Re: [netconf] I-D Action: draft-ietf-netconf-udp-client-server-01.txt

Alex Huang Feng <alex.huang-feng@insa-lyon.fr> Wed, 20 March 2024 02:27 UTC

Return-Path: <alex.huang-feng@insa-lyon.fr>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB7BFC17C882; Tue, 19 Mar 2024 19:27:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.263
X-Spam-Level:
X-Spam-Status: No, score=0.263 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_HELO_IP_MISMATCH=2.368, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=insa-lyon.fr
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h0R8K9Rou03z; Tue, 19 Mar 2024 19:27:26 -0700 (PDT)
Received: from smtpout01-ext2.partage.renater.fr (smtpout01-ext2.partage.renater.fr [194.254.240.33]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A83C1519BA; Tue, 19 Mar 2024 19:27:19 -0700 (PDT)
Received: from zmtaauth03.partage.renater.fr (zmtaauth03.partage.renater.fr [194.254.240.26]) by smtpout10.partage.renater.fr (Postfix) with ESMTP id 2DC366798A; Wed, 20 Mar 2024 03:27:14 +0100 (CET)
Received: from zmtaauth03.partage.renater.fr (localhost [127.0.0.1]) by zmtaauth03.partage.renater.fr (Postfix) with ESMTPS id 1FDA480021; Wed, 20 Mar 2024 03:27:14 +0100 (CET)
Received: from localhost (localhost [127.0.0.1]) by zmtaauth03.partage.renater.fr (Postfix) with ESMTP id 0C694800B4; Wed, 20 Mar 2024 03:27:14 +0100 (CET)
DKIM-Filter: OpenDKIM Filter v2.10.3 zmtaauth03.partage.renater.fr 0C694800B4
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=insa-lyon.fr; s=CB289C06-95B8-49FE-9C4B-D197C6D2E7CB; t=1710901634; bh=A6hzQpmTX7tT4Q/D645Zl4VpsRFXFOsjI+uGpyfK9IU=; h=Mime-Version:From:Date:Message-Id:To; b=hPQ9uNvdilGqCqjYyoLh6pR+qeepnzHO1JJvw2QNY1lwpoh3n64xtg9I1NUh+ruV+ hFk19L7nd10CtJwPGg7r0csp3ktLXdDjcxQ9jr6DU+AZ2YMPnvK5cGNuggXM8ERq0m q6liSWjlYOMJXQgP6dFRZLTGg3naWWK4RDUjh9fU7VnyW35oY1UKoU48Ha3qnJDiNW 0VU6Ac9QlDDp43FRZpEQ2fRHmmnbYnPJ4HMIiBCruuuCKs2sZWSY5zAvIJunKWqP9n mksJ6fZ8NFUsGsQebh2SK8VaAdxKW6A4USShzqupmfKvobKXta0OmCXM8nsfQKAouI GPGa/bqfMSXIg==
Received: from zmtaauth03.partage.renater.fr ([127.0.0.1]) by localhost (zmtaauth03.partage.renater.fr [127.0.0.1]) (amavis, port 10026) with ESMTP id zsZBQsig5VRc; Wed, 20 Mar 2024 03:27:13 +0100 (CET)
Received: from 150.246.26.49 (unknown [194.254.241.251]) by zmtaauth03.partage.renater.fr (Postfix) with ESMTPA id AEBC380021; Wed, 20 Mar 2024 03:27:11 +0100 (CET)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6\))
From: Alex Huang Feng <alex.huang-feng@insa-lyon.fr>
In-Reply-To: <DU2PR02MB101605F558AA9AC7C0D3BB5DA88332@DU2PR02MB10160.eurprd02.prod.outlook.com>
Date: Wed, 20 Mar 2024 11:26:58 +0900
Cc: netconf <netconf@ietf.org>, Kent Watsen <kent+ietf@watsen.net>, Pierre Francois <pierre.francois@insa-lyon.fr>, "draft-ietf-netconf-udp-notif.authors@ietf.org" <draft-ietf-netconf-udp-notif.authors@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <A342CF8A-D816-4E57-8390-40AEDDF5F3D5@insa-lyon.fr>
References: <170902103504.20636.1987971235893076436@ietfa.amsl.com> <2DC5FC5E-CDBD-4673-889C-61A48D4C3BB5@insa-lyon.fr> <DU2PR02MB101605F558AA9AC7C0D3BB5DA88332@DU2PR02MB10160.eurprd02.prod.outlook.com>
To: mohamed.boucadair@orange.com
X-Mailer: Apple Mail (2.3731.700.6)
X-Virus-Scanned: clamav-milter 0.103.8 at clamav03
X-Virus-Status: Clean
X-Renater-Ptge-SpamState: clean
X-Renater-Ptge-SpamScore: -100
X-Renater-Ptge-SpamCause: gggruggvucftvghtrhhoucdtuddrgedvledrledvgddujecutefuodetggdotefrodftvfcurfhrohhfihhlvgemucftgffptefvgfftnecuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpegtggfuhfgjffevgffkfhfvofesthhqmhdthhdtjeenucfhrhhomheptehlvgigucfjuhgrnhhgucfhvghnghcuoegrlhgvgidrhhhurghnghdqfhgvnhhgsehinhhsrgdqlhihohhnrdhfrheqnecuggftrfgrthhtvghrnhepueefieefieefleekhfevfeduteffleeilefgiedvuefgudekieegieeiledvudehnecuffhomhgrihhnpehouhhtlhhoohhkrdgtohhmpdhivghtfhdrohhrghenucfkphepudelgedrvdehgedrvdeguddrvdehudenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeduleegrddvheegrddvgedurddvhedupdhhvghlohepudehtddrvdegiedrvdeirdegledpmhgrihhlfhhrohhmpegrlhgvgidrhhhurghnghdqfhgvnhhgsehinhhsrgdqlhihohhnrdhfrhdpnhgspghrtghpthhtohephedprhgtphhtthhopehmohhhrghmvggurdgsohhutggruggrihhrsehorhgrnhhgvgdrtghomhdprhgtphhtthhopehnvghttghonhhfsehivghtfhdrohhrghdprhgtphhtthhopehkvghnthdoihgvthhfseifrghtshgvnhdrnhgvthdprhgtphhtthhopehpihgvrhhrvgdrfhhrrghntghoihhssehinhhs rgdqlhihohhnrdhfrhdprhgtphhtthhopegurhgrfhhtqdhivghtfhdqnhgvthgtohhnfhdquhguphdqnhhothhifhdrrghuthhhohhrshesihgvthhfrdhorhhg
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/RtYeRG8lL1ocfTEzn3SbKHXo5sk>
Subject: Re: [netconf] I-D Action: draft-ietf-netconf-udp-client-server-01.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2024 02:27:31 -0000

Dear Med,

I will change the generic grouping and follow the tcp-client-server groupings structure.
- changing the ip to a generic inet:host
- adding the local-address and local-port to the client

I will check then how to manage all this at the UDP-notif level.

Cheers,
Alex

> On 20 Mar 2024, at 09:29, mohamed.boucadair@orange.com wrote:
> 
> Hi Alex, 
> 
> Thanks for taking care of the comments. 
> 
> For this specific one:
> 
>> The current model was based on the comments that were coming from the
>> UDP-notif YANG model, where the WG felt it was safer to be more
>> conservative on how to configure the udp-notif receiver.
> 
> I don't think we need to restrict the common model based on a very specific use. 
> 
> I do still prefer a consistent approach independent of the transport protocol.  
> 
> Cheers,
> Med
> 
>> -----Message d'origine-----
>> De : Alex Huang Feng <alex.huang-feng@insa-lyon.fr>
>> Envoyé : mardi 27 février 2024 18:06
>> À : netconf <netconf@ietf.org>; BOUCADAIR Mohamed INNOV/NET
>> <mohamed.boucadair@orange.com>
>> Cc : Kent Watsen <kent+ietf@watsen.net>; Pierre Francois
>> <pierre.francois@insa-lyon.fr>; draft-ietf-netconf-udp-
>> notif.authors@ietf.org
>> Objet : Re: [netconf] I-D Action: draft-ietf-netconf-udp-client-
>> server-01.txt
>> 
>> Dear NETCONF WG,
>> 
>> I submitted a new iteration addressing some of the comments from the
>> ML during the adoption call.
>> 
>> Changes:
>> - The ports have become "mandatory false" with a default value of 0
>> following the tcp-client-server model.
>> - Security Considerations is following the template
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwiki
>> .ietf.org%2Fgroup%2Fops%2Fyang-security-
>> guidelines&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C4903e1a9e92
>> 74255fd9508dc376b0a9e%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638
>> 446180073833970%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2
>> luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=zbfiZ3YElo07o1
>> 9C0ySLccaLrEpk4AoHS4TLStewyr8%3D&reserved=0
>> 
>> Med asked why the udp-server model was not following the tcp-server
>> model:
>> grouping tcp-client-grouping:
>>    +-- remote-address                inet:host
>>    +-- remote-port?                  inet:port-number
>>    +-- local-address?                inet:ip-address
>>    |       {local-binding-supported}?
>>    +-- local-port?                   inet:port-number
>>    |       {local-binding-supported}?
>> 
>> The current model was based on the comments that were coming from the
>> UDP-notif YANG model, where the WG felt it was safer to be more
>> conservative on how to configure the udp-notif receiver.
>> As of now, the UDP-notif draft is the main user of this grouping
>> draft.
>> That is the reason why the remote-address is "inet:ip-address-no-zone"
>> instead of a simple "inet:ip-address" or "inet:host" as was defined in
>> the tcp grouping.
>> 
>> My question to the WG is:
>> - Should udp-client-server groupings follow the tcp-client-server
>> groupings models and have generic "inet:host" and local-addresses in
>> the client OR stay conservative following the comments from UDP-notif
>> draft?
>> 
>> One comment on the impacts:
>> - At first, UDP-notif was going to use this generic grouping to
>> configure its receiver (this draft has become a dependance for UDP-
>> notif).
>> If client-server-grouping draft follow the tcp model, should the UDP-
>> notif not use this model and implement a specific one with the
>> "inet:ip-address-no-zone"?
>> 
>> Regarding managing dual stacks on a single server, I don't have an
>> answer, so I am open to any suggestions or contributions.
>> 
>> Cheers,
>> Alex
>> 
>> 
>>> On 27 Feb 2024, at 17:03, internet-drafts@ietf.org wrote:
>>> 
>>> Internet-Draft draft-ietf-netconf-udp-client-server-01.txt is now
>> available.
>>> It is a work item of the Network Configuration (NETCONF) WG of the
>> IETF.
>>> 
>>>  Title:   YANG Groupings for UDP Clients and UDP Servers
>>>  Authors: Alex Huang Feng
>>>           Pierre Francois
>>>           Kent Watsen
>>>  Name:    draft-ietf-netconf-udp-client-server-01.txt
>>>  Pages:   10
>>>  Dates:   2024-02-27
>>> 
>>> Abstract:
>>> 
>>>  This document defines two YANG 1.1 modules to support the
>>>  configuration of UDP clients and UDP servers.
>>> 
>>> The IETF datatracker status page for this Internet-Draft is:
>>> 
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdata
>> tracker.ietf.org%2Fdoc%2Fdraft-ietf-netconf-udp-client-
>> server%2F&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C4903e1a9e927
>> 4255fd9508dc376b0a9e%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6384
>> 46180073841986%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l
>> uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=PAbiUWOrSH1Qi2Z
>> GVy9CFrGiEJFcqAasOkY0vYaFt5k%3D&reserved=0
>>> 
>>> There is also an HTMLized version available at:
>>> 
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdata
>> tracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-netconf-udp-client-server-
>> 01&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C4903e1a9e9274255fd9
>> 508dc376b0a9e%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63844618007
>> 3847727%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
>> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=NmZVjwYZbHbpfhv5m3cd5t
>> %2FFRbFV%2Fa4CgzBK8%2BINlIw%3D&reserved=0
>>> 
>>> A diff from the previous version is available at:
>>> 
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fauth
>> or-tools.ietf.org%2Fiddiff%3Furl2%3Ddraft-ietf-netconf-udp-client-
>> server-
>> 01&data=05%7C02%7Cmohamed.boucadair%40orange.com%7C4903e1a9e9274255fd9
>> 508dc376b0a9e%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C63844618007
>> 3852383%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLC
>> JBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=l1Za3akPcYeXEn%2FagYy%
>> 2Ba9n4K6ZtZAqmM6Mc2tRCfrU%3D&reserved=0
>>> 
>>> Internet-Drafts are also available by rsync at:
>>> rsync.ietf.org::internet-drafts
>>> 
>>> 
>>> _______________________________________________
>>> netconf mailing list
>>> netconf@ietf.org
>>> 
>> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.
>> ietf.org%2Fmailman%2Flistinfo%2Fnetconf&data=05%7C02%7Cmohamed.boucada
>> ir%40orange.com%7C4903e1a9e9274255fd9508dc376b0a9e%7C90c7a20af34b40bfb
>> c48b9253b6f5d20%7C0%7C0%7C638446180073856995%7CUnknown%7CTWFpbGZsb3d8e
>> yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%
>> 7C%7C%7C&sdata=pP6kCUfCJGvwDzlJ08VjjhqoHqfoWWaSsWTu33f%2FIXI%3D&reserv
>> ed=0
> 
> ____________________________________________________________________________________________________________
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>