Re: [Netconf] LC on subscribed-notifications-10
Kent Watsen <kwatsen@juniper.net> Wed, 25 April 2018 22:07 UTC
Return-Path: <kwatsen@juniper.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2DDE12D87B for <netconf@ietfa.amsl.com>; Wed, 25 Apr 2018 15:07:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.3
X-Spam-Level: **
X-Spam-Status: No, score=2.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, GB_SUMOF=5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tMR1VCPKdk73 for <netconf@ietfa.amsl.com>; Wed, 25 Apr 2018 15:07:24 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 911A412D86E for <netconf@ietf.org>; Wed, 25 Apr 2018 15:07:24 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3PM4t0k031829; Wed, 25 Apr 2018 15:07:21 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=dfp1hE3tq4Hxj9h9N+cCXr1Jd0MjlWkyTsYVjbyqP8Y=; b=F5uL72N7jUaMH7svOZ/dS8i0L9hS4VB96zz5LJ4vtEWQu1V625v6GtTSl0qlVuwKE5QP EoJTSRyoCNT6SNgvIFm9fK8IlS7X+pdFHymv1nR2jhymHg/RI+Nc15GeJ610N7eTXtv+ WfxiuYZWFAT1mZv1nX/5J3VDP3RPwdEgfsnHYJbGv7mo4ac33Oh1Kduhw5OLPO0lUQdH owEuFVb6vzwUSX61+focCdcAFMD+ry+S/wzu4XgQI85S+NqnjP28P//siuCFisNrIpbz lem6O1MQ3zzHOfdcydfW0bHOMkDU1x2P69DZeQkc12fhZSk/6ZVQpm6P7U0T/rr6tHxP sw==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0015.outbound.protection.outlook.com [216.32.181.15]) by mx0b-00273201.pphosted.com with ESMTP id 2hk1e3r2en-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 25 Apr 2018 15:07:21 -0700
Received: from DM5PR05MB3484.namprd05.prod.outlook.com (10.174.240.147) by DM5PR05MB3514.namprd05.prod.outlook.com (10.174.242.143) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.715.7; Wed, 25 Apr 2018 22:07:18 +0000
Received: from DM5PR05MB3484.namprd05.prod.outlook.com ([fe80::173:36cf:42b7:5965]) by DM5PR05MB3484.namprd05.prod.outlook.com ([fe80::173:36cf:42b7:5965%6]) with mapi id 15.20.0715.015; Wed, 25 Apr 2018 22:07:18 +0000
From: Kent Watsen <kwatsen@juniper.net>
To: "Eric Voit (evoit)" <evoit@cisco.com>, Alexander Clemm <ludwig@clemm.org>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [Netconf] LC on subscribed-notifications-10
Thread-Index: AQHTvAAnlMdwSaUGiEGsguuFvEIgr6PTNMYAgAKRSACAHsEbAIAEpeaAgAxV1oCAAIbkgIAIxKuAgAHWLYCAAWPcgA==
Date: Wed, 25 Apr 2018 22:07:18 +0000
Message-ID: <7F8F2AF4-28A5-4016-B727-10CAF6A093AF@juniper.net>
References: <17B884BF-0BB8-4B7C-BFBB-0AAFBEA857F6@juniper.net> <aedeb7390d0b4faa9f2bf12c2fe45cd2@XCH-RTP-013.cisco.com> <040a01d3be9f$09700490$1c500db0$@clemm.org> <2089023D-DA09-48E9-8F37-8FE459DC4F49@juniper.net> <dfc78f2b1062498388824b1f6dd97ff6@XCH-RTP-013.cisco.com> <1EC2E732-C524-4552-A3AD-27507239F763@juniper.net> <2b788c22f7ee4af889813b805348d69a@XCH-RTP-013.cisco.com> <9E7F3A66-98B9-4528-882C-43AAD19F0AEC@juniper.net> <96615f0331cd455182901ddf3e6ece23@XCH-RTP-013.cisco.com>
In-Reply-To: <96615f0331cd455182901ddf3e6ece23@XCH-RTP-013.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.20.0.170309
x-originating-ip: [66.129.241.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR05MB3514; 7:BqP1ZdFUrBNDLFiEgsoIWt1gWXd/2mWWp/+XbR34Hvrp2MCUnRMPHsQgTpMjQ5tSANvqqF23SxMg7WaPc9jgXMdMBh28OeHnkcy3HdXXhKZmvi2n6CBdEZJfUDflhmd8Pk87fm08hNTKb0jMx1Igfv9TCzpNn6ZE//R30+sAhnWJjDJ/8LhLYbw4xbDWIgbRQeEJgHEs4+gpxsKPT2kpNnQV+I6jhVXcLKzLUFCAJww/2F+MDXxOx9sChReoVjep
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR05MB3514;
x-ms-traffictypediagnostic: DM5PR05MB3514:
x-microsoft-antispam-prvs: <DM5PR05MB35145815747ADDC67A0E5A9DA58F0@DM5PR05MB3514.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(192374486261705)(788757137089)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(3231232)(944501410)(52105095)(93006095)(93001095)(3002001)(6055026)(6041310)(20161123560045)(20161123564045)(201703131423095)(201703011903075)(201702281528075)(20161123555045)(201703061421075)(20161123562045)(20161123558120)(6072148)(201708071742011); SRVR:DM5PR05MB3514; BCL:0; PCL:0; RULEID:; SRVR:DM5PR05MB3514;
x-forefront-prvs: 06530126A4
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(7966004)(396003)(376002)(346002)(39860400002)(366004)(39380400002)(199004)(189003)(69234005)(51444003)(3846002)(6116002)(3660700001)(5660300001)(99286004)(186003)(76176011)(8676002)(81156014)(81166006)(25786009)(105586002)(54896002)(36756003)(6306002)(6512007)(53946003)(508600001)(6246003)(53936002)(551984002)(6436002)(446003)(106356001)(6506007)(2900100001)(33656002)(26005)(229853002)(97736004)(2906002)(10710500007)(66066001)(7110500001)(6486002)(11346002)(110136005)(2616005)(7736002)(5250100002)(2501003)(59450400001)(102836004)(83716003)(3280700002)(15650500001)(476003)(86362001)(58126008)(93886005)(8936002)(316002)(14454004)(486006)(68736007)(2420400007)(82746002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR05MB3514; H:DM5PR05MB3484.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: c6otPl6HbWWiHjqwZ2ULvY8Cgt6iIfwM1XcXQqgCw2y43LAs+m3Fm/Dj6I8VWh6qWDdq77ofG2t29mdQ8rnlvkUSsRhXJ+KOEzIqkoLEoLSMhOEjTjAXBKcrnLAv3gojcpy1SD1zGrH8librKNCYW7FACfHmBYFNcAj/PRaG9YHVLcN86+Cg4g5+AVj9G8tV
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_7F8F2AF428A54016B72710CAF6A093AFjunipernet_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: b1dc1990-333a-4794-f801-08d5aaf8e925
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: b1dc1990-333a-4794-f801-08d5aaf8e925
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2018 22:07:18.2023 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR05MB3514
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-04-25_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804250202
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/2JDRav0j5_jU2G4R5R7o8vOoN7k>
Subject: Re: [Netconf] LC on subscribed-notifications-10
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Apr 2018 22:07:28 -0000
[further trimming] <Eric4> Ahhh. I got it now. The two reasons are: · Insufficient resources (e.g., CPU) · Unsupportable volume (i.e., a bandwidth constraint) I adjusted the diagram to: ......... : start : :.......: | establish-subscription | | .------modify-subscription-------. v v | .-----------. .-----------. .--------. | receiver |-insufficient CPU, b/w->| receiver | modify- '| ACTIVE | | SUSPENDED | subscription | |<---CPU, b/w sufficient-| | ---------->'-----------' '-----------' | | delete/kill-subscription delete/kill- | subscription v | ......... | : end :<-------------------------------' :.......: With the supporting bullet items under the diagram: · A publisher may choose to suspend a subscription when there is insufficient CPU or bandwidth available to service the subscription. This is notified to a subscriber with a "subscription-suspended" state change notification. · A suspended subscription may be modified by the subscriber (for example in an attempt to use fewer resources). Successful modification returns the subscription to an active state. · Even without a "modify-subscription" request, a publisher may return a subscription to the active state should the resource constraints clear. This is announced to the subscriber via the "subscription-resumed" subscription state change notification. <KENT4> yes, this is it. Just a couple nits, can you widen the diagram a couple characters to give more dashes (-) around the "insufficient" line? Also, in the 3rd bullet, maybe replace "resource constraints clear" to "resource constraints become sufficient again" so that it binds with the words in the diagram? <snip/> <Eric3> Added the descriptive paragraph requested in the middle of the three paragraphs below... It is possible to place a start time on a configured subscription. This enables streaming of logged information immediately after restart. Replay of events records created since restart can be quite useful. This allows event records generated before transport connectivity was supportable by a publisher to be passed to a receiver. In addition, event records logged before restart are not sent. This avoids the potential for accidental event record duplication. Such duplication might otherwise be likely as a configured subscription’s identifier before and after the reboot is the same, and there may be not be evidence to a receiver that a restart has occurred. By establishing restart as the earliest potential time for event records to be included in notification messages, a well-understood timeframe for replay is defined. Therefore, when configured replay subscription receivers first become ACTIVE, buffered event records (if any) will be sent immediately after the "subscription-started" notification. And the leading event record sent will be the first event record subsequent to the latest of four different times: the "replay-log-creation-time", "replay-log-aged-time", "replay-start-time", or the most recent publisher boot time. <Kent3> Hmmm, I'm having a negative reaction to the "event records logged before restart are not sent" bit. I know what you are trying to do, but I worry that this behavior might drop important logs, perhaps to the advantage of an adversary. Note that some devices implement an <edit-config> with a restart. Maybe the solution should require publishers to maintain a per configured-subscription awareness of (roughly) which log was sent last? - and notify the receiver when a restart has occurred, or when the replaying of events occurs, so that they can be aware that there might be some duplicates? <Eric4> The current solution guarantees no duplicates, and also informs the receiver of each new “start-time”. This allows the receiver to attempt to reconstruct any gaps from the last event previously pushed, should the choose to attempt such reconstruction. As a dynamic subscription has no such boundary constraints on replay and boot time, all a subsequent dynamic subscription needs to do is to request the events between the last received event previously received from that configured subscription and the new replay-start-time. <Kent4> So, the receiver is informed of each new "start-time" via the "subscription-started" control message, and then MUST do a short-lived dynamic subscription to scoop-up any possibly-missed logs, for which there may be none? If we choose to keep this behavior, the draft should say this more clearly, perhaps in the Security Considerations section… <Eric4> Note that this solution acts identically for loss of events when the platform *doesn’t* reboot, and events are just lost due to some overflow. See the Section 2.5.2 text: “However if events are lost (rather than just delayed) due to replay buffer overflow, a new "subscription-started" must be sent. This new "subscription-started" indicates an event record discontinuity.” I.e., this way the receiver doesn’t have to do forensics to determine and attempt to determine the cause of a transient loss of events on a publisher. <Kent4> okay, but note that this section refers to Section 2.4.2.1 (not 2.5.2). I understand what you mean, but I think more text is needed to convey it to readers… In any case, tracking the last event sent to each receiver will be a pretty hard requirement to meet during a publisher crash. Things are simpler to just let the receiver attempt a reconstruction should they need to. <Kent4> this I agree with, but I really don't like the fact that receiver MUST do a short-lived dynamic subscription to scoop-up any possibly-missed logs, for which there may be none. Perhaps we could add more values into the "subscription-started" notification message that would enable to receiver to make a local determination if such a dynamic subscription would be helpful? <Kent3> Going back to my original comment, the new paragraph helps, it certainly caught my attention regarding reboots wiping out the replay log buffer. <Eric4> There is no requirement that the reboot wipe outs out the buffer (the solution is agnostic to that). The only requirement is that a configured subscription replay start no earlier than the last reboot time. <Kent4> I'm glad to hear that the logs before restart aren't lost, just rather that there is no attempt to send them by default. This wasn't all that obvious to me from what you wrote before. I suggest adding text that clarifies this, and details the need for a short-lived dynamic-subscription. <snip/> But this wasn't quite what I was looking for either. What I was hoping for was something akin to references (e.g., <xref>), or perhaps just starting that the "replay-log-creation-time" and "replay-log-aged-time" are identified as being via the read-only "streams" data tree, and "replay-start-time" is configured in the "subscription" tree. It's clear what you mean by the publisher boot time, though I have to admit that, before, I didn't understand its envisioned impact. <Eric4> Added a subsequent sentence including <xref> which says: “The "replay-log-creation-time" and "replay-log-aged-time" are discussed in Section 2.4.2.1, and "replay-start-time" in Section 2.7.1.” <Kent4> perfect. <snip/> > Re: the 6th paragraph, I'm surprised that requirements for transport- > bindings wasn't discussed before in its own section. It seems like > a new thing here, that a receiver's transport might not be secure. > I'm okay with and support this, btw, as its sometimes better to > offload devices thru the use of a local collector node, for which > encryption may not be needed... Agree with your comments. <KENT> but where's the change? Shouldn't this have been discussed previously in the draft somewhere? <Eric2> The vast majority of transport binding discussions are addressed in the transport document. So I see this as guidance to a documenter of a transport document. Perhaps that is unnecessary for this document, and the paragraph should be removed. I would be fine with that. <Kent2> wait, I don't think you can offload transport-requirements to the transport-binding documents. I think that this document needs to define the requirements and the transport-binding documents then show how they adhere to them. Does this make sense? <Eric3>With the varied transports of NETCONF, HTTP/RESTCONF, UDP, CoAP already in drafts my belief is that only a high level subset of transport requirements spanning the universe of potential transports can potentially be abstracted in this document. The secure transport requirement is one such example, and that is a recommendation. The Security Considerations section is a good place for that one. Beyond the security recommendation there aren’t too many transport independent possibilities. I did just added one new transport requirement to the very end of “Event Streams” section though (which perhaps wasn’t explicit enough elsewhere). This requirement is: “Event records MUST NOT be delivered to a receiver in a different order than they were placed onto an event stream.” What other transport-independent transport requirements might there be which are not already documented? Stepping back, I see the transport draft plus this drafts providing the aggregate set of requirements for a full solution. And I had thought it would be up to the draft authors plus WGs to validate that the sum of the documents is sufficient. <Kent3> unsure. For example, RFC 6241has Section 2 (Transport Protocol Requirements) that the SSH and TLS binding drafts refer to. It seems that this draft should have a similar section that highlights what MUST or MUST NOT be supported. It could even include some additional text indicating that bindings MAY introduce additional requirements. <Eric4> I re-read RFC6241 Section 2 a couple times. There are a comparisons can be made from that document to a subset of requirements currently in this document’s security section. But I don’t see anything missing on the MUST and MUST NOT side of things. FYI: the specific requirements I am thinking of are: For both configured and dynamic subscriptions the publisher MUST authenticate and authorize a receiver via some transport level mechanism before sending any updates. A secure transport is highly recommended and the publisher MUST ensure that the receiver has sufficient authorization to perform the function they are requesting against the specific subset of content involved. With configured subscriptions, one or more publishers could be used to overwhelm a receiver. Notification messages SHOULD NOT be sent to any receiver which does not support this specification. Receivers that do not want notification messages need only terminate or refuse any transport sessions from the publisher. That is about it for common stuff. Considering the wide variety of potential transports, and ubiquity for the need of stream transports, I am simply not aware of any more common requirements. If you need me to, I can extract these three requirements, and put this under a separate transport requirements section. But this seems excessive, especially as we have transport specific documents with eyes on them from the WG. But if really do want this, I will place these into a new, separate section; and I will add your text: “bindings MAY introduce additional requirements.” <Kent4> yes, this is what I'm thinking is needed, even if just for these 3 requirements + a statement that each transport MAY impose additional limitations (not so much a "requirement" as a "fact of life using said transport" I think) Kent // contributor
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] subscribed-notifications-12 Eric Voit (evoit)
- Re: [Netconf] subscribed-notifications-12 Martin Bjorklund
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Xufeng Liu
- Re: [Netconf] LC on subscribed-notifications-10 Jeff Tantsura
- Re: [Netconf] LC on subscribed-notifications-10 Tim Jenkins (timjenki)
- Re: [Netconf] LC on subscribed-notifications-10 Igor Bryskin
- Re: [Netconf] LC on subscribed-notifications-10 Qin Wu
- Re: [Netconf] LC on subscribed-notifications-10 Tianran Zhou
- Re: [Netconf] LC on subscribed-notifications-10 JEFERSON CAMPOS NOBRE
- Re: [Netconf] LC on subscribed-notifications-10 Henk Birkholz
- Re: [Netconf] LC on subscribed-notifications-10 Robert Wilton
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Robert Wilton
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Martin Bjorklund
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Martin Bjorklund
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Andy Bierman
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Qin Wu
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 r… Balazs Lengyel
- Re: [Netconf] LC on subscribed-notifications-10 Rohit R Ranade
- Re: [Netconf] LC on subscribed-notifications-10 Alexander Clemm
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… alex
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… Rohit R Ranade
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… Juergen Schoenwaelder
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… Randy Presuhn
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… Sterne, Jason (Nokia - CA/Ottawa)
- Re: [Netconf] LC on subscribed-notifications-10 r… Eric Voit (evoit)
- Re: [Netconf] [SPAM?] RE: LC on subscribed-notifi… Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 r… Martin Bjorklund
- Re: [Netconf] LC on subscribed-notifications-10 r… Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Alexander Clemm
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- [Netconf] subscribed-notifications-12 t.petch
- Re: [Netconf] subscribed-notifications-12 Eric Voit (evoit)
- Re: [Netconf] subscribed-notifications-12 t.petch
- Re: [Netconf] subscribed-notifications-12 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)
- Re: [Netconf] LC on subscribed-notifications-10 Kent Watsen
- Re: [Netconf] LC on subscribed-notifications-10 Eric Voit (evoit)