Re: [netmod] Unknown bits - backwards compatibility

"Rob Wilton (rwilton)" <rwilton@cisco.com> Tue, 23 May 2023 15:59 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62519C14CF1C for <netmod@ietfa.amsl.com>; Tue, 23 May 2023 08:59:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.594
X-Spam-Level:
X-Spam-Status: No, score=-14.594 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="nCNCIsZE"; dkim=pass (1024-bit key) header.d=cisco.com header.b="IVZbyybO"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id geR-41EROZGg for <netmod@ietfa.amsl.com>; Tue, 23 May 2023 08:59:43 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 008B0C14F736 for <netmod@ietf.org>; Tue, 23 May 2023 08:59:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=32380; q=dns/txt; s=iport; t=1684857583; x=1686067183; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=NXTe0CSttktbnHWSMfJYdiBZ1sdCd0jJwCBCsyNNMo0=; b=nCNCIsZEBGlQkHIpxWjsHctsPOv2YP5B/+eQ52KT+8LrE/7vov23tL7y YsOUjXcBcKwLypbyqgIpP3H70NphaPCw0riwq5TB9FGOd65K0NDGj5ezh puXMxu1vkQsQ4D0qzzH1FgM2keEOUwrHyH/FXhGemRNFT3T+YDazK06xj o=;
X-IPAS-Result: A0ABAACS4mxkmJFdJa1aGQEBAQEBAQEBAQEBAQEBAQEBARIBAQEBAQEBAQEBAQFAJYEWBAEBAQEBCwGBKzFScwJYPSkdiCCETokaA51nFIERA1YPAQEBDQEBOwkEAQGFBgKFWgIlNAkOAQICAgEBAQEDAgMBAQEBAQEDAQEFAQEBAgEHBBQBAQEBAQEBAR4ZBQ4QJ4VoDYYEAQEBAQMSGxMBATgPAgEIEQQBASEBBgcyFAkIAgQBEggMBweCXAGCFUcDAQcIBqAzAYE/AooheIE0gQGCCAEBBgQFgTwCEEGdFQmBQgGJNYgoJxuBSUSBWIFmgQI+gmIBAQEBAReBEAEBEgEJFAYrCYNegi6JUYI9DQuDB4x3gTBygSOBKIECAgkCEWeBDghmgXNAAg1kCwtsgTtaQ1WBFAICEUIMFV0CgQQQARMDBwQCgQ4QMQcENwsYCQYJHTUtBl0HLyQJExVTB4QlBzYDRB1AAwt1PTUGDh8FBCMBS4FYBC9CgRMCBEmdDAM4gVAmTAE9JgRDDgEBIAJEHxMtCDcuARUGGg+SEyRCjX5HgTShCAqEBYt5lTcXg3+MaoZtkRdih1WQNCCCL4sLhzphh1uFPIR7AgQCBAUCDgEHgWM6a3BwFRqDCAlJGQ+OIBmDWoJugiaKZUMyAjkCBwEKAQEDCYtGAQE
IronPort-PHdr: A9a23:RWjzfx86KBSXTP9uWO7oyV9kXcBvk6//MghQ7YIolPcTNK+i5J/le kfY4KYlgFzIWNDD4ulfw6rNsq/mUHAd+5vJrn0YcZJNWhNEwcUblgAtGoiEXGXwLeXhaGoxG 8ERHER98SSDOFNOUN37e0WUp3Sz6TAIHRCqLxV0IvjyHKbZjt+80Ka5/JiAKwlNjSC2NKt7N w7+7R2Er9Qfm4JkNqc3x1PFo2AdfeNQyCIgKQeYng334YG7+5sLzg==
IronPort-Data: A9a23:yaSPQ690Rter/YXEERqjDrUD436TJUtcMsCJ2f8bNWPcYEJGY0x3x mAaDzvUOv2LZzejctglaoS3p0MF7MeDx94wHgRprClEQiMRo6IpJzg2wmQcns+2BpeeJK6yx 5xGMrEsFOhtEjmE4E3F3oHJ9RGQ74nQLlbHILCCYngZqTNMEn970ko+wbVh2OaEvPDga++zk YKqyyHgEAfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8kFWc M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y47OKoxZBh4hQ6AsIt1l pJsm6SPYjcQa/ikdOQ1C3G0EglkNqFAvbTAO3X64IqYzlbNdD3nxPAG4EMeZNJDvL0oRzAVs 6VEdVjhbTjb7w6y6KikS+1wgcILJ8jwN4RZsXZlpd3cJah/H8yeE/mWjTNe9AwRm9lXGPHeX PBaVxkwNDnDPxkRKG5CXfrSm8/x1iWgLFW0smm9o6cr5m/f5A18zLarN8DaEuFmXu1PlUqe4 2nB5Wm8U1cRNceUznyO9XfEavLzcT3TWI5CObDn2fBRiXLIwjJUKTMuanCLmKzs4qKhYO53J 0sR8ysoiKE98k23U9XwNyFURlbZ5nbwvPINS4UHBBGxJrn8uFnGWzBVJtJVQJl3659sHG1CO kqhxouxXVRSXKuppWVxH4p4QBuoMiQTaGQFfyJBHE0O4sLop8c4iRenojdf/Eyd0ISd9dLYm mDiQM0Ca1M71pVjO0KTpgyvvt5UjsKVJjPZHy2ONo5f0it3ZZS+e6uj4kXB4PBLIe6xFwfR4 CdUw5LCtLxVVflhcRBhps1QQtlFAN7YblXhbaJHRPHNChz0oSf4JNAMiN2ADBYzaa7ohgMFk GeK6V8Ou/e/zVOhbLR8ZMqqGt82wK37fekJpdiKBueilqNZLVfdlAk3PBb49zm0zCAEz/plU b/FKpnEMJrvIfk9pNZAb71DgeZDK+FX7T67eK0XODz8ieDPOyHNGeZZWLZMB8hghJ65TMzu2 483H+OByg5UV6v1ZSy/zGLZBQpiwaQTbXwul/FqSw==
IronPort-HdrOrdr: A9a23:BHpF/K1HCCDVSMbLXiTP3QqjBQtyeYIsimQD101hICG9Lfb3qy n+ppsmPEHP5Ar5AEtQ5OxoWJPrfZquz+8I3WBxB8boYOCCggqVxe5ZnPLfKlHbak/DH6tmpN 1dmstFeZfN5DpB/L7HCWCDer5KoKjlzEnrv5ak854Hd3APV0gU1XYeNu/tKDwQeOApP+tdKH Ob3Kd6jgvlXU5SQtWwB3EDUeSGjcbMjojabRkPAANiwBWSjBuzgYSKXySw71M7aXdi0L0i+W /Kn0jS/aO4qcy2zRfayiv684lWot380dFObfb8xfT9aw+cxDpAVr4RG4FqjwpF491HL2xa0u Ukli1QfvibLUmhO11d7yGdnzUImwxelEMKgWXo/0cL5/aJCQ7Tz6F69MRkmtyz0TtmgPhslK 1MxG6XrJxREFfJmzn8/cHBU1VwmlOzumdKq59ks5Vza/prVFZql/1pwGpFVJMbWC7q4oEuF+ djSMna+fZNaFufK3TUpHNmztCgVmk6Wk7ueDlLhuWFlzxN2HxpxUoRw8IS2n8G6ZImUpFBo+ DJKL5hmr1CRtIfKah9GOACS82qDXGle2OEDEuCZVD8UK0XMXPErJD6pL0z+eGxYZQNiIA/nZ zQOWkowFLau3iee/Fm8Kc7gSwlGl/NLAgF4vsul6REhg==
X-Talos-CUID: 9a23:e55Ifm05v//jfjp8b2twN7xfGsx1X3CC43nrKmDjDTguaZOtdnSgwfYx
X-Talos-MUID: 9a23:vVXVngZeW5LBneBTjB7xnShnM8dT2eeQKx9VvJZav5eWDHkl
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 23 May 2023 15:59:41 +0000
Received: from rcdn-opgw-5.cisco.com (rcdn-opgw-5.cisco.com [72.163.7.169]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 34NFxfLT002378 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <netmod@ietf.org>; Tue, 23 May 2023 15:59:41 GMT
Authentication-Results: rcdn-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.00,186,1681171200"; d="scan'";a="1814972"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LEEwxJiwf1BeIY31PC3rxVcvyRON8lYfAPi+Xrh2654Fzys2EfBplBkp9y6v9OerprIUrxG7JBKzlTrYpB/Hhq4Zapz8N1//2bK1kAVwWjbMN/eSdk2tcErpdYuOC0C7H8hX2jYZDkE5xn/QWmSX2bL7dOS9xDWLsJdmAmJhGc/tXpvIA0iDWxBM84GOrcK7VWJmPkWiu3Um9shlOX1y/6eAOEHGI1qbFYNJ+hbh6UpnpEta7lwVIXLYYn8RL3JAUJqVYU60JoP60g7ljHdvLPzRqsCVTQcW0UVMpeKBzdhGe0+j9XoMExQ0MlZcId90KcNrSvf2P85CW3oUnEL53w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=POhUD2ISUFSHznA8TiU9JcOPwUQucLVH4CqVsd3Hj/0=; b=IZMSJGG2dfRUSZyNWNMu7wlfk06OP66NbXoj7YKQeSrszIHSfXjMkhasZAF8wNPqjimpOkhubpnipPgVyGicFrTQfHAQT7awLVjgMvn+oKiwKMlUeW3uqydfEvoHs0cOC1Sncd882ngGRXjBM7OaipjPfbByrlaI+7k4SSLi9c8yPSqzavsYn8KNBoUPkQNA6jVP1gip3ctHP8kZBo2kR+lrgvyLjZR/v3n93HNK1A6fvdsH8bYULDN/7r54q9IHy8PkJudr2do+tgkkVHelcdi94vixwdyky97jsxSEOfSDbLJEQxeOqA+lex3EtkfFtgvIWKEi9jUUN5rD6Vmf7g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=POhUD2ISUFSHznA8TiU9JcOPwUQucLVH4CqVsd3Hj/0=; b=IVZbyybOM64QsZHI3UBIITbZpVMTej2jQTluwydOfUWoYRfegakJu9GwJKaRVIZIOqwYkrnrKBn9e6XVkW5nWrnefuYtEV9xd9MkX2g1S4eNBLVV25tFNjX49ZJQbev7yEPXxqOeqbeerp70MvL3pT03IQM368+tuqc6X0TRIt0=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by PH8PR11MB8064.namprd11.prod.outlook.com (2603:10b6:510:253::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6411.28; Tue, 23 May 2023 15:59:20 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::bf59:c91d:ec37:3bc3]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::bf59:c91d:ec37:3bc3%7]) with mapi id 15.20.6411.028; Tue, 23 May 2023 15:59:20 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Italo Busi <Italo.Busi=40huawei.com@dmarc.ietf.org>, "Jason Sterne (Nokia)" <jason.sterne@nokia.com>, Jeffrey Haas <jhaas@pfrc.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Unknown bits - backwards compatibility
Thread-Index: AQHZbYUxAE2jAf8kn0OKTYpmXYt+gK8oL9mAgAJErwCAPcRD4A==
Date: Tue, 23 May 2023 15:59:20 +0000
Message-ID: <BY5PR11MB419608C7A9D444B5345874F5B5409@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <167510951913.30783.6878062588510633543@ietfa.amsl.com> <70DA36EA-F90A-4800-A4C8-0DDCF6FFD845@pfrc.org> <0F8C57E5-F7F8-4383-A9BE-E98D2C6A6E42@pfrc.org> <DM6PR08MB50841A7B84BA1D84AC0B57809B9B9@DM6PR08MB5084.namprd08.prod.outlook.com> <DM6PR08MB5084E9656CA7C388D2A229779B9B9@DM6PR08MB5084.namprd08.prod.outlook.com> <e71941b457bc4d3084803126a00cc040@huawei.com>
In-Reply-To: <e71941b457bc4d3084803126a00cc040@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|PH8PR11MB8064:EE_
x-ms-office365-filtering-correlation-id: 5ad2764a-cdc6-4d97-dcd9-08db5ba6ab81
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(136003)(39860400002)(396003)(376002)(366004)(346002)(451199021)(2906002)(21615005)(5660300002)(52536014)(8936002)(8676002)(76116006)(41300700001)(66446008)(66946007)(66476007)(66556008)(64756008)(478600001)(316002)(110136005)(7696005)(33656002)(71200400001)(966005)(55016003)(53546011)(6506007)(9686003)(38100700002)(122000001)(86362001)(186003)(83380400001)(38070700005)(166002)(367604002)(10090945012)(9984715007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB419608C7A9D444B5345874F5B5409BY5PR11MB4196namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5ad2764a-cdc6-4d97-dcd9-08db5ba6ab81
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 May 2023 15:59:20.3147 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZMIRaEL49YpJPgurfRE7ACXYLUODsD4Zgx2WEysSSoQ2MTxIHUrI/rNDfZyOvkHDMcFoDCHlKlIwHx5e+9f+Sw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR11MB8064
X-Outbound-SMTP-Client: 72.163.7.169, rcdn-opgw-5.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/8nSgYz75Sd9Mim8MhP2d9Q1Zt8w>
Subject: Re: [netmod] Unknown bits - backwards compatibility
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 May 2023 15:59:47 -0000

I was looking at this draft again, and since I had read the -02 version of the draft I thought that I would send the comments here.

My no hats view here (looking at the latest draft) is:

  *   documenting something here is probably helpful because this is an issue that folks are experiencing and providing written guidance on how to handle it helpful to the YANG modelling community.
  *   having such a document update RFC 8407 would probably be helpful (to help YANG authors find it),
  *   but I'm concerned that the proposed solution is not backwards compatible at the instance data level.  E.g., an old client talking to a new server would still hit a problem if the server changed from sending an unknown "bit-<x>" to a known bit (defined in a backards-compatible module update), and if the old client doesn't know/understand the now known bit (because they are still coded against the older module version), then the client may break.  This makes me think that there is going to be some subtleties around when it is safe to not send an unknown bit, hence my suggestion was to call it just "bits" (which is already in -02) and *always sending* this leaf may be a more backwards compatible choice.  It isn't clear to me, for the "all bits" leaf, whether sending this as a raw uint8 - uint64, or binary, and doing the decode on the client side (if required) might be a better choice than sending them as a generic bits type.

Regards,
Rob

From: netmod <netmod-bounces@ietf.org> On Behalf Of Italo Busi
Sent: 14 April 2023 09:05
To: Jason Sterne (Nokia) <jason.sterne@nokia.com>; Jeffrey Haas <jhaas@pfrc.org>; netmod@ietf.org
Subject: Re: [netmod] Unknown bits - backwards compatibility

Jason, Jeffrey,

If the need is to report the value of a received protocol field for debugging/troubleshooting purposes, I am wondering why not using a binary type instead of a bits type or, better, a YANG leaf of bits type for the known bits and another YANG leaf of binary type for all known/unknown bits

Trailing zeros can be added when the protocol field is not an integer number of octets

In this way there will be no backward compatibility issues when unknown bits are assigned and becomes known

My 2 cents

Italo

From: Jason Sterne (Nokia) <jason.sterne@nokia.com<mailto:jason.sterne@nokia.com>>
Sent: mercoledì 12 aprile 2023 23:26
To: Jason Sterne (Nokia) <jason.sterne@nokia.com<mailto:jason.sterne@nokia.com>>; Jeffrey Haas <jhaas@pfrc.org<mailto:jhaas@pfrc.org>>; netmod@ietf.org<mailto:netmod@ietf.org>
Subject: Re: [netmod] Unknown bits - backwards compatibility

It just occurred to me that to avoid the NBC change we could also consider just calling this new typedef "raw-bits" and always outputting all the bits in the second leaf (whether they are known or not)?  I suspect this was already considered though...

Jason

From: netmod <netmod-bounces@ietf.org<mailto:netmod-bounces@ietf.org>> On Behalf Of Jason Sterne (Nokia)
Sent: Wednesday, April 12, 2023 5:24 PM
To: Jeffrey Haas <jhaas@pfrc.org<mailto:jhaas@pfrc.org>>; netmod@ietf.org<mailto:netmod@ietf.org>
Subject: [netmod] Unknown bits - backwards compatibility

Hi Jeff,

One topic that came up during the IETF 116 NETMOD meeting was backwards compatibility.

>From what I understand, a leaf (e.g. unknown-flags) that uses the unknown-bits typedef would never change its definition in YANG. It would always be defined as unknown-bits with all 64 bit definitions even as more and more bits become "known".  *But* the system would suddenly stop reporting bit-0, then bit-1 in that unknown-flags leaf as those bits become known.

Strictly speaking, that should probably be considered an NBC change although it is a bit of a grey zone - the NBC rules for state are fuzzy (theoretically they are defined by RFC7950 but it is clear those rules were focused on config, and the same goes for all our new versioning work). But I could imagine an implementation that was previously seeing bit-0 returned and suddenly stops seeing that bit-0 returned (which could cause different interpretation/behavior). So in some ways the semantics of the unknown-flags leaf has changed. It may be better to just flag this as an NBC change so a user would be drawn to look at it, and make a decision that they do or don't have to update their handling/use of it?

The known flags leaf would only go through backwards compatible changes though (since we'd always be additive in adding bits) - assuming bit positions don't change in the protocol.

It would probably help to show an example of what a YANG module looks like for step 1 and then step 2 (an unknown becomes known), and also what is returned in NETCONF in step 1 and step 2. You partially have that in section 3.2 although the YANG model isn't shown and it might be good to explicitly mention that <unknown-flags> isn't returned (note it may also be valid to return <unknown-flags></unknown-flags>).

Jason


From: netmod <netmod-bounces@ietf.org<mailto:netmod-bounces@ietf.org>> On Behalf Of Jeffrey Haas
Sent: Monday, April 10, 2023 2:48 PM
To: netmod@ietf.org<mailto:netmod@ietf.org>
Subject: Re: [netmod] Request for WG adoption, draft-haas-netmod-unknown-bits-01.txt


CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See http://nok.it/ext for additional information.


Netmod Working Group,

The presentation at IETF 116 on the YANG unknown bits typedef seemed to be positively received.

I've updated the draft in version -02 to incorporate a hallway suggestion (from Rob, I think?) to rename the bits from a pattern of "unknown-N" to "bit-N".  Please find the information for the updated draft pasted below my original request for adoption.

Having given my presentation and seeing there seems to be interest in the work, could we consider adoption?

-- Jeff




On Feb 20, 2023, at 1:23 PM, Jeffrey Haas <jhaas@pfrc.org<mailto:jhaas@pfrc.org>> wrote:

The current version of this small draft has addressed the discussion points to date.

I'd like to request that the netmod WG consider adopting this draft.  Alternatively, if it's thought useful but more appropriate to carry this work on elsewhere (e.g. rtgwg), I'd appreciate such feedback.

For the process folk, I am unaware of any applicable IPR covering this draft.

-- Jeff


Name:  draft-haas-netmod-unknown-bits
Revision: 02
Title: Representing Unknown YANG bits in Operational State
Document date: 2023-04-10
Group: Individual Submission
Pages: 18
URL:            https://www.ietf.org/archive/id/draft-haas-netmod-unknown-bits-02.txt
Status:         https://datatracker.ietf.org/doc/draft-haas-netmod-unknown-bits/
Html:           https://www.ietf.org/archive/id/draft-haas-netmod-unknown-bits-02.html
Htmlized:       https://datatracker.ietf.org/doc/html/draft-haas-netmod-unknown-bits
Diff:           https://author-tools.ietf.org/iddiff?url2=draft-haas-netmod-unknown-bits-02

Abstract:
  Protocols frequently have fields where the contents are a series of
  bits that have specific meaning.  When modeling operational state for
  such protocols in YANG, the 'bits' YANG built-in type is a natural
  method for modeling such fields.  The YANG 'bits' built-in type is
  best suited when the meaning of a bit assignment is clear.

  When bits that are currently RESERVED or otherwise unassigned by the
  protocol are received, being able to model them is necessary in YANG
  operational models.  This cannot be done using the YANG 'bits' built-
  in type without assigning them a name.  However, YANG versioning
  rules do not permit renaming of named bits.

  This draft proposes a methodology to represent unknown bits in YANG
  operational models and creates a YANG typedef to assist in uniformly
  naming such unknown bits.