Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)

Giles Heron <giles.heron@gmail.com> Wed, 25 January 2017 09:30 UTC

Return-Path: <giles.heron@gmail.com>
X-Original-To: i2rs@ietfa.amsl.com
Delivered-To: i2rs@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1CBD129889; Wed, 25 Jan 2017 01:30:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gfRS4ehW_k2d; Wed, 25 Jan 2017 01:30:42 -0800 (PST)
Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DFBF012984A; Wed, 25 Jan 2017 01:30:41 -0800 (PST)
Received: by mail-wm0-x22e.google.com with SMTP id r144so19938115wme.1; Wed, 25 Jan 2017 01:30:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=WBYq2bqr4UQhf+Od12VnOUTcHq/EEGtkOeXTi9snLCQ=; b=uMOR6qjdniEtAkiFIyqQjruH27MMGkpoIwDEYZhQbShDtu/VxlWatkVQmavCUQNwk1 v3c7m5HPprw1+av6vErD0Iko1LUT+XYBNvK72Bx/1mB3zaN/5/xvTt8zrSCTpZO/AeQb QKNX8ur4taRDYTYwiHrLAAm2lcH4gqefRgVAYP/SbHxqz/uJenPTy7lCjSSd1qFijnM7 c81GN057gQ0xbDG9pX74VCll36ZKwRJMhDIqFfMjjyAVqv1fT08Id1IJM5j/MiZ6Gtwh wlMb3wem3/sctmjVzz1+iS5ASBYzXi5/mUOoCrKtu1MHmsWyeKvN3lb0dKvjCES3nHzH qKAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=WBYq2bqr4UQhf+Od12VnOUTcHq/EEGtkOeXTi9snLCQ=; b=iC9T+rwmpxHXUQk1YYJGCVztl9syRIXW1yINSOjmUAeM8NNiNQwwRJWdEECQQEZimO jI9nE9bUHEpD36mBAoVR+Cig/jzUPdxhMCsNYR1e0pfYHVSsjVYMFc3jaNATtcloFlqA Jh3+3yNBDQDz0Q+BUytxmzWRz3MRrH1EvUkj40ydkoZbFalJeA5oA9QNuuJjlaMV7VQx SW7wWIJB/yPZMpyFvbR4aUFWmTcjpiLNZx8ncJLAGDVnUFVFlNGulLSqYEH3BDv37/DC Xic3Oft63vm78c2RJjgfsFBV5bS81MX4cXHX2t357K8nzpW6nAv0DF5eod9dSNyuzOhK v3tw==
X-Gm-Message-State: AIkVDXLgb4y2z63Yyi8oRCdz+n0x3UNZBvTCCxIWt3Bjg6LUphytEuaVQVsMxzeWSWk8SA==
X-Received: by 10.28.140.140 with SMTP id o134mr23439865wmd.87.1485336640312; Wed, 25 Jan 2017 01:30:40 -0800 (PST)
Received: from ams-giheron-8914.cisco.com ([173.38.220.42]) by smtp.gmail.com with ESMTPSA id z134sm30330033wmc.20.2017.01.25.01.30.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 25 Jan 2017 01:30:39 -0800 (PST)
From: Giles Heron <giles.heron@gmail.com>
Message-Id: <1FD0813A-D31B-4BCE-BEBB-54D302F61DA6@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8B89092E-FF72-441D-8E9B-A60A6C8FDFFE"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Date: Wed, 25 Jan 2017 09:30:36 +0000
In-Reply-To: <6a06779b-fa72-c6c9-f9ea-99dc5e32e3a7@cisco.com>
To: Benoit Claise <bclaise@cisco.com>
References: <000701d27594$28d12350$7a7369f0$@ndzh.com> <20170123.194721.1193117831378217486.mbj@tail-f.com> <010a01d275b0$183d7360$48b85a20$@ndzh.com> <20170123.212621.119545616051737472.mbj@tail-f.com> <afdfb4d3-0901-2ee0-8d87-f8f1aeeff37e@hq.sk> <019c01d275c4$edf51f30$c9df5d90$@ndzh.com> <20170123221458.GA34192@elstar.local> <029301d27636$f2514690$d6f3d3b0$@ndzh.com> <20170124115221.GD35835@elstar.local> <87f80f69-5a3c-18a0-8f4f-e560572417e8@kot-begemot.co.uk> <008d01d2766a$5387def0$fa979cd0$@ndzh.com> <7A14208D-2046-4421-AD8A-B8D3CED74D36@lucidvision.com> <6a06779b-fa72-c6c9-f9ea-99dc5e32e3a7@cisco.com>
X-Mailer: Apple Mail (2.3259)
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2rs/S7GO0K7bApH-5L7tU7klTgh88Nk>
Cc: IESG IESG <iesg@ietf.org>, Thomas Nadeau <tnadeau@lucidvision.com>, Anton Ivanov <anton.ivanov@kot-begemot.co.uk>, i2rs@ietf.org
Subject: Re: [i2rs] Kathleen Moriarty's No Objection on draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
X-BeenThere: i2rs@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Interface to The Internet Routing System \(IRS\)" <i2rs.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2rs>, <mailto:i2rs-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2rs/>
List-Post: <mailto:i2rs@ietf.org>
List-Help: <mailto:i2rs-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2rs>, <mailto:i2rs-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Jan 2017 09:30:45 -0000

Hi Benoit

agreed - the model should be independent of the protocol used to access it.

As mentioned earlier on the thread, OpenDaylight has implemented older versions of the model.  Over time I’d expect each service in OpenDaylight that uses the models to upgrade to the upcoming RFC.  In general OpenDaylight implements the models as read-only (i.e. in its operational data-store), though as Robert Varga has noted there’s a case where we use the config data-store for device inventory (longer term that will move to the ietf-network model but not ietf-network-topology - though there might be use cases where you’d have read-write access to ietf-network-topology, e.g when using it to express intent.)

OpenDaylight enables access to topology data using NETCONF and RESTCONF as the north-bound protocoIs are independent of the models accessed.  I believe there has also been some work on using AMQP as a north-bound protocol, and that the Kafka plug-in could be used to send data change notifications for the operational models (so you’d get a message when a link went up or down etc.)   South-bound we have also used ODL to read topology data from a device using NETCONF/YANG (IIRC we showed a demo of this using Homenet running on OpenWrt at IETF a couple of years back).

I’m also working with other groups such as MEF and OpenROADM to leverage the I2RS topology models for their YANG efforts.    So clearly the models need to be used in a non-I2RS environment.

Giles

> On 24 Jan 2017, at 22:04, Benoit Claise <bclaise@cisco.com> wrote:
> 
> Dear all,
> 
> The thread that grows faster than you can read...
> 
> Let me repeat what I mentioned already on the I2RS mailing list:
> This document contains a YANG model, a generic YANG model that could be accessed by NETCONF, RESTCONF, or the future I2RS protocol.
> This document doesn't say (and that would be a mistake IMO if it would) that this YANG model can only be accessed by the I2RS protocol.
> Hence I'm advocating that the security considerations diligently follow https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines <https://trac.ietf.org/trac/ops/wiki/yang-security-guidelines>, and that they don't go in the I2RS protocol specific details.
> This comment was made for draft-ietf-i2rs-yang-network-topo, but is equally applicable to this draft-ietf-i2rs-yang-l3-topology draft.
> I still maintain this point of view: it would be a mistake to limit a data model usage to a particular protocol. These topology documents are not I2RS YANG models, these are YANG models, which can be used in different contexts. I'm very concerned if we start having per-WG or per context data models in the IETF.
> Btw, I haven't seen a RFC specifying what the I2RS protocol is, only the requirements.
> We can't modify the current generic YANG security considerations for an I2RS control plane and a new datastore that are not yet specified. If you want to describe how I2RS will be using those topology YANG models (and any YANG models btw), then it's suitable to include this part of the I2RS protocol spec or part of an I2RS applicability statement. This is typically where you would describe some protocol specific information such as "write contention for two clients writing a node using I2RS priority (linked to I2RS User-ID)". 
> 
> Let me make my point differently. Let's assume for a moment that I2RS needs to use the IETF interface YANG model, does it mean that you will require RFC 7223bis with an updated security considerations? This can't be.
> 
> I still think the generic YANG security guidelines is suitable, as it relates to IETF specified protocols NETCONF and RESTCONF. Addition of some generic information about the data model (not I2RS protocol) might be useful though. For example, text around "there is a risk that a write to a topology may create a looping topology or overload a particular node". Note that I don't think the the security considerations is the best section for this though. 
> 
> Regards, Benoit
>> 	Sue: 
>> 
>> 	The implication of that statement is that actual implementations (like ODL etc) now 
>> need to copy/paste this model without the I2RS text to use them in other ways. This seems
>> strange and just about the most inefficient way to use these that I can think of.
>> 
>> 	—Tom
>> 
>> 
>> 
>>> On Jan 24, 2017:12:50 PM, at 12:50 PM, Susan Hares <shares@ndzh.com> <mailto:shares@ndzh.com> wrote:
>>> 
>>> Anton:  
>>> 
>>> See earlier message to Martin.  Topology models are I2RS YANG Models
>>> designed for ephemeral state with specific security concerns.  This is not
>>> your basic YANG model no matter which data store ephemeral gets linked to.
>>> Where is ephemeral state?  By IESG Design of charter, I2RS is not in charge
>>> of defining ephemeral state solution.  NETMOD/NETCONF are.  Go ask them. 
>>> 
>>> Do not blame the messenger echoing NETMOD results, 
>>> 
>>> Sue 
>>> 
>>> -----Original Message-----
>>> From: i2rs [mailto:i2rs-bounces@ietf.org <mailto:i2rs-bounces@ietf.org>] On Behalf Of Anton Ivanov
>>> Sent: Tuesday, January 24, 2017 8:30 AM
>>> To: i2rs@ietf.org <mailto:i2rs@ietf.org>
>>> Subject: Re: [i2rs] Kathleen Moriarty's No Objection on
>>> draft-ietf-i2rs-yang-l3-topology-08: (with COMMENT)
>>> 
>>> On 24/01/17 11:52, Juergen Schoenwaelder wrote:
>>>> Susan,
>>>> 
>>>> so are these YANG models regular YANG models or are these YANG models 
>>>> specific to the yet to be defined I2RS protocol and yet to be defined 
>>>> datastores?
>>>> 
>>>> I think this is the core of Martin's and my question. A simple clear 
>>>> and concise answer would be nice.
>>> +1.
>>> 
>>> A.
>>> 
>>> 
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org <mailto:i2rs@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
>>> 
>>> _______________________________________________
>>> i2rs mailing list
>>> i2rs@ietf.org <mailto:i2rs@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
>> _______________________________________________
>> i2rs mailing list
>> i2rs@ietf.org <mailto:i2rs@ietf.org>
>> https://www.ietf.org/mailman/listinfo/i2rs <https://www.ietf.org/mailman/listinfo/i2rs>
> 
> _______________________________________________
> i2rs mailing list
> i2rs@ietf.org
> https://www.ietf.org/mailman/listinfo/i2rs