[netconf] Updates posted yesterday

Kent Watsen <kent+ietf@watsen.net> Wed, 25 May 2022 12:22 UTC

Return-Path: <01000180fb2abf21-e00186e7-9619-45b4-a340-69a925a3a1c3-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26C30C185B3D for <netconf@ietfa.amsl.com>; Wed, 25 May 2022 05:22:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pjf8gvJ1LiNf for <netconf@ietfa.amsl.com>; Wed, 25 May 2022 05:22:05 -0700 (PDT)
Received: from a48-95.smtp-out.amazonses.com (a48-95.smtp-out.amazonses.com [54.240.48.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80988C185B3E for <netconf@ietf.org>; Wed, 25 May 2022 05:22:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1653481324; h=From:Content-Type:Mime-Version:Subject:Message-Id:Date:To:Feedback-ID; bh=5PTolzZqXCpBz5eAYgSmzRLgJ9wzujIKkY+gdLuOEig=; b=MFKrQFXQqyN+7WK8NthHowA4P3sERkTC6qiwkqqKRQkgALkBwcNflGAgr06/U11L nCNDGRAoQCZ/+5vtmN73v852TETkmtdb6Qw/TSV99iga/n88+sEVxAR3YEK9IHLxlzs FqJncXoWQwWpslEraB4aIFItwPkkPvzr0bFoi/Vs=
From: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_F4C7DD28-DAF3-4FD2-9D1E-0461AF44AD26"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.60.0.1.1\))
Message-ID: <01000180fb2abf21-e00186e7-9619-45b4-a340-69a925a3a1c3-000000@email.amazonses.com>
Date: Wed, 25 May 2022 12:22:04 +0000
To: "netconf@ietf.org" <netconf@ietf.org>
X-Mailer: Apple Mail (2.3693.60.0.1.1)
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
X-SES-Outgoing: 2022.05.25-54.240.48.95
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/5sOWE_SE_ah6BmrhihmeZR6s4A8>
Subject: [netconf] Updates posted yesterday
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 May 2022 12:22:07 -0000

Regarding yesterday's update to the suite of client-server drafts, following are the Change Log entries for each draft.  Please review carefully, as these drafts are eminent to be published!

The only item remaining is a review of the IANA modules in the SSH and TLS drafts, to see if those sections are in reasonable shape to handoff to IANA.  This is a non-blocking item, but it should be done and anyone can do it without needing to understand any of rest of the "suite of client-server drafts".  My only ask is that draft-boucadair-netmod-iana-registries is considered as part of that review.  Anyone?

Kent // contributor



Crypto-types

   *  Fixed an example to reference correct key.

   *  Fixed an example to not have line-returns around the encoding for
      a binary value.


Trust-anchors

   *  Updated Security Considerations section to address comment
      received from Carl Wallace.

   *  Fixed examples to not have line-returns around "identity"
      encodings.

   *  Fixed a couple tree diagrams to not create diagrams for
      "groupings" too.

   *  Added "if-feature central-truststore-supported" to top-level
      "trustore" container.


Keystore

   *  Added a "term" for "key" (IEEE liaison).

   *  Clarified draft text to ensure proper use of the "key" term (IEEE liaison).

   *  Added statement that built-in keys SHOULD NOT be cleartext (IEEE liaison).

   *  Added "if-feature central-keystore-supported" to top-level
      "keystore" container.


Tcp-client-server

   *  NO UPDATE.


Ssh-client-server

   *  Fixed example to not have line-returns around "identity" values.

   *  Fixed examples to not include "xmlns:algs".

   *  Added an example for the "generate-public-key" RPC.


Tls-client-server

   *  Fixed draft text to refer to new "identity" values (e.g., s/tls-
      1.3/tls13).

   *  Added ietf-tls-common:generate-public-key() RPC.


Http-client-server

   *  NO UPDATE.


Netconf-client-server

   *  Added feature "central-netconf-client-supported" to top-level node
      "netconf-client".

   *  Added feature "central-netconf-server-supported" to top-level node
      "netconf-server".

   *  Clarified container "netconf-client-parameters" description
      statement.

   *  Removed unneccesary "xmlns:x509c2n" in a NETCONF server
      configuration example.


Restconf-client-server

   *  Added feature "central-restconf-client-supported" to top-level
      node "restconf-client".

   *  Added feature "central-restconf-server-supported" to top-level
      node "restconf-server".