf.org, draft-ietf-opsawg-l2nm.all@ietf.org, last-call@ietf.org, opsawg@ietf.org
Message-Id: <E09F735A-F37B-4211-988B-14B22BF05BBF@eggert.org>
References: <165223349452.32947.16768955581927525076@ietfa.amsl.com>
To: Dale Worley <worley@ariadne.com>
X-MailScanner-ID: 3B0781D2D9D.AB036
X-MailScanner: Not scanned: please contact your Internet E-Mail Service Provider for details
X-MailScanner-From: lars@eggert.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/JbinGT63l_KrHJ_uKbsH5WIl8UE>
Subject: Re: [Gen-art] [Last-Call] Genart last call review of draft-ietf-opsawg-l2nm-15
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 May 2022 10:11:38 -0000

Dale, thank you for your review. I have entered a No Objection ballot for this document.

Lars


> On 2022-5-11, at 4:44, Dale Worley via Datatracker <noreply@ietf.org> wrote:
> 
> Reviewer: Dale Worley
> Review result: Ready with Nits
> 
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair.  Please treat these comments just
> like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>.
> 
> Document:  draft-ietf-opsawg-l2nm-15
> Reviewer:  Dale R. Worley
> Review Date:  2022-05-10
> IETF LC End Date:  2022-05-13
> IESG Telechat date:  [not known]
> 
> I have not checked the Yang module itself, as the Yang Doctors will do
> a better job than I can.  Similarly, I have assumed that the specific
> information required for configuring VPNs has been set correctly by
> the members of the working group.  I have reviewed it from the point
> of view that I am qualified to, a reader with beginning knowledge
> about VPNs and Yang learning more about the subject.
> 
> Summary:
> 
>    This draft is basically ready for publication, but has nits that
>    should be fixed before publication.
> 
> Nits/editorial comments:
> 
> 2.  Terminology
> 
> Clarifying the wording here so as to make clear the relationships
> between these concepts would ease the learning curve for the
> inexperienced.  For example,
> 
>   VPN node:  Is an abstraction that represents a set of policies
>      applied on a PE and belonging to a single VPN service.
> 
> This is likely known in the VPN community, but I'm having a problem
> following it:  What exactly is a PE, or rather, what is its conceptual
> scope?  A "Customer Edge-to-Provider Edge attachment circuit" is clear
> to the naive, because it's the tangible thing that connects the
> customer to the service provider.  That suggests that the CE is the
> logical entity on the customer end of the attachment, and similarly
> the PE.  But is the PE unique to the attachment circuit, and thus the
> VPN has a lot of PEs that it interconnects, or is there a single PE in
> the VPN?
> 
> Also, is there only one VPN node that is applied to any one PE, or can
> there be many?  This determines whether VPN nodes are one-to-one with
> PEs or whether they may have a wider scope.  It seems to be known that
> a VPN can have multiple VPN nodes, but that isn't stated in the
> definition either.
> 
>   VPN network access:  [...]
> 
>      A reference to the bearer is maintained to allow keeping the link
>      between the L2SM and the L2NM when both data models are used in a
>      given deployment.
> 
> This sentence is correct, but it doesn't seem to belong in this
> location, as it seems to describe an aspect of the data concerning an
> attachment circuit, whereas "VPN network access" is an abstraction of
> just one end of an attachment circuit.  Or does the conceptual model
> not have an abstraction of the other end of attachment circuits, thus
> allowing the network interface and the attachment circuit to be
> conflated, and thus the reference to the bearer can be considered to
> be a property of the VPN network access?
> 
> 4.  Reference Architecture
> 
> In Figure 1, some of the module names are missing the initial "ietf-".
> 
> The bottom section of Figure 1 is:
> 
>    +------+  Bearer    +------+      +------+         +------+
>    | CE A + ---------- + PE A +      + PE B + ------- + CE B |
>    +------+ Connection +------+      +------+         +------+
> 
>               Site A                           Site B
> 
> Shouldn't there be some indication of connection between PE A and PE
> B?
> 
> Also, it's not clear why this set of boxes is integrated with the rest
> of Figure 1, as the lines in the figure don't seem to show any
> particular connection between these four boxes and the boxes above
> them.  This segment seems to be a generic VPN between two sites, but
> "Site A" and "Site B" don't seem to be referenced elsewhere.
> 
> If the intention is that "Network" embraces all 4 of these boxes, then
> the ends of the dashed line above "Network" need to be aligned with
> the left and right edges of the sites, and possibly some "|" added to
> show the various interconnections, perhaps in this style:
> 
>               +----+----+   |                   |
>               | Config  |   |                   |
>               | Manager |   |                   |
>               +----+----+   |                   |
>                    |        |                   |
>                    | NETCONF/CLI..................
>                    |        |                   |
>    +---------------------------------------------------------+
>    |                            Network                      |
> 
>    +------+  Bearer    +------+      +------+         +------+
>    | CE A + ---------- + PE A +======+ PE B + ------- + CE B |
>    +------+ Connection +------+      +------+         +------+
> 
>               Site A                           Site B
> 
> But if you want to emphasize that L2NM only describes the part of the
> network between the PE's, you could do something like this:
> 
>               +----+----+   |                   |
>               | Config  |   |                   |
>               | Manager |   |                   |
>               +----+----+   |                   |
>                    |        |                   |
>                    | NETCONF/CLI..................
>                    |        |                   |
>                  +-------------------------------+
>                  |              Network          |
> 
>    +------+ Bearer     +------+      +------+ Bearer  +------+
>    | CE A + ---------- + PE A +======+ PE B + ------- + CE B |
>    +------+ Conn.      +------+      +------+ Conn.   +------+
> 
>               Site A                           Site B
> 
> 7.2.  VPN Profiles
> 
>   The 'vpn-profiles' container (Figure 5) is used by a VPN service
>   provider to define and maintain a set of VPN profiles [RFC9181] that
>   apply to one or several VPN services.
> 
>   This document does not make any assumption about the exact definition
>   of these profiles.
> 
> I am having a hard time understanding what is intended.  The first
> sentence says that the container provides a way to define profiles,
> but the rest of the document doesn't provide any way to define the
> profiles.  Is the intended meaning that the container lists the names
> of profiles that are defined somewhere else, so that once the names
> are listed in the container, the profiles can be referenced in the
> definitions of services?  Or is there an implication that additional
> Yang nodes can be added in vpn-profiles to provide the definitions?
> 
> In addition, despite the phrasing, there seems to be no constraint
> that a particular profile is in fact applied to one or several
> services.  Is the intended meaning that the listed profiles *can be
> applied* to services?
> 
> 8.1.  IANA BGP Layer 2 Encapsulation Types
> 
>       description
>         "ATM transparent cell transport";
> 
> For consistency with the other items, there should be a "." at the end
> of the description.
> 
> 10.1.  YANG Modules
> 
> Perhaps this section would better be named "Registrations".
> 
> 10.2.  BGP Layer 2 Encapsulation Types
> 
> There are a number of ways the wording of this section could be
> improved.
> 
>   This document defines the initial version of the IANA-maintained
>   "iana-bgp-l2-encaps" YANG module (Section 8.1).  IANA is requested to
>   add this note for both modules:
> 
> "both modules" isn't correct here, as only one module has been
> mentioned by this point in the section.
> 
>      BGP Layer 2 encapsulation types must not be directly added to the
>      "iana-bgp-l2-encaps" YANG module.  They must instead be
>      respectively added to the "BGP Layer 2 Encapsulation Types"
>      registry [IANA-BGP-L2].
> 
> It's not clear what the word "respectively" means in this context.
> It would be clearer if the second sentence was expanded to:
> 
>      BGP Layer 2 encapsulation types must not be directly added to
>      the "iana-bgp-l2-encaps" YANG module.  They must instead be
>      added to the "BGP Layer 2 Encapsulation Types" registry
>      [IANA-BGP-L2], and then a derived identity added to
>      "iana-bgp-l2-encaps".
> 
> --
> 
>   The name of the
>   "identity" is the lower-case of the encapsulation name provided in
>   the description.
> 
> "the description" is ambiguous here; you mean "the description in the
> registry".
> 
> But for most of the existing encapsulation types, the identity name is
> not, strictly speaking, the lower-case of the encapsulation name in
> the registry, but rather something similar.  Suitable wording could be
> "a lower-case version of the encapsulation name".
> 
>   "reference":   Replicates the reference from the registry and add the
>                  title of the document.
> 
> Possibly better phrased "Replicates the reference from the registry
> with the title of the document added."
> 
> 10.3.  Pseudowire Types
> 
> Similar nits as for section 10.2.
> 
> A.4.  VPWS-EVPN Service Instance
> 
> Figure 29 would be clearer if a little more space was used to separate
> "ESI{1,2}" from the network elements.
> 
> 
>                      |<-------- EVPN Instance --------->|
>                      |                                  |
>                |     V                                  V  |
>                |     +-----+   +--------------+   +-----+  |
>         +----+ |     | PE1 |===|              |===| PE3 |  |    +----+
>         |    +-------+     |   |              |   |     +-------+    |
>         |    | |     +-----+   |              |   +-----+  |    |    |
>         | CE1| |               |     Core     |            |    |CE2 |
>         |    | |     +-----+   |              |   +-----+  |    |    |
>         |    +-------+     |   |              |   |     +-------+    |
>         +----+ |     | PE2 |===|              |===| PE4 |  |    +----+
>              ^ |     +-----+   +--------------+   +-----+  |    ^
>              | |                                           |    |
>              |  ESI1                                       ESI2 |
>              |                                                  |
>              |<-------------- Emulated Service ---------------->|
> 
>                     Figure 29: An Example of VPWS-EVPN
> 
> 
> A.5.  Automatic ESI Assignment
> 
> Figure 32 would be a little clearer if "LACP" was moved down a line
> (in parallel with how ES is raised a line).
> 
>              ES
>              |     +-----+      +--------------+   +-----+
>       +----+ |     | PE1 |======|              |===| PE3 |       +----+
>       |    +-------+     |      |              |   |     +-------+ CE3|
>       |    | |     +-----+      |              |   +-----+       +----+
>       | CE1| |                  |     Core     |
>       |    | |     +-----+      |              |   +-----+       +----+
>       |    +-------+     |      |              |   |     +-------+ CE2|
>       +----+ |     | PE2 |======|              |===| PE4 |       +----+
>              |     +-----+      +--------------+   +-----+
>            LACP
> 
>           Figure 32: An Example of Automatic ESI Assignment
> 
> [END]
> 
> 
> 
> --
> last-call mailing list
> last-call@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call