[netconf] Re: [Tsv-art] UDP default port

Kent Watsen <kent+ietf@watsen.net> Thu, 19 December 2024 17:05 UTC

Return-Path: <01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@amazonses.watsen.net>
X-Original-To: netconf@ietfa.amsl.com
Delivered-To: netconf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F6A0C14F61D; Thu, 19 Dec 2024 09:05:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q5DvoHHxnur6; Thu, 19 Dec 2024 09:05:24 -0800 (PST)
Received: from a8-31.smtp-out.amazonses.com (a8-31.smtp-out.amazonses.com [54.240.8.31]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF519C14F610; Thu, 19 Dec 2024 09:05:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=ug7nbtf4gccmlpwj322ax3p6ow6yfsug; d=amazonses.com; t=1734627923; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=FbCJ7x2edxJcKNtPdFpVayODbXN/LQhbbmLddJcbMak=; b=nde5XzN7okNlmzqPT3SvbnX6lCM5+S5ny9lPrVfz6IAP8x5Tt2QPj9H/o0+3nSTr gtUP8nyhAbLRzL0qn137ORcA7lPEw1ZoUPq3Tf39BGc2UwvvTIlaJg+EqSyVUDUHx7n BdyFdgtZCh3xElYWpoqOleVL+j6E61HlEKJ2e9Eg=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_73B31AF6-17CA-48B4-A243-526A54B094DF"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\))
Date: Thu, 19 Dec 2024 17:05:22 +0000
In-Reply-To: <c4dba5cf-dd1a-454b-9945-c0644a24fd78@huawei.com>
To: "draft-ietf-netconf-udp-notif@ietf.org" <draft-ietf-netconf-udp-notif@ietf.org>
References: <2EBB4D35-4D0A-4123-AE45-0D0C6B549E48@insa-lyon.fr> <EAEFE72C-2E72-4847-B612-E76617A1C5CC@strayalpha.com> <249963514c32443fb46250e3d7492944@swisscom.com> <1FD4AA1D-0509-45F3-96D4-A2FEE0390B60@strayalpha.com> <F721D255-EFF2-4FCA-812F-9816E25E9949@insa-lyon.fr> <9056d35ba7e24548b36c31bf75a4a6b6@swisscom.com> <98762A51-2207-4193-BB67-8F13CAD9A2C4@strayalpha.com> <b0918cd139444a56bccef2fa233ae828@swisscom.com> <01000193bb4d7eb1-9d40b4a7-3504-4367-b77b-44a5db15d004-000000@email.amazonses.com> <01000193c0e29a1c-9eedbddf-9f9e-4407-80f5-b1a3d776295b-000000@email.amazonses.com> <CH3PR11MB8519A9D21EA690F8F38EC712B53B2@CH3PR11MB8519.namprd11.prod.outlook.com> <c4dba5cf-dd1a-454b-9945-c0644a24fd78@huawei.com>
X-Mailer: Apple Mail (2.3774.400.31)
Feedback-ID: ::1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
X-SES-Outgoing: 2024.12.19-54.240.8.31
Message-ID-Hash: WHHPMXNCGDE3YUCEFNHXHGCDMDVPJNZK
X-Message-ID-Hash: WHHPMXNCGDE3YUCEFNHXHGCDMDVPJNZK
X-MailFrom: 01000193dfe193ee-64b69c81-e3e1-494f-98d3-8c11e9ea4e55-000000@amazonses.watsen.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netconf.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "netconf@ietf.org" <netconf@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [netconf] Re: [Tsv-art] UDP default port
List-Id: NETCONF WG list <netconf.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netconf/qlqKZxqN4KEA14PN7UyEYTv8F-A>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netconf>
List-Help: <mailto:netconf-request@ietf.org?subject=help>
List-Owner: <mailto:netconf-owner@ietf.org>
List-Post: <mailto:netconf@ietf.org>
List-Subscribe: <mailto:netconf-join@ietf.org>
List-Unsubscribe: <mailto:netconf-leave@ietf.org>

[Removing Joe and TSVART]


As I understand it, udp-notif is intended to be used only for notifications that do not require reliable delivery.  That is, there would be one configured subscription using udp-notif for nodes that don’t require reliable delivery, and another configured subscription using, e.g., https-notif, for nodes that do require reliable delivery.  Is this correct?

Two things confuse me:

1) the YANG Push protocol itself defines some notifications (subscription-changed) that are intended to be reliable.

2) Slides 11 of IETF YANG-Push Implementations and Next Steps <https://datatracker.ietf.org/meeting/121/materials/slides-121-nmop-ietf-yang-push-implementations-and-next-steps-01> suggests that some notifications occur once (e.g., On-change sync), and hence suggest a need to be delivered reliably.


How are these issues resolved?   Wouldn’t QUIC resolve them better?

Thanks,
Kent



> On Dec 17, 2024, at 11:37 AM, Benoit Claise <benoit.claise=40huawei.com@dmarc.ietf.org> wrote:
> 
> Hi, 
> 
> 
> On 12/17/2024 3:44 PM, Rob Wilton (rwilton) wrote:
>> Hi Kent, all.
>>  
>> Not an author (but I am involved with the implementation of the UDP Notif draft), one comment inline …
>>  
>>  
>> From: Kent Watsen <kent+ietf@watsen.net> <mailto:kent+ietf@watsen.net>
>> Date: Friday, 13 December 2024 at 16:41
>> To: touch@strayalpha.com <mailto:touch@strayalpha.com> <touch@strayalpha.com> <mailto:touch@strayalpha.com>, draft-ietf-netconf-udp-notif@ietf.org <mailto:draft-ietf-netconf-udp-notif@ietf.org> <draft-ietf-netconf-udp-notif@ietf.org> <mailto:draft-ietf-netconf-udp-notif@ietf.org>
>> Cc: tsv-art@ietf.org <mailto:tsv-art@ietf.org> <tsv-art@ietf.org> <mailto:tsv-art@ietf.org>, netconf@ietf.org <mailto:netconf@ietf.org> <netconf@ietf.org> <mailto:netconf@ietf.org>
>> Subject: [netconf] Re: [Tsv-art] UDP default port
>> 
>>  
>> Hi Joe and UDP-Notif Authors,
>>  
>> It seems that this thread has stalled.  What can we do to move it forward?  
>>  
>> Kent and Per // NETCONF chairs
>>  
>>  
>> A couple thought-provoking questions:
>>  
>> 1.      What does "udp-notif" bring that isn’t supported by the "https-notif" draft, assuming the https-notif draft supports the QUIC transport?
>> 2.      If the https-notif draft with QUIC transport is deemed unacceptable, would a "quic-notif” draft work?
>>  
>>  
>> PROs:
>>  
>> ·         QUIC is well-defined (RFC 9000) and tooling should prominent.
>> ·         HTTP/3 is well-defined (RFC 9114) and tooling should prominent. 
>> ·         QUIC supports reliability on a per frame-type basis, thus muxing both types is possible (see RFC 9221)
>> ·         Stateful firewalls supporting QUIC will allow the return packets, thus enabling an “encoding-discovery” mechanism.
>> ·         QUIC is still UDP, and so (I think) continues to support the properties desired by the “distributed-notify” draft.
>> ·         Anything else?
>>  
>> CONs:
>>  
>> ·         No ability to disable encryption (for “private” networks)
>> o    I don’t know how big of a problem this is.
>> o    Assuming long-lived connections, the overhead of the asymmetric key handshake is negligible.
>> o    The overhead for symmetric-key encryption (e.g., AES) is also pretty negligible
>> o    The “overhead” is mostly a concern on the receiver-side, as logging is a many-to-one activity, but it’s easy to scale receivers.
>> o    Encryption negates the ability to copy frames directly to persistent storage.  This is unlikely a good idea anymore, but ~20 years ago I designed the binary logging protocol such that the packets could be mmap-ed directly to disk, in their final storage format (note: a post-sweep would build indices).
>>  
>> ·         Anything else?
>> Yes, it is not what the clients/servers are implementing. ;-)  I.e., the UDP notif draft ticks the running code box, but AFAIK nobody is yet implementing a QUIC based transport, although I understand that there is potentially interest in future.
>> Another key benefit of the UDP stack is that it is lightweight.  We implemented the core of it in a few weeks.  A QUIC implementation will take significantly more time and effort, or most likely we will try and find a suitable third-party library to leverage.
>> But ultimately, If the operators are saying that UDP fits their requirements, and the vendors are implementing then what is the stumbling block to publishing this?
> What Rob said.
> IPFIX has been proving that UDP works and scales in production now.
> 
> Regards, Benoit
>> Regards,
>> Rob
>>  
>>  
>> Kent / contributor
>>  
>> 
>> 
>> _______________________________________________
>> netconf mailing list -- netconf@ietf.org <mailto:netconf@ietf.org>
>> To unsubscribe send an email to netconf-leave@ietf.org <mailto:netconf-leave@ietf.org>
> 
> _______________________________________________
> netconf mailing list -- netconf@ietf.org
> To unsubscribe send an email to netconf-leave@ietf.org