[netconf] Re: [Tsv-art] UDP default port

Andy Bierman <andy@yumaworks.com> Thu, 19 December 2024 18:08 UTC

Return-Path: <andy@yumaworks.com>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67557C14F69C for <netconf@ietfa.amsl.com>; Thu, 19 Dec 2024 10:08:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yumaworks.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D4fpk-TUXccq for <netconf@ietfa.amsl.com>; Thu, 19 Dec 2024 10:08:06 -0800 (PST)
Received: from mail-pl1-x635.google.com (mail-pl1-x635.google.com [IPv6:2607:f8b0:4864:20::635]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0307AC14F610 for <netconf@ietf.org>; Thu, 19 Dec 2024 10:08:05 -0800 (PST)
Received: by mail-pl1-x635.google.com with SMTP id d9443c01a7336-2162b5d2e1fso1772735ad.3 for <netconf@ietf.org>; Thu, 19 Dec 2024 10:08:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yumaworks.com; s=google; t=1734631685; x=1735236485; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=qdBFhl7VZa3F1uE9maXGHBbgzK9BAcOl22Q2mIcT9pA=; b=Uc7uRWCQyY9qnohl7Lz+qX7r4YZaDHZBcbTLgyKufu5/omN6siBArcaPVizVSCDnTz Me14fZjJJUvxVlyUuP8qCLRF+x9LVv4OTR+EpEz2GPmXkoeU5l2i2eIiaSPtI1B2YfsF 2OOTdqPkO/NKHlH6fgGiG+TOvXhw1llsfHXRBkgCCGMD57yWdDb6Df2KKnrpT0JLCQ2i lPEuuKSa2SI7IccSZ8olirEkedfJqr/rcKDV4EBI7Ee5/SFMvQDek38T4WcUKbQK+7MH 7iSYXzoupRweZ+IcCqTCnNByRQZME2PngPAyF5a14DJ6sa+fIagrli1tNYsxAuVfzd+p A1pg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1734631685; x=1735236485; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=qdBFhl7VZa3F1uE9maXGHBbgzK9BAcOl22Q2mIcT9pA=; b=G9jHInTfE2nnx5ZaleNUarb3hOp4MadWQIjzChix6nu4W0dU7NqYBVuAk2W8BMPAgl 7EbN+6/7IxRHaEoemzU2RdqXIo/3WNMG5iMc/FXqySQKt+SPv3dUKOXEMTIBsHW/2v6G yDX6y5bpOBmQbRmKAVphbucGEhtdee3P+UoMpFJwcct/yHsfFPOkvUN2E+oG9K2B43sv rEJvu+MR84uk7FftEfUJpHh4ZocoDT0E69TwSCO+9lg9KH0+HezfCWEXtXv59tNe2quL 3EgNl7XcrHSrqzBXrv37CIvjpEOJhSUCuXdOfUBA2WptijDvygn8KQE2bEw3y0tbnyc7 PRGw==
X-Forwarded-Encrypted: i=1; AJvYcCVe5752xSJyBMDz3VGgG4U0yqKPHTT4fVuib+s928manw2iO3l3cPG4hAdce8ciek9AtlzFG8WH@ietf.org
X-Gm-Message-State: AOJu0YwK9Sxn32ISsAfhJFL0CNtfqc5O//jPLAxEEKoqEQf69LCuuXNq LgRq97hnPJpcJ/o4BHDq1VxSI5jjd6ab0EL7935R5p33vQDAQEJouhB9gL0pIH1j1DJJQl3c38S f9iifKwwSfeLj2dMElVbZaZQIU3AJAgFR7/4TXw==
X-Gm-Gg: ASbGncvLMvDK9k1s+GUepmBB+OjY9TkOV2q2nXbrnT7w5UVibjv1IMSydzumjLjmW/1 FoVxh58A3kZsxE5DCUcWaAfwBseGY+jSnPJch
X-Google-Smtp-Source: AGHT+IGQLrGmBXPbYH/ZQnMu4TD+0vVu/8AjNRdriZhAyo2agf/ATPSrEnUcQEVl4mFktm26kGwDu2+la7pbpzHhlXY=
X-Received: by 2002:a17:902:f643:b0:216:30f9:93db with SMTP id d9443c01a7336-218d6c49aa5mr41966545ad.0.1734631683733; Thu, 19 Dec 2024 10:08:03 -0800 (PST)
MIME-Version: 1.0
References: <2EBB4D35-4D0A-4123-AE45-0D0C6B549E48@insa-lyon.fr> <EAEFE72C-2E72-4847-B612-E76617A1C5CC@strayalpha.com> <249963514c32443fb46250e3d7492944@swisscom.com> <1FD4AA1D-0509-45F3-96D4-A2FEE0390B60@strayalpha.com> <F721D255-EFF2-4FCA-812F-9816E25E9949@insa-lyon.fr> <9056d35ba7e24548b36c31bf75a4a6b6@swisscom.com> <98762A51-2207-4193-BB67-8F13CAD9A2C4@strayalpha.com> <b0918cd139444a56bccef2fa233ae828@swisscom.com> <01000193bb4d7eb1-9d40b4a7-3504-4367-b77b-44a5db15d004-000000@email.amazonses.com> <01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@email.amazonses.com> <CH3PR11MB8519A9D21EA690F8F38EC712B53B2@CH3PR11MB8519.namprd11.prod.outlook.com> <c4dba5cf-dd1a-454b-9945-c0644a24fd78@huawei.com> <01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@email.amazonses.com>
In-Reply-To: <01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@email.amazonses.com>
From: Andy Bierman <andy@yumaworks.com>
Date: Thu, 19 Dec 2024 10:07:52 -0800
Message-ID: <CABCOCHSC9TUoODXZzYtmqeVHeAmDf-NKFOY_PVaPvEWO5pgVaA@mail.gmail.com>
To: Kent Watsen <kent+ietf@watsen.net>
Content-Type: multipart/alternative; boundary="0000000000005359ca0629a36993"
Message-ID-Hash: I5PSR6YQ6QSALTUDMT74FCBITTR33UCB
X-Message-ID-Hash: I5PSR6YQ6QSALTUDMT74FCBITTR33UCB
X-MailFrom: andy@yumaworks.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-netconf-udp-notif@ietf.org" <draft-ietf-netconf-udp-notif@ietf.org>, "netconf@ietf.org" <netconf@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [netconf] Re: [Tsv-art] UDP default port
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/pvfekN_7WRMKDos-Gdbk-fjHt8g>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>

On Thu, Dec 19, 2024 at 9:05 AM Kent Watsen <kent+ietf@watsen.net> wrote:

> [Removing Joe and TSVART]
>
>
> As I understand it, udp-notif is intended to be used only for
> notifications that do not require reliable delivery.  That is, there would
> be one configured subscription using udp-notif for nodes that don’t require
> reliable delivery, and another configured subscription using, e.g.,
> https-notif, for nodes that do require reliable delivery.  Is this
> correct?
>
> Two things confuse me:
>
> 1) the YANG Push protocol itself defines some notifications
> (subscription-changed) that are intended to be reliable.
>
> 2) Slides 11 of IETF YANG-Push Implementations and Next Steps
> <https://datatracker.ietf.org/meeting/121/materials/slides-121-nmop-ietf-yang-push-implementations-and-next-steps-01> suggests
> that some notifications occur once (e.g., On-change sync), and hence
> suggest a need to be delivered reliably.
>
>
> How are these issues resolved?   Wouldn’t QUIC resolve them better?
>
>
The architecture has a Controller and a Collector.
The Controller needs to use NETCONF or RESTCONF to configure, monitor,
resync, etc.

I don't know why the UDP-notif draft says to use HTTP-Notif for reliable
notification delivery.
What about the long-deployed dynamic subscription over SSH or TLS?
The most notification deployment is still RFC 5277.
I think the reliable delivery option is already handled.

There should be no assumption that the system will work without a
traditional client session,
in addition to the UDP-notif receivers.


Thanks,
> Kent
>
>
Andy


>
>
> On Dec 17, 2024, at 11:37 AM, Benoit Claise <benoit.claise=
> 40huawei.com@dmarc.ietf.org> wrote:
>
> Hi,
>
>
> On 12/17/2024 3:44 PM, Rob Wilton (rwilton) wrote:
>
> Hi Kent, all.
>
>
>
> Not an author (but I am involved with the implementation of the UDP Notif
> draft), one comment inline …
>
>
>
>
>
> *From: *Kent Watsen <kent+ietf@watsen.net> <kent+ietf@watsen.net>
> *Date: *Friday, 13 December 2024 at 16:41
> *To: *touch@strayalpha.com <touch@strayalpha.com> <touch@strayalpha.com>,
> draft-ietf-netconf-udp-notif@ietf.org
> <draft-ietf-netconf-udp-notif@ietf.org>
> <draft-ietf-netconf-udp-notif@ietf.org>
> *Cc: *tsv-art@ietf.org <tsv-art@ietf.org> <tsv-art@ietf.org>,
> netconf@ietf.org <netconf@ietf.org> <netconf@ietf.org>
> *Subject: *[netconf] Re: [Tsv-art] UDP default port
>
>
>
> Hi Joe and UDP-Notif Authors,
>
>
>
> It seems that this thread has stalled.  What can we do to move it forward?
>
>
>
>
> Kent and Per // NETCONF chairs
>
>
>
>
>
> A couple thought-provoking questions:
>
>
>
> 1.      What does "udp-notif" bring that isn’t supported by the
> "https-notif" draft, assuming the https-notif draft supports the QUIC
> transport?
>
> 2.      If the https-notif draft with QUIC transport is deemed
> unacceptable, would a "quic-notif” draft work?
>
>
>
>
>
> PROs:
>
>
>
> ·         QUIC is well-defined (RFC 9000) and tooling should prominent.
>
> ·         HTTP/3 is well-defined (RFC 9114) and tooling should prominent.
>
> ·         QUIC supports reliability on a per frame-type basis, thus
> muxing both types is possible (see RFC 9221)
>
> ·         Stateful firewalls supporting QUIC will allow the return
> packets, thus enabling an “encoding-discovery” mechanism.
>
> ·         QUIC is still UDP, and so (I think) continues to support the
> properties desired by the “distributed-notify” draft.
>
> ·         Anything else?
>
>
>
> CONs:
>
>
>
> ·         No ability to disable encryption (for “private” networks)
>
> o    I don’t know how big of a problem this is.
>
> o    Assuming long-lived connections, the overhead of the asymmetric key
> handshake is negligible.
>
> o    The overhead for symmetric-key encryption (e.g., AES) is also pretty
> negligible
>
> o    The “overhead” is mostly a concern on the receiver-side, as logging
> is a many-to-one activity, but it’s easy to scale receivers.
>
> o    Encryption negates the ability to copy frames directly to persistent
> storage.  This is unlikely a good idea anymore, but ~20 years ago I
> designed the binary logging protocol such that the packets could be mmap-ed
> directly to disk, in their final storage format (note: a post-sweep would
> build indices).
>
>
>
> ·         Anything else?
>
> Yes, it is not what the clients/servers are implementing. ;-)  I.e., the
> UDP notif draft ticks the running code box, but AFAIK nobody is yet
> implementing a QUIC based transport, although I understand that there is
> potentially interest in future.
>
> Another key benefit of the UDP stack is that it is lightweight.  We
> implemented the core of it in a few weeks.  A QUIC implementation will take
> significantly more time and effort, or most likely we will try and find a
> suitable third-party library to leverage.
>
> But ultimately, If the operators are saying that UDP fits their
> requirements, and the vendors are implementing then what is the stumbling
> block to publishing this?
>
> What Rob said.
> IPFIX has been proving that UDP works and scales in production now.
>
> Regards, Benoit
>
> Regards,
> Rob
>
>
>
>
>
> Kent / contributor
>
>
>
> _______________________________________________
> netconf mailing list -- netconf@ietf.org
> To unsubscribe send an email to netconf-leave@ietf.org
>
>
> _______________________________________________
> netconf mailing list -- netconf@ietf.org
> To unsubscribe send an email to netconf-leave@ietf.org
>
>
> _______________________________________________
> netconf mailing list -- netconf@ietf.org
> To unsubscribe send an email to netconf-leave@ietf.org
>