RE: Fwd: New Version Notification for draft-troan-6man-universal-ra-option-03.txt

Vasilenko Eduard <vasilenko.eduard@huawei.com> Wed, 07 October 2020 15:16 UTC

Return-Path: <vasilenko.eduard@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20B323A0A24 for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 08:16:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xL0oVkmc_tzI for <ipv6@ietfa.amsl.com>; Wed, 7 Oct 2020 08:16:38 -0700 (PDT)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1AC0E3A09DE for <ipv6@ietf.org>; Wed, 7 Oct 2020 08:16:38 -0700 (PDT)
Received: from lhreml732-chm.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id BE7F381B1B77306D8D09; Wed, 7 Oct 2020 16:16:36 +0100 (IST)
Received: from msceml706-chm.china.huawei.com (10.219.141.145) by lhreml732-chm.china.huawei.com (10.201.108.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Wed, 7 Oct 2020 16:16:36 +0100
Received: from msceml703-chm.china.huawei.com (10.219.141.161) by msceml706-chm.china.huawei.com (10.219.141.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Wed, 7 Oct 2020 18:16:35 +0300
Received: from msceml703-chm.china.huawei.com ([10.219.141.161]) by msceml703-chm.china.huawei.com ([10.219.141.161]) with mapi id 15.01.1913.007; Wed, 7 Oct 2020 18:16:35 +0300
From: Vasilenko Eduard <vasilenko.eduard@huawei.com>
To: Lorenzo Colitti <lorenzo=40google.com@dmarc.ietf.org>, Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>
CC: IETF IPv6 Mailing List <ipv6@ietf.org>
Subject: RE: Fwd: New Version Notification for draft-troan-6man-universal-ra-option-03.txt
Thread-Topic: Fwd: New Version Notification for draft-troan-6man-universal-ra-option-03.txt
Thread-Index: AQHWnJ7OY/y2/hI87E2y8JyzKoujC6mMFy1////bgYCAAEblQA==
Date: Wed, 07 Oct 2020 15:16:35 +0000
Message-ID: <39f6a9131cf94a52877f9270f801a009@huawei.com>
References: <160201571921.22183.2288394613501535041@ietfa.amsl.com> <FAA42031-FAF9-4F1E-A702-3B4F27375F4F@employees.org> <m1kQ8qM-0000FiC@stereo.hq.phicoh.net> <CAKD1Yr2LrKw65LWviNVxBk47Bfm2ondkfh4=1-ztQZb9h_forQ@mail.gmail.com>
In-Reply-To: <CAKD1Yr2LrKw65LWviNVxBk47Bfm2ondkfh4=1-ztQZb9h_forQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.47.207.205]
Content-Type: multipart/alternative; boundary="_000_39f6a9131cf94a52877f9270f801a009huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/-KY_j49a9rEFLGbAQA0j7pvJXzY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Oct 2020 15:16:40 -0000

+1 on semantics
The progress on SDN and automation in general is so miserable because it has been discovered that everybody is using different YANG model, and number of YANG models is already 600+.
Therefore, this draft would be useless without strict data model attached.

I have 1 additional comment on syntax:
The world has moved from hard-coded SNMP to flexible (and human-readable) Netcong/YANG. Many other examples exist from management domain. Hence, it looks like the trend.
But where it should stop?
Low level data plane details should definitely stay TLV – XML parsing in ASIC is overkill.
We are talking here about control plane protocol that typically has TLV format for all data.
I did not hear (my problem) that BGP or ISIS have intention to move out of TLV format to something human readable and flexible as XML.
Why? Probably performance problem. Parsing is more resource-consuming.
Will all other control plane protocols migrate to XML in the future? It is an open question.
I am just trying to understand why ND should be the 1st on this path. ISIS and BGP is not supposed to operate in IoT, but ND should.
Is anybody aware about any other control plane protocol that has started migration to XML-like?

Eduard
From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Lorenzo Colitti
Sent: 7 октября 2020 г. 16:38
To: Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com>
Cc: IETF IPv6 Mailing List <ipv6@ietf.org>
Subject: Re: Fwd: New Version Notification for draft-troan-6man-universal-ra-option-03.txt

On Wed, Oct 7, 2020 at 9:47 PM Philip Homburg <pch-ipv6-ietf-6@u-1.phicoh.com<mailto:pch-ipv6-ietf-6@u-1.phicoh.com>> wrote:
A new RA (or DHCP) option has two aspects: syntax and semantics. What this
draft does is introduce a more complex low level syntax for RA and DHCP
options. I.e., the relatively simple, fixed length fields in RA and DHCP
options are replaced with a generic, compressed, self-describing format.
[...]
Beyond that, encoding options in CBOR does nothing for the semantics of
an option. And it seems to me that most of the discussion is regarding
semantics.

+1. Defining an RA (or DHCP, or whatever) option is not just about defining the syntax. That's actually the easy part. It's about defining the semantics of the option, and what behaviour should occur in response by hosts and routers. The reasons this is important are the same reasons we have all standards: interoperability, vendor independence, ability to engineer networks based on expected behaviour instead of building them empirically around implementation behaviour, etc.