Re: [I2nsf] [Last-Call] Yangdoctors last call review of draft-ietf-i2nsf-sdn-ipsec-flow-protection-08

tom petch <daedulus@btconnect.com> Wed, 30 September 2020 16:31 UTC

Return-Path: <daedulus@btconnect.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFEB83A0B38; Wed, 30 Sep 2020 09:31:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.113
X-Spam-Level:
X-Spam-Status: No, score=-2.113 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.213, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JiYVkZdLL1oB; Wed, 30 Sep 2020 09:31:21 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80108.outbound.protection.outlook.com [40.107.8.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 404D43A0B20; Wed, 30 Sep 2020 09:31:20 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dPh95oU1hXt/02i5Ju84TTaGFp+0zsWZw4o2YDI5zZ98xOrJvKrIQDe0OQyIwXQHSo0HnCh4sF17MblJyouwEjAhAd5fFR2DKNRzt/tmapATcYfVNJTcn5ZJfByD2GzaxJzmceh34uJWUXofnR4eU4IlwSBoCs7AAT91L7vxxwUUvfBjRFiTvZUJQpDncEXBHrAZ4IEtG9s9ROYCRJjbCKviCkSyGbifqHFjMj+t6Co6wxDvIL+1LkBf0ngIJ5VQ9sPQZ1XBeCioCD8g54GhKGsVjx6WgVzdX8loaSPqJRtBMiiWbboTaww3KwsZ7unr3vXGQtuYiuxNGvoABhpfqQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fmZrr1ou4oyKJKsPu4kLa35P9hFaV1bD3/Fab2RxPDY=; b=gZRcBa5aH7HdiO7VznEUx4Uk0LyreOAEmfjW28kI809hkAugyXOVibR/IeymzU6JbnLfRfiajuu8AIJ/kQsgEIpyqhweAgI3dR+Fr9Zi2e6L8bAQvBA8v+rBdJB5fKLGrBvmo09orXwV7t+3dyK3AlgDBGyvCaTRa1Z9jIikd42Jvv24JZA34YUnaoHcOuJ4VNzOUa74mgf4HveDkVJG/5VfQhGKyQYYUcIFk5j5aG+8552xVo4acEDw4f1q50i0hlCaaj2fkimy3fxZ/nxHkVd6xijG4m8sJvl3Uobat3pJWYOdcPeG60JI6U5kq2UoJZAOV/LuUWG5/dbUN8Aljg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=btconnect.com; dmarc=pass action=none header.from=btconnect.com; dkim=pass header.d=btconnect.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector2-btconnect-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fmZrr1ou4oyKJKsPu4kLa35P9hFaV1bD3/Fab2RxPDY=; b=DlezutxnhXohWVUDWekOEm59QR3lZ9wP9Rj+OsD7i2prG5x7dUyk7WAFbgOyhfhpyMByzJSyyGoWk8b3t5emy0dQJv+7EZyHI6kasiKCK8/ysHDkYGD1z4WWS0GcCSmCQMxWPGod0dhW6n4TGZN+Ut5F8OsJvDn2jGp0Z7ER+gQ=
Authentication-Results: 4668.se; dkim=none (message not signed) header.d=none;4668.se; dmarc=none action=none header.from=btconnect.com;
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8) by VI1PR0701MB2718.eurprd07.prod.outlook.com (2603:10a6:801:b::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.13; Wed, 30 Sep 2020 16:31:13 +0000
Received: from VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::6165:9c1c:e5b1:15db]) by VI1PR07MB6704.eurprd07.prod.outlook.com ([fe80::6165:9c1c:e5b1:15db%4]) with mapi id 15.20.3433.030; Wed, 30 Sep 2020 16:31:13 +0000
To: Rafa Marin-Lopez <rafa@um.es>
References: <159827985531.30993.17722282912726281276@ietfa.amsl.com> <D25A15B0-B714-407C-B119-F83B634099D4@chopps.org> <MN2PR11MB43668FA513A764EA0514790BB53B0@MN2PR11MB4366.namprd11.prod.outlook.com> <27C522C8-53E3-40EF-ADD7-5B2F84FFCF83@um.es> <MN2PR11MB4366E30B3C372D13B391AE07B53B0@MN2PR11MB4366.namprd11.prod.outlook.com> <2B88888E-A264-4D81-A8DA-9C6225E83E0E@um.es> <MN2PR11MB4366119EA0904BF1076AD896B5380@MN2PR11MB4366.namprd11.prod.outlook.com> <5F6B2757.9010804@btconnect.com> <4DDFB9F6-DA2D-4E77-8987-010FDBFAD018@um.es> <5F71ADF6.8020900@btconnect.com> <8AA79D47-C067-4249-B665-37644301657C@um.es>
Cc: "Rob Wilton (rwilton)" <rwilton=40cisco.com@dmarc.ietf.org>, Christian Hopps <chopps@chopps.org>, "i2nsf@ietf.org" <i2nsf@ietf.org>, Gabriel Lopez <gabilm@um.es>, "draft-ietf-i2nsf-sdn-ipsec-flow-protection.all@ietf.org" <draft-ietf-i2nsf-sdn-ipsec-flow-protection.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, Martin Björklund <mbj+ietf@4668.se>
From: tom petch <daedulus@btconnect.com>
Message-ID: <5F74B2CD.5060402@btconnect.com>
Date: Wed, 30 Sep 2020 17:31:09 +0100
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
In-Reply-To: <8AA79D47-C067-4249-B665-37644301657C@um.es>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [86.146.121.140]
X-ClientProxiedBy: LO2P265CA0104.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:c::20) To VI1PR07MB6704.eurprd07.prod.outlook.com (2603:10a6:800:18b::8)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [192.168.1.65] (86.146.121.140) by LO2P265CA0104.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:c::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.3412.20 via Frontend Transport; Wed, 30 Sep 2020 16:31:12 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 0771671e-2268-4c60-86a6-08d8655e3ef4
X-MS-TrafficTypeDiagnostic: VI1PR0701MB2718:
X-Microsoft-Antispam-PRVS: <VI1PR0701MB27186B134AD9C7E2CB6BAB57C6330@VI1PR0701MB2718.eurprd07.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:6430;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 4QPEB/1pl5jkF6gdGe6R0QSYloq6Vxh5b+0DY1dN1W12os/9WE27DZBBcuFa2U63HgZ+qNVxiVXyVQQsGXdvK6q44vjnvO+mOsRaZ3R/8wo96t7/Ru6QWGYjsriM6uBE8IEZV1F83hfCbL5atZInwbM1eAofzLZasWrDh3K2joXxIBhV0eZ96BWk+5ajbI+wYtaHW30uSmTlt5jCGYW4GybAwYooTkN39YP4lV1+O/yNFYqBNhvjjeGpZDClbnIq9PnWmDh+6ESYpxXZBTR6GAv/pzlSROmoIHKJLdLkEPAhp+E0ypzwqGlaF+B9OpncM63oSHXjy/dYLC7HMKc1KQ==
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR07MB6704.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(39860400002)(376002)(346002)(366004)(136003)(87266011)(86362001)(6916009)(2906002)(52116002)(8676002)(478600001)(8936002)(6666004)(6486002)(83380400001)(66574015)(36756003)(33656002)(4326008)(316002)(16576012)(26005)(66946007)(16526019)(66556008)(66476007)(956004)(5660300002)(186003)(54906003)(30864003)(2616005)(53546011); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData: 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
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0771671e-2268-4c60-86a6-08d8655e3ef4
X-MS-Exchange-CrossTenant-AuthSource: VI1PR07MB6704.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Sep 2020 16:31:13.3077 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: CJ+kJsob91wpvbaIg2V8EWSqlvwUe3WuM2NGlQ6vWQXGKrNNahgrlzJgt6jGyCg+s3yOfs46+ZMWyyz/GIxWpw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0701MB2718
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/h0WvKXvaOh0wxNnEuSNQClH7e-s>
Subject: Re: [I2nsf] [Last-Call] Yangdoctors last call review of draft-ietf-i2nsf-sdn-ipsec-flow-protection-08
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Sep 2020 16:31:24 -0000

On 29/09/2020 17:14, Rafa Marin-Lopez wrote:
> Hi Tom:
>
> Please see our comments inline:
>
>> El 28 sept 2020, a las 11:33, tom petch <daedulus@btconnect.com> escribió:
>>
>> On 28/09/2020 10:01, Rafa Marin-Lopez wrote:
>>> Hi Rob, Tom:
>>>
>>> Renaming the modules sounds reasonable. With regard to have a different prefix, it is also ok. Perhaps the easiest way is to solve this is the following: instead of using -sdn- we could include -i2nsf- so we would have: ietf-i2nsf-common, ietf-i2nsf-ike, and ietf-i2nsf-ikeless. This would mean that this is in the context of i2nsf wg.
>>>
>>> What do you think?
>>
>> Ok with -ike and -ikeless
>
> Great.
>
>> but I would not use ietf-i2nsf-common the reason being that there is an awful lot in common across the different i2nsf I-D that with hindsight would have made an excellent common i2nsf module and may be will in future if these modules get revised.
>
> We agree.
>> Other WG have created 'common' or 'types' modules, with more of the latter and then abbreviated that to 't' or 'c' so perhaps ietf-i2nsf-iket, or -ikec.
>
> Ok about ietf-i2nsf-ikec.
>
>
>> Prefix ahould be short so something like nsfike, nsfikeless (longer than I would like - nsfiken?) and nsfiket, or nsfikec.
>
> For the prefix to the common module
>
> prefix "nsfikec";
>
>
> For the prefix to the ietf-i2nsf-ike, nsfike seems to refer to IKE case , which is good.
>
> prefix "nsfike”;
>
> For the prefix to the ietf-i2nsf-ikeless, nsfikeless (a shorter one could be nsfikels but we do not know if that is acceptable) has a clear meaning and it is coherent with the rest of the names. I think we can live with a few letters more.
>
> Is this acceptable?

Yes, although I think that a shorter prefix for ikeless might be better. 
  YANG Guidelines does not give a figure but I mentally think going over 
six can be problematic.  There aren't any instances in the module at 
present but it is when you need to refer to an object (e.g. in a 
constraint, notification, augment) and the absolute form of reference is 
needed or recommended and the object is several layers down.  I see six 
layers in ikeless so a ten character prefix would add 60 characters of 
red tape, a six character on 36 characters.  Currently you do not have 
such references.  (I have been looking at CCAMP lately and they go 17 
layers down - fortunately the prefix are mostly two or three character 
but even so, it does make the YANG harder to follow for me; the path for 
a YANG augment or a when can spread over seven lines).

Tom Petch

> Best Regards.
>
>>
>> Tom Petch
>>
>>>> El 23 sept 2020, a las 12:45, tom petch <daedulus@btconnect.com <mailto:daedulus@btconnect.com>> escribió:
>>>>
>>>> On 23/09/2020 11:24, Rob Wilton (rwilton) wrote:
>>>>> Hi Rafa,
>>>>>
>>>>> Thanks for replying with the extra background information.
>>>>>
>>>>> It seems like renaming the modules, as you propose for the -09 version, is the pragmatic path forward here.
>>>>
>>>> And the namespace and the YANG prefix IMHO.  Having ike as a prrefix for a module which is not the 'ike' module I see as a source of confusion. If this is nsf specific, then I would suggest nsfike although nsfikeless then seems a bit long.
>>>>
>>>> Tom Petch
>>>>
>>>>> Regards,
>>>>> Rob
>>>>>
>>>>>
>>>>> From: Rafa Marin-Lopez <rafa@um.es <mailto:rafa@um.es>>
>>>>> Sent: 23 September 2020 10:29
>>>>>
>>>>> Hi Rob, (Chris):
>>>>>
>>>>> Thank you very much for your answers. Please see our comments inline.
>>>>>
>>>>>
>>>>> El 22 sept 2020, a las 17:38, Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org <mailto:rwilton=40cisco.com@dmarc.ietf.org><mailto:rwilton=40cisco.com@dmarc.ietf.org <mailto:rwilton=40cisco.com@dmarc.ietf.org>>> escribió:
>>>>>
>>>>> Hi Rafa,
>>>>>
>>>>> Thanks for getting back to me.
>>>>>
>>>>> Yes, changing the name of the module is an okay, if not ideal, resolution.  But I appreciate that you also want to be done with this work.
>>>>>
>>>>> Correct, especially at this point of time. We have been discussing this I-D for a long time. There was a consensus in the WG. I2NSF WG chairs can comment about this. In our opinion, the changes that need to be applied are major changes from what it was approved in the WG. However, this is coming in the “last minute” and we feel this is not merely moving a few lines from here to there. We need to understand the impact of this. Therefore, it is not so trivial as it may seem. See below.
>>>>>
>>>>> But I would like to check:  My understanding is that the changes that Chris is proposing are pretty small.  I.e. move the SA structure under ipsec-common, and put it under a YANG feature.  Are you sure that it is impractical to accommodate this change which would allow a single ipsec module to be shared and extended via YANG augmentations?
>>>>>
>>>>> In the context of our I-D, if we move SAD structure to ipsec-common, what we are meaning is that IPsec SA configuration data (setting values to the SAD structure) are common to the IKE case and the IKE-less cases, which are not. It is confusing. Moreover, the usage of feature means that, after all, this “common” is not “common” to both cases IKE case and IKE-less. Again, it seems confusing. In the IKE case, the SDN/I2NSF controller does not configure the SAD at all but the IKE implementation in the NSF. In our opinion, in order to properly add this IPsec SA operational state to the IKE case we should include operational data about the IPsec SAs (config false) to the ietf-ipsec-ike. Alternatively, we have certain operational data (ro) in the SAD structure in the IKE-less case. If only those are moved to the common part should be ok but we think it does not solve the problem.
>>>>>
>>>>> Therefore it is not only an implementation aspect.
>>>>>
>>>>> As you may observe, our discussion is taking into account there is an I2NSF Controller and we have two cases IKE case and IKE-less case, that have been discussed in the WG. The YANG model in the I-D has tried to reflect this discussion. It was never the intention to provide a general YANG model for IPsec.
>>>>>
>>>>> Best Regards.
>>>>>
>>>>> Thanks,
>>>>> Rob
>>>>>
>>>>> From: Rafa Marin-Lopez <rafa@um.es <mailto:rafa@um.es><mailto:rafa@um.es <mailto:rafa@um.es>>>
>>>>> Sent: 22 September 2020 14:05
>>>>> Subject: Re: [yang-doctors] Yangdoctors last call review of draft-ietf-i2nsf-sdn-ipsec-flow-protection-08
>>>>>
>>>>> Dear Rob:
>>>>>
>>>>> Apologies for our delayed answer. We are now working in the revision to submit v09 by compiling all the comments.
>>>>>
>>>>> As you mentioned, we want to avoid any further delay. As we mentioned to Chris in the past (i2nsf mailing list), we do not have any problem to include some additional text (e.g. “-sdn-" in the module names). Therefore, Rob, we agree with your point of view about this.
>>>>>
>>>>> In summary, we are working in the next revision v09, and our idea to address Chris’ comments was to include -sdn- to the module names.
>>>>>
>>>>> We hope this is fine.
>>>>>
>>>>> Best regards.
>>>>>
>>>>>
>>>>>
>>>>> El 22 sept 2020, a las 13:56, Rob Wilton (rwilton) <rwilton@cisco.com <mailto:rwilton@cisco.com><mailto:rwilton@cisco.com <mailto:rwilton@cisco.com>>> escribió:
>>>>>
>>>>> Hi draft authors, Chris,
>>>>>
>>>>> Can we also please try and close on this issue raised by Chris.
>>>>>
>>>>> Chris, I don’t think that there is any great way to solve this issue using YANG features, but presumably the constraint could be enforced with a must statement, or groupings could be used to copy parts of the ipsec structure into an sdn specific ipsec tree structure.
>>>>>
>>>>> I understand that there isn't any great desire to delay these drafts by trying to generalize the ipsec YANG model contained within it.  However, I think that means that the modules should have "-sdn-" in their names to indicate that they are intended specifically for the SDN use case, and should not be confused with the more generic ipsec YANG modules that have been proposed.
>>>>>
>>>>> Regards,
>>>>> Rob
>>>>>
>>>>> -----Original Message-----
>>>>> From: yang-doctors <yang-doctors-bounces@ietf.org <mailto:yang-doctors-bounces@ietf.org><mailto:yang-doctors-bounces@ietf.org <mailto:yang-doctors-bounces@ietf.org>>> On Behalf Of Christian
>>>>> Hopps
>>>>> Sent: 24 August 2020 18:08
>>>>>
>>>>> [adding in ipsec@]
>>>>>
>>>>> Hi,
>>>>>
>>>>> This draft was discussed in ipsecme at the last IETF, and there was a
>>>>> desire to look closer at a couple changes that would make these models
>>>>> usable by ipsec generally rather than only for SDNs. Otherwise we will end
>>>>> up with 2 models that look very similar and duplicate almost all the
>>>>> functionality. This was going to be done during the next yang doctor
>>>>> review, but it looks like that happened in the meantime (ships in the
>>>>> night).
>>>>>
>>>>> At minimum the module names should include "-sdn-" if no other changes are
>>>>> made to indicate that they are only for sdn use; however, this is not the
>>>>> optimal solution.
>>>>>
>>>>> A better solution would be to move the containers currently under ikeless
>>>>> (for SA and Policy databases) under ipsec-common.
>>>>>
>>>>> The feedback I received from the authors was that the SDN controllers
>>>>> didn't care about the actual SAs and policies when using IKE so they
>>>>> didn't want to require someone implementing ike+common modules to have to
>>>>> support them.
>>>>>
>>>>> The YANG question I suppose is, is there an easy way to move these
>>>>> containers from ipsec-ikeless to ipsec-common, but still allow for them to
>>>>> be empty and/or unimplemented for the SDN IKE use case? If they were made
>>>>> features, is there a proper YANG way to indicate that if the ikeless
>>>>> module is present then those features must also be supported thus matching
>>>>> the functionality as defined by the current draft?
>>>>>
>>>>> Thanks,
>>>>> Chris.
>>>>>
>>>>> On Aug 24, 2020, at 10:37 AM, Martin Björklund via Datatracker
>>>>> <noreply@ietf.org <mailto:noreply@ietf.org><mailto:noreply@ietf.org <mailto:noreply@ietf.org>>> wrote:
>>>>>
>>>>> Reviewer: Martin Björklund
>>>>> Review result: Ready with Nits
>>>>>
>>>>> I did an early YANG Doctor's review of this draft.  Most of my
>>>>> comments then have been addressed in this version.
>>>>>
>>>>> Comments:
>>>>>
>>>>> o  As I wrote in my early review, the RFC editor enforces a common
>>>>>   format of YANG modules, so it is better to adhere to this format
>>>>>   before sending the draft to the RFC editor.  Use
>>>>>
>>>>>     pyang -f yang --yang-line-length 69 <FILE>
>>>>>
>>>>>   to get a consistent look-and-feel for your module.
>>>>>
>>>>>   (You will have to manually re-flow description statements after
>>>>>   this.)
>>>>>
>>>>>
>>>>> o  There are some leafs that are optional in the model, but w/o a
>>>>>   default value and w/o an explanation of what happens if that leaf
>>>>>   is not set.  You should find those and either make them mandatory,
>>>>>   add a default value, or explain what it means when it isn't set.
>>>>>   As an example,
>>>>>   /ipsec-ike/pad/pad-entrypeer-authenticatin/pre-shared/secret
>>>>>   is optional.  I suspect that this leaf needs to be mandatory.
>>>>>   Another example is the leaf espencap.
>>>>>
>>>>>
>>>>> /martin
>>>>>
>
> -------------------------------------------------------
> Rafa Marin-Lopez, PhD
> Dept. Information and Communications Engineering (DIIC)
> Faculty of Computer Science-University of Murcia
> 30100 Murcia - Spain
> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
> -------------------------------------------------------
>
>
>
>
>