Re: [ippm] Ignas Bagdonas' Discuss on draft-ietf-ippm-twamp-yang-11: (with DISCUSS and COMMENT)

Ignas Bagdonas <ibagdona@gmail.com> Tue, 26 June 2018 16:32 UTC

Return-Path: <ibagdona@gmail.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AAEF13109F; Tue, 26 Jun 2018 09:32:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oT-EMBLqo6Ph; Tue, 26 Jun 2018 09:32:15 -0700 (PDT)
Received: from mail-pl0-x232.google.com (mail-pl0-x232.google.com [IPv6:2607:f8b0:400e:c01::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A495130E09; Tue, 26 Jun 2018 09:32:15 -0700 (PDT)
Received: by mail-pl0-x232.google.com with SMTP id 31-v6so8802670plc.4; Tue, 26 Jun 2018 09:32:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=hAvPy80xKE8rI3padky4A3oMgL/EzfCY57O8ySEh0hU=; b=U528nzdc1ornn29/cEBPYvy6mS2YGOsCt0liJ9/OsHgzJakqAfQ2AYxgV+7iaJniO0 fxjygzinrJowx8HhrWFuqqR/v/D5NF99/o2ukUizpT0Ge/X2+tpAh8/D1rPXDLvbWiu+ uUiYL/vhylh39TMKf3OLKPxCr3N7SAtolqSMPVqsLFN4JMqrs+ljM1k0Ej4YeWalEu75 Ogti7Pg5fOIiUHfM1ek1LDUG5yLxw+3ttCiijyJO60Vr/MnynAdNMMd0Qj3IXNdKbUY1 DGQdP8DHw1SoE+KF7Zo+wJTzBdEWzCfiKi1mgjRq5vxr46MiKj+9UqRwZJBiGP4IcPMq JMqg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=hAvPy80xKE8rI3padky4A3oMgL/EzfCY57O8ySEh0hU=; b=g+YaTJWPQD6ZZ1s+N98bLCnX0xcM0xgbnkar4FrQOpF4pV3VJadLhFGIkpMP7bSGyE PGMUBC2SfYf4iUh7+1MPPGzXgtqVGTH6KVh0uEM1MzeFRRI9tV18XHkp4udaFXyZ9fkL PGIkjP9hlKLL1cqWzJOwEaQTUW1KfFsLomDFxrgz2ZpqSsGhmvJ3YoAQysnFcejJjTf3 duK0D1WA1n9O5mGqdsUMvQwLTIiSL1T6g/vPIzCL4aTCoK+dMrpmut0Q4ZA7fzbTLQjT 6iqH99HNxlo3j77+WvIHP8FTbL/UBmg+wwdbV2t46rDzDa0NeCJ1iJEdgQSfBr53qMpS wqWw==
X-Gm-Message-State: APt69E3WfMCf5PB72nxnkebJLLxfZP6Y6x2HThsdPGnTiwbApfylzW1X GwejZ3Y8kzFCXYl+M45Qyr+QKfR66EA=
X-Google-Smtp-Source: ADUXVKKBF3pvFzob20A0FEbv9Ew6cN/TB4+Tu7wRn8evyVQYEj11rSENpFJwJSW6bCU0u6/AczQ29A==
X-Received: by 2002:a17:902:722:: with SMTP id 31-v6mr2417051pli.3.1530030735057; Tue, 26 Jun 2018 09:32:15 -0700 (PDT)
Received: from [10.195.14.69] ([216.221.228.6]) by smtp.gmail.com with ESMTPSA id e1-v6sm3046506pgt.71.2018.06.26.09.32.13 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 26 Jun 2018 09:32:14 -0700 (PDT)
To: Mahesh Jethanandani <mjethanandani@gmail.com>
Cc: The IESG <iesg@ietf.org>, draft-ietf-ippm-twamp-yang@ietf.org, Nalini Elkins <nalini.elkins@insidethestack.com>, ippm-chairs@ietf.org, ippm@ietf.org
References: <152950984681.28540.15458643208076088093.idtracker@ietfa.amsl.com> <6F0F300E-F699-4DE2-8C13-710264957452@gmail.com>
From: Ignas Bagdonas <ibagdona@gmail.com>
Message-ID: <54331c1c-02d4-b50c-07ce-43532fc86583@gmail.com>
Date: Tue, 26 Jun 2018 17:32:12 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <6F0F300E-F699-4DE2-8C13-710264957452@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-GB
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/TWdAsQMCjiOkTgKCuCl5apZjOKY>
Subject: Re: [ippm] Ignas Bagdonas' Discuss on draft-ietf-ippm-twamp-yang-11: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jun 2018 16:32:18 -0000

Hi Mahesh,


>> 1. Operational state. Section 2 defines operational aspects of the configured
>> TWAMP mechanisms as being out of scope. How does that relate to the motivation
>> goals in section 1? Having no common machine readable mechanism for retrieving
>> measurement results and verifying the operation of measurement processes does
>> not seem to help in reducing the need for proprietary mechanisms.
> The idea behind describing operational part of the model as out of scope, particularly as they relate to measurement results, relates the work that is currently going on in the “Registry of Performance Metrics (PM)”, something the IPPM WG is trying to finish. Once that work is complete, this model can be enhanced or another one written to provide the data needed for PM.

That seems to be a practical way and also aligned with the current 
charter. While there is a question of practicality of what a 
configuration-only model allows to do, this is better than nothing. 
Gaining operational experience is needed, and we better start with a 
partial solution.

>> 2. What is the compatibility of this model with NMDA?
> This model is compatible with NMDA.

Excellent. As Spencer mentioned, it may be good to have that stated 
specifically, as other models do.

>> 3. Key storage. The document defines its own way of storing keys - while there
>> are multiple existing ways to store keys (routing key-chain model, I2NSF, IPsec
>> model, netconf-keystore). Why yet another key storage mechanism is required?
>> What could be reused from other existing mechanisms?
> Precisely. When we started work on this draft, there were plethora of ideas on how to store keys. We borrowed the idea from what is now the ietf-key-chain module to define the key chain. And we followed the KISS principle by incorporating what was absolutely needed by TWAMP.

That is understood and probably can be justified for this particular 
model. But the cost of this approach is yet another way of storing key 
information.

> Having the answers for the three points that you have raised, would you still have a DISCUSS. If so, which issue, do you want to see addressed?

I am happy with the answers, will clear the DISCUSS. The one that I am 
somewhat less happy with is the key storage one - from the perspective 
of both model developer and application developer, additional model that 
does mostly the same thing is getting towards both to the duplication of 
the work and encouraging the divergence of the ways how similar things 
are done. The root of the problem is far deeper than this draft - there 
does not appear to be an overall coordination of how the different 
models bind together into something that allows to use different models 
in the context of the whole system.


>
>> A nit suggestion - YANG examples typically look more readable in JSON encoding.
> I am reading this is more as a suggestion than as a nit.

This might be a topic for a broader discussion of YANG model 
coordination - it is not in scope of this draft though. The fact is that 
JSON encoding looks to be easier to read than XML one, and maybe a 
common recommendation could be to use JSON for examples. Again, for the 
context of this draft this is a nit type suggestion - and it is up to 
authors and WG to decide whether a change is needed given that it was 
not discussed more broadly in the whole YANG development effort.

Thank you.

Ignas