[netconf] Re: Private candidates -03 and points for discussion
Andy Bierman <andy@yumaworks.com> Fri, 28 June 2024 15:02 UTC
Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2697C14F714 for <netconf@ietfa.amsl.com>; Fri, 28 Jun 2024 08:02:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.864
X-Spam-Level:
X-Spam-Status: No, score=-0.864 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nWb8opVc-vaV for <netconf@ietfa.amsl.com>; Fri, 28 Jun 2024 08:02:49 -0700 (PDT)
Received: from mail-pg1-x52f.google.com (mail-pg1-x52f.google.com [IPv6:2607:f8b0:4864:20::52f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1131C14F6FB for <netconf@ietf.org>; Fri, 28 Jun 2024 08:02:49 -0700 (PDT)
Received: by mail-pg1-x52f.google.com with SMTP id 41be03b00d2f7-7276dff62b6so1435413a12.1 for <netconf@ietf.org>; Fri, 28 Jun 2024 08:02:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks.com; s=google; t=1719586969; x=1720191769; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=kYIJc9H0QWw/CMaCM80TI3NB7VqjCEoqDUHinQmW0Ug=; b=MedDOk9nolcwG4QJNxpWN4Rqj7liDw694Ho5nYdhwLeg6gjKqtL3NpcbtDMYtHBNju DcJG7y/yjHbWwx0bUjhX1Jj12vyTlphH7wD0SyoRlpJyAfKg4lXCV6ELXVgW7QWHRqL2 TRVrjW+JUFnCqeks4P6ELk5XPetozOQgGjbIev9LpZJgplALE6hw+8NAk6WNHn+5UQiS f7VaKPmOKkmA6L2mqA0+NbV6qFbR7dB6dL3nR3vanZqy82Yk8xj+h06a6eLZqFcFnHBb OiRFhzQoYmh8aAdm7lP5BcH+5cZIcwCfUB1x9AcA/oeKS0NJR7wEQQmV2qlviMjVkjEi U9Xw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1719586969; x=1720191769; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=kYIJc9H0QWw/CMaCM80TI3NB7VqjCEoqDUHinQmW0Ug=; b=PRW+qflPfL6O+UPQNGsJjk0vDAMOSW5XezwGRA6w3ls3bcyp/7TXl6mlKVgCsDQNJU 7LF/LQUMjBLSgRCUlQYGqwwSSlKShQjKq+ccbjAFA3IzZvvYaSRrMgxeAVyXo0X7pDcC ZfbhswCc6KUEU6uqj9aDjaF3EF5GnLfh3QqdXMsgXTSkWOl8RlvkjdzTZN5R+VpahQcr cwQQMWcZ78vfNm8m743bwP1+lCLPw0ry+rr1WqU/4kIPLXJANSBfk5XYJhTAR3o0TG5o VbzMkKxTUYohcgHTeIQhigzwBS1Kh71LZeSR7LgnJpNeIFQtDLxYeg4j/5PZH7WKemyS SXKA==
X-Forwarded-Encrypted: i=1; AJvYcCVJaP1+884DHqMBdvvtvCGIx+GEFJrjpeMtTaBV9RwOeO+B8PU33vBEt07MnAduRPAKCIvt8wtR+dm3JPW8EN77
X-Gm-Message-State: AOJu0YzhV8JlNnsjq0pLNRePMLnI0dT5L/hlHx7FRFFp41wL2ETZeiNI DmDsxZiIuuPtlWKZhmGir1pYpwiWmF19MrDo2UAmGi+BbmhUenaJPcCVIK1FJydUnxjNvLdWT1K Nku13l6sjS6+QIZ59qGbw6+Yw9PPdJuWK82u4ZyVX2Z7udB1VT+M=
X-Google-Smtp-Source: AGHT+IHdSbCws3bhWG0Hk8vFzmY9Q8GnbDSD/24cqfRjF4dT42mZDMPyfBaYUn4vAlnFkkQB0fVaPBZXKuxs/xUrVuw=
X-Received: by 2002:a17:90a:f28a:b0:2c8:4f4e:d438 with SMTP id 98e67ed59e1d1-2c92763cd7fmr3007619a91.4.1719586968493; Fri, 28 Jun 2024 08:02:48 -0700 (PDT)
MIME-Version: 1.0
References: <SA1PR08MB721579B2324BCFBF0061BC21FFF32@SA1PR08MB7215.namprd08.prod.outlook.com> <0100019014b5327e-0f40b891-8923-4063-a02c-cce7f2ab7923-000000@email.amazonses.com> <SA1PR08MB72150B89F47272FE8797976CFFD62@SA1PR08MB7215.namprd08.prod.outlook.com> <CABCOCHSP9F6i+zjdQ6Cbb8MR9aZGO1=_+9vaXGn8cHgX7wTc5w@mail.gmail.com> <SA1PR08MB721540FF65AE573DD56E6633FFD02@SA1PR08MB7215.namprd08.prod.outlook.com>
In-Reply-To: <SA1PR08MB721540FF65AE573DD56E6633FFD02@SA1PR08MB7215.namprd08.prod.outlook.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Fri, 28 Jun 2024 08:02:37 -0700
Message-ID: <CABCOCHQqeiESJnQtiy5grwr1FWuB8g1LLDu4TBd7uEhmy4JQ=w@mail.gmail.com>
To: "James Cumming (Nokia)" <james.cumming@nokia.com>
Content-Type: multipart/alternative; boundary="0000000000006afd03061bf48ae2"
Message-ID-Hash: WOSP7GQHA5CYN5BQVAMNFC3RLHN24546
X-Message-ID-Hash: WOSP7GQHA5CYN5BQVAMNFC3RLHN24546
X-MailFrom: andy@yumaworks.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "netconf@ietf.org" <netconf@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [netconf] Re: Private candidates -03 and points for discussion
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/ffF-An1_4qgxkfbY6ggB1OhDQKg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>
On Fri, Jun 28, 2024 at 7:58 AM James Cumming (Nokia) < james.cumming@nokia.com> wrote: > Hi Andy, > > > > The idea of an interim was floated but the chairs felt we needed more > discussion on the list first. I would be in favour of either an interim or > a side meeting in Vancouver (I’m not sure which is the correct option of an > adopted draft). > > > > I don’t appear to have access to create a repository on this specific > GitHub account. If someone would be able to give me access I would be more > than happy to post it here (I think it would be beneficial to track issues). > > > IMO email is not a modern collaboration tool. Use of an issue tracker is needed for complex drafts like this one. Thanks > > > James > > > Andy > > > > > *From: *Andy Bierman <andy@yumaworks.com> > *Date: *Wednesday, 26 June 2024 at 17:28 > *To: *James Cumming (Nokia) <james.cumming@nokia.com> > *Cc: *Kent Watsen <kent+ietf@watsen.net>, netconf@ietf.org < > netconf@ietf.org> > *Subject: *Re: [netconf] Re: Private candidates -03 and points for > discussion > > > > *CAUTION:* This is an external email. Please be very careful when > clicking links or opening attachments. See the URL nok.it/ext for > additional information. > > > > > > > > On Wed, Jun 26, 2024 at 11:08 AM James Cumming (Nokia) <james.cumming= > 40nokia.com@dmarc.ietf.org> wrote: > > Hi Kent, > > > > Thanks for taking the time to review and provide your feedback. It’s much > appreciated. Please find some responses/comments/questions interleaved. > > > > > > > > This draft is not on the NETCONF WG github page: > > https://github.com/netconf-wg > > > > It would be helpful to start using the issue tracker for this important > draft. > > > > Would it be possible to have a side meeting in Vancouver and maybe a > virtual interim in August > > for people interested in understanding and implementing private candidates? > > > > The original NETCONF design team (pre-4741) came up with the > "conventional" datastore model > > so the major stakeholders each had a reasonable implementation strategy > for their software architecture. > > > > > > Thanks > > > > James > > > > > > > > > > Andy > > > > > > Hi James, > > > > > > On May 30, 2024, at 3:36 PM, James Cumming (Nokia) < > james.cumming=40nokia.com@dmarc.ietf.org> wrote: > > > > Good morning/evening everyone, > > > > The authors/editors of the private candidates draft have just published a > new -03 version of the draft ( > https://datatracker.ietf.org/doc/draft-ietf-netconf-privcand/) which we > believe address the comments from the last (couple of) IETF meetings. > > > > We would like to invite everyone to review the draft and provide any > feedback. > > > > Whilst addressing the points raised, a few other issues were identified > and we have proposed solutions to these in the draft as well. > > > > Here is a summary of the changes in no particular order: > > > > 1. Added Andy Bierman as a contributor > 2. Section 4.7.2.11.1: Identified that commit-confirmed behaviour was > unclear so provided some detail on how this should work with private > candidates (and confirming that it is supported). We considered how to > deal with confirmed commits that expire their timer or are cancelled. We > also considered whether alternate sessions should be able to cancel them. > 3. Added the YANG models to the draft as requested. This led us to a > procedural question. This draft is meant to operate for NMDA and non-NMDA > capable servers. It is also adding a new base operation (update) and has > some additive changes to other older YANG models. The discussion here is > what the procedure should be for this. All changes are additive and > therefore this fact, coupled with the RFC sections that state that this > draft updates the proceeding RFCs we hope is sufficient here. We did > discuss the option to do augmentation rather than updates but this feels > fairly awkward for clients given the base operation and the additional > datastore identity. The approach we have in the draft (currently) also > follows the suggestion given to another draft last meeting that was also > looking to add new items to a base YANG model. This approach is certainly > common for drafts without embedded YANG models. > > > > I don’t understand the “awkward for clients” comment. I am surprised to > see "ietf-netconf”, “ietf-datastore”, and "ietf-nmda-compare" being > published by this I-D. It seems that augments would work fine. > > > > [Augments do work for most of the changes. The decision to update was > based around providing a consistent approach to all of the operations > making private-candidates feel like part of the base specification. For > example <edit-config><target><candidate/></target></edit-config> becomes > <edit-config><target><private-candidate/></target></edit-config> rather > than <edit-config><target><private-candidate > xmlns=”new_ns”/></target></edit-config>. The same difference would be > created for identity datastores. This is probably something we would like > to have a chair / AD ruling on and we will cover it in our slot in IETF120 > in person as well.] > > > > Regarding ietf-netconf, RFC 6241’s only noteworthy “update” is by RFC > 8526 (NMDA for NETCONF) which defines two new operations and “augments” in > the “datastore” parameter into a number of existing RPCs. > > > > Regarding ietf-datastore, note that “identity” statements were used in > part to enable new declarations to occur outside RFC 8342 (NMDA). For > example, this is what the “system-config” draft has: > https://datatracker.ietf.org/doc/html/draft-ietf-netmod-system-config-06#name-yang-module > > > > Can you remind me, what was the other draft last meeting that was also > looking to add new items to a base YANG model? > > > > [I was trying to find the details in the minutes but was unable to. I > recall that it may have been the system datastore update I do recall that > it was Benoit who was discussing it] > > > > 3. > 4. Updated the RFC list that this draft updates > > > > One of the RFCs listed is RFC 8526, but the string “8526" isn’t found > anywhere else in the draft... > > > > When “updating” an RFC, it is customary to have a paragraph or section > (called “Updates to RFC XXXX”) in the Introduction that provides details. > For instance, https://datatracker.ietf.org/doc/html/rfc8526 uses > paragraphs while > https://datatracker.ietf.org/doc/html/draft-ietf-netmod-system-config-06#name-introduction uses > sections. > > > > BTW, should this draft also “update" RFC 8342, for the same reasons as the > system-config draft? > > > > [Thanks Kent. Rob is working on some text to cover this.] > > 4. > 5. Section 4.6.1: Made the ‘what constitutes a conflict’ section > explicit with a minimum set of requirements > 6. Section 4.6.1: Added scope for servers to add additional > requirements to conflict detection mechanisms beyond the minimum set (which > are mandatory). Transaction ID is explicitly mentioned as one such example > here. > 7. Section 4.7.2.9: Identified the delete-config operation needed > updating as well so provided a solution for this > 8. Section 4.7.1.1: Added a statement calling out that the update > operation is atomic and provided a definition > 9. Section 4.6.1: Explained in more detail how each node is marked as > in conflict which covers the discussed use-case of servers deciding to call > update themselves (without client prompting) > 10. Added an updated NMDA diagram to visually explain how the solution > fits into NMDA > 11. Various grammatical enhancements > > > > We look forward to further discussion. > > > > While focusing on the above, I noticed a number of editorial issues. It > would be a significant effort for me to provide a review of at that level > of detail. Hopefully most of these will be addressed automatically in time. > > > > High-level comments: > > > > - I wonder if Section 3 is needed, or perhaps it could reduced to a > paragraph in the Introduction? Generally I don’t think specs should > provide a lot of motivating justification... > > > > [I reviewed it again and this section is IMHO a reasonable size to explain > the problem statement. I would welcome any additional views from the WG] > > > > - Regarding Section 4.4.1, the go-to solution these days is to use YANG > Library. Capabilities are only maintained for legacy clients. FWIW, I > suspect that a NETCONF 2.0 would eliminate the <hello> messages. > > > > [Thanks, we missed detailing this and will add it] > > > > - Regarding Section 4.4.2, given the previous comment, I’m opposed to a > client-sent capability having a significant role. > > > > [The draft aims to keep an approach that works for NMDA and non-NMDA > clients and servers, so that all clients can benefit from the new > functionality if the server supports it. What the above comment boils > down to is whether the WG feels a client should be able to select between > private-candidates and shared-candidates on a session-by-session basis. If > we feel they should (as they can in NMDA by targeting a specific datastore) > then the current approach is probably the right one. If we feel that a > client should not be able to select between private and shared candidates > on a per-session basis, then the alternative is to allow a server to > specifically select a mode (perhaps in config but ‘how’ would be out of > scope for the document) that is present for the lifetime of that choice… > i.e. if a server implements private candidates a non-NMDA client will > always get private-candidates and never be able to target the shared > candidate.] > > > > Regarding Section 4.3, I don’t understand why there is a difference. > Please make the solutions the same so that, e.g., an RC server can be built > on top on an NC server, and vice versa. BTW, why destroy the private > candidate at all, can't each user have their own perpetually? Does it > matter? > > > > [Let me try to address each part of this in turn: > > > > Why is there a difference? It is a natural approach in NETCONF to tie the > candidate to the NETCONF session ID for a few reasons. Firstly, this is > communicated clearly at the start of each session and a session on a router > is tied to it (at least in the implementations I have seen). The NETCONF > spec delineates nicely between the transport layer (e.g. SSH) where the > authentication (and the ties to the user are handled) and the NETCONF > protocol layer. Blending these seemed unnatural. Our understanding (which > comes with a request for RESTCONF expert assistance) is that in RESTCONF > there is no such session ID with which to tie the candidate to, therefore > at the suggestion of the WG we selected the client identity (ie the > RESTCONF username). I note that you say RC can rely on NC. I’m not sure > if this is implementation specific or spec described so any guidance is > welcome. > > > > Why destroy the private-candidate at all? If the private-candidate is > tied to the NETCONF session ID then closing of this session would destroy > this candidate. Leaving it in place would just bloat the memory usage in a > node. This is based of my answer for why we are attaching it to the > session-id rather than the username. In RESTCONF we could choose not to > destroy the private-candidate at all, but this would lead to significant > memory overhead, for example 5000 users would have 5000 copies of running > (as according to the spec a candidate is a full copy, although > implementations may not implement it this way). Another issue is that over > time the probability of a private candidate being out of date is very high, > therefore, any workflow would require a client to do an update immediately > on starting the session in order to get the config back in sync. > > > > Does it matter? To answer this question in both contexts…. Does it matter > that there is a slightly different implementation for NETCONF and > RESTCONF? I don’t think so, they are functionally very similar in the key > parts of the draft. Does it matter whether a candidate is destroyed at > all? Yes, in order to ensure optimal memory management of a node over a > significant period of time (that may have a significant number of users).] > > > > James and Rob > > > Kent // contributor > > > > [Thanks Kent! We hope to have a -04 for the WG to review prior to IETF120] > > > > > > > > *From: *Kent Watsen <kent+ietf@watsen.net> > *Date: *Thursday, 13 June 2024 at 23:05 > *To: *James Cumming (Nokia) <james.cumming@nokia.com> > *Cc: *netconf@ietf.org <netconf@ietf.org> > *Subject: *Re: [netconf] Private candidates -03 and points for discussion > > > > *CAUTION:* This is an external email. Please be very careful when > clicking links or opening attachments. See the URL nok.it/ext for > additional information. > > > > Hi James, > > > > > > On May 30, 2024, at 3:36 PM, James Cumming (Nokia) <james.cumming= > 40nokia.com@dmarc.ietf.org> wrote: > > > > Good morning/evening everyone, > > > > The authors/editors of the private candidates draft have just published a > new -03 version of the draft ( > https://datatracker.ietf.org/doc/draft-ietf-netconf-privcand/) which we > believe address the comments from the last (couple of) IETF meetings. > > > > We would like to invite everyone to review the draft and provide any > feedback. > > > > Whilst addressing the points raised, a few other issues were identified > and we have proposed solutions to these in the draft as well. > > > > Here is a summary of the changes in no particular order: > > > > 1. Added Andy Bierman as a contributor > 2. Section 4.7.2.11.1: Identified that commit-confirmed behaviour was > unclear so provided some detail on how this should work with private > candidates (and confirming that it is supported). We considered how to > deal with confirmed commits that expire their timer or are cancelled. We > also considered whether alternate sessions should be able to cancel them. > 3. Added the YANG models to the draft as requested. This led us to a > procedural question. This draft is meant to operate for NMDA and non-NMDA > capable servers. It is also adding a new base operation (update) and has > some additive changes to other older YANG models. The discussion here is > what the procedure should be for this. All changes are additive and > therefore this fact, coupled with the RFC sections that state that this > draft updates the proceeding RFCs we hope is sufficient here. We did > discuss the option to do augmentation rather than updates but this feels > fairly awkward for clients given the base operation and the additional > datastore identity. The approach we have in the draft (currently) also > follows the suggestion given to another draft last meeting that was also > looking to add new items to a base YANG model. This approach is certainly > common for drafts without embedded YANG models. > > > > I don’t understand the “awkward for clients” comment. I am surprised to > see "ietf-netconf”, “ietf-datastore”, and "ietf-nmda-compare" being > published by this I-D. It seems that augments would work fine. > > > > Regarding ietf-netconf, RFC 6241’s only noteworthy “update” is by RFC > 8526 (NMDA for NETCONF) which defines two new operations and “augments” in > the “datastore” parameter into a number of existing RPCs. > > > > Regarding ietf-datastore, note that “identity” statements were used in > part to enable new declarations to occur outside RFC 8342 (NMDA). For > example, this is what the “system-config” draft has: > https://datatracker.ietf.org/doc/html/draft-ietf-netmod-system-config-06#name-yang-module > > > > Can you remind me, what was the other draft last meeting that was also > looking to add new items to a base YANG model? > > > > > > > 3. > 4. Updated the RFC list that this draft updates > > > > One of the RFCs listed is RFC 8526, but the string “8526" isn’t found > anywhere else in the draft... > > > > When “updating” an RFC, it is customary to have a paragraph or section > (called “Updates to RFC XXXX”) in the Introduction that provides details. > For instance, https://datatracker.ietf.org/doc/html/rfc8526 uses > paragraphs while > https://datatracker.ietf.org/doc/html/draft-ietf-netmod-system-config-06#name-introduction uses > sections. > > > > BTW, should this draft also “update" RFC 8342, for the same reasons as the > system-config draft? > > > > > > > 4. > 5. Section 4.6.1: Made the ‘what constitutes a conflict’ section > explicit with a minimum set of requirements > 6. Section 4.6.1: Added scope for servers to add additional > requirements to conflict detection mechanisms beyond the minimum set (which > are mandatory). Transaction ID is explicitly mentioned as one such example > here. > 7. Section 4.7.2.9: Identified the delete-config operation needed > updating as well so provided a solution for this > 8. Section 4.7.1.1: Added a statement calling out that the update > operation is atomic and provided a definition > 9. Section 4.6.1: Explained in more detail how each node is marked as > in conflict which covers the discussed use-case of servers deciding to call > update themselves (without client prompting) > 10. Added an updated NMDA diagram to visually explain how the solution > fits into NMDA > 11. Various grammatical enhancements > > > > We look forward to further discussion. > > > > While focusing on the above, I noticed a number of editorial issues. It > would be a significant effort for me to provide a review of at that level > of detail. Hopefully most of these will be addressed automatically in time. > > > > High-level comments: > > > > - I wonder if Section 3 is needed, or perhaps it could reduced to a > paragraph in the Introduction? Generally I don’t think specs should > provide a lot of motivating justification... > > > > - Regarding Section 4.4.1, the go-to solution these days is to use YANG > Library. Capabilities are only maintained for legacy clients. FWIW, I > suspect that a NETCONF 2.0 would eliminate the <hello> messages. > > > > - Regarding Section 4.4.2, given the previous comment, I’m opposed to a > client-sent capability having a significant role. > > > > Regarding Section 4.3, I don’t understand why there is a difference. > Please make the solutions the same so that, e.g., an RC server can be built > on top on an NC server, and vice versa. BTW, why destroy the private > candidate at all, can't each user have their own perpetually? Does it > matter? > > > > > > James and Rob > > > Kent // contributor > > > > > > > > _______________________________________________ > netconf mailing list -- netconf@ietf.org > To unsubscribe send an email to netconf-leave@ietf.org > >
- [netconf] Private candidates -03 and points for d… James Cumming (Nokia)
- [netconf] Re: Private candidates -03 and points f… Jan Lindblad (jlindbla)
- [netconf] Re: Private candidates -03 and points f… Kent Watsen
- [netconf] Re: Private candidates -03 and points f… James Cumming (Nokia)
- [netconf] Re: Private candidates -03 and points f… Andy Bierman
- [netconf] Re: Private candidates -03 and points f… maqiufang (A)
- [netconf] Re: Private candidates -03 and points f… Andy Bierman
- [netconf] Re: Private candidates -03 and points f… Andy Bierman
- [netconf] Re: Private candidates -03 and points f… James Cumming (Nokia)
- [netconf] Re: Private candidates -03 and points f… James Cumming (Nokia)