[netconf] Zaheduzzaman Sarker's No Objection on draft-ietf-netconf-http-client-server-23: (with COMMENT)

Zaheduzzaman Sarker via Datatracker <noreply@ietf.org> Wed, 21 August 2024 13:57 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: netconf@ietf.org
Delivered-To: netconf@ietfa.amsl.com
Received: from [10.244.2.52] (unknown [104.131.183.230]) by ietfa.amsl.com (Postfix) with ESMTP id 8652EC15152D; Wed, 21 Aug 2024 06:57:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Zaheduzzaman Sarker via Datatracker <noreply@ietf.org>
To: The IESG <iesg@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 12.22.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <172424862919.2332705.4639463315479746794@dt-datatracker-6df4c9dcf5-t2x2k>
Date: Wed, 21 Aug 2024 06:57:09 -0700
Message-ID-Hash: FVNKANY7VWU7TUWWQXMHBZE6DEX2REVP
X-Message-ID-Hash: FVNKANY7VWU7TUWWQXMHBZE6DEX2REVP
X-MailFrom: noreply@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: draft-ietf-netconf-http-client-server@ietf.org, netconf-chairs@ietf.org, netconf@ietf.org
X-Mailman-Version: 3.3.9rc4
Reply-To: Zaheduzzaman Sarker <zahed.sarker.ietf@gmail.com>
Subject: [netconf] Zaheduzzaman Sarker's No Objection on draft-ietf-netconf-http-client-server-23: (with COMMENT)
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ByplqnBvEX2n6PIVlx5naIYdfpw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>

Zaheduzzaman Sarker has entered the following ballot position for
draft-ietf-netconf-http-client-server-23: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-http-client-server/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for working on this complex group of specifications.

I have following comments/questions and I believe addressing those will improve
the specification

   - May be I am failing to see the whole picture but I understand that
   draft-ietf-netconf-tls-client-server defines tls-common module along with 
   tls-client and tls-server modules, but I don't see the Section 3.1.2.2
   mentions tls-common module which is common to both client and server. is
   this an overlook? if not then, I would expect some description of how
   tls-common module is used here or not used here. ( I was initially thinking
   of this as discuss worthy but as I am not sure I understand how this whole
   thing is used together I am putting it as comment, and here is your chance
   to educate me :-) )

   - Looking at Section 3.1.2.2 the quic-supported tree, I am wondering if this
   how it should be done or not. As TLS 1.3 is ovened into QUIC, QUIC take
   cares of the TLS record layer, the way tls-server-parameters and
   tls-server-grouping is used would it be sufficient? may be it does, but I
   dont understand it as TLS is not used with QUIC as it is used with TCP.

   - proxy-connect feature only refers to CONNECT method of RFC9110, but what
   about the CONNECT-UDP (RFC9298) that http clients can use to connect via
   proxy? Is that considered here but explicitly put out of scope? I can see
   HTTP/2 and HTTP/3 clients can use CONNECT-UDP method which is derived from
   CONNECT method.