Re: [netconf] Éric Vyncke's Discuss on draft-ietf-netconf-tcp-client-server-21: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Wed, 28 February 2024 10:18 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7441C14F60D; Wed, 28 Feb 2024 02:18:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IsJCCg-0_pdt; Wed, 28 Feb 2024 02:18:50 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3769FC14F5F7; Wed, 28 Feb 2024 02:18:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=44415; q=dns/txt; s=iport; t=1709115530; x=1710325130; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=0amnNep6Un0e2zLjQtPsHe1S1Ew/ycvdy2Ccf9STtQ8=; b=e7bP0YJ2FXvbaPc5/kucTzgGAyF3WQ/zqqydlD8R12PJ1w2uBiAGPN8/ Glx/GAP77bKxYHMVCp89K0ppO/4j9TkLQckOV58sd2o0cIONhqeyNZUSV 8Kz7raL53H/qq0GX69qNoC9VmP+BY6GPjuUB3EqBWbmW5G8y5sdsSxd21 o=;
X-CSE-ConnectionGUID: SDzDIvA2Qp+BHC46m0r9Qw==
X-CSE-MsgGUID: QVluZZXkQ6eCBE2BdNDZLw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:5OQV0hQPP7MHd+QirLoCZ8nvj9pso3TLVj580XJvo7tKdqLm+IztI wmGo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk0GUN3maQjqq2appSUXBg25MAN0IurvHYuHgtqm0eux9rXYYh5Dg3y2ZrYhZ BmzpB/a49EfmpAqar5k0BbLr3BUM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:58vOHaDDGkZ2ihVW//3jw5YqxClBgxIJ4kV8jS/XYbTApGsng2BUn GRJUDiEMqqNZWajf41zb4+3pkoHv8SEmt9qOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hXWthh fuo+5eDYAX/i2YtWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAlFEb9q2aHue0Gn8uaz5BGYdiP2ksxxWRRe0Y0woo6bAElU/ vAebTsKdB3G3aS9wamwTa9ngcFLwMvDZdxE/Co/i2CCS697GvgvQI2SjTNc9Doul8ZFHvv2b MsCYj0pZxPFC/FKEg5GV8tlx7341xETdRVhllaIl5gH4FGNwSdb/eLHPPz5SPiVEJA9ckGw/ T+eoD+jXXn2Lue3zzeZ+XWqiMfOkD/1HoUIG9WQ8PN2i1qVyCkYCBQXT0CToPSlhAi5Qd03A 0AO8yQy6Kk/6ELuSNThVBq+rjuYtQZZUN5RHusmrRqA0LTZ+S6YC3QKCDlbZ7QOtcItShQr2 0OH2dTzClRSXKa9U3mR8PKfqim/fHJTJm4ZbihCRgwAizX+nG0tpinjXPpCDofvt8W2MxHbn 26P9DJvvqpG2KbnyJ6H1VzAhjutoL3AQQg0+hjbUwqZAuVROd/Ni2uAtAiz0BpQELt1WGVtq 5TtpiRzxPoFAZfInyuXTaBXWrqo/P2CdjbbhDaD/qXNFRzzpxZPnqgJvFmSwXuF1O5fJlcFh 2eI5mtsCGd7ZifCUEOOS9vZ5z4W5abhD8/5cfvfc8BDZJN8HCfeo3k/PRPAgTC1zxh0+U3aB Xt9WZj0ZZr9Ifk2pAdau89CuVPW7nlnmjONH8yTI+qPgevPDJJqdVv1GADTNr9itvzsTPT9+ NdEPMzC0ARETOD7eWHW94VVRW3m3lBlba0aX/d/L7bZSiI/QTlJI6aIndsJJdc/94wLzbigw 51IchICoLYJrSeZeVzih7EKQO6HYKuTWlphY3ZzYQvxhyh4CWtthY9GH6YKkXAc3LUL5dZ/T uIOfIOLBfEnd9gN0211gUXVxGC6SCmWuA==
IronPort-HdrOrdr: A9a23:+6PXa64DiWorZ8iyjQPXwYiCI+orL9Y04lQ7vn2ZFiYlEfBwxv rPoB1E737JYW4qKQ8dcLC7VJVpQRvnhPhICPoqTMaftWjdySSVxe5ZnPHfKlHbaknDH6tmpN hdmstFeZPN5DpB/LvHCWCDer5KrqjkgcWVbKXlvgtQpGpRGthdBnJCe32m+zpNNXF77PQCZf 2hz/sCjQCNPV4QacO2DGQEWe/sm/3n/aiNXTc2QzQcxE2rlz2H1J7WeiL04v4ZaVxy6IZn1V KAvx3y562lvf3+4ATbzXXv45Nfn8ak4sdfBeSX4/JlagnEu0KNXsBMSreCtDc6rKWE81Axiu TBpB8mIoBa927RRGeouhHgsjOQkwrGqkWSi2Nws0GT5fARdwhKTPapQrgpNCcx3nBQ+e2UFp g7hl5x+aAnVS8o1x6Nl+QgHysa5XZc50BS0NL6SxdkINEjgHg7l/1FwKseeq1wbh7S+cQpFv JjA9rb4+sTeVSGb2rBtm0q29C0WG8vdy32CHTql/blmwS+pkoJhHcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAiiVKCi8fF66MBDiDuUKKnjNo5n47PE84/yrYoUByN83lI 7aWF1VuGYucwblCNGI3pdM7hfRKV/NEAjF24Vb/dx0q7f8TL3kPWmKT00vidKpp7EFDsjSS5 +ISdtr6j/YXB3T8KpyrnrDssNpWAwjueUuy6IGZ24=
X-Talos-CUID: 9a23:cWmXFWlKe+oViXFNPT9+WTHec1vXOUbx3lvxPWbiMH4qYp2+FQGVoLk1qtU7zg==
X-Talos-MUID: 9a23:cZlkcwSyZmv7CEx6RXTVujV/BvVY4J3wBWsnvM8st++oBwhvbmI=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2024 10:18:48 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 41SAImeK032507 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 28 Feb 2024 10:18:48 GMT
X-CSE-ConnectionGUID: GhSdUMt2TAWQ3fJDzlYDyA==
X-CSE-MsgGUID: IzB4W3QuTfW1HYwAa5R58w==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.06,190,1705363200"; d="scan'208,217";a="24626273"
Received: from mail-co1nam11lp2169.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.169]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2024 10:18:47 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Si4cWts4Rb82LzcthWc2ZeAb/GQpxGKsqNDeKyUe2bI3obEmbd0+EEiyFm16l3VIEQIyt8jYmBjsxPDSMc/9ZFktBwmlOU28Yi3xvuWrf4NODAIiTFJKCBMn08jAxasOQACkcW6qOAlQKsXbI1ToSUlWvudt6WC5a3OYhjdMgAiPyuc7BJGPczlktltKxod2pCGZIHoys6V3RxW/rPbR+DdN4vJ33C3YA5gYAJFsxmhZBdGJp0inB4qjwAl0oRRN+JLKrvqmWoTm8UlslJA2qRKcKEmGmq0+938+WZbebFNJm0qCl/jD26HE64HIWRINHKxPrzhirJsLkJoD6u2JqQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0amnNep6Un0e2zLjQtPsHe1S1Ew/ycvdy2Ccf9STtQ8=; b=PBPSJTxHnrwn/Q4begHgT8KwsZWxco3OrXMW2/JmNUCaCo9kJuq0fl9vw4NkTdzUW+i7Rm3czbuE01ZsjnqatHDGyXR+OVCBgGGy0b79zWuLS0mA9b2bm7D8rTyHgEGlhx3jppjpaoTO7YRlBlFEN0o4t/oUC8pP+NMHhfGp0X5wVPcm+c7cIj0gXXaXEf+Biw9vcQoGL0Oqdrml4u30iZFCJ3SgnV8M9iIITNN/pMA2P9eitmjtWjczR9s+YLBQzplWq0xccJPojv8ZRsqc8Nj2pCUbE1cL4SIIV6FMGOyyvQRN0W2ORpxLVCP0sCejlqZjRirueN7kIqXdvHpFAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH7PR11MB6451.namprd11.prod.outlook.com (2603:10b6:510:1f4::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.22; Wed, 28 Feb 2024 10:18:46 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::251c:6e15:4d7d:2a88]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::251c:6e15:4d7d:2a88%7]) with mapi id 15.20.7339.024; Wed, 28 Feb 2024 10:18:46 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: The IESG <iesg@ietf.org>, "draft-ietf-netconf-tcp-client-server@ietf.org" <draft-ietf-netconf-tcp-client-server@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "Per Andersson (perander)" <perander@cisco.com>, Mahesh Jethanandani <mjethanandani@gmail.com>, "Scharf, Michael" <michael.scharf@hs-esslingen.de>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-netconf-tcp-client-server-21: (with DISCUSS and COMMENT)
Thread-Index: AQHaZRUirKBSTH4pQU6UhVv3cvuqvrEfpZ6A
Date: Wed, 28 Feb 2024 10:18:46 +0000
Message-ID: <FD90F905-186C-4EE6-8B73-52B09337A35B@cisco.com>
References: <170843373775.28810.15163380629330089098@ietfa.amsl.com> <0100018dcdc7aa67-7894f636-2412-4a2d-a0be-71154b217bf0-000000@email.amazonses.com>
In-Reply-To: <0100018dcdc7aa67-7894f636-2412-4a2d-a0be-71154b217bf0-000000@email.amazonses.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.82.24021813
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|PH7PR11MB6451:EE_
x-ms-office365-filtering-correlation-id: 1a48ff8f-4f76-4d13-e83d-08dc3846a5d4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 3cMLxwjH5DJ4JGIt1J+BAXuFiRUnAc6sMmHkcVCx87SDMbwyaUCgwWJDivUsDaTyIlpFKAPCNqxgbkAkFmqChdYTxC6q6NKZlF1WaCSG+u2gIX75VtpjoV2jF2THSYYAsYtzTswqnMVG7cwDaBH8OHk75MOF2fieewDra4dPXM9XzDkjOGxsA2jTN+K/at7qt1po2DxO1Pv4AKO1ezd/zW9FY8FyoIvt9qO/W929jxQkn3uL2yTKHJXddbnjH+hq/UmzXnWOt0pD5aG6pupwZriS+ty2S09rr7CEM+5lhtEXz9hVbAL2C/rbPjm4tzp5MAwlvfJHPLOwrWQlhoOOf64ozXvGyET26svivuJpAMeVPFWTquUzSlhyVmYYKRMYHz8PO7R6aeqIcX+3qVFftZ6T7FGo3taKzGDosMoBmVBDeWyN3YekD2q7S7nKipAo6xbLK8u3NsQ/f+DM0+WDXRo1pD3TdEo7J9prVGBB4U8fSHhWYvwoA1J8vq1i/VPiuBHsHuJrJH3JyEKES0XrmBYk9x6a7okVq4xakMQCblOTFlH6TvJMtSd0g3+3hKPi/chEMZoYB4wnXISyVHUscjIQBzGsmec53Gx20kIedeKqwT3TJtGyL3wJ+tAmosyNd6IERahqRmjZMv8CIWHhyQvQHwFZ7YV8C2ErH5Qw0u8=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: fuv+T7M+J64kkxmTaGRlnUWRubQD+3Gk4Ur4bNgj8iJXOl+R9NLVC7PAp0c8YlMBrgPRZz+AGxqCEMf52fFVYZa7Iye8LHkVakAlHQeaCtOA3/nmbqza805SiATQJJjQ62kpcdBhS+kQX2/WgItzfWyIlfwil4vNVhtpAShcitsznMbHSwjRj8oujFIlUggo4uASPzoIqmnFlTzOX7UxM85AeS8WsZlta/kHf7NeVh/NUSxMq+RtN4YdNKGkHqf+kFtPRvU2s4sSBv3DY6D3wuV96zxZMAVrZmGZFQAlzpTugGUEeyoUA8a28xaOvXdTs8as6lo9rh2Z7H2KqsETg9SCJfAIQOi7omrsXMsZDn9bfRUiVbLk9robEMSQSNWGMAU//Rw88uL52yOQIVaWRM3Vt+IdPUYNeqrsAtn/YQ3s4zFDIisNhT0fpSzf4oF5AbLzUTgwIcyfmmc6JZHU7FOJiszwRG+s7wEnZc9HWF4wj+gC9038ckdG96XQmLUt8G99nZByvlE1jjyeG9VXMIbVxlnur0qFclaqHWW6VVZD00EH/vzLW8sWha3SP20zvESQLV1zT4OUxZ65fv3JLHtSYzpM7Q/mtnCVHtpM0k5fQqjl7/1r5+6mTCv6Z9211W0NVN779aS5C+CuGj1J5UunezUquKjwQ2TLCt+yCSZfO1uz+sS02aJiVitO49wo1PYsoNozH78G6BPQIwU+uio5/1ZireQ+m5FcTFeTILbKigYWTAKyTgENBLUajqXnWUiQd0NzJULXP4A1OdpJDPHocZQGWnEPZEFuoXKlPKrYzcdXNRiHKrx5pcnSmr4FUbOsIaF4z4b99937I9YCvmX87cWg6bx94WPwlc7v4r+vfI22R4syEkKGeEWHSJGP7VmzIQCv6flP9jyPoJjLQ9CeBRKt8DO6QWUT+JPKvMCPn0eRFNerRTO7QJG7cFvTt6JpElhL5EOvI+WBHpKvz/L4lKZBKqsmLVV7ENRT0YXZ1DcDEsQvZo4Jp4gBlEAauskBpWt4wqFO3DdiLXb0I1TGBQAfxDhpUbENhWaKdO8hKGiye9OeCt/uxo4nY8zEWpLsP5JkM0ezTEuQTckZknFP6KMOiIaXbcfUU48v3eyBU4xbkuKSMRiz3ylD2f0Kx7qfoaqPA0qhtlTY6vduhDHNTSPzqaFf2sN3QUif3G0EUcSi90EbOZhoxE3K6zEttNGqul6Zgx145aCxqslUwuEJu9ZZ+hVFaocK0QsjWPAQ/cWnUdSssgDZ0fTKl5NyyJQLKOlXkBBTiS0eAuIf9j/qShA9t9J9R0Gh+H+6J9Q123zj3FvRnVVwayJxjCvq9pDwB5L7yGKRSwzS19xrqLxfiIC2TNU1yRtUNej0kk+8787VBI3cwvxGLyJMI9zc3YAlihFDAEA1AeOWpCh7jn6sNYD6D0YO91B9TYT89owFPY9vWgbyN9cBCnna7xV2DyDJYlvqTGO4PW1EwIySO8vlbF0uJEg8OvVByIzdMyGxkSgTPbbG5F0zVaII9HkxTcXpIMBQ9m8wb8JXc6YloIeWodoVfTPcdPDYqs7BQAFJ8aAhai7L3B6v3lheE9ZB
Content-Type: multipart/alternative; boundary="_000_FD90F905186C4EE68B7352B09337A35Bciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1a48ff8f-4f76-4d13-e83d-08dc3846a5d4
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 10:18:46.0591 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FlLiLTCfkpACMFf0Nn+vvwhPo1gd0ZQzHsJtE/EsCFfRIZ5dUlKgMymZ4HLTlXHTQjstC2iCyTmIRjDN+v8/kg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6451
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/1NGoyPvRFParJvQNjZ5L9tL1wCM>
Subject: Re: [netconf] Éric Vyncke's Discuss on draft-ietf-netconf-tcp-client-server-21: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 10:18:54 -0000

Hello Kent,

Thanks for your email and for your patience.

The main issue seems to be around the use of the CONNECT HTTP method (i.e., not a GET but “CONNECT www.example.com:830”) that can be used to tunnel *any* TCP protocol, including netconf, i.e., this is not an HTTP proxy where HTTP requests are proxied by an HTTP-aware proxy to an HTTP server (e.g., “GET http://www.example.com/”).

=> HTTP CONNECT can act as a plain TCP proxy, i.e., should appear at the same place as SOCKS.

I agree that MASQUE connect may be considered as slightly different (cfr Martin Duke’s ballot).

See below for EVY> for less important points.

Regards

-éric

From: Kent Watsen <kent+ietf@watsen.net>
Date: Wednesday, 21 February 2024 at 23:27
To: Eric Vyncke <evyncke@cisco.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-netconf-tcp-client-server@ietf.org" <draft-ietf-netconf-tcp-client-server@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "Per Andersson (perander)" <perander@cisco.com>, Mahesh Jethanandani <mjethanandani@gmail.com>, "Scharf, Michael" <michael.scharf@hs-esslingen.de>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-netconf-tcp-client-server-21: (with DISCUSS and COMMENT)

Hi Éric,

Thank you for your comments.
Please see below for responses.

Kent



On Feb 20, 2024, at 7:55 AM, Éric Vyncke via Datatracker <noreply@ietf.org> wrote:

Éric Vyncke has entered the following ballot position for
draft-ietf-netconf-tcp-client-server-21: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-netconf-tcp-client-server-21

Thank you for the work put into this document.

Please find below one blocking DISCUSS points (easy to address as it is only to
force a reply), some non-blocking COMMENT points (but replies would be
appreciated even if only for my own education).

Special thanks to Per Andersson for the shepherd's detailed write-up including
the WG consensus (and the discussion with TCPM) and the justification of the
intended status.

I hope that this review helps to improve the document,

Regards,

-éric

# DISCUSS (blocking)

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

## No MASQUE or HTTP-proxy defined ?

This is mainly to force a discussion over email. SOCKS were (and probably are
still) a common proxy mechanism, but should SSH tunnels, MASQUE connect (and
its old parent HTTP connect method) be part of this document?

This discuss seems to be about the "http-client-server” draft more so than the “tcp-client-server” draft.

For instance, this section[1] in the http-client-server draft defines a node called "proxy-connect” that enables the HTTP-client to be configured to connect via either an HTTP- or HTTPS- based proxy.  Though the “http-client-server" document doesn’t say it (which I just fixed), the “proxy-connect” node intends to support HTTP connect [2].

[1] https://datatracker.ietf.org/doc/html/draft-ietf-netconf-http-client-server-17#section-2.1.2.2
[2] https://datatracker.ietf.org/doc/html/rfc9110#section-9.3.6

I never heard before about MASQUE, which I see now is defined in both RFC 9298 (Proxying UDP in HTTP) and RFC 9484 (Proxying IP in HTTP).   Those RFCs being so new, the question is if MASQUE should be 1) added to the http-client-server draft now, 2) acknowledged as not being in the http-client-server draft, or 3) say nothing about MASQUE, only stating that HTTP-connect is supported and other proxy-types can be added by future work?


PS: there is a related DISCUSS going on for the http-client-server draft, regarding its current lack of support for QUIC.  The same 1/2/3-options in the previous paragraph are in play.   I had a conversion with the NETCONF-chairs (Mahesh and Per) today and we think that a small update to the http-client-server draft might be possible to support QUIC, assuming the configuration for QUIC and DTLS are the same (i.e., TLS + UDP).   [Is there a QUIC expert in the house I can ask?]


EVY> I have replied on the top of this email

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


# COMMENTS (non-blocking)

## Section 2.1

While the text about keep-alives use cases sounds correct, I wonder whether
this text is relevant in an I-D about *data models*, i.e., why discussing the
semantics and use cases of TCP keep-alives?

Section 2.1.5 (Guidelines for Configuring TCP Keep-Alives) was written by my co-author, Michael Sharf (CC-ed), who is also a chair of the TCPM WG.  I had assumed that it was important...

Michael, can you respond to this comment?


EVY> thanks to Michael for his reply, I have replied to Micheal’s email

Some issue with the use of normative language for the default values of TCP
keep-alives, those values SHOULD be in NETCONF/RESTCONF protocols and not
discussed in this data model. To be honest, I hesitated to raise a discuss
level on this.

I’m assuming this comment regards Section 2.1.5 (Guidelines for Configuring TCP Keep-Alives).
I agree that text about motivation doesn’t need to be in a document regarding data-models...

Michael, can you respond to this comment also?




## Section 3.1.2.1

The reader would probably welcome an explanation of the differences between
'socks4' and 'socks4a', is it only to allow for a hostname ?

Should it be possible to configure multiple remote-addresses for the proxy ?

This took some effort.

As you’ll see when I publish an update to the suite of drafts (maybe later today),
I made the following changes:

1) added three new “feature” statements:
- socks4-supported
- socks4a-supported
- socks5-supported

2) greatly expanded Section 3.1.1 (Features) to describe each feature, with the
description for the “socks4a-supported” feature including the statement:

"The difference between Socks4 and Socks4a is that Socks4a enables
the "remote-address" to be specified using a hostname, in addition to
an IP address.

3) expanded Section 3.1.2.1, under the "proxy-server” description section, to
refer to the new “feature” statements and, in particular, the aforementioned
Section 3.1.1.


I’m hoping you will be happy with this update.



EVY> indeed I am 😊 but more important is that the model is better like it is now


## Section 3.3

About the tcp-client-grouping remote-address `the IP addresses are tried
according to local preference order`, should there be a reference to RFC 6724
(as there can be multiple source addresses) ?

I’m looking at https://datatracker.ietf.org/doc/html/rfc6724#section-6
…and feeling unsure about applicability to this section.

My hesitation regards how this same "tcp-client-grouping” specifies
the "local-address” (which I equate to “source address” as a single
value (type inet:ip-address), either specified or picked by the OS,
but it is still just one value.

Does RFC 6724 still apply?   Please advise.


EVY> it still does. Many hosts have multiple IP addresses (IPv4 global, IPv6 link-local,, IPv6 global) and sometimes multiple interfaces and restricting to a single source IP may not be the optimum.


Also in tcp-client-grouping local-address, AFAIK `INADDR6_ANY
('0:0:0:0:0:0:0:0' a.k.a. '::')` also means supporting IPv4-mapped addresses
per RFC 4291. SO, the text `the server can bind to any IPv4 or IPv6 addresses,
respectively ` should be amended.

Looking at:
https://datatracker.ietf.org/doc/html/rfc4291#section-2.5.2
https://datatracker.ietf.org/doc/html/rfc4291#section-2.2
https://datatracker.ietf.org/doc/html/rfc4291#section-2.5.5

I see what you mean.  I made this change:

OLD: any IPv4 or IPv6 addresses, respectively.
NEW: any IPv4 or IPv6 address

EVY> could be OK indeed
.




## Section 4.3

Also in tcp-server-grouping local-address, AFAIK `INADDR6_ANY
('0:0:0:0:0:0:0:0' a.k.a. '::')` also means supporting IPv4-mapped addresses
per RFC 4291. SO, the text `the server can bind to any IPv4 or IPv6 addresses,
respectively ` should be amended.

I made the same change as described in my previous response.


EVY> same thing ;-)

Thanks again!
Kent