Re: registering tunnel types

tom petch <ietfc@btconnect.com> Fri, 02 November 2018 16:26 UTC

Return-Path: <ietfc@btconnect.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8475A130DE4 for <ipv6@ietfa.amsl.com>; Fri, 2 Nov 2018 09:26:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.197
X-Spam-Level: ***
X-Spam-Status: No, score=3.197 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RATWARE_MS_HASH=2.148, RATWARE_OUTLOOK_NONAME=2.95, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=btconnect.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O8EzmLfsQOX2 for <ipv6@ietfa.amsl.com>; Fri, 2 Nov 2018 09:26:18 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0098.outbound.protection.outlook.com [104.47.1.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21CBE130DDF for <ipv6@ietf.org>; Fri, 2 Nov 2018 09:26:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=btconnect.onmicrosoft.com; s=selector1-btconnect-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dFXL+afkfCRPJ1TA5uVnUdV9xXGMyYS4NJor7FtA9GA=; b=V957eYLcM/qI0KdSciMYim4VzqNTLfwbAbfrT8UaMxHwoiaJGA4HvMdyClvYdicBPQE+le1FPFsmrv3n7/o8/L0ebHdES3WVisZ04bdbR9sYRcSMpE+qyldKiGifTBKOcGVNzHHf3wq4nFImUi0M+BOjo3kqIzohAHmLB0Wn78Y=
Received: from VI1PR07MB5022.eurprd07.prod.outlook.com (20.177.202.206) by VI1PR07MB5743.eurprd07.prod.outlook.com (20.177.202.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1294.16; Fri, 2 Nov 2018 16:26:15 +0000
Received: from VI1PR07MB5022.eurprd07.prod.outlook.com ([fe80::d929:3695:4655:d265]) by VI1PR07MB5022.eurprd07.prod.outlook.com ([fe80::d929:3695:4655:d265%4]) with mapi id 15.20.1294.024; Fri, 2 Nov 2018 16:26:15 +0000
From: tom petch <ietfc@btconnect.com>
To: Joel Jaeggli <joelja@bogus.com>
CC: "ipv6@ietf.org" <ipv6@ietf.org>
Subject: Re: registering tunnel types
Thread-Topic: registering tunnel types
Thread-Index: AQHUa7JQGt84fGh/gUCjkcGLMGYnDQ==
Date: Fri, 02 Nov 2018 16:26:15 +0000
Message-ID: <013a01d472c8$9326b480$4001a8c0@gateway.2wire.net>
References: <01a901d46bb2$26c23700$4001a8c0@gateway.2wire.net> <e1ebf233-6e34-8d78-3ce3-293602462665@gmail.com> <787AE7BB302AE849A7480A190F8B93302E039F88@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <e71cbb98-a841-013c-1baa-300c45db20bd@gmail.com> <026701d47048$dfd7b900$4001a8c0@gateway.2wire.net> <2A649FB9-0696-40BC-BE4E-2CB5E4AA4F05@bogus.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-clientproxiedby: LO2P265CA0115.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:c::31) To VI1PR07MB5022.eurprd07.prod.outlook.com (2603:10a6:803:9b::14)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ietfc@btconnect.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [86.128.101.213]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR07MB5743; 6:YoQ0f4ZAlfc7McONGr0SHaIFJ001Mtbjcvfjo3ZSzVOF+8sTO1y/CApRtFP/+QWpwGwyZNkMgFCIxcwqbPr6xSG6GmG7SlSMApVfran9wfA5FKNq/Ol+sDiNxUHsoSqftx7TOXaSPc2BSbIz+jwTHI6EFctX0ZmBobKHQhJgoLO2W/dqDP7S+GASurUQXm5iqmPngVeRbe6t3EXEf7MGzUnMv0RR1O+9KdEV2DrdcKjupPu3ttgYy4c72MHB5rVEERORe2fKx5Iez/k0mLuKzkAf2qG3nSCl92j6F/MesaO5B42WbHSkeJbwvbaZDW2b2j3dlMFl807093/h94KmpNxpHX/oWolChmtxS+t9wGfS2SmIEVDALvR5qKpDLgCn+s5NzWn4Z7aY1tOMpVg6P9XGXybJoIAhmXXpFnR/Gco7dHHQhjgjXgPHuBnjQv/wMyJbU8p5Jf5ni7D75YiXyA==; 5:kBbbC6dp8yRq6e+nlM3i4FWQ6XVSKC9hM/93lbvScZnoh0dF0TnYOAGsONLblzOZDc29SBjoiwUgNn9b3xmkMWWQV8BvbAv4eGSqTljexRIzhdpFWRHQiUeCHPlojvg4cckwP0zVpjwNAKUibtheKKYU8sV19e3p5/wOMgjlhjY=; 7:SOpQbt7+zAWx7J1/lwWwD6uFNitZBgXVyJ2S7jRRFRcz8gnzEnN3zLJKGUGxaY2VofsyX1bsUncXIO8c21T68PpcJwc8B6qZMH5ufVgA8aerh8fiiCBiKQbT96rPoqkgMZLDWGXW4a18aLE2xHQoag==
x-ms-office365-filtering-correlation-id: c7b0e542-8119-4ea3-bd14-08d640dfe965
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(2017052603328)(7193020); SRVR:VI1PR07MB5743;
x-ms-traffictypediagnostic: VI1PR07MB5743:
x-microsoft-antispam-prvs: <VI1PR07MB5743A7B9C886FEDB535356FFA0CF0@VI1PR07MB5743.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(219612443155931)(178726229863574)(161740460382875)(18271650672692)(85827821059158);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3231382)(944501410)(52105095)(3002001)(10201501046)(93006095)(93001095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201708071742011)(7699051)(76991095); SRVR:VI1PR07MB5743; BCL:0; PCL:0; RULEID:; SRVR:VI1PR07MB5743;
x-forefront-prvs: 08444C7C87
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(376002)(346002)(136003)(396003)(39860400002)(55784004)(189003)(51444003)(13464003)(199004)(106356001)(44736005)(71200400001)(68736007)(81156014)(99286004)(2906002)(6116002)(84392002)(1556002)(66574009)(966005)(3846002)(8676002)(3480700004)(71190400001)(14454004)(446003)(6436002)(81166006)(105586002)(8936002)(97736004)(14496001)(6486002)(256004)(7116003)(7736002)(86362001)(2900100001)(305945005)(52116002)(33896004)(9686003)(66066001)(6512007)(6306002)(6246003)(25786009)(478600001)(186003)(561944003)(93886005)(476003)(102836004)(26005)(229853002)(53546011)(76176011)(6506007)(316002)(4326008)(486006)(86152003)(6916009)(386003)(5660300001)(53936002); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR07MB5743; H:VI1PR07MB5022.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0;
received-spf: None (protection.outlook.com: btconnect.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 4VO7VpKntvcdu76etrEE56ji7KyZ1WqUeUoLje7rKn2NZAAfuOKQNwV0JhkccSxqpqhxftSn8/cegCoel97bMDjAFfhfO81jHfF4iAz6BRrTOKEB63JQM6Hev5QKLimrookzSiD6RK+AwV5yZEsj1ZTdSnaj3rWh1ckLVHPWgW/FGu/gCi2cmcFEelJbx1xPA5DxceVcYsRyCHRlmt3yQcrq0KrLXfTVwkpROH8y3/VPDqK8L5kF5CABy3TgJy6bnCyMoqkOvstf+6pEnFxKSsxkTn/b1p1cVIZv9N+UrbBuo1x0Io1xIuE0hp91XOd8n8dBvRI4uBCZtlCWS4BZNzIf1ZAohalzmDcCVThXqUE=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <9AD3C61E9DB95A40AEB5F36A2284E5F4@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: btconnect.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c7b0e542-8119-4ea3-bd14-08d640dfe965
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Nov 2018 16:26:15.8808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: cf8853ed-96e5-465b-9185-806bfe185e30
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5743
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/GGoq6505lEyX5Iw2LjlACn7uc3w>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Nov 2018 16:26:20 -0000

---- Original Message -----
From: "Joel Jaeggli" <joelja@bogus.com>
To: "tom petch" <ietfc@btconnect.com>
Cc: <mohamed.boucadair@orange.com>; <ipv6@ietf.org>; "Alexandre
Petrescu" <alexandre.petrescu@gmail.com>
Sent: Tuesday, October 30, 2018 8:23 PM

> On Oct 30, 2018, at 05:07, tom petch <ietfc@btconnect.com> wrote:
>>
>
> Alex
>
> I agree, at least in part; tunnels and interfaces are different
animals
> and it is unfortunate that they were conflated in SMI.
>
> I was surprised that NETMOD had not produced a YANG module for tunnels
> but it seems that there has been no need for the past decade.  That
> said, I think that it is a good idea to have one.  Whether or not it
> should mirror the Tunnel MIB I find more debatable.

It’s not entirely obvious to me that netted / netconfig would be where
the tunnel models were produced.

They tend if fact to be produced by the tunnel protocol maintainers e.g.
l3sm/l2sm/ccamp and so on. The management tools for a product tend to be
developed itself in my experience.

<tp>

Joel

My concern is that something that cuts across a number of IETF WG should
get adequate review.  The YANG interface module was much discussed in
the netmod WG, with an existing MIB as guidance, before becoming an RFC.

The proposed YANG tunnel module, which borrows the concepts of the
interface module, that additions should be made by the Tunnel MIB
Designated Expert to a registry and then propagated to the Tunnel MIB
and the Tunnel YANG module, has not been discussed in any WG.  The
proposal, as I mentioned before, has been added to the I-D after IETF
Last Call has been completed so appears to me to be the work of one
individual, without any review; the I-D lists seven editors, six of whom
appear to be absent.  TheWG mailing list seems devoid of any discussion.

I believe that the IETF succeeds because of peer review, and I struggle
to see that here.

Tom Petch

> My own homework came across other IP in IP varieties which do not
> appear.
>
> Tom Petch
>
>
>>
>> Alex
>>
>>>
>>> If you need a new value or if you have a question about a given
> interface tunnel type, please follow the guidelines in the url cited
> above. All this is out of the scope of draft-ietf-softwire-yang.
>>>
>>> Cheers,
>>> Med
>>>
>>>> -----Message d'origine-----
>>>> De : ipv6 [mailto:ipv6-bounces@ietf.org] De la part de Alexandre
> Petrescu
>>>> Envoyé : jeudi 25 octobre 2018 09:54
>>>> À : ipv6@ietf.org
>>>> Objet : Re: registering tunnel types
>>>>
>>>> Are:
>>>> -IPv6 in UDPv4 and
>>>> -IPv6 in IPv6 as used by openvpn;
>>>>
>>>> covered by the list below?
>>>>
>>>> These are a few tunnelling mechanisms I use routinely.
>>>>
>>>> Existing identity 6tofour should be deprecated, if that means 6to4,
>>>> which is deprecated.
>>>>
>>>> Existing identity iphttps has a version number for IP?
>>>>
>>>> Alex
>>>>
>>>> Le 24/10/2018 à 17:57, tom petch a écrit :
>>>>> draft-ietf-softwire-yang
>>>>> completed IETF Last Call two weeks ago and, since then, has
> acquired a
>>>>> YANG module that defines tunnel types, as listed below.  It is
> intended
>>>>> to be a IANA-maintained module and so changes to the list of
> tunnels
>>>>> will not require a reissue of the softwires RFC-to-be.  At the
> same
>>>>> time, getting it right first time never did any harm so if anyone
> can
>>>>> think of any missing, or can think of other places where there
> might be
>>>>> other tunnels lurking, now would be a good time to mention it.
>>>>>
>>>>> It is based on RFC4087 Tunnel MIB (which created an SMI Textual
>>>>> Convention that went up to Teredo) so tunnels from that vintage
> are
>>>>> likely well catered for.  softwires is not where I would have
> first
>>>>> looked for tunnel types, but it has a certain logic to it.
>>>>>
>>>>>       identity  other
>>>>>
>>>>>       identity direct
>>>>>
>>>>>       identity gre
>>>>>
>>>>>       identity minimal
>>>>>
>>>>>       identity l2tp
>>>>>
>>>>>       identity pptp
>>>>>
>>>>>       identity l2f
>>>>>
>>>>>       identity udp
>>>>>
>>>>>       identity atmp
>>>>>
>>>>>       identity msdp
>>>>>
>>>>>       identity sixtofour
>>>>>
>>>>>       identity sixoverfour
>>>>>
>>>>>       identity isatap
>>>>>
>>>>>       identity teredo
>>>>>
>>>>>       identity iphttps
>>>>>
>>>>>       identity softwiremesh
>>>>>
>>>>>       identity dslite
>>>>>
>>>>>       identity  aplusp
>>>>>
>>>>> Tom Petch
>>>>>
>>
>>>> -------------------------------------------------------------------
-
>>>>> IETF IPv6 working group mailing list
>>>>> ipv6@ietf.org
>>>>> Administrative Requests:
> https://www.ietf.org/mailman/listinfo/ipv6
>>
>>>> -------------------------------------------------------------------
-
>>>>>
>>>>
>>
>>> --------------------------------------------------------------------
>>>> IETF IPv6 working group mailing list
>>>> ipv6@ietf.org
>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>
>>> --------------------------------------------------------------------
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org <mailto:ipv6@ietf.org>
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
<https://www.ietf.org/mailman/listinfo/ipv6>
> --------------------------------------------------------------------