Re: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-26.txt

mohamed.boucadair@orange.com Fri, 05 April 2024 14:35 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C557AC14F616 for <netconf@ietfa.amsl.com>; Fri, 5 Apr 2024 07:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.794
X-Spam-Level:
X-Spam-Status: No, score=-2.794 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oZC_evWrDC4P for <netconf@ietfa.amsl.com>; Fri, 5 Apr 2024 07:35:47 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF7FBC14F6BE for <netconf@ietf.org>; Fri, 5 Apr 2024 07:35:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1712327747; x=1743863747; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:from; bh=MKxg5MYBnlRBrnKvnzMD0nD450KFzD0PI2ffzDN4eCs=; b=f9PGpJlRK/fFdZyD3tMYjtfm8XZqsQqdazl69nmAmFNpxLKkSYMhpu+I 1Y5ztdBql5qC8C2IzRY32+30+UI0QFYxW0NmGJ+rS0uHXIxZwMWvX57LC QUSAzzdO7kPHt/MgHHqluMRF5HQ51jG0L51WJIxZWgfhpT+pCWVGOLyZK KnjWzetYWxwEMoqsfIvrrSD/nJIfuE3cvk/wV7GsBdmc1Fhn/lU73C/FC egI3t2OlTU9Cruy9ob/MvueZRWn2KZW6pIMGxf7UNIE3EqIURvVQIAzn9 lrhBHuTs/Ztxebmwm/QtCz9n9m3oHvaL4Osj7Ht6t0TZNAb0YFs7yDLm/ w==;
Received: from unknown (HELO opfedv1rlp0d.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 16:35:44 +0200
Received: from unknown (HELO opzinddimail5.si.fr.intraorange) ([x.x.x.x]) by opfedv1rlp0d.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 16:35:44 +0200
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id A3D4E106443F for <netconf@ietf.org>; Fri, 5 Apr 2024 16:35:44 +0200 (CEST)
Received: from opzinddimail5.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 905AB1064424 for <netconf@ietf.org>; Fri, 5 Apr 2024 16:35:44 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail5.si.fr.intraorange (Postfix) with ESMTPS for <netconf@ietf.org>; Fri, 5 Apr 2024 16:35:44 +0200 (CEST)
Received: from mail-db8eur05lp2105.outbound.protection.outlook.com (HELO EUR05-DB8-obe.outbound.protection.outlook.com) ([104.47.17.105]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2024 16:35:13 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AM7PR02MB6356.eurprd02.prod.outlook.com (2603:10a6:20b:1b7::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.42; Fri, 5 Apr 2024 14:35:11 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::18a0:3679:a134:1d02%6]) with mapi id 15.20.7409.042; Fri, 5 Apr 2024 14:35:11 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR05-DB8-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.17.105 as permitted sender) identity=mailfrom; client-ip=104.47.17.105; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR05-DB8-obe.outbound.protection.outlook.com designates 104.47.17.105 as permitted sender) identity=helo; client-ip=104.47.17.105; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR05-DB8-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:7CZntKrcSMgNZvo47GVe0EhX8EheBmJBYhIvgKrLsJaIsI4StFCzt garIBnXbP2CNmOmco0gOoiz8EsPv5SHyNJkQVBqpC5jH3gTopacVYWSI3mrMnLJJKUvbq7GA +byyDXkBJppJpMJjk71atANlVEliefSAOOU5NfsYkhZXRVjRDoqlSVtkus4hp8AqdWiCmthg /uqyyHkEAHjg2Ec3l48sfrZ9Esz5Kmq4Vv0g3RlDRx1lA6H/5UqJMJHTU2BByOQapVZGOe8W 9HCwNmRlo8O105wYj8Nuu+TnnwiGtY+DyDX4pZlc/HKbix5m8AH+v1T2Mzwy6tgo27hc9hZk L2hvHErIOsjFvWkdO81C3G0H8ziVEFL0OevHJSxjSCc5x3eUkHlw6lVMG83ONEIoL9WH391x fNNfVjhbjjb7w636J+GcLExw+gJfIzsNo5ZvWx8xzbEC/pgWYrEX6jB+d5f2nE3m9xKGvHdI cEebFKDbjyZO0EJZghRUc14xb/17pX8W2UwRFa9oK036m3ewEp716XmOdbce8aiQt9cmEmV4 GnB+gwVBzlBb4XPkGLVqhpAgMf/hT/hfrMKJYShyd8pgFuezHEqSw0/AA7TTf6R0RXkB403x 1Yv0ikjq7Rx9UG3QPHiVgGjrXjCuBMAM/JWHvEx7weD4qvZ/wjfAXILJgOtc/Qjvc4yADAgh lKUhYu0ASQ16eXID3WA6r2TsDW+fzAPKnMPbjMFSg1D5MT/pIY0jVTESdML/LOJYsPdSSnR+ TmK8BMCqbQW0d5RjoSl42v3jGf5znTWdTId6gLSV2Ojywp2Yo+5eoClgWQ3C94Qfe51qXHR7 RA5d9ii0QwYMX2avA2gKNjh8Zms7veBdTHW0VNyBcF88yz3oib+O4dN/Dt5OUFldN4efiPka 1PSvgUX44JPOHytbul8ZIfZ5yUWIUrIRIiNuhP8N4Emjn1NmOmvonwGiam4gT2FraTUuftjU ap3iO71ZZrgNYxpzSCtW8AW2qIxyyY1yAv7HM+ilU76jObAOSXOFN/p1WdiiMhotMtoRy2Eq 75i2zeil0wCAIUSnwGLr9FPdgBSfRDX+7iv8ZMLK7LrzvVa9JEJUKSLnexJl31NmqVejODT+ X+hEkRf0kKXuJE0AVTiV5yXU5u2BcwXhStjY0QEZA/0s1B9O9rHxPlELPMfI+J4nNGPONYvE 5Hpje3bX6wTItkGkhxBBaTAQHtKL0j71VPXZHX7MFDSvfdIHmT0xzMtRSO3nAFmM8Z9nZJWT 2GIvu8afXYCe+imJOvrUqryin+b7T0aku80WFbUKN5Ofkmq6JJtNyH6kv4wJYcLNAnHwTyZk Q2RBH/0YMHT9pQt/oChab+s9u+U/ylWRiK23FU3KZ6xLyDc8WflyohFOApNVS6IT3v6oc1Oe s0Jp8zB3CU7oWt3
IronPort-HdrOrdr: A9a23:w8sqZK87zJ120l7YbaBuk+FHdb1zdoMgy1knxilNoENuH/Bwxv rFoB1E73TJYW4qKQkdcdDpAsm9qADnhOVICOgqTMGftWbdyQ+Vxe1Zg7cKhgeQYhEWldQtnJ uIEZIOb+EYZGIS5aqU3OD7KadH/DDtytHKuQ6q9QYJcegcUdAD0+4WMGemO3wzYDMDKYsyFZ Ka6MYCjSGnY24rYsOyAWRAd/TfpvXQ/aiWKiIuNloC0k2jnDmo4Ln1H1yzxREFSQ5Cxr8k7C zsjxH53KO+qPu2oyWsnVM7rq4m1ecJ+OEzS/BkufJlZAkETTzYJbiJbofy8AzdZtvfqGrC3u O84CvIdP4DkU85NlvF3CcFnTOQmArH5xLZuCOlqGqmrsrjSD0gDc1dwYpfbxvC8kIl+Mpxya RRwguixu9q5D777VfADuLzJmNXv1vxpWBnnf8YjnRZX4dbYLhNrZYH9EcQFJsbBir15I0uDe ErVajnlYFrWELfa2qcsnhkwdSqUHh2FhCaQlIassjQ1zRNhnh2w0YR2cRalHYd85A2TYVC+o 3/Q9BVvaALStVTYbN2Be8HT8fyAmvRQQjUOGbXOljjHLFvAQO8l3c22sRF2AjxQu128HIbou W+bG9l
X-Talos-CUID: 9a23:iRgaEWufVQThd/rqXu1i3VVY6It1alznxXeMGHOWCGM1WOfMaEGOw5Nrxp8=
X-Talos-MUID: 9a23:5GPmHAZQj1CCUOBThyfwnhdTLPZR+puPS0ALnJ8bgoqUHHkl
X-IronPort-AV: E=Sophos;i="6.07,181,1708383600"; d="scan'208,217";a="33181080"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LdJj7FM2rsVtSAeTPFE8K5fsTYZujCPzeAUEb6xYR4VXQzqhsb2bXsLqtpCDYzoKP8l7KBTBNhBGNFbrk+kso5su0IAmR/T89cZ1RoPhAphuk29XRird/E/ARTNPaN9Dr934YEtIMDMNn8XOsmnaxIrZFc44iAkC6iG5JmiEqIq9kpanm4Hq5ew02Oipx3BG69vUajNHj4mxx4kvRseL+Ec36Lx8CIOfd26Jc0CB5nVrO2pCRUxdqihJcZ4XYXEkR2xZ1Z1XET2Xcx62qxUsBeSoib77AwbbX9Acl/Z6Q25jpd/vPgTs8rQ5VKHP9jpiVrPLxYCFD6HI8fmsaxjLRA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=f+tBPMysm9dyiLMUTP0HcuWx0zCfwpc/YbLqkpFytE0=; b=RIgs7KLAaUFJ2iLPVa54/xoH/L/NaEAVx94q8pZ2YDl1Wufl7YjE8G5h8t881ExagrWhwk87615TGgyWNLlYjMhL2XQ7Bdy119WBs+SM8jD2d2cBywSC0JEuZpBViwjCsgGq+2Tml2/tXi5GS8R0HcLZKajq3hP0N24mcABc5pHS0E2QE1I2i5YfMB3sddjAFrYcMGZwu5y/vuAt/WW1ENpxpOJug6emk45l9dy7U0U75gGJfRxkrTp3S5EMCovSnvwtHWYYQ9oos6pM6ejZhDJ6sPemY4qN9sHM2/xQvhabpn+YhmpZSPTOgJU95uCUveDygDdQ9Un+wcUE2WB65g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-26.txt
Thread-Index: AQHah18tOBeqtULPekKZJY1xH9EDWbFZupkQ
Date: Fri, 05 Apr 2024 14:35:11 +0000
Message-ID: <DU2PR02MB1016053785410738A21476D1188032@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <171226403149.2606.821454564035808417@ietfa.amsl.com> <0100018eaaea53c1-a5bf6813-0fec-4824-bcfc-39d82d4e6e01-000000@email.amazonses.com> <DU2PR02MB1016096DD114F7547AC6EF74488032@DU2PR02MB10160.eurprd02.prod.outlook.com> <0100018eae7efaef-bb42b15a-aaba-413e-abf8-9e1e4fa9068a-000000@email.amazonses.com>
In-Reply-To: <0100018eae7efaef-bb42b15a-aaba-413e-abf8-9e1e4fa9068a-000000@email.amazonses.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=51128e1e-713a-4416-b8e6-cccc26c0d8cc; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-05T14:34:58Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=0; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AM7PR02MB6356:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2PR02MB10160.eurprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366007)(376005)(1800799015); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DU2PR02MB1016053785410738A21476D1188032DU2PR02MB10160eu_"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c8b39454-ecaf-4266-d058-08dc557d994b
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Apr 2024 14:35:11.0774 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NyfdDjkkzOsrSTWlNoOFn7d3YPcd7cfzBx/MFFRyt+D/uC4IDGfxfG4ziK+ZMuDJTl0gatw0F8rE6Cvq6rB4xQXPI2LGqpq8BNQIqTovsBE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR02MB6356
X-TM-AS-ERS: 10.218.35.126-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.0.1002-28300.000
X-TMASE-Result: 10--48.269800-10.000000
X-TMASE-MatchedRID: UEe6CCDNlZzuYusHgJkgyjoSfZud5+GgEUEOJBao4yRaGOYWNVxksm+7 4QBQ4LHT5SEOGeIIsg4rGZl+WouOifknCf5Y5jPYrHCvytg5b463CLdtdG1oCCiWvZLMyc+rv/n LHkYI1eO5PQOzBp9OCaNOXIxVDeaEutvHF25zoU+k8yaNAmZfIQ0hu3ZmIfW6dVdDf+p3DnJ9t8 JTtJvpThnoApnkIMmO4sp79sDrf1KC+Y2uxPjocjKLdeHNQhvIbNSK+DWcxZqSsj39Y+7eNwzJw L9+nQQsGNv//7IO1BxlARECWL4fDWMugLQMu2GX+KgiyLtJrSAxkLdkW7C5qvBtio2KySUUxvnU pXXUe9ELwzLePx5OYcvUi6w3vfTkCKFDk1kJexIz0SQBTPKW4bQ2IpPB7zc93rE8Oo7Zj67vPrW B/m7DXz10DJ+BbCjaxOHHA5l3Dp0X6pCkJZNSOU+GXNpGtDoYMbjv12PWhcdbO7k9Vgx9FoSS38 vwe0AnJsstvJIG6l5gWedfbeR/vTz6L+U/pejxTSz0JdEAJbTv/JaPjbGBl10QTojKLQVyonezS FCgVadcWPWm98SUsZ7RVKDtnR4hDG/+epQxc0b9zML+ydOw177LhjjzshwBa92W1BgviofwAkZL sjriXauVCdsHobg3ZxXixh+oxh4E7TRD/Y9CzyRfLRRLTnaruCF0N8/HZ2rIhVAD8ND4t9wcZK0 JUjvdPMp4ulOr3sIqXuKH5Jbj7LGWmeVAULKHwTlc9CcHMZcuPHQ6kqUzSexaIFENL1fYM9qsDs wKJ2tbj6b8Z54R4Ey4wu+wGbyTTjAbyA+i2ql9LQinZ4QefLx5HT4ZzaY/IT3mlTBx7EzjCeE5v 4lH5OoKEDqVJEm+0u+wqOGzSV1v3qL6X6HuCsMVrGYAcjcWhbGZWXEjTYXfd+P6wwCt8xoxTJ4L Sy1oSRUA+vRNdLw=
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/CHXUSEg2HMlw9oJXBFEMWS1M0yQ>
Subject: Re: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-26.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Apr 2024 14:35:52 -0000

Hi Kent,

Please see inline.

Cheers,
Med

De : Kent Watsen <kent+ietf@watsen.net>
Envoyé : vendredi 5 avril 2024 15:42
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : netconf@ietf.org
Objet : Re: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-26.txt

Hi Med,

Thanks for taking a look.
Comments below.

The net-net is that I think we can ask RFC Editor to
tweak the tree-diagram and move the 2119/8174-ref
to the Normative section.

Kent



On Apr 5, 2024, at 1:43 AM, mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> wrote:

Hi Kent,

Thank you for taking care of this.

(1) There is a nit in the tree diagram:

OLD:
      |  +-- local-address?   inet:ip-address

NEW:
      |  +-- local-address   inet:ip-address

I use scripts to build the draft.
These scripts auto-generate a new tree diagram each time...

Is pyang broken?  I’m using the latest (2.6.0)
My command is:
    pyang -f tree --tree-line-length 69 --tree-print-groupings --tree-no-expand-uses ietf-tcp-server@*.yang<mailto:ietf-tcp-server@*.yang>

Running manually I get the same thing.
Removing the “min-elements” has no effect.

Adding a “mandatory true” to the “local-address” leaf fixes
  - but shouldn’t be necessary!

Wrapping the grouping in a “container” also fixes
  - but we’re trying to print a grouping
  - still, it shows inconsistency in pyang

I can either manually edit the XML before submission, or ask RFC Editor to fix…


(2) When going through the text, I see that the security template was not followed, e.g.,

OLD:
   The "ietf-tcp-server" YANG module defines "grouping" statements that
   are designed to be accessed via YANG based management protocols, such
   as NETCONF [RFC6241] and RESTCONF [RFC8040].  Both of these protocols
   have mandatory-to-implement secure transport layers (e.g., SSH, TLS)
   with mutual authentication.

NEW:
   The "ietf-tcp-server" YANG module defines "grouping" statements that
   are designed to be accessed via network management protocols such
   as NETCONF [RFC6241] or RESTCONF [RFC8040].  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) [RFC6242].  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   [RFC8446].

rfc8407bis isn’t published yet…
[Med] This is the actual template since 2018! Please see https://wiki.ietf.org/group/ops/yang-security-guidelines

My text is better:
  - more concise
  - more accurate
             - NETCONF supports other transports besides SSH
             - RESTCONF supports other transports beside TLS

I suggest fixing rfc8407bis



+ Add 6242/8446 as normative.

My text does not reference these two RFCs (see above)
  - no update needed.
[Med] It should per “Note: [RFC 8446<https://datatracker.ietf.org/doc/rfc8446/>], [RFC6241<https://datatracker.ietf.org/doc/rfc6241/>], [RFC6242<https://datatracker.ietf.org/doc/rfc6242/>], [RFC8341<https://datatracker.ietf.org/doc/rfc8341/>], and [RFC8040<https://datatracker.ietf.org/doc/rfc8040/>] must be "normative references" from the template.


(4) Idem for 5.2, 5.3

ACK, but see above.


(5) Also, at least the following should be moved to be listed as Normative:

   [RFC3688]  Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
              DOI 10.17487/RFC3688, January 2004,
              <https://www.rfc-editor.org/info/rfc3688>.

IMO, understanding this RFC isn’t required to implement this document.
  - e.g., server only needs to know what the namespace is, which is defined in this document



   [RFC6241]  Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
              and A. Bierman, Ed., "Network Configuration Protocol
              (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
              <https://www.rfc-editor.org/info/rfc6241>.

IMO, understanding this RFC isn’t required to implement this document.
  - e.g., implementation may not be a NETCONF server
[Med] Please see the note above



   [RFC8040]  Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF
              Protocol", RFC 8040, DOI 10.17487/RFC8040, January 2017,
              <https://www.rfc-editor.org/info/rfc8040>.

IMO, understanding this RFC isn’t required to implement this document.
  - e.g., implementation may not be a NETCONF server
[Med] Please see the note above.



   [RFC8342]  Bjorklund, M., Schoenwaelder, J., Shafer, P., Watsen, K.,
              and R. Wilton, "Network Management Datastore Architecture
              (NMDA)", RFC 8342, DOI 10.17487/RFC8342, March 2018,
              <https://www.rfc-editor.org/info/rfc8342>.

IMO, understanding this RFC isn’t required to implement this document.
  - e.g., only servers implementing NMDA care, right?
[Med] I also cited it as informative in few RFCs (RFC9181/RFC9408), but when I started the work in the bis, I convinced myself that it is normative for the simple reason that the statement can’t be assessed without know what NDMA is about. It seems that few of us went for informative vs. normative: Please see https://datatracker.ietf.org/doc/rfc8342/referencedby/.



I think the same ref issue applies for the other documents in the set. For some of them (e.g., draft-ietf-netconf-keystore), the following should be moved to the normative list as well:

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

This is probably true.

Note that *this* draft has 2119/8174 in the Normative section.

I can fix for future drafts, and ask RFC Editor to drafts in their queue.



Apologies for not reporting this earlier as I was not following these doc.

Thank you.

No worries and thank you!

Kent



Cheers,
Med

De : netconf <netconf-bounces@ietf.org<mailto:netconf-bounces@ietf.org>> De la part de Kent Watsen
Envoyé : jeudi 4 avril 2024 23:01
À : netconf@ietf.org<mailto:netconf@ietf.org>
Objet : Re: [netconf] I-D Action: draft-ietf-netconf-tcp-client-server-26.txt


Dear WG,

-25 reflects what I sent for review last week.
-26 just adds a “min-elements 1” statement to the local-bind list to ensure at least one is configured.

The -26 update is safe as [1] says:

              o  A leaf-list or list node may get a different "min-elements" or
                  "max-elements" statement.

Which means consuming models can still adjust the min-elements value as needed.

[1] https://datatracker.ietf.org/doc/html/rfc7950#section-7.13.2

Kent // author





On Apr 4, 2024, at 4:53 PM, internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> wrote:

Internet-Draft draft-ietf-netconf-tcp-client-server-26.txt is now available.
It is a work item of the Network Configuration (NETCONF) WG of the IETF.

  Title:   YANG Groupings for TCP Clients and TCP Servers
  Authors: Kent Watsen
           Michael Scharf
  Name:    draft-ietf-netconf-tcp-client-server-26.txt
  Pages:   39
  Dates:   2024-04-04

Abstract:

  This document presents three YANG 1.1 modules to support the
  configuration of TCP clients and TCP servers.  The modules include
  basic parameters of a TCP connection relevant for client or server
  applications, as well as client configuration required for traversing
  proxies.  The modules can be used either standalone or in conjunction
  with configuration of other stack protocol layers.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-netconf-tcp-client-server/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-netconf-tcp-client-server-26.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-netconf-tcp-client-server-26

Internet-Drafts are also available by rsync at:
rsync.ietf.org<http://rsync.ietf.org/>::internet-drafts


_______________________________________________
netconf mailing list
netconf@ietf.org<mailto:netconf@ietf.org>
https://www.ietf.org/mailman/listinfo/netconf


____________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.