Re: [netmod] Comments on draft-ma-netmod-immutable-flag-06

"Rob Wilton (rwilton)" <rwilton@cisco.com> Wed, 05 April 2023 10:49 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93D43C151B00 for <netmod@ietfa.amsl.com>; Wed, 5 Apr 2023 03:49:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="lImTpwVS"; dkim=pass (1024-bit key) header.d=cisco.com header.b="knVFIw7O"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JrnhH0w_bXZZ for <netmod@ietfa.amsl.com>; Wed, 5 Apr 2023 03:49:34 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC42FC151551 for <netmod@ietf.org>; Wed, 5 Apr 2023 03:49:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28156; q=dns/txt; s=iport; t=1680691773; x=1681901373; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=sJg7z5OuU+WKZRojiaohwqBsSsMR7NNxtsPhbGrjYoA=; b=lImTpwVS49dD+Pf96YJsuHd5b8UWUAGzMZ/eOXFKShfgc7qkcm7w1MrB pJFrd5wEqf3ttKZTDTEGxyxlkkxyf0pkhIfGY6Lxh1JVJw07TOFAUwiUv VND35c8moK404TSIPbxKgMErjfuvTBSpZq4oBhG/BFHpEyukauoosBMBs Q=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:bleuEhA0O+bsiazm6H/tUyQVaBdPi9zP1kY95pkmjudIdaKut9TnM VfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G 8JPHF9o9n22Kw5bAsH7MlbTuXa1qzUVH0aXCA==
IronPort-Data: A9a23:BAjPlKoHsp7xaNFwjxkMZffskjxeBmIzZRIvgKrLsJaIsI4StFCzt garIBnSa66NNGHyct11advn9E4D6sDVnYQyT1dkrSk1RC4WouPIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZGEk1GE/NtTo5w7Ri2tIw3IDga++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQRt0phPZouxh8 YVu9qSPUiUqILLwiN1IBnG0EwkmVUFH0LbDJX76usuJwgibNXDt2P5pSkoxOOX0+M4uXjoIr qJecWtLN0vT7w616OrTpu1EnNsiKNXsOqsUu2prynfSCvNOrZXrEvyXu4QDg2hYasZmNvP1e usbMDhVUT/7bRprImcZMaovpbL97pX4W2QI9A3KzUYt2EDVwRB017TFMdfJdJqNX8o9tkScp 2TK9WDwV01CP92Ewj3D+XWpruPKlDnwHoMfCLP+8eRl6HWQy2oPSxwbSVWTvvClkUO4HdRSN yQpFjEGpKw28gmgScPwGkD+q3+ftRlaUN1VewEn1O2T4vb3ziDJO1QUd25iK+QZr+01WyMWx mbcyrsFGgdTmLGSTHuc8JKdojWzJTUZIAc+icksEFNtDz7L/dlbs/7fcjpwOPXv3oCpRVkc1 xjP/XZj1uRL5SIe//jjlW0rlQ5AsXQgouQdyQzNWmuj4muVj6b6OtT0sjA3ARu8Rbt1o3GIu HwC3sOZ9u1LUNeGlTeGR6MGG7TBCxe53N/03wYH83oJrmvFF5ufkWZ4u28WyKBBaZpsRNMRS BWP0T69HbcKVJdQUYd5YpiqF+MhxrX6GNLuW5j8N4QeOsYqL1fdrHk2OSZ8OlwBdmBxzsnT3 r/GL66R4YoyUsyLMRLvHb5GiO93rszA7TODHPgXMChLIZLHNCLKFt/pwXOFb/sy6+ufsR7J/ tNEX/ZmOD0BONASlhL/qNZJRXhTdCBTLcmv96R/KLXZSiI4Qz5JNhMk6e57E2CTt/4Lxr6gE 7DUchIw9WcTclWecVXVMS88OO+zNXu9xFpiVRER0Z+T8yBLSe6SAG03LvPboZFPGDRf8MNJ
IronPort-HdrOrdr: A9a23:XYuWNa8zCq6ZDIuoKBZuk+Fmdb1zdoMgy1knxilNoENuHPBwxv rAoB1E73PJYW4qKQ0dcdDpAtjlfZquz+8L3WBxB8buYOCCggqVxe5ZnPPfKlHbak/DH6tmpN pdmstFeZHN5DpB/L3HCWCDer5KqrTmgcOVbKXlvg1QpGpRGsZdBnJCe3+m+zpNNW977PQCZf +hz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYp4LSIly95FMzQjlPybAt/S zuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzSvBky/JlawkEuDzYJ7iJaIfy/gzdZ9vfrWrCpe O84yvI+f4Dr085MFvF5icFkDOQrgrGo0WSuGNwx0GT5/AQgFkBepJ8bUUzSGqB16NohqAN7I tbm22erJZZFhXGgWD04MXJTQhjkg6urWMlivN7tQ0WbWIyUs4mkWUkxjIdLL4QWCbhrIw3Gu hnC8/RoP5QbFOBdnjc+m1i2salUHg/FgqPBhFqgL3e7xFG2HRii0cIzs0WmXkNsJo7Vplf/u zBdqBljqtHQMMaZb90QO0BXcy0AGrQRg+kChPYHX33UKUcf37doZ/+57s4oOmsZZwT1ZM33I /MVVtJ3FRCDH4Gyff+qKGj3iq9NVlVBw6duf22z6IJyIHBeA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos; i="5.98,319,1673913600"; d="scan'208,217"; a="91563377"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 Apr 2023 10:49:32 +0000
Received: from mail.cisco.com (xfe-aln-003.cisco.com [173.37.135.123]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 335AnWeU031666 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 5 Apr 2023 10:49:32 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Wed, 5 Apr 2023 05:49:31 -0500
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25 via Frontend Transport; Wed, 5 Apr 2023 05:49:31 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LG4AN+GZRo8izeSlq4Ox1E2bPw44PcR5pz4mrXGjGDhq75vegV2/8mAy7cx6xfSY9yKb72ZbKBNez8aV9K4WvS1dCuV0AExzNYMH58UXKDtw0kikTHWy1EuKDMWIjgUKtLaFTKmOJ7QO2flNTexPU9QT23j44reneSQYYnoKfDQRRGCEyAUsmiorhvMAuSHjqRQDblRUkR3Or9jNsO0Px1st3wRwWlKOYQB0q+GxiwQekL5geigHhWQWWKIvU7aVNlfpDrtk7DaWv7F7TpaNEg99s1rTaQkVbnl7G8buyPuxBrGslID3SjRTXc0nfG4I3WSRuRfONXJefmEw1qT1gA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sJg7z5OuU+WKZRojiaohwqBsSsMR7NNxtsPhbGrjYoA=; b=agyZD8GiRscN5xOEaQPVacj3im3e4oz+eM7bKhYlfUkaJwMNYzUAqfMMUyXNC7oGQPXuN4tVHYxM4AYGwDO0cpShVGYBv0d6zECM2QorhMg2W+KIKjJcFV+F2pW9QIR+vqoYZ3uM6QgoNmNTv3MDe6JlKCTS1MhJKx1QIb86EfBD0kRiKW2BETO8DuHvegRUJVTpVqAOhuFISrT+FsAGo+Rg/oyniK9jbQ/rLxPjwPOAgjovjch1QjNbcsTDiyOGDpLJtHVfP8+ikisFXBPFcTzfCNrJefmA0PwHPgTlXuiUIC9SYDq5DvICrvH3XyNnvNnKhr5uEZ4x9blawymnbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sJg7z5OuU+WKZRojiaohwqBsSsMR7NNxtsPhbGrjYoA=; b=knVFIw7OYgJmbcDQXm6uOiKDBhZUmq6FBSSxvkwseB2wB5kdqld/59x0+YTPRqzYGOlMUFnmIl0oA/Zl0zRuH2bISJs08PtaO8Q2gUeQJaijXQjUPoacAMtoeayPnCAvAt/cADBfa1z9EATan5QttfCmHh1ICYo7Eu2ZioQXuP8=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by BL1PR11MB5286.namprd11.prod.outlook.com (2603:10b6:208:312::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6254.35; Wed, 5 Apr 2023 10:49:30 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::4671:25af:94b6:7d36]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::4671:25af:94b6:7d36%6]) with mapi id 15.20.6254.033; Wed, 5 Apr 2023 10:49:29 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Kent Watsen <kent+ietf@watsen.net>
CC: "Jan Lindblad (jlindbla)" <jlindbla=40cisco.com@dmarc.ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] Comments on draft-ma-netmod-immutable-flag-06
Thread-Index: AQHZY5/rnoEbFB29eUSkCppbFcSdG68ZbNSAgACw7gCAAl3DQA==
Date: Wed, 05 Apr 2023 10:49:29 +0000
Message-ID: <BY5PR11MB419677D444D44125DD69C91CB5909@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <PAWPR07MB92743ED513FA25816935A0E3F0BA9@PAWPR07MB9274.eurprd07.prod.outlook.com> <F534A076-F959-4F03-9E23-6C80A4F0DC58@cisco.com> <ed2f5323329c4d05ab04c8d80866ab71@huawei.com> <59DAD4D3-754D-41E1-A4D4-0CA8FEA263F1@cisco.com> <BY5PR11MB41964C481FCE2619020F1D7AB5929@BY5PR11MB4196.namprd11.prod.outlook.com> <010001874900b5fd-f56744b5-974d-40b2-8177-221a23de41ca-000000@email.amazonses.com>
In-Reply-To: <010001874900b5fd-f56744b5-974d-40b2-8177-221a23de41ca-000000@email.amazonses.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|BL1PR11MB5286:EE_
x-ms-office365-filtering-correlation-id: b568bc11-c801-439d-4a49-08db35c36ed8
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: bN3H8yXQWvugD64EZTElUOsK+KECLNDSr4eo0361NjrLevaXcBtRPm7ISmbFPlqFVJItwQQ72czlV7IB3+thCjN15ZnPtkmQ4UJ1+qXaEc423BisID7cqrzcZb0YsSHi6tdMsHJaulyOGxTVa141QtwDvnMoPBRZQ9MeDZQGsaxW/Q6fn/lObgml4GQDnHdylw1uGfRPNhF9fUpyHTbE7Sfi/ZIGZPzb/WIdggtXT03coneFp73k2Lje5g1cveW257uRo+EjJ04Y4kF1uA+vTGRLsQY/ucAQmSdv6v/cTa1AZAgAAgJTsVfP8xdlNmCCVQnxp46efmDChmYlsh3s0x6BrnGp8ql1CeDGOmAUaf9rG5ci8IyTaIxC602XybElwoFZc0Tqxhw7yfcZAJczlqqpZ8zJRZQ4CrdRbcbcJyubmFN/yHuWX+K8rVoeIru02i7pZqdHwmbP5d2Jcng6Iogz++Yg34RUZUB1M7UF0mdeyx9PBKSQWXNDJUFw8yTCcImj2anuTbAX0Dy+0eDMqHcM2G8GccnurKeWC6XzLQX5v7fwGZUTkC7mTAarrOEdu2X/IY6ITWni2JzoGK0ovP/nWvnEahw/oU2ECye+NQK1xkEB09G/8+1hMCQjNYtfxIgDsK5d2/p48Fx90QcB8A==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(366004)(376002)(396003)(39860400002)(346002)(136003)(451199021)(55016003)(4326008)(478600001)(64756008)(66446008)(122000001)(66556008)(8676002)(76116006)(66476007)(66946007)(5660300002)(54906003)(316002)(9326002)(8936002)(52536014)(41300700001)(38100700002)(186003)(53546011)(83380400001)(7696005)(71200400001)(6506007)(166002)(9686003)(86362001)(2906002)(33656002)(38070700005)(66899021); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB419677D444D44125DD69C91CB5909BY5PR11MB4196namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b568bc11-c801-439d-4a49-08db35c36ed8
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Apr 2023 10:49:29.7250 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fDfq+RskVilEhwo6jRQNx23iHaUapRK4X1kZWoeUM+IuHSOxZZSgsEBvz6525Cj1jctLtNNUWKSay3joi6fZIQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR11MB5286
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.123, xfe-aln-003.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/CBOSbBi-29aGawlgqC0eOJbWJE4>
Subject: Re: [netmod] Comments on draft-ma-netmod-immutable-flag-06
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Apr 2023 10:49:38 -0000

Hi Kent,

Some of my concern stems from the fact that during the NMDA architecture discussions there was a strong desire to make the configuration data stored in <running> to be owned by the client.  I.e., the server has the right to accept or reject a particular configuration but ultimately it is the client that should control what is in <running>.  Related to this, is the goal of ensuring the validation of the configuration is based on the state that the configuration represents, not the particular config edit that is being made to transition the configuration into that state.  I.e., it should be possible for a client to change the configuration from any valid state A to any valid state B, without requiring extra client orchestration steps to keep the server happy (e.g., you can transition from A to B, but must go via C, D and E on the way).  Or to put it another way, if such steps are required, then it is much simpler (for an automation client) to do those transitional steps on the server than it is to expose and force them on to the client.

As you point out, existing implementations don’t always follow these rules above, but I regard these as warts in the implementations relative to following the ideal architecture above.  As such, I have little issue with a YANG extension or metadata annotation to programmatically indicate to clients where these aberrations occur for this use case.

But this isn’t what the 3GPP liaison is asking for.  They are requesting to bake the edit-config constraints directly into the management APIs defined in YANG because this is how their underlying management model is defined and they don’t want to change their underlying paradigm.  No longer is YANG just defining the configuration data model, but protocol edit-config semantics are being merged and baked into the data model defining the management API.

These newly defined management APIs will not just work with existing generic YANG clients and orchestrators because I presume that the clients will require custom code to be able to successfully interface with the server implementing these models.  Perhaps these annotations provide sufficient information for YANG clients to generically work around these restrictions?  But even in the case that they do then I still question whether that is really helpful.  I.e., what is ultimately achieved other than the addition of some extra complexity in the automation, and what is the true goal here.  If the aim is to signal to the client that there are some properties that cannot be changed without tearing down the containing service in a traffic impacting way, then rather than marking the properties as being immutable, it might be sufficient to annotate them as service impacting if changed.  This might still provide the necessary visibility and awareness to the client, whilst avoiding additional orchestration complexity for clients.  After all, there are many properties in the network configuration models standardized in the IETF (and OpenConfig) that are similarly service impacting if changed, that don’t seemingly require any protection.

It also feels that we are on the path of fracturing the definition of the NETCONF/YANG management protocols, which is somewhat like how OpenConfig decided to interpret the pattern statement regex language differently (which they have now backtracked on) or their recent statement that servers are not generally expected/required to validate leaf ref constraints in the running configuration.  Each of these little cuts, whilst innocent and good intentioned on their own, risk gradually devaluing the common standards by creating many incompatible subvariants of the language and protocols.

Hence, this is why I think Jan’s approach of looking at the individual problems that are being solved and having a discussion as to what is the best way of solving these individual problems may result in a better overall solution.  Specifically, is there a compromise that can meet 3GPP’s and ITU’s goals without eroding the underlying NETCONF/YANG architecture?

Regards,
Rob

// Still no hats.

From: netmod <netmod-bounces@ietf.org> On Behalf Of Kent Watsen
Sent: 03 April 2023 22:23
To: Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org>
Cc: Jan Lindblad (jlindbla) <jlindbla=40cisco.com@dmarc.ietf.org>; netmod@ietf.org
Subject: Re: [netmod] Comments on draft-ma-netmod-immutable-flag-06

Hi Rob,


- In terms of properties that cannot be changed once written, I would rather see this issue framed more in the direction of it just being extra documentation written in a machine-readable way.  Specifically, using the annotation to give an indication that servers MAY reject requests to create/delete, or change, the configuration, but not requiring that they do so.  I.e., at the data model level, I don't think that we should preclude servers being able to handle this is in a more client friendly way (e.g., by breaking a single client transaction up into multiple internal transactional changes where needed).

I agree that the document does not make it clear enough, but this is already the case.   As I said at the end of this document's presentation on Friday's NETMOD, session, this document has no runtime-impact on servers (other than them needing to return annotated YANG and/or metadata).  There is also no runtime-impact on clients, as they as free to ignore all the annotations and metadata.   All this document does is define a mechanism for servers to describe the behavior they already implement.   The text in the document is confusing because the normative statements make it sound like the server needs to implement behavior to reject certain updates *because annotations/metadata said so*, but actually it's the other way around, as the server was already implemented to reject the changes.

1st paragraph in the Introduction:


This document defines a way to formally document as a YANG extension or YANG metadata an existing model handling behavior that is already allowed in YANG and which has been used by multiple standard organizations and vendors. It is the aim to create one single standard solution for documenting modification restrictions on data declared as configuration, instead of the multiple existing vendor and organization specific solutions. See Appendix B<https://datatracker.ietf.org/doc/html/draft-ma-netmod-immutable-flag#Existing_implementations> for existing implementations.¶<https://datatracker.ietf.org/doc/html/draft-ma-netmod-immutable-flag#section-1-1>





- For any immutable related metadata annotations, I think that this additional metadata should only be returned to clients when explicit requested via a separate RPC parameter, and I think that the draft needs to add text for protocol capabilities used to indicate whether this new option is supported (e.g., along the lines of RFC 6243, with-defaults).

Somewhat agree (Principle of Least Astonishment), though it's neither illegal, would cause client problems, or cause excessive network utilization (unlike with-defaults).

K.