[netconf] Re: [Tsv-art] UDP default port

Kent Watsen <kent+ietf@watsen.net> Fri, 13 December 2024 16:38 UTC

Return-Path: <01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 631D5C1840D4; Fri, 13 Dec 2024 08:38:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2cuJ-gFF6q_c; Fri, 13 Dec 2024 08:38:17 -0800 (PST)
Received: from a8-83.smtp-out.amazonses.com (a8-83.smtp-out.amazonses.com [54.240.8.83]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77A7BC1840F5; Fri, 13 Dec 2024 08:38:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1734107896; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=MZUEVk2xwxCScBHz7IwDHXGHATowD4/JH9V0xT6yOpk=; b=bbSGwnShxMCXUcZMS5h+/crtiOqis7Q+UhA8kspkTaqZGwu/1q0a8T5FzHybyEjZ fi77doLUzJSzFwAtvS9JUtQ8G0EriRVMUOQWNsBOhlpKOC0ZQYcW61U57e8YOtEnAzL sWR9nSmAlTfOXUnWBpwYLkdVojWosxWcwah73oWE=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_2C229ED1-E487-4F27-B2FC-639A3D8AFA12"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
Date: Fri, 13 Dec 2024 16:38:16 +0000
In-Reply-To: <01000193bb4d7eb1-9d40b4a7-3504-4367-b77b-44a5db15d004-000000@email.amazonses.com>
To: touch@strayalpha.com, draft-ietf-netconf-udp-notif@ietf.org
References: <2EBB4D35-4D0A-4123-AE45-0D0C6B549E48@insa-lyon.fr> <EAEFE72C-2E72-4847-B612-E76617A1C5CC@strayalpha.com> <249963514c32443fb46250e3d7492944@swisscom.com> <1FD4AA1D-0509-45F3-96D4-A2FEE0390B60@strayalpha.com> <F721D255-EFF2-4FCA-812F-9816E25E9949@insa-lyon.fr> <9056d35ba7e24548b36c31bf75a4a6b6@swisscom.com> <98762A51-2207-4193-BB67-8F13CAD9A2C4@strayalpha.com> <b0918cd139444a56bccef2fa233ae828@swisscom.com> <01000193bb4d7eb1-9d40b4a7-3504-4367-b77b-44a5db15d004-000000@email.amazonses.com>
X-Mailer: Apple Mail (2.3774.400.31)
Feedback-ID: ::1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
X-SES-Outgoing: 2024.12.13-54.240.8.83
Message-ID-Hash: VF7E3QOPES5INNGFPCQ5FWPM6KI4FS7A
X-Message-ID-Hash: VF7E3QOPES5INNGFPCQ5FWPM6KI4FS7A
X-MailFrom: 01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@amazonses.watsen.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: tsv-art@ietf.org, "netconf@ietf.org" <netconf@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [netconf] Re: [Tsv-art] UDP default port
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/aM5UViR-inb0qHmH_GGJuzsn83M>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>

> Hi Joe and UDP-Notif Authors,
> 
> It seems that this thread has stalled.  What can we do to move it forward?  
> 
> Kent and Per // NETCONF chairs


A couple thought-provoking questions:

What does "udp-notif" bring that isn’t supported by the "https-notif" draft, assuming the https-notif draft supports the QUIC transport?
If the https-notif draft with QUIC transport is deemed unacceptable, would a "quic-notif” draft work?


PROs:

QUIC is well-defined (RFC 9000) and tooling should prominent.
HTTP/3 is well-defined (RFC 9114) and tooling should prominent. 
QUIC supports reliability on a per frame-type basis, thus muxing both types is possible (see RFC 9221)
Stateful firewalls supporting QUIC will allow the return packets, thus enabling an “encoding-discovery” mechanism.
QUIC is still UDP, and so (I think) continues to support the properties desired by the “distributed-notify” draft.
Anything else?

CONs:

No ability to disable encryption (for “private” networks)
I don’t know how big of a problem this is.
Assuming long-lived connections, the overhead of the asymmetric key handshake is negligible.
The overhead for symmetric-key encryption (e.g., AES) is also pretty negligible
The “overhead” is mostly a concern on the receiver-side, as logging is a many-to-one activity, but it’s easy to scale receivers.
Encryption negates the ability to copy frames directly to persistent storage.  This is unlikely a good idea anymore, but ~20 years ago I designed the binary logging protocol such that the packets could be mmap-ed directly to disk, in their final storage format (note: a post-sweep would build indices).
Anything else?


Kent / contributor