Re: [netconf] Capability-fetching mechanisms

Zmail <> Tue, 08 June 2021 07:21 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id CB2673A25B1; Tue, 8 Jun 2021 00:21:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.596
X-Spam-Status: No, score=-2.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id BQROQ7ykbL3s; Tue, 8 Jun 2021 00:21:10 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 6B9353A25B0; Tue, 8 Jun 2021 00:21:09 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 284AD614D0; Tue, 8 Jun 2021 09:21:01 +0200 (CEST)
Received: from (localhost []) by (Postfix) with ESMTPS id 17549140280; Tue, 8 Jun 2021 09:21:01 +0200 (CEST)
Received: from localhost (localhost []) by (Postfix) with ESMTP id 092E2140468; Tue, 8 Jun 2021 09:21:01 +0200 (CEST)
X-Virus-Scanned: amavisd-new at
Received: from ([]) by localhost ( []) (amavisd-new, port 10026) with ESMTP id 4ZmB8IVXOgQM; Tue, 8 Jun 2021 09:21:00 +0200 (CEST)
Received: from [] (unknown []) by (Postfix) with ESMTPA id 9DA15140280; Tue, 8 Jun 2021 09:21:00 +0200 (CEST)
From: Zmail <>
Message-Id: <>
Content-Type: multipart/alternative; boundary="Apple-Mail=_1C7B3D59-A24A-4D9E-953C-19830628D377"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.\))
Date: Tue, 08 Jun 2021 09:21:00 +0200
In-Reply-To: <>
Cc:,, Pierre Francois <>,
References: <>
X-Mailer: Apple Mail (2.3608.
X-Renater-Ptge-SpamState: clean
X-Renater-Ptge-SpamScore: -100
X-Renater-Ptge-SpamCause: gggruggvucftvghtrhhoucdtuddrgeduledrfedtkedguddutdcutefuodetggdotefrodftvfcurfhrohhfihhlvgemucftgffptefvgfftnecuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjughrpefhkfgtggfuffgjvfhfofesrgdtmherhhdtjeenucfhrhhomhepkghmrghilhcuoegrlhgvgidrhhhurghnghdqfhgvnhhgsehinhhsrgdqlhihohhnrdhfrheqnecuggftrfgrthhtvghrnhepkedvuddvjedtgeeigefgveeifeeffedvhfefhfegudeghfehffekvdfgffeggfffnecuffhomhgrihhnpehhthhtphhsthhovgigtghhrghnghgvrgguvhgvrhhtihhsvgguuggrthgrrdhinhenucfkphepudelgedrvdehgedrvdeguddrvdehtdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeduleegrddvheegrddvgedurddvhedtpdhhvghloheplgduledvrdduieekrddtrdduhegnpdhmrghilhhfrhhomhepkghmrghilhcuoegrlhgvgidrhhhurghnghdqfhgvnhhgsehinhhsrgdqlhihohhnrdhfrheqpdhrtghpthhtohepsghilhhlrdifuheshhhurgifvghirdgtohhmpdhrtghpthhtohepnhgvthgtohhnfhdqtghhrghirhhssehivghtfhdrohhrghdprhgtphhtthhopehnvghttghonhhfsehivghtfhdrohhrghdprhgtphhtthhopehmrghqihhufhgrnhhgudeshhhurgifvghirdgtohhmpdhrtghpthht ohepphhivghrrhgvrdhfrhgrnhgtohhishesihhnshgrqdhlhihonhdrfhhrpdhrtghpthhtohepfigvihifrghnghelgeesfhhogihmrghilhdrtghomh
Archived-At: <>
Subject: Re: [netconf] Capability-fetching mechanisms
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETCONF WG list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 08 Jun 2021 07:21:16 -0000

Hi everyone,

I join this thread to discuss the understanding of the draft data-export-capabilities and how it is confusing with the capabilities export feature of https-notif draft.

I think that the data-export-capabilities draft should change the terms client/server to publisher/receiver. That way, I think it would be clearer in which draft we discuss which case.

As I understood reading this thread, data-export-capabilities discusses how the receiver (client) could get the publisher's (server) capabilities. And on the other side, the HTTPS GET capabilities from https-notif draft defines how the receiver (client) could export its capabilities to the publisher (server). It’s that right ? Please correct me if there is any misunderstanding.

On the other hand, we are discussing how the receiver could expose its capabilities on each notification drafts (https-notif, udp-notif, etc). Notifications drafts defines a protocol to exchange notifications over a transport layer, so from my point of view, the capabilities export feature should not be defined there because :
1. it would be transport dependent (I don't feel confortable putting a HTTPS export capabilities on the udp-notif draft...)
2. for configured notifications from the publisher side, there is no need to know the capabilities for the receiver, they already know them
3. I think we are mixing the configuration part and the notification part

As I understood in the precedent mails, Qin is looking for a common protocol to exchange these capabilities over all notifications drafts. Maybe it is better to define this capabilities export transport dependent protocol on another draft ? Or on the data-export-capabilities draft, but it is defined as transport agnostic…

Any thoughts ?

Alex Huang Feng
INSA Lyon | Unyte team

> Date: Wed, 2 Jun 2021 01:07:05 +0000
> From: Qin Wu <>
> To: Mahesh Jethanandani <>
> Cc: Kent Watsen <>, ""
> 	<>
> Subject: [netconf] ??:  Capability-fetching mechanisms
> Message-ID: <>
> Content-Type: text/plain; charset="utf-8"
> Hi, Mahesh:
> ???: Mahesh Jethanandani []
> ????: 2021?6?2? 6:44
> ???: Qin Wu <>
> ??: Kent Watsen <>;
> ??: Re: [netconf] Capability-fetching mechanisms
> [Trimming down the e-mail to open topics]
> Hi Qin,
> See inline with [mj1]
> On May 18, 2021, at 4:40 AM, Qin Wu <<>> wrote:
> Hi, Mahesh:
> The question is whether the receiver needs to be a NETCONF/RESTCONF server. As maqiufang wrote in his response, if the receiver supports the data-export-capabilities draft, then it would need to be a NETCONF/RESTCONF server, whereas with the https-notif draft that is not the case. This is the case whether the receiver supports RFC 8639 or not.
> [Qin]:My understanding is data-export-capabilities doesn?t require receiver to be tied with NETCONF/RESTCONF server. I assume the management system (i.e., receiver) and network device (i.e., publisher) can use HTTPS to exchange advertised data.
> In addition, Maybe what is missing in the data-export-capabilities draft is to define RPC to allow the publisher get capability from receiver through HTTPS channel, similar to what is get-bootstrapping-data RPC defined in RFC8572.
> [mj1] Stipulating a HTTPs channel works for the HTTPS notif draft. But what will other transport type drafts use? e.g. the UDP notif draft??
> [Qin]:I think UDP notif draft could also use HTTPs channel to carry capability information from the server to the client in the form of YANG instance file format.
> Please note that RFC 8639 receivers do not have to be NETCONF/RESTCONF servers for configured subscriptions. RFC 8639, Section 2.7 defines the control messages such as <subscription-started> using one-way YANG ?notification? statements.
> [Qin]: Understand this case, Do you think we should define a new notification in the data-export-capabilities draft instead of considering to define RPC?
> [mj1] I do not understand this statement. Can you expand?
> [Qin]: I am not sure the RPC is a good design choice, I think we could have 3 options
> ?a?Report capability information from the HTTPs server or the HTTPs client at run-time or implementation- time, per the YANG Instance Data File Format.
> (b) Define one way YANG notification similar to <subscription-started> that is sent from the server to the client
> (c) Report capability information only from NETCONF server using YANG model define in data-export-capaiblities draft
> I think (b) only allow the server advertise the server capability to the client but does not allow the client issue notification and advertise client capability to the server
> (c) is something you envision how it is used, the limitation is to require NETCONF server to be supported by the receiver or the client, but this option is not what we proposed in the data-export-capabilities draft.
> The solution we proposed is (a) which allows report capability information either from the Server or the client using YANG Instance data file. Hope this clarifies.
> Mahesh Jethanandani