[netconf] Updates posted yesterday
Kent Watsen <kent+ietf@watsen.net> Wed, 25 May 2022 12:22 UTC
Return-Path: <01000180fb2abf21-e00186e7-9619-45b4-a340-69a925a3a1c3-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26C30C185B3D for <netconf@ietfa.amsl.com>; Wed, 25 May 2022 05:22:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pjf8gvJ1LiNf for <netconf@ietfa.amsl.com>; Wed, 25 May 2022 05:22:05 -0700 (PDT)
Received: from a48-95.smtp-out.amazonses.com (a48-95.smtp-out.amazonses.com [54.240.48.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80988C185B3E for <netconf@ietf.org>; Wed, 25 May 2022 05:22:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1653481324; h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=5PTolzZqXCpBz5eAYgSmzRLgJ9wzujIKkY+gdLuOEig=; b=MFKrQFXQqyN+7WK8NthHowA4P3sERkTC6qiwkqqKRQkgALkBwcNflGAgr06/U11L nCNDGRAoQCZ/+5vtmN73v852TETkmtdb6Qw/TSV99iga/n88+sEVxAR3YEK9IHLxlzs FqJncXoWQwWpslEraB4aIFItwPkkPvzr0bFoi/Vs=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_F4C7DD28-DAF3-4FD2-9D1E-0461AF44AD26"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.60.0.1.1\))
Message-ID: <01000180fb2abf21-e00186e7-9619-45b4-a340-69a925a3a1c3-000000@email.amazonses.com>
Date: Wed, 25 May 2022 12:22:04 +0000
To: "netconf@ietf.org" <netconf@ietf.org>
X-Mailer: Apple Mail (2.3693.60.0.1.1)
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
X-SES-Outgoing: 2022.05.25-54.240.48.95
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/5sOWE_SE_ah6BmrhihmeZR6s4A8>
Subject: [netconf] Updates posted yesterday
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2022 12:22:07 -0000
Regarding yesterday's update to the suite of client-server drafts, following are the Change Log entries for each draft. Please review carefully, as these drafts are eminent to be published! The only item remaining is a review of the IANA modules in the SSH and TLS drafts, to see if those sections are in reasonable shape to handoff to IANA. This is a non-blocking item, but it should be done and anyone can do it without needing to understand any of rest of the "suite of client-server drafts". My only ask is that draft-boucadair-netmod-iana-registries is considered as part of that review. Anyone? Kent // contributor Crypto-types * Fixed an example to reference correct key. * Fixed an example to not have line-returns around the encoding for a binary value. Trust-anchors * Updated Security Considerations section to address comment received from Carl Wallace. * Fixed examples to not have line-returns around "identity" encodings. * Fixed a couple tree diagrams to not create diagrams for "groupings" too. * Added "if-feature central-truststore-supported" to top-level "trustore" container. Keystore * Added a "term" for "key" (IEEE liaison). * Clarified draft text to ensure proper use of the "key" term (IEEE liaison). * Added statement that built-in keys SHOULD NOT be cleartext (IEEE liaison). * Added "if-feature central-keystore-supported" to top-level "keystore" container. Tcp-client-server * NO UPDATE. Ssh-client-server * Fixed example to not have line-returns around "identity" values. * Fixed examples to not include "xmlns:algs". * Added an example for the "generate-public-key" RPC. Tls-client-server * Fixed draft text to refer to new "identity" values (e.g., s/tls- 1.3/tls13). * Added ietf-tls-common:generate-public-key() RPC. Http-client-server * NO UPDATE. Netconf-client-server * Added feature "central-netconf-client-supported" to top-level node "netconf-client". * Added feature "central-netconf-server-supported" to top-level node "netconf-server". * Clarified container "netconf-client-parameters" description statement. * Removed unneccesary "xmlns:x509c2n" in a NETCONF server configuration example. Restconf-client-server * Added feature "central-restconf-client-supported" to top-level node "restconf-client". * Added feature "central-restconf-server-supported" to top-level node "restconf-server".
- [netconf] Updates posted yesterday Kent Watsen
- Re: [netconf] Updates posted yesterday Hartley, Jeff
- Re: [netconf] Updates posted yesterday Kent Watsen