Re: [netconf] Adoption poll for draft-jgc-netconf-privcand-02

"maqiufang (A)" <maqiufang1@huawei.com> Wed, 16 August 2023 10:44 UTC

Return-Path: <maqiufang1@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19BC2C14F748 for <netconf@ietfa.amsl.com>; Wed, 16 Aug 2023 03:44:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M94BH29eR9SX for <netconf@ietfa.amsl.com>; Wed, 16 Aug 2023 03:44:23 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3591C15109A for <netconf@ietf.org>; Wed, 16 Aug 2023 03:44:22 -0700 (PDT)
Received: from lhrpeml100001.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4RQl5c4sdqz67GX0 for <netconf@ietf.org>; Wed, 16 Aug 2023 18:40:20 +0800 (CST)
Received: from kwepemm000019.china.huawei.com (7.193.23.135) by lhrpeml100001.china.huawei.com (7.191.160.183) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Wed, 16 Aug 2023 11:44:19 +0100
Received: from kwepemm600017.china.huawei.com (7.193.23.234) by kwepemm000019.china.huawei.com (7.193.23.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.31; Wed, 16 Aug 2023 18:44:17 +0800
Received: from kwepemm600017.china.huawei.com ([7.193.23.234]) by kwepemm600017.china.huawei.com ([7.193.23.234]) with mapi id 15.01.2507.031; Wed, 16 Aug 2023 18:44:17 +0800
From: "maqiufang (A)" <maqiufang1@huawei.com>
To: Kent Watsen <kent+ietf@watsen.net>, "netconf@ietf.org" <netconf@ietf.org>
Thread-Topic: [netconf] Adoption poll for draft-jgc-netconf-privcand-02
Thread-Index: AQHZzvRXoQLbS511tEmTO9vRNnWwva/rEaYA
Date: Wed, 16 Aug 2023 10:44:17 +0000
Message-ID: <f177a7bbbcfc4df683a1325751d7b822@huawei.com>
References: <01000189f5e5d5b7-03439005-5f58-4a13-be25-e26dd0b2d7df-000000@email.amazonses.com>
In-Reply-To: <01000189f5e5d5b7-03439005-5f58-4a13-be25-e26dd0b2d7df-000000@email.amazonses.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.136.118.147]
Content-Type: multipart/alternative; boundary="_000_f177a7bbbcfc4df683a1325751d7b822huaweicom_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/GSKmkxd55OsT4_vz_PaaJE4xatA>
Subject: Re: [netconf] Adoption poll for draft-jgc-netconf-privcand-02
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Aug 2023 10:44:27 -0000

Hi, Kent, all

I have read the current version of the document and support the adoption of this work.

It is a useful work, the conflict detection and resolution look good to me, but I do have a couple of comments elsewhere, some of which might need more discussion:


1.       Private candidate solution for RESTCONF protocol

The current document states the private candidate used by RESTCONF exists only for the duration of the RESTCONF request, and any changes made to the private candidate datastore will be immediately committed to running. It is similar to 8040, but I think this doesn’t make much sense to introduce private candidate to RESTCONF. I don’t really understand what extra value private-candidate brings for RESTCONF protocol.

There seems to be a desire to allow some mechanisms in NC also work in RC, does this mean that it is desirable for RC to also hold the configuration in private candidate and commit to the running whenever it’s ready?


2.       Collectively supporting of both shared candidate and private candidate

The proposed solution requires the server to declare both the support for private candidate and the shared candidate capability to use the private candidate datastore, and the client also needs to send the private-candidate capability to enable the private candidate mode.

But it seems to me that if a server supports private-candidate, there is no need for it to maintain a shared candidate datastore any longer.  Any client can still use the “candidate” target in the edit-config/edit-data operation, but the configuration modification is actually made to the private candidate datastore by the server.

A client receiving the private candidate capability in server’s <hello> message, understands that the candidate datastore is now exclusive and a <lock> towards it is no longer needed, the legacy client if not understanding the private candidate capability can still simply behave the same way and lock the private candidate but this is no harm. Make sense?


3.       Missing YANG model

The document defines a new operation named <update> and augments the <compare> RPC operation defined in RFC 9144 to allow the client specify a historical private candidate, but I don’t see the related RPC definition and augmentation.


4.       Sec.4.6.2.2 <lock> and <unlock>

“Performing a <lock>/<unlock> on the private-candidate datastore is a valid operation. This will also lock/unlock the running configuration.”

Any consideration for the <lock>/<unlock> operation to perform on the both private-candidate and running datastores? This is inconsistent with 6241. NETCONF defines if the client specifies candidate datastore to be locked, then only candidate datastore is locked. I am not sure it is a good practice to change the lock behavior in this document.

It seems that there is no need for a client to lock the private candidate datastore, but it is okay. If that happens, a server could just do nothing.

Best Regards,
Qiufang

From: netconf [mailto:netconf-bounces@ietf.org] On Behalf Of Kent Watsen
Sent: Tuesday, August 15, 2023 5:14 AM
To: netconf@ietf.org<mailto:netconf@ietf.org>
Subject: [netconf] Adoption poll for draft-jgc-netconf-privcand-02


All,

This is start of a two week poll on making https://datatracker.ietf.org/doc/html/draft-jgc-netconf-privcand-02 a working group document.  Following up of the presentation and polls from the 117 session, please note that in-room poll indicated strong support for this work, though not many had read the current version of the draft.

Please send email to the list indicating "yes/support” or "no/do not support".  If indicating no, please state your reservations
with the document.  If yes, please also feel free to provide comments you'd like to see addressed once the document is a WG document.

The poll ends August 28.

Kent and Mahesh (as co-chairs)