Re: [Gen-art] [Last-Call] Genart last call review of draft-ietf-opsawg-l2nm-15
Lars Eggert <lars@eggert.org> Mon, 30 May 2022 10:11 UTC
Return-Path: <lars@eggert.org>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26E4AC15BFF3; Mon, 30 May 2022 03:11:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.109
X-Spam-Level:
X-Spam-Status: No, score=-7.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eggert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cwm2sA61W22V; Mon, 30 May 2022 03:11:34 -0700 (PDT)
Received: from mail.eggert.org (mail.eggert.org [91.190.195.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE120C15BFF1; Mon, 30 May 2022 03:11:33 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2a00:ac00:4000:400:f819:17d2:74e:ec1c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.eggert.org (Postfix) with ESMTPSA id 3B0781D2D9D; Mon, 30 May 2022 13:11:18 +0300 (EEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=eggert.org; s=dkim; t=1653905478; bh=bysWZcEmF37OyWt5qiddADulmtvpCNYWHS3HebB9MI0=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=vrGfmVVycZMygbTKLreVZG5j1Mgh/hdmvKiabsg+WgTDxf7yLuAu4HLmnUWPpr+66 PwZbGdyXkA8iuqNPG6Y3pAWPBb8CaakXb16DEKfukLnf93XYfJfS+/99nI+ftZRLMO UiHbMvkpAaBlf7phE23zszT03ae+l2M57Dk23iR0=
Content-Type: multipart/signed; boundary="Apple-Mail=_52C27ADB-66CE-4EC4-AC95-308EDAF39CDE"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.100.31\))
From: Lars Eggert <lars@eggert.org>
In-Reply-To: <165223349452.32947.16768955581927525076@ietfa.amsl.com>
Date: Mon, 30 May 2022 13:11:07 +0300
Cc: gen-art@ietf.org, draft-ietf-opsawg-l2nm.all@ietf.org, last-call@ietf.org, opsawg@ietf.org
Message-Id: <E09F735A-F37B-4211-988B-14B22BF05BBF@eggert.org>
References: <165223349452.32947.16768955581927525076@ietfa.amsl.com>
To: Dale Worley <worley@ariadne.com>
X-MailScanner-ID: 3B0781D2D9D.AB036
X-MailScanner: Not scanned: please contact your Internet E-Mail Service Provider for details
X-MailScanner-From: lars@eggert.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/JbinGT63l_KrHJ_uKbsH5WIl8UE>
Subject: Re: [Gen-art] [Last-Call] Genart last call review of draft-ietf-opsawg-l2nm-15
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 May 2022 10:11:38 -0000
Dale, thank you for your review. I have entered a No Objection ballot for this document. Lars > On 2022-5-11, at 4:44, Dale Worley via Datatracker <noreply@ietf.org> wrote: > > Reviewer: Dale Worley > Review result: Ready with Nits > > I am the assigned Gen-ART reviewer for this draft. The General Area > Review Team (Gen-ART) reviews all IETF documents being processed > by the IESG for the IETF Chair. Please treat these comments just > like any other last call comments. > > For more information, please see the FAQ at > > <https://trac.ietf.org/trac/gen/wiki/GenArtfaq>. > > Document: draft-ietf-opsawg-l2nm-15 > Reviewer: Dale R. Worley > Review Date: 2022-05-10 > IETF LC End Date: 2022-05-13 > IESG Telechat date: [not known] > > I have not checked the Yang module itself, as the Yang Doctors will do > a better job than I can. Similarly, I have assumed that the specific > information required for configuring VPNs has been set correctly by > the members of the working group. I have reviewed it from the point > of view that I am qualified to, a reader with beginning knowledge > about VPNs and Yang learning more about the subject. > > Summary: > > This draft is basically ready for publication, but has nits that > should be fixed before publication. > > Nits/editorial comments: > > 2. Terminology > > Clarifying the wording here so as to make clear the relationships > between these concepts would ease the learning curve for the > inexperienced. For example, > > VPN node: Is an abstraction that represents a set of policies > applied on a PE and belonging to a single VPN service. > > This is likely known in the VPN community, but I'm having a problem > following it: What exactly is a PE, or rather, what is its conceptual > scope? A "Customer Edge-to-Provider Edge attachment circuit" is clear > to the naive, because it's the tangible thing that connects the > customer to the service provider. That suggests that the CE is the > logical entity on the customer end of the attachment, and similarly > the PE. But is the PE unique to the attachment circuit, and thus the > VPN has a lot of PEs that it interconnects, or is there a single PE in > the VPN? > > Also, is there only one VPN node that is applied to any one PE, or can > there be many? This determines whether VPN nodes are one-to-one with > PEs or whether they may have a wider scope. It seems to be known that > a VPN can have multiple VPN nodes, but that isn't stated in the > definition either. > > VPN network access: [...] > > A reference to the bearer is maintained to allow keeping the link > between the L2SM and the L2NM when both data models are used in a > given deployment. > > This sentence is correct, but it doesn't seem to belong in this > location, as it seems to describe an aspect of the data concerning an > attachment circuit, whereas "VPN network access" is an abstraction of > just one end of an attachment circuit. Or does the conceptual model > not have an abstraction of the other end of attachment circuits, thus > allowing the network interface and the attachment circuit to be > conflated, and thus the reference to the bearer can be considered to > be a property of the VPN network access? > > 4. Reference Architecture > > In Figure 1, some of the module names are missing the initial "ietf-". > > The bottom section of Figure 1 is: > > +------+ Bearer +------+ +------+ +------+ > | CE A + ---------- + PE A + + PE B + ------- + CE B | > +------+ Connection +------+ +------+ +------+ > > Site A Site B > > Shouldn't there be some indication of connection between PE A and PE > B? > > Also, it's not clear why this set of boxes is integrated with the rest > of Figure 1, as the lines in the figure don't seem to show any > particular connection between these four boxes and the boxes above > them. This segment seems to be a generic VPN between two sites, but > "Site A" and "Site B" don't seem to be referenced elsewhere. > > If the intention is that "Network" embraces all 4 of these boxes, then > the ends of the dashed line above "Network" need to be aligned with > the left and right edges of the sites, and possibly some "|" added to > show the various interconnections, perhaps in this style: > > +----+----+ | | > | Config | | | > | Manager | | | > +----+----+ | | > | | | > | NETCONF/CLI.................. > | | | > +---------------------------------------------------------+ > | Network | > > +------+ Bearer +------+ +------+ +------+ > | CE A + ---------- + PE A +======+ PE B + ------- + CE B | > +------+ Connection +------+ +------+ +------+ > > Site A Site B > > But if you want to emphasize that L2NM only describes the part of the > network between the PE's, you could do something like this: > > +----+----+ | | > | Config | | | > | Manager | | | > +----+----+ | | > | | | > | NETCONF/CLI.................. > | | | > +-------------------------------+ > | Network | > > +------+ Bearer +------+ +------+ Bearer +------+ > | CE A + ---------- + PE A +======+ PE B + ------- + CE B | > +------+ Conn. +------+ +------+ Conn. +------+ > > Site A Site B > > 7.2. VPN Profiles > > The 'vpn-profiles' container (Figure 5) is used by a VPN service > provider to define and maintain a set of VPN profiles [RFC9181] that > apply to one or several VPN services. > > This document does not make any assumption about the exact definition > of these profiles. > > I am having a hard time understanding what is intended. The first > sentence says that the container provides a way to define profiles, > but the rest of the document doesn't provide any way to define the > profiles. Is the intended meaning that the container lists the names > of profiles that are defined somewhere else, so that once the names > are listed in the container, the profiles can be referenced in the > definitions of services? Or is there an implication that additional > Yang nodes can be added in vpn-profiles to provide the definitions? > > In addition, despite the phrasing, there seems to be no constraint > that a particular profile is in fact applied to one or several > services. Is the intended meaning that the listed profiles *can be > applied* to services? > > 8.1. IANA BGP Layer 2 Encapsulation Types > > description > "ATM transparent cell transport"; > > For consistency with the other items, there should be a "." at the end > of the description. > > 10.1. YANG Modules > > Perhaps this section would better be named "Registrations". > > 10.2. BGP Layer 2 Encapsulation Types > > There are a number of ways the wording of this section could be > improved. > > This document defines the initial version of the IANA-maintained > "iana-bgp-l2-encaps" YANG module (Section 8.1). IANA is requested to > add this note for both modules: > > "both modules" isn't correct here, as only one module has been > mentioned by this point in the section. > > BGP Layer 2 encapsulation types must not be directly added to the > "iana-bgp-l2-encaps" YANG module. They must instead be > respectively added to the "BGP Layer 2 Encapsulation Types" > registry [IANA-BGP-L2]. > > It's not clear what the word "respectively" means in this context. > It would be clearer if the second sentence was expanded to: > > BGP Layer 2 encapsulation types must not be directly added to > the "iana-bgp-l2-encaps" YANG module. They must instead be > added to the "BGP Layer 2 Encapsulation Types" registry > [IANA-BGP-L2], and then a derived identity added to > "iana-bgp-l2-encaps". > > -- > > The name of the > "identity" is the lower-case of the encapsulation name provided in > the description. > > "the description" is ambiguous here; you mean "the description in the > registry". > > But for most of the existing encapsulation types, the identity name is > not, strictly speaking, the lower-case of the encapsulation name in > the registry, but rather something similar. Suitable wording could be > "a lower-case version of the encapsulation name". > > "reference": Replicates the reference from the registry and add the > title of the document. > > Possibly better phrased "Replicates the reference from the registry > with the title of the document added." > > 10.3. Pseudowire Types > > Similar nits as for section 10.2. > > A.4. VPWS-EVPN Service Instance > > Figure 29 would be clearer if a little more space was used to separate > "ESI{1,2}" from the network elements. > > > |<-------- EVPN Instance --------->| > | | > | V V | > | +-----+ +--------------+ +-----+ | > +----+ | | PE1 |===| |===| PE3 | | +----+ > | +-------+ | | | | +-------+ | > | | | +-----+ | | +-----+ | | | > | CE1| | | Core | | |CE2 | > | | | +-----+ | | +-----+ | | | > | +-------+ | | | | +-------+ | > +----+ | | PE2 |===| |===| PE4 | | +----+ > ^ | +-----+ +--------------+ +-----+ | ^ > | | | | > | ESI1 ESI2 | > | | > |<-------------- Emulated Service ---------------->| > > Figure 29: An Example of VPWS-EVPN > > > A.5. Automatic ESI Assignment > > Figure 32 would be a little clearer if "LACP" was moved down a line > (in parallel with how ES is raised a line). > > ES > | +-----+ +--------------+ +-----+ > +----+ | | PE1 |======| |===| PE3 | +----+ > | +-------+ | | | | +-------+ CE3| > | | | +-----+ | | +-----+ +----+ > | CE1| | | Core | > | | | +-----+ | | +-----+ +----+ > | +-------+ | | | | +-------+ CE2| > +----+ | | PE2 |======| |===| PE4 | +----+ > | +-----+ +--------------+ +-----+ > LACP > > Figure 32: An Example of Automatic ESI Assignment > > [END] > > > > -- > last-call mailing list > last-call@ietf.org > https://www.ietf.org/mailman/listinfo/last-call
- [Gen-art] Genart last call review of draft-ietf-o… Dale Worley via Datatracker
- Re: [Gen-art] Genart last call review of draft-ie… mohamed.boucadair
- Re: [Gen-art] [Last-Call] Genart last call review… Lars Eggert