Re: [Netconf] WGLC for draft-ietf-netconf-tls-04.txt

badra@isima.fr Sun, 28 September 2008 01:34 UTC

Return-Path: <netconf-bounces@ietf.org>
X-Original-To: netconf-archive@ietf.org
Delivered-To: ietfarch-netconf-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CB8773A6975; Sat, 27 Sep 2008 18:34:58 -0700 (PDT)
X-Original-To: netconf@core3.amsl.com
Delivered-To: netconf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D1C773A68C6 for <netconf@core3.amsl.com>; Sat, 27 Sep 2008 18:34:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.384
X-Spam-Level:
X-Spam-Status: No, score=-0.384 tagged_above=-999 required=5 tests=[AWL=-0.294, BAYES_20=-0.74, HELO_EQ_FR=0.35, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yJT25ylxBifp for <netconf@core3.amsl.com>; Sat, 27 Sep 2008 18:34:57 -0700 (PDT)
Received: from sp.isima.fr (sp.isima.fr [193.55.95.1]) by core3.amsl.com (Postfix) with ESMTP id D62623A6842 for <netconf@ietf.org>; Sat, 27 Sep 2008 18:34:56 -0700 (PDT)
Received: from www.isima.fr (www-data@www.isima.fr [193.55.95.79]) by sp.isima.fr (8.13.8/8.13.8) with SMTP id m8S2Z7N3921734; Sun, 28 Sep 2008 03:35:07 +0100
Received: from 88.164.98.77 (SquirrelMail authenticated user badra) by www.isima.fr with HTTP; Sun, 28 Sep 2008 03:34:07 +0200 (CEST)
Message-ID: <53194.88.164.98.77.1222565647.squirrel@www.isima.fr>
In-Reply-To: <f944b43f3d55f.3d55ff944b43f@huawei.com>
References: <20080927090622.GA431@elstar.local><59304.88.164.98.77.1222523373.squirrel@www.isima.fr><20080927154119.GA803@elstar.local><61122.88.164.98.77.1222530809.squirrel@www.isima.fr><20080927161432.GA918@elstar.local><49231.88.164.98.77.1222550961.squirrel@www.isima.fr> <f944b43f3d55f.3d55ff944b43f@huawei.com>
Date: Sun, 28 Sep 2008 03:34:07 +0200
From: badra@isima.fr
To: fanhuaxiang� 90002624� <washam.fan@huawei.com>
User-Agent: SquirrelMail/1.4.2
MIME-Version: 1.0
X-Priority: 3
Importance: Normal
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-3.0 (sp.isima.fr [193.55.95.1]); Sun, 28 Sep 2008 03:35:07 +0100 (WEST)
Cc: � <netconf@ietf.org>
Subject: Re: [Netconf] WGLC for draft-ietf-netconf-tls-04.txt
X-BeenThere: netconf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Network Configuration WG mailing list <netconf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/netconf>
List-Post: <mailto:netconf@ietf.org>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netconf>, <mailto:netconf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: netconf-bounces@ietf.org
Errors-To: netconf-bounces@ietf.org

Dear Washam,

> IMHO, we may need to describe when to close connection for both sides.e.g,
> when client don't want to initial any rpc operation or server found there
> is no data on the wire for a long time.
> And, I wanna express there is a difference between syslog and netconf
> scenarios. in syslog case, only client is expected to send data, so
> syslog-tls says "client SHOULD send the pending data before sending the
> close_notify alert", whilst in netconf case, both sides are expected to
> send data, so the same words should be applied to client and server.

Let's agree on a common text, please don't hesitate to propose your text
if the following isn't sufficient for you or if more correction is needed.

2.2. Connection Closure

   TLS [RFC5246] has the ability for secure connection closure using the
   Alert protocol.  Either NETCONF peer MAY stop the NETCONF connection at
   any time by sending a TLS close_notify alert.

   A NETCONF peer MUST close the associated TLS connection if the
   connection is not expected to deliver any rpc operation or when no data
   is received from a connection for a long time, where the application
   decides what "long" means.  The NETCONF peer MUST send a TLS
   close_notify alert before closing the connection.  A sender's
   close_notify MAY choose to not wait for the receiver's close_notify
   alert and simply close the connection, thus generating an incomplete
   close on the receiver's close_notify side.  Once the receiver gets a
   close_notify from the sender's close_notify, it MUST reply with a
   close_notify unless it becomes aware that the connection has already
   been closed by the sender (e.g., the closure was indicated by TCP).

Best regards,
Badra
_______________________________________________
Netconf mailing list
Netconf@ietf.org
https://www.ietf.org/mailman/listinfo/netconf