Re: [netconf] Éric Vyncke's Discuss on draft-ietf-netconf-https-notif-13: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Thu, 18 January 2024 22:24 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2F91C14F61A; Thu, 18 Jan 2024 14:24:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.905
X-Spam-Level:
X-Spam-Status: No, score=-11.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QYQ9lFihtkKu; Thu, 18 Jan 2024 14:24:44 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1866C14F5FE; Thu, 18 Jan 2024 14:24:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=70279; q=dns/txt; s=iport; t=1705616683; x=1706826283; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=N2UbnVBOc8vxVM5dBeI0vJ1TYu96XLOjIGUE/aswL8A=; b=ZNyDxVuHI3VR/ekTRu0dUgAGkknVVMZcEmp7loUaideSEVXK17XaaI2L sezQQ0OTHjAV9PGowd2UaJRIIMwsbvltvLTWEh3RuRYzzVwV+cr9CW3jC +OYRVj5umN6EgVG5gItRXEyJjVddRu5xrNuXoViLxMwQ8EGamvFViF83u A=;
X-CSE-ConnectionGUID: Hoop734yTbmpyy82F0+vhQ==
X-CSE-MsgGUID: kMhvCJItTC2QiDlN4wdEqw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:EQY3LRKdPUDF/EtQONmcua4yDhhOgF28FgcR7pxijKpBbeH/uZ/jJ 0fYo/5qiQyBUYba7qdcgvHN++D7WGMG6Iqcqn1KbpFWVhEEhMlX1wwtCcKIEwv6edbhbjcxG 4JJU1o2t2qjPx1tEd3lL0bXvmX06DcTHhvlMg8gK/rkHIXRguy81vu5/NvYZAAbzDa4aKl5e Q2/th6Z9tFDm4ZgJ60tghfIuS5OfOJbhCtkcFmShB37oMy3+fZe
IronPort-Data: A9a23:iqK/dqDaUBBKyBVW/+fjw5YqxClBgxIJ4kV8jS/XYbTApD4l1WQEy DZJDTzSOf2MamujKIsnOoy2oBsGsJCGytVnOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hXmthh fuo+5eDYAb8i2YuWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAleOqpep+SbMES1tNSC3h2cXSOv3fVXWRRe0Y0woo6bAElU/ vAebTsKdB3G2qS9wamwTa9ngcFLwMvDZdxE/Co/i2CCS697H/gvQI2SjTNc9Doul8ZFHvv2b MsCYj0pZxPFC/FKEg5IUshhx7/32xETdRVbjVKLjogW/1T4ljVw/LzLbMXZV8WVEJA9ckGw/ T+eoD+jXXn2Lue3zzeZ+XWqiMfOkD/1HoUIG9WQ8PN2i1qVyCkYCBQXT0CToPSlhAi5Qd03A 0AO8yQy6Kk/6ELuSNThVBq+rjuEogIEQJ9WFPE75imMx7bapQGDCQAsTzNaZ/QnudM4Azsw2 Te0c8jBHzdjtvieTmiQs+rSpjKpMi9TJmgHDcMZcecby/nkp5ls1U7ectxmCL+k3ofbQXLuw wnf+UDSmI4vpcIM0qy6+3XOjDStuoXFQ2YJCuP/AzLNAuRROd7NWmC41WU3+8qsO2pwc7Vsl GIPl87b5+cUANTQ0ieMW+4KWrqu4p5p0QEwY3YxRPHNFBz0pxZPmLy8BhkldC+F1e5fKVfUj Lf741852XOqFCLCgVVLS4ywEd826qPrCM7oUPvZBvIXPcAsKlfdonExOBPJt4wIrKTKufxuU Xt8WZv9ZUv29Yw3pNZLb75Eju91nHxWKZ37HMylkXxLLoZylFbOFO9aawHRBgzIxKiFuw7Su 81OLNeHzg4XUev1JEHqHX07czg3wYwALcmu8aR/L7fbSiI/QT1JI6GKm9sJJdc695m5Y8+Vp BlRrGcClgqm7ZAGQC3XAk1ehETHA80h/C1nYXdyVbtqslB6CbuSAG4kX8JfVZEs9fdoyrh/S PxtRilKKq0npujvk9jFUaTAkQ==
IronPort-HdrOrdr: A9a23:fG51Ba8MmTH1avixLw1uk+GYdr1zdoMgy1knxilNoENuA6+lfp GV/MjziyWUtN9IYgBfpTnhAsW9qXO1z+8S3WBjB8bSYOCGghrmEGgM1/qZ/9SNIVybygcZ79 YeT0EcMqy/MbEZt7eG3ODQKb9Jq7f3ktHMuQ6d9QYQcegAUdAY0+4NMHfhLqQAfng/OXNWLu v62uN34xCbVTA8aMO9CnMZX+7FieHqufvdCyIuNloM0iXLqSmnxoLbPnGjsyv2VQkh/Z4StU z+1yDp7KSqtP+2jjXG0XXI0phQkNz9jvNeGc2lkKEuW3XRozftQL4kd6yJvTgzru3qwk0tis PwrxApONk2w2/Nf1uyvQDm12DboXUTAj7ZuB2laEnY0IjErQEBeo18bEViA13kAn8bzZRBOW RwrjukXtRsfEv9dW/Glqj1vllR5zmJSDwZ4K8uZ7g1a/pFVFeXxrZvp3+8Wv07bVDHwZFiH+ 90AM7G4vFKNVuccnDCp2FqhMehR3IpA369MwI/U+GuonBrdUpCvgAl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SIGHv3QS6vCEWiELtCN2PGqpbx7rlw7Oa2eIYQxJ93nJ jaSltXuWM7ZkqrA8yT259A9AzLXQyGLHnQ49Ab44I8tqz3RbLtPyHGQFcyk9G4q/FaGcHfU+ bbAuMePxYiFxqZJW9k5XyIZ3AJEwhqbCQ8gKdOZ26z
X-Talos-CUID: 9a23:0zXCZW0g2H0D7esIyzKaELxfOsciaiKGkGbsKUqgGHc5EpPNCkGQwfYx
X-Talos-MUID: 9a23:znK5MA3+bjKPOPkGENe/iBuDAzUj4IGuFmsvsIk6kJO9NAB0HWuCgBmuXdpy
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-9.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Jan 2024 22:24:42 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by rcdn-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 40IMOg3B006545 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 18 Jan 2024 22:24:42 GMT
X-CSE-ConnectionGUID: PXUr3NnnQ2erMLvtFk7P6Q==
X-CSE-MsgGUID: RlN1UcDTS+6x07n5JIEvnw==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.05,203,1701129600"; d="scan'208,217";a="20537467"
Received: from mail-dm6nam04lp2040.outbound.protection.outlook.com (HELO NAM04-DM6-obe.outbound.protection.outlook.com) ([104.47.73.40]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Jan 2024 22:24:42 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c7ZnDxOkJz/vlGe8jrYSv0TQTbfUwwYrPbJemZrpBVgXEyhiytTbXAItqqyDf8OUruUkJAIQgRnrfsOcKEE+8Ln6eF8IDVSkc4WtAO1joW/7NN+IJA8HaMpv8tdpdZ65rew8/xUAQZbrL2xK5RPlezSfJj9veyrsDxJIpm3Siyu5xrBhDiXJXtvYAU5HxaE4V7aIhpwWpJgFk7wfM2GnL0DNpwiPdVaphUjXjVd3NBFe19+NeO5y9oXxeE+1KWagm9dN2MQkEZnrzc5OFXEozsTUuhkl3/ldSm26ulVKmuN/ZoO4tTlmkdTtBZxSJRm72sCfPVeS3AkoIphn9i2JxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N2UbnVBOc8vxVM5dBeI0vJ1TYu96XLOjIGUE/aswL8A=; b=IOfrbds7EGIIApWcefwDyHF8SBYIfOxkIO9ja/VUPNBP9OzQl5NnIuARNAj7ZzDzDBWvBDXMJrPg7c8TGgmDWyGubWEWGOTt+HhDwHnLWdKmThd2SwMWl3mBkP/eItOIm4y3P/OrWQYsr9cWLd2IKfdoi9KzvddiTh9fRZDIQddU2fXjHkuR3Fl0LZfs/A4MdytQlZxw1YkmwJtMwRt6qN7o7DDTzt5XyLM3WTbFpp6OPwiajwjuJ+hWjSAHiargcbh99lF8v+vzMkFRDylEyC9Uj0xZZ0yc35GSL/DeFbMjSKKiQpiCIQfCM1xulCvAjDerzaIVQMyTBqmBO/t9xQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by SN7PR11MB7115.namprd11.prod.outlook.com (2603:10b6:806:29a::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7202.24; Thu, 18 Jan 2024 22:24:39 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6%4]) with mapi id 15.20.7202.024; Thu, 18 Jan 2024 22:24:39 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Mahesh Jethanandani <mjethanandani@gmail.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-netconf-https-notif@ietf.org" <draft-ietf-netconf-https-notif@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "maqiufang (A)" <maqiufang1@huawei.com>, Kent Watsen <kent+ietf@watsen.net>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-netconf-https-notif-13: (with DISCUSS and COMMENT)
Thread-Index: AQHZEKU2fsYipL9TnUiK59nywnBuI7DieVKAgAAwZQA=
Date: Thu, 18 Jan 2024 22:24:39 +0000
Message-ID: <9BA30798-A469-4400-96F4-0D748D85198A@cisco.com>
References: <167086308047.46335.8881003980522216529@ietfa.amsl.com> <0100018516b0c9e2-95ff1fec-9eef-4d20-820d-49392c4a1dfb-000000@email.amazonses.com> <17DA3BAC-DEC6-4AC7-9892-33948A6DE764@gmail.com>
In-Reply-To: <17DA3BAC-DEC6-4AC7-9892-33948A6DE764@gmail.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.81.24011420
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|SN7PR11MB7115:EE_
x-ms-office365-filtering-correlation-id: 7d6a4aa3-f962-4883-140b-08dc187442e6
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(396003)(136003)(39860400002)(366004)(346002)(376002)(230922051799003)(186009)(1800799012)(451199024)(64100799003)(66476007)(66446008)(66946007)(122000001)(66556008)(54906003)(8936002)(966005)(6486002)(478600001)(76116006)(91956017)(64756008)(166002)(38100700002)(4326008)(6512007)(2616005)(83380400001)(53546011)(6506007)(86362001)(66574015)(71200400001)(316002)(6916009)(2906002)(33656002)(5660300002)(30864003)(224303003)(36756003)(38070700009)(41300700001)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_9BA30798A469440096F40D748D85198Aciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7d6a4aa3-f962-4883-140b-08dc187442e6
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jan 2024 22:24:39.7299 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: PvQbpv8Ob2YBgKjHFkooffFgVPmKraCwVVvPuaQOEN5pGHnUMmFrKKjr2SQdWDuaXvMYNPm9ak6qBdsy70bxBA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB7115
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/bpzZ6f-7S5nZDnkoQiweS23ZWsA>
Subject: Re: [netconf] Éric Vyncke's Discuss on draft-ietf-netconf-https-notif-13: (with DISCUSS and COMMENT)
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETCONF WG list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf/>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Jan 2024 22:24:48 -0000

Mahesh and Kent,

Thanks for your patience (it seems that Kent’s reply was lost in my end-of-the-year shutdown period [1]) and for the revised I-D.

The combination of Kent’s very detailed reply and the revised I-D is sufficient for me to clear my DISCUSS.

BTW, it would have been easier to read draft-ietf-netconf-netconf-client-server first ;-)

Regards

-éric

[1] never hesitate to nudge an AD ! an AD is just another human being suffering from mailbox overload ;-)

From: Mahesh Jethanandani <mjethanandani@gmail.com>
Date: Thursday, 18 January 2024 at 21:31
To: Eric Vyncke <evyncke@cisco.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-netconf-https-notif@ietf.org" <draft-ietf-netconf-https-notif@ietf.org>, "netconf-chairs@ietf.org" <netconf-chairs@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>, "maqiufang (A)" <maqiufang1@huawei.com>, Kent Watsen <kent+ietf@watsen.net>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-netconf-https-notif-13: (with DISCUSS and COMMENT)

Hi Eric,

We posted a -14 version of the draft that addresses your DISCUSS and COMMENT. Please review.

Thanks.


On Dec 15, 2022, at 8:49 AM, Kent Watsen <kent+ietf@watsen.net<mailto:kent+ietf@watsen.net>> wrote:

Hi Ėric,


Please see below for responses to your valuable comments.


Kent // co-author




On Dec 12, 2022, at 11:38 AM, Éric Vyncke via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>> wrote:

Éric Vyncke has entered the following ballot position for
draft-ietf-netconf-https-notif-13: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-netconf-https-notif/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------


# Éric Vyncke, INT AD, comments for draft-ietf-netconf-https-notif-13
CC @evyncke

Thank you for the work put into this document.

Please find below one blocking DISCUSS points (easy to address), some
non-blocking COMMENT points (but replies would be appreciated even if only for
my own education).

Special thanks to Qiufang Ma for the shepherd's detailed write-up including the
WG consensus *and* the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric

## DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion on the following topics:

### Section 6.1

`The module contains the TCP, TLS and HTTPS parameters` seems to prevent the
use of HTTP/3, which relies on QUIC, i.e., UDP. Is it on purpose ? If so, a
justification is probably required.

The parameters mentioned are inherited from draft-ietf-netconf-http-client-server, which was just published to the IESG for consideration.

Looking at the "http-client-server" draft, Section 1.1, entitled "Relation to other RFCs" [1], you will notice that the there is a hierarchy of protocol-specific drafts, each pertaining only to its layer in a protocol stack.  More specifically, each draft defines two YANG "groupings", one for the protocol-client and the other for the protocol-server.

[1] https://www.ietf.org/archive/id/draft-ietf-netconf-http-client-server-12.html#name-relation-to-other-rfcs

For instance, to define an HTTP-client, the stack is:

    tcp-client-grouping // from draft-ietf-netconf-tcp-client-server
    http-client-grouping // from draft-ietf-netconf-http-client-server

To define an HTTPS-client, the stack is:

    tcp-client-grouping // from draft-ietf-netconf-tcp-client-server
    tls-client-grouping // from draft-ietf-netconf-tls-client-server
    http-client-grouping // from draft-ietf-netconf-http-client-server

Now, to support a QUIC-client, we'd want a stack something like:

    udp-client-grouping // from TBD
    quic-client-grouping // from TBD
    http-client-grouping // from draft-ietf-netconf-http-client-server

The "TBD" above means that there are currently no drafts in progress for "udp-client-server" or "quic-client-server".   Such drafts may be developed at any time, and "case" statements may be "augmented" into the instances of the groupings defined the "http-client-server" draft.

All this to say, support for HTTP/3 can be added when desired.



Related to the above sentence, the tree has:
```
         +--rw https-receiver
            +--rw (transport)
            |  +--:(tls) {tls-supported}?
            |     +--rw tls
```
Please, bear with my ignorance of YANG, but does the '?' indicate that the tls
sub-tree may not be supported ? Weird for an IETF draft whose title include
HTTPS ;-) (or is it to support QUIC ?)

Yes, the "{foo}?" syntax in YANG tree-diagrams (RFC 8340) means that the node is present only when the specified feature (foo) is enabled.

The "https-notif" module (defined in this draft) inherits a snippet of YANG from the "ietf-http-client" module (defined in draft-ietf-netconf-http-client-server).   The "http-client-server" draft correctly defines features enabling the various supported transports (e.g., TCP and TLS currently, QUIC when defined) so that the specific transport(s) supported by an application may be specified.


FWIW, this draft's YANG explicitly disables the ability for HTTP (i.e., w/o TLS), but the tree diagram still renders the only remaining "case" statement with its "feature" statement.  This should be seen as a positive, as it enables other secure transports to be exclusively supported in the future (e.g., a QUIC-only future).  Perhaps this draft's title could be changed, e.g., s/HTTPS/Secure/?



Finally, and for sure it is my ignorance about YANG, but I do not see an
obvious link between the tree view and the YANG module. Should there be a
written explanation in the text ? (this is of course a COMMENT-level point).

Good catch, this draft is missing a reference to RFC 8340.




### Section 7

The security section is mainly about the YANG RESTCONF/NETCONF template, but
does not address the security of sending notifications over HTTP. E.g., as
written below, what about TLS mutual authentication ? How is the HTTP server
certificate is trusted ?

HTTP (without TLS) is not supported by this draft.

The Security Considerations section, as written, accurately addresses the "northbound API" presented by NETCONF and RESTCONF servers.  What is not addressed is the "eastbound API" this draft introduces, which is just "HTTPS" and does not have a mutual-auth requirement.

Would the fix be to add the following to the Security Considerations section?
- the publisher (the HTTPS-client) MUST authenticate the server.
- the receiver (the HTTPS-server) MUST authenticate the client.




----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------


## COMMENTS

### Abstract
```
  This document requires that the publisher is a "server" (e.g., a
  NETCONF or RESTCONF server), but does not assume that the receiver is
  a server.
```
This last paragraph adds more confusion on the roles... Suggest to remove it.

The paragraph was added due to comments about how things were confusing before.

To be clear:

- the publisher (the HTTPS-client) MUST also be a YANG-based server, i.e., presenting a YANG-based protocol such as NETCONF and RESTCONF.

- the receiver (the HTTPS-server), is an HTTPS-server without further stipulation





### Roles

Suggest to prefix server always by HTTPS (i.e., "HTTPS server") and use
"publisher" for the NETCONF/RESTCONF "server".

Agreed.  Mark Nottingham provided similar comments, and v14 version of the document (currently in GitHub here<https://github.com/netconf-wg/https-notif/pull/27>) carries the prefix HTTP or NETCONF/RESTCONF before the word “server” to clarify what kind of server is being assumed.



### Which TLS version ?

I will let the transport/security ADs to ballot a DISCUSS if required, but
wouldn't a specification of which HTTP and TLS versions are required ?

The "http-client-server" draft does not have any "feature" statements enabling configuration to vary the configuration HTTP-layer by HTTP-version.  And hence is unconstrained.

The "tls-client-server" draft does have "feature" statements enabling configuration to vary by TLS-version, specifically 1.0, 1.1, 1.2, and 1.3.  Note that 1.0 and 1.1 have "status obsolete", and TLS 1.2 has "status deprecated".

This draft inherits the above stance without imposing any new limitations.


Should the certificate validation procedure be specified ?

No, such is for protocol drafts to define.  This draft, and those it depends on, regard only on how to *configure* the protocol stacks.



### Section 2

Probably linked to my ignorance of the system (a global archicture or a more
detailed introduction would be appreciated), but how is the
"relay-notifications" known by the publisher ? In the examples, there is not
such item.

There is a typo in Section 2: s/relay-notifications/relay-notification/.

Search again without the trailing 's'?


Minor comment: is it a "path" or a "common prefix" ? Also, doesn't having a
common prefix in the URI prevent having two "HTTP servers" for the same
subscription. E.g., one for the capabilities and one for the notifications
(e.g., for geographica load distribution).

It is a common prefix.  This was fixed per another comment.




### Section 3.2

`a publisher can issue an HTTPS GET request` should the 'can' be 'upgraded' to
a "SHOULD" or "MAY" ?

Good grief, as the beginning of that sentence is written, it's more like a MUST ;)

But equally good, IMO: s/can issue/issues/

Thoughts?


### Section 3.4

Please replace 'nnn' by the exact Content-Length.

Or remove "Content-Length" line from the examples?




### Section 4.1

s/HTTPS POST request/HTTP POST request/ ?

Good catch.




### Section 4.2

```
  ... In case of
  corrupted or malformed event, the response should be an appropriate
  HTTP error response.
```

Suggest to replace "should" by "SHOULD" or even "MUST".

Agreed.



## NITS

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments



Thanks again!
Kent


Mahesh Jethanandani
mjethanandani@gmail.com<mailto:mjethanandani@gmail.com>