Re: [netconf] AD review of draft-ietf-netconf-http-client-server-13

"Rob Wilton (rwilton)" <rwilton@cisco.com> Fri, 26 January 2024 18:05 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36EFDC1CAF7D; Fri, 26 Jan 2024 10:05:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.905
X-Spam-Level:
X-Spam-Status: No, score=-11.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fqND2ml1qtVa; Fri, 26 Jan 2024 10:05:11 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E078C151099; Fri, 26 Jan 2024 10:05:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=38744; q=dns/txt; s=iport; t=1706292311; x=1707501911; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=NYg/G1gj1vjp3zJbF5VNaUm7FoMguuW0n5OQYFNiLf8=; b=JCiJiaoYZeSOrLO0ewJWxf/ov8H/SwZZRzpcjH3DwpMWynV5lzP2H9vm 07cEQF8BVJjHoG2C5ls+QrO3BnhBtqI3MqyPlLgPPvibpCztzyixt5lDU /4w3O3Hwt+zTnM6m1dMwQCSKV1CueUl0L4r7UbEXXAWu2KN3sjhtzwLvt Q=;
X-CSE-ConnectionGUID: 13mR27ZDTgGKNIhbXgZXww==
X-CSE-MsgGUID: J1GEnbHlRAKvlc30GhAAbA==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:sriWlBC04MFJcKzI8/EFUyQVpxdPi9zP1kY98JErjfdJaqu8us+kN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HvBY/Wk8Ox/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd54J6Q8wQeBrnpTLuJRw24pbV7GlBfn7cD295lmmxk=
IronPort-Data: A9a23:5Nv5QK/zhX7S+JdPlE63DrUDt36TJUtcMsCJ2f8bNWPcYEJGY0x3x mNKWz2OafeLa2Wgf4tyYdmw8BxVsMDSyt8wQAM9ri1EQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEzmE4E/ra+C9xZVF/fngbqLmD+LZMTxGSwZhSSMw4TpugOdRbrRA2bBVOCvT/ 4uvyyHjEAX9gWIsazhIs/vrRC5H5ZwehhtJ5jTSWtgT1LPuvyF9JI4SI6i3M0z5TuF8dgJtb 7+epF0R1jqxEyYFUrtJoJ6iGqE5auK60Ty1t5Zjc/PKbi6uCcAF+v1T2PI0MS+7gtgS9jx74 I0lWZeYEW/FMkBQ8QgQe0EwLs1wAUFJ0OacJELl7v6/80LpUF3Nw/9eA3MGIpJNr46bAUkWn RAZACoGYhbGjOWszffiE69nh98oK4/gO4Z3VnNIlG6CS615B8GYBfyWure03x9o7ixKNezBZ s4FbjxHZxXbaBoJMVASYH47tL731iCuLGUH8Dp5o4IVukf+ygZR1ILEE8TRcYfSasV8t0yx8 zeuE2PRWUxCa4fFllJp6EmEivXGkz++WY8OGvi+++Jhh1udg2wPFAVTXl+6rP+lz1WzQcxSM Qod/i4GrKUu+gqsVNaVdxu1vHWDuBA0WtdMHas98g7l90bPyxySCm5BRTlbZZl/7Yk9RCch0 RmCmNaB6SFTXKO9ECmYzO3Lnx+ONgc2C04Cbx8Lfzsa/Iy2yG0stS7nQtFmGa+zq9T6HzDs3 jyHxBTSYZ1O3abnMI3mrTj6byKQm3TfcuIiCuzqso+N9Ah1YsuuYJalrAGCq/1BN42eCFKGu RDoevRyDshQU/lhdwTUHI3h+Y1FAd7eb1UwZnY0QPEcG8yFoSLLQGypyGgWyL1VGsgFYyT1R 0TYpBlc4pReVFPzMvcpOdruV5Rxkvm9fTgAahwyRocfCnSWXFLWlByCmWbOt4wQuBF1zvFhY 8vznTiEVC5FUMyLMwZat89GjOd0nXphrY8ibZv61B+gmaGPf2KYTKxNMV2FKIgEAFCs/m3oH yJkH5LSkX13CbSmCgGOqNJ7BQ5RdxATW8upw/G7g8beeGKK7kl7Va+IqV7gEqQ495loehDgp yniCxMHlgej1BUq62yiMxheVV8mZr4mxVoTNi03NlHu0H8mCbtDJo9EH3frVdHLLNBe8MM=
IronPort-HdrOrdr: A9a23:7W5+manp6IgvumKqy7mzegf8A8DpDfNliWdD5ihNYBxZY6Wkfp +V7ZcmPE7P6Ar5BktApTnZAtj/fZq9z/JICYl4B8bFYOCUghrYEGgC1/qv/9SOIVyFygcw79 YFT0E6MqyOMbEYt7e03ODbKadc/DDvysnB7omurQYJcegpUdAd0+4TMHfjLqQCfng8OXNPLu vl2iMonUvGRV0nKu6AKj0uWe/Fq9fXlJTgTyInKnccgjWmvHeD0pK/NwKX8Cs/flp0rIvK91 KrryXJooGY992rwB7V0GHeq75MnsH699dFDMuQzuAINzTFkG+TFcVccozHmApwjPCk6V4snt WJiQwnJd5P53TYeXzwiQfx2jPnzC0l5xbZuB+laDrY0I/ErQABeo98bLFiA1/kAo0bzZZBOZ dwriCkXlxsfFX9dWrGloH1vlpR5zqJSDIZ4J0uZjpkIMUjgHs7l/1FwKuTe61wRB7S+cQpFv JjA9rb4+sTeVSGb2rBtm0q29C0WG8vdy32CXTql/blmgS+pkoJh3cw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAiiVKCi8fV66MBDiDuUKKnjNo5n47PE84/yrYoUByN83lI 7aWF1VuGYucwblCNGI3pdM7hfRKV/NFwjF24Vb/dx0q7f8TL3kPWmKT00vidKpp7EFDsjSS5 +ISeRr6j/YXBzT8KpyrnnDssNpWAsjueUuy6MGZ24=
X-Talos-CUID: 9a23:qj8NIW1bHVMD+tI+tmnnnrxfQ5sgSCeC/lvsLGCbL0dpQo2ae2+P5/Yx
X-Talos-MUID: 9a23:WUYQqQ8DWdk6WFpY5GrmiVqQf+UxzImoAmAJq7wlpc2PbnRfOx60hh3iFw==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jan 2024 18:05:09 +0000
Received: from rcdn-opgw-3.cisco.com (rcdn-opgw-3.cisco.com [72.163.7.164]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 40QI5924009535 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 26 Jan 2024 18:05:09 GMT
X-CSE-ConnectionGUID: sQwuQk4fRue5WN32OrseJw==
X-CSE-MsgGUID: BwWXlIS/R9eFpiSo2wjZSQ==
Authentication-Results: rcdn-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.05,216,1701129600"; d="scan'208,217";a="11074235"
Received: from mail-bn7nam10lp2100.outbound.protection.outlook.com (HELO NAM10-BN7-obe.outbound.protection.outlook.com) ([104.47.70.100]) by rcdn-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jan 2024 18:05:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=M+GIeUTHSzxJ+7/DtfiH1/TvoqOX5fpBVn/qMzxYsJClSS37k3cz4KDlAFJNHEwYl2C7xwoKOiu7lBdq5X+0H9U0J1813H4GYJbhLWX3OfuWdxwo6G65MgPWPaLUDmW2I4DuQl5DjQ5WWkDRzedSRABREZ2bpZ2DIOo+a/w0B6CxTOamz1w6f31R4i/ap92zTZ66d8vAYRYJOiJbpsQoOsHAwGsAK51uYCIoX3WiVKl1OfuWKU1dus2mSFXBDbXARK73Ke3+Vefp4vFVB+FIMj/y8bfKv9rr+jJ/tOqCmSvAYvV8MX40T1kY1bMDlmIoLYRlpRbYaeRS5Nb9bWInOQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NYg/G1gj1vjp3zJbF5VNaUm7FoMguuW0n5OQYFNiLf8=; b=QYQNjX+kPIHcCKDgyUgU45jzYZvDnGttasvUh6gyQM043nGw3fkpD0JDxtt1RULW1LBfkPKbl9POHqxAAi1cGpJgpzkBqxakQgIsGn1lGyOXN6xnUNpZcayrNH8QhxePFNaJH55cxctPU8vit9vjEENj1xhhaoR7XecXRNt3py2wY7yWXFYhDura/WZCLuc64sInVf11y5ejm3NSaBgIFcoWsxNbr2JEEgVC3ZNAmi5UlddfXJOVNOQ7BQ+w/WdCYgb+sVP3OD4bt0K0TfWUgDmrkMzwdAO/la9Y2JtxfAwy4BO1LeN33etnHpkDrXHM19ECNfirMnViDwmRONgh+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from LV8PR11MB8536.namprd11.prod.outlook.com (2603:10b6:408:1ec::19) by DM4PR11MB8089.namprd11.prod.outlook.com (2603:10b6:8:17f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.27; Fri, 26 Jan 2024 18:05:06 +0000
Received: from LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d]) by LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d%2]) with mapi id 15.20.7228.026; Fri, 26 Jan 2024 18:05:06 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "netconf@ietf.org" <netconf@ietf.org>, "draft-ietf-netconf-http-client-server.all@ietf.org" <draft-ietf-netconf-http-client-server.all@ietf.org>
Thread-Topic: [netconf] AD review of draft-ietf-netconf-http-client-server-13
Thread-Index: AdmoS6AJscnDbXd/RRKccOpuX48wtCKj7LOAB2iWmDo=
Date: Fri, 26 Jan 2024 18:05:06 +0000
Message-ID: <LV8PR11MB8536C902208A2DBC1758D902B5792@LV8PR11MB8536.namprd11.prod.outlook.com>
References: <BY5PR11MB4196B88C4782033094CD3852B526A@BY5PR11MB4196.namprd11.prod.outlook.com> <0100018c849edd6a-1a61b612-ab12-45a1-9db2-a304fd320ec5-000000@email.amazonses.com>
In-Reply-To: <0100018c849edd6a-1a61b612-ab12-45a1-9db2-a304fd320ec5-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV8PR11MB8536:EE_|DM4PR11MB8089:EE_
x-ms-office365-filtering-correlation-id: 893ce151-9925-4648-a6e9-08dc1e9953d4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV8PR11MB8536.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(346002)(366004)(39860400002)(136003)(396003)(230922051799003)(1800799012)(186009)(451199024)(64100799003)(9686003)(26005)(7696005)(6506007)(71200400001)(83380400001)(55016003)(53546011)(8936002)(8676002)(4326008)(5660300002)(52536014)(478600001)(66556008)(54906003)(64756008)(66476007)(66946007)(66446008)(91956017)(86362001)(76116006)(122000001)(316002)(38100700002)(41300700001)(33656002)(38070700009)(2906002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV8PR11MB8536C902208A2DBC1758D902B5792LV8PR11MB8536namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV8PR11MB8536.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 893ce151-9925-4648-a6e9-08dc1e9953d4
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jan 2024 18:05:06.4663 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: c2W5xZjIs8+dY3OLrc0SZ0JKiKRSxm4l5ryIDgDrIybhsAW9lHprJSyQENFdXh8BNGpDGwJqnTufneSqNWD3Aw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB8089
X-Outbound-SMTP-Client: 72.163.7.164, rcdn-opgw-3.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/VaPmnElM5WUiIwixtM0ZyrBY5Xk>
Subject: Re: [netconf] AD review of draft-ietf-netconf-http-client-server-13
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Jan 2024 18:05:15 -0000

HI Kent,

I’ve given some replies inline, but in short, I think that what you have is fine and hence I will initiate IETF LC on this draft.

inline …

From: Kent Watsen <kent+ietf@watsen.net>
Date: Wednesday, 20 December 2023 at 00:27
To: Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org>
Cc: netconf@ietf.org <netconf@ietf.org>, draft-ietf-netconf-http-client-server.all@ietf<mailto:draft-ietf-netconf-http-client-server.all@ietf>.org <draft-ietf-netconf-http-client-server.all@ietf.org>
Subject: Re: [etconf] AD review of draft-ietf-netconf-http-client-server-13
Hi Rob,

Thank you for your review.
Please see below for responses to your comments.

Kent // author



On Jun 26, 2023, at 12:36 PM, Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org> wrote:

Hi Kent,

This is my AD review of draft-ietf-netconf-http-client-server-13.  Another great, easy to read document, thanks.

Moderate level comments:

(1) p 3, sec 1.1.  Relation to other RFCs

                                 crypto-types
                                   ^      ^
                                  /        \
                                 /          \
                        truststore         keystore
                         ^     ^             ^  ^
                         |     +---------+   |  |
                         |               |   |  |
                         |      +------------+  |
  tcp-client-server      |     /         |      |
     ^    ^        ssh-client-server     |      |
     |    |           ^            tls-client-server
     |    |           |              ^     ^        http-client-server
     |    |           |              |     |                 ^
     |    |           |        +-----+     +---------+       |
     |    |           |        |                     |       |
     |    +-----------|--------|--------------+      |       |
     |                |        |              |      |       |
     +-----------+    |        |              |      |       |
                 |    |        |              |      |       |
                 |    |        |              |      |       |
              etconf-client-server       restconf-client-server

Looking at the YANG, I would have thought that http-client-server should have a normative reference to tcp, and tls that isn’t illustrated in the diagram above.  E.g., I reviewed this document before tls because I thought that it had no dependency from the diagram.


First, I note that Section 2.1.2.2. was wrong, but fixed it as follows:

OLD:
                 The “http-client-grouping” defines the configuration for just
                 “HTTP” part of a protocol stack.  It does not, for instance,
                 define any configuration for the “TCP” or “TLS” protocol layers
                 (for that, see <xref target=”http-client-stack-grouping”/>).

NEW:
                The “http-client-grouping” primarily (not including
                the proxy configuration) defines the configuration for just
                “HTTP” part of a protocol stack.  It does not, for instance,
                define any configuration for the “TCP” or “TLS” protocol layers
                (for that, see <xref target=”http-client-stack-grouping”/>).

With this understanding in place, please take another look at the paragraph just above the diagram, reproduced below:

             The dependency relationship between the primary YANG groupings
             defined in the various RFCs is presented in the below diagram.
             In some cases, a draft may define secondary groupings that
             introduce dependencies not illustrated in the diagram.

Note in particular the word “primary” in the first sentence, and also the entirety of the last sentence.

My feeling is that this text allows the dependencies in the artwork to be valid / okay – agreed?


Yes, probably okay.  I still feel it is a little bit misleading but it would probably make the diagram look quite a lot more complicated, so I’m happy to leave it as is, and see if anyone else complains.


(2) p 25, sec 4.1.  The "ietf-http-client" YANG Module

  None of the writable data nodes defined in this YANG module are
  considered sensitive or vulnerable in network environments.  The NACM
  "default-deny-write" extension has not been set for any data nodes
  defined in this module.

Should 'client-identity' in http-client-identity-grouping be listed here?  It has a default-deny-write extension.  A similar comment applies for 'proxy-connect'.

Fixed/added



(3) p 26, sec 4.2.  The "ietf-http-server" YANG Module

  None of the writable data nodes defined in this YANG module are
  considered sensitive or vulnerable in network environments.  The NACM
  "default-deny-write" extension has not been set for any data nodes
  defined in this module.

Should 'server-name', 'client-authentication', and users/user/basic/password be listed here?  They all have default-deny-write NACM extension statements defined on them.

Fixed/added


Minor level comments:

(4) p 1, sec

  The "Relation to other RFCs" section Section 1.1 contains a self-
  reference to this draft, along with a corresponding Informative
  Reference in the Appendix.

Note to clarify the instruction to the RFC editor.

Per reviews in other drafts, the following note to the RFC Editor will now appear in all the drafts:

          The "Relation to other RFCs" section <xref target="collective-effort"/> contains
          a self-reference to this draft, along with a corresponding reference in
          the Appendix.  Please replace the self-reference in this section with "This RFC"
          (or similar) and remove the self-reference in the "Normative/Informative References"
          section, whichever it is in.



(5) p 4, sec 1.4.  Conventions

  Various examples used in this document use a placeholder value for
  binary data that has been base64 encoded (e.g., "BASE64VALUE=").
  This placeholder value is used as real base64 encoded structures are
  often many lines long and hence distracting to the example being
  presented.

I couldn't see any usage of BASE64VALUE, perhaps this paragraph can be removed?

Removed.  Also removed in the restconf-client-server draft.



(6) p 8, sec 2.1.2.3.  The "http-client-stack-grouping" Grouping

     -  The "tcp-client-grouping" grouping is discussed in
        Section 3.1.2.1 of [I-D.ietf-netconf-tcp-client-server].
     -  The "tls-client-grouping" grouping is discussed in
        Section 3.1.2.1 of [I-D.ietf-netconf-tls-client-server].
     -  The "http-client-grouping" grouping is discussed in
        Section 2.1.2.2 in this document.

Would it be helpful to also include the expanded tree, perhaps in an appendix if it is quite long?

The issue isn’t that they’re long, but that they line-wrap so much as to become unreadable.

The WG made a decision a long time back to just have the unexpanded trees in the *-client-server modules because of this.

Ack.



(7) p 8, sec 2.1.3.  Protocol-accessible Nodes

  The "ietf-http-client" module defines only "grouping" statements that
  are used by other modules to instantiate protocol-accessible nodes.

Same comment as per other draft review as to whether this paragraph is helpful/required.

Same response as before, I added a second sentence to make the section easier to read.



(8) p 8, sec 2.2.  Example Usage

  <http-client xmlns="urn:ietf:params:xml:ns:yang:ietf-http-client">
    <client-identity>
      <basic>
        <user-id>bob</user-id>
        <cleartext-password>secret</cleartext-password>
      </basic>
    </client-identity>
  </http-client>

I find this example slightly confusing (relative to the description) because it never identifies the server that it is purportedly connecting to.  This is also true for the connection via a proxy.

The grouping “http-client-grouping” is what is commonly put into a container called “http-client-parameters”, which would be after, e.g., “tcp-client-parameters” and “tls-client-parameters”.   As such, the "http-client-grouping” itself doesn’t specify the HTTP server being connected to.

Elsewhere in the module there is the grouping "http-client-stack-grouping” that defines the whole “stack” (tcp+http and also tcp+tls+http), but this grouping does not have an example for it.

You are right that the text preceding the example is misleading.  To address this, I added the second sentence below:

          The following example illustrates the case where the HTTP client
          connects directly to an HTTP server.  Note, the information identifying
          the remote server (e.g., its hostname) would be configured in the
          "tcp-client-grouping" (not shown).


Thanks.


(9) p 13, sec 2.3.  YANG Module

        presence
          "Indicates that a proxy server connections have been
           configured.  This statement is present so the mandatory
           descendant nodes do not imply that this node must be
           configured.";

As per a similar comment on the TCP draft, I wonder whether a presence container is needed here, or whether it would be better to move it down to the containers under the case statements?

The “case” statement itself is “mandatory true”.  The presence statement is needed here because the "proxy-connect” node is optional to configure.

This is okay.  I still think that it would be slightly better to have the presence containers under the case statements (and drop the presence statement from the proxy-connect container), but I think that functionality wise they equate to the same thing and I’m happy for you to leave it as is.

Regards,
Rob




Regards,
Rob

Kent