[netconf] Re: [Tsv-art] UDP default port

Benoit Claise <benoit.claise@huawei.com> Fri, 20 December 2024 11:46 UTC

Return-Path: <benoit.claise@huawei.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FB07C221B54; Fri, 20 Dec 2024 03:46:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1LDZ9gq47WwZ; Fri, 20 Dec 2024 03:46:32 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 409D7C221B36; Fri, 20 Dec 2024 03:46:29 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.31]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4YF5BY0JQMz6K9fZ; Fri, 20 Dec 2024 19:42:45 +0800 (CST)
Received: from frapeml500001.china.huawei.com (unknown [7.182.85.94]) by mail.maildlp.com (Postfix) with ESMTPS id 629F8140A46; Fri, 20 Dec 2024 19:46:26 +0800 (CST)
Received: from [10.195.32.207] (10.195.32.207) by frapeml500001.china.huawei.com (7.182.85.94) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Fri, 20 Dec 2024 12:46:23 +0100
Content-Type: multipart/alternative; boundary="------------0nOdwLK3zaYNWQ7sxAp0PRuU"
Message-ID: <d54f9c51-1367-4b68-a5a2-fc6d429787ad@huawei.com>
Date: Fri, 20 Dec 2024 12:46:18 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Thomas.Graf@swisscom.com, kent+ietf@watsen.net, draft-ietf-netconf-udp-notif@ietf.org
References: <2EBB4D35-4D0A-4123-AE45-0D0C6B549E48@insa-lyon.fr> <EAEFE72C-2E72-4847-B612-E76617A1C5CC@strayalpha.com> <249963514c32443fb46250e3d7492944@swisscom.com> <1FD4AA1D-0509-45F3-96D4-A2FEE0390B60@strayalpha.com> <F721D255-EFF2-4FCA-812F-9816E25E9949@insa-lyon.fr> <9056d35ba7e24548b36c31bf75a4a6b6@swisscom.com> <98762A51-2207-4193-BB67-8F13CAD9A2C4@strayalpha.com> <b0918cd139444a56bccef2fa233ae828@swisscom.com> <01000193bb4d7eb1-9d40b4a7-3504-4367-b77b-44a5db15d004-000000@email.amazonses.com> <01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@email.amazonses.com> <CH3PR11MB8519A9D21EA690F8F38EC712B53B2@CH3PR11MB8519.namprd11.prod.outlook.com> <c4dba5cf-dd1a-454b-9945-c0644a24fd78@huawei.com> <01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@email.amazonses.com> <bd3bb3982aa44eee87ebae80c85c45aa@swisscom.com>
Content-Language: en-US
From: Benoit Claise <benoit.claise@huawei.com>
In-Reply-To: <bd3bb3982aa44eee87ebae80c85c45aa@swisscom.com>
X-Originating-IP: [10.195.32.207]
X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To frapeml500001.china.huawei.com (7.182.85.94)
Message-ID-Hash: GC6B4Z4KWOSKCVTXDD5JQISIDEYCJFSC
X-Message-ID-Hash: GC6B4Z4KWOSKCVTXDD5JQISIDEYCJFSC
X-MailFrom: benoit.claise@huawei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: netconf@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [netconf] Re: [Tsv-art] UDP default port
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/gDfiqrPnSnBWzr5mQEGLaxmGBik>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>

Kent,

I guess I fail to understand this willingness to come back to the use 
cases behind this draft, to try to find new solutions here (QUIC), and 
to postpone further the publication.
A 4 years old WG document, with 6 implementations (see Implementation 
Status 
<https://datatracker.ietf.org/doc/html/draft-ietf-netconf-udp-notif#name-implementation-status>). 
Isn't it time to ship it?

Regards, Benoit

On 12/20/2024 9:35 AM, Thomas.Graf@swisscom.com wrote:
>
> Dear Kent,
>
> Speaking as an operator who maintains a large scale Network Telemetry 
> data collection. We at Swisscom have >2 years of experience operating 
> udp-notif data collection in production environment with periodical, 
> on-change and on-change sync-on-start subscriptions.
>
>   * 2) Slides 11 of IETF YANG-Push Implementations and Next Steps
>     <https://datatracker.ietf.org/meeting/121/materials/slides-121-nmop-ietf-yang-push-implementations-and-next-steps-01> suggests
>     that some notifications occur once (e.g., On-change sync), and
>     hence suggest a need to be delivered reliably.
>
> Correction. Slide 10 and 11 show the use cases. Slide 12 how they are 
> being addressed.
>
> https://datatracker.ietf.org/doc/html/draft-ietf-netconf-udp-notif#section-5 
> <https://datatracker.ietf.org/doc/html/draft-ietf-netconf-udp-notif#section-5>describes 
> main appliccability.
>
> The main use case of the proposed mechanism is the collection of 
> statistical metrics for accounting purposes, where potential loss is 
> not a concern, but should however be reported (such as IPFIX Flow 
> Records exported with UDP [RFC7011 
> <https://www.rfc-editor.org/info/rfc7011>]). Such metrics are 
> typically exported in a periodical subscription as described in 
> Section 3.1 of [RFC8641 <https://www.rfc-editor.org/info/rfc8641>].
>
> Today snmp traps, the YANG-Push on-change pendant, are sent via udp. 
> IPFIX has data-templates and options-templates, similar to YANG-Push 
> subscription state change notifications, are sent also via UDP but 
> periodically. Loss can occur not only in YANG-Push transport but also 
> somewhere throughout the data processing chain 
> (https://datatracker.ietf.org/doc/html/draft-ietf-nmop-yang-message-broker-integration-05#section-4) 
> Therefore it is important to be able to recognize loss 
> (https://datatracker.ietf.org/doc/html/draft-netana-netconf-notif-envelope-01#section-3.4.1) 
> throughout the data processing chain and not only retrieve at the 
> YANG-Push session establishment the initial state with on-change 
> sync-on-start 
> (https://datatracker.ietf.org/doc/html/rfc8641#section-3.1) when the 
> YANG-Push session was lost, but also periodically throughout the 
> YANG-Push subscription life cycle. Today this requires two 
> subscriptions but tomorrow, same as in gNMI, this could be an option 
> at the subscription.
>
> From vendor implementation interactions we understood that udp-notif 
> is implementable on distributed systems because session states doesn't 
> need to be maintained. Current implementations are ranging from 
> routers with line cards in the IP domain, OLT's in the broadband 
> access domain to even SmartSFP's. I am not aware of any vendors intend 
> to implement https-notif nor QUIC transport for YANG-Push. In the 
> future, with different hardware capabilities, this might change.
>
> Best wishes
>
> Thomas
>
> *From:*Kent Watsen <kent+ietf@watsen.net>
> *Sent:* Thursday, December 19, 2024 6:05 PM
> *To:* draft-ietf-netconf-udp-notif@ietf.org
> *Cc:* netconf@ietf.org
> *Subject:* Re: [netconf] [Tsv-art] UDP default port
>
>
> 	
>
> *Be aware:*This is an external email.
>
> [Removing Joe and TSVART]
>
> As I understand it, udp-notif is intended to be used only for 
> notifications that do not require reliable delivery.  That is, there 
> would be one configured subscription using udp-notif for nodes that 
> don’t require reliable delivery, and another configured subscription 
> using, e.g., https-notif, for nodes that do require reliable delivery. 
>  Is this correct?
>
> Two things confuse me:
>
> 1) the YANG Push protocol itself defines some notifications 
> (subscription-changed) that are intended to be reliable.
>
> 2) Slides 11 of IETF YANG-Push Implementations and Next Steps 
> <https://datatracker.ietf.org/meeting/121/materials/slides-121-nmop-ietf-yang-push-implementations-and-next-steps-01> suggests 
> that some notifications occur once (e.g., On-change sync), and hence 
> suggest a need to be delivered reliably.
>
> How are these issues resolved? Wouldn’t QUIC resolve them better?
>
> Thanks,
>
> Kent
>
>
>
>     On Dec 17, 2024, at 11:37 AM, Benoit Claise
>     <benoit.claise=40huawei.com@dmarc.ietf.org> wrote:
>
>     Hi,
>
>     On 12/17/2024 3:44 PM, Rob Wilton (rwilton) wrote:
>
>         Hi Kent, all.
>
>         Not an author (but I am involved with the implementation of
>         the UDP Notif draft), one comment inline …
>
>         *From: *Kent Watsen <kent+ietf@watsen.net>
>         <mailto:kent+ietf@watsen.net>
>         *Date: *Friday, 13 December 2024 at 16:41
>         *To: *touch@strayalpha.com <touch@strayalpha.com>
>         <mailto:touch@strayalpha.com>,
>         draft-ietf-netconf-udp-notif@ietf.org
>         <draft-ietf-netconf-udp-notif@ietf.org>
>         <mailto:draft-ietf-netconf-udp-notif@ietf.org>
>         *Cc: *tsv-art@ietf.org <tsv-art@ietf.org>
>         <mailto:tsv-art@ietf.org>, netconf@ietf.org <netconf@ietf.org>
>         <mailto:netconf@ietf.org>
>         *Subject: *[netconf] Re: [Tsv-art] UDP default port
>
>             Hi Joe and UDP-Notif Authors,
>
>             It seems that this thread has stalled.  What can we do to
>             move it forward?
>
>             Kent and Per // NETCONF chairs
>
>         A couple thought-provoking questions:
>
>         1.What does "udp-notif" bring that isn’t supported by the
>         "https-notif" draft, assuming the https-notif draft supports
>         the QUIC transport?
>
>         2.If the https-notif draft with QUIC transport is deemed
>         unacceptable, would a "quic-notif” draft work?
>
>         PROs:
>
>         1.QUIC is well-defined (RFC 9000) and tooling should prominent.
>
>         2.HTTP/3 is well-defined (RFC 9114) and tooling should prominent.
>
>         3.QUIC supports reliability on a per frame-type basis, thus
>         muxing both types is possible (see RFC 9221)
>
>         4.Stateful firewalls supporting QUIC will allow the return
>         packets, thus enabling an “encoding-discovery” mechanism.
>
>         5.QUIC is still UDP, and so (I think) continues to support the
>         properties desired by the “distributed-notify” draft.
>
>         6.Anything else?
>
>         CONs:
>
>         1.No ability to disable encryption (for “private” networks)
>
>         1.I don’t know how big of a problem this is.
>
>         2.Assuming long-lived connections, the overhead of the
>         asymmetric key handshake is negligible.
>
>         3.The overhead for symmetric-key encryption (e.g., AES) is
>         also pretty negligible
>
>         4.The “overhead” is mostly a concern on the receiver-side, as
>         logging is a many-to-one activity, but it’s easy to scale
>         receivers.
>
>         5.Encryption negates the ability to copy frames directly to
>         persistent storage.  This is unlikely a good idea anymore, but
>         ~20 years ago I designed the binary logging protocol such that
>         the packets could be mmap-ed directly to disk, in their final
>         storage format (note: a post-sweep would build indices).
>
>         2.Anything else?
>
>         Yes, it is not what the clients/servers are implementing. ;-) 
>         I.e., the UDP notif draft ticks the running code box, but
>         AFAIK nobody is yet implementing a QUIC based transport,
>         although I understand that there is potentially interest in
>         future.
>
>         Another key benefit of the UDP stack is that it is
>         lightweight.  We implemented the core of it in a few weeks.  A
>         QUIC implementation will take significantly more time and
>         effort, or most likely we will try and find a suitable
>         third-party library to leverage.
>
>         But ultimately, If the operators are saying that UDP fits
>         their requirements, and the vendors are implementing then what
>         is the stumbling block to publishing this?
>
>     What Rob said.
>     IPFIX has been proving that UDP works and scales in production now.
>
>     Regards, Benoit
>
>         Regards,
>         Rob
>
>         Kent / contributor
>
>
>
>         _______________________________________________
>
>         netconf mailing list --netconf@ietf.org
>
>         To unsubscribe send an email tonetconf-leave@ietf.org
>
>     _______________________________________________
>     netconf mailing list -- netconf@ietf.org
>     To unsubscribe send an email to netconf-leave@ietf.org
>
>
> _______________________________________________
> netconf mailing list --netconf@ietf.org
> To unsubscribe send an email tonetconf-leave@ietf.org