Re: [netmod] Module tags

Christian Hopps <chopps@chopps.org> Sun, 12 February 2017 13:55 UTC

Return-Path: <chopps@chopps.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAED01295D4 for <netmod@ietfa.amsl.com>; Sun, 12 Feb 2017 05:55:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HhRX2Hhanc-M for <netmod@ietfa.amsl.com>; Sun, 12 Feb 2017 05:55:06 -0800 (PST)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id 326C812951D for <netmod@ietf.org>; Sun, 12 Feb 2017 05:55:06 -0800 (PST)
Received: from utops.chopps.org (97-83-46-222.dhcp.trcy.mi.charter.com [97.83.46.222]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 9708B623A8; Sun, 12 Feb 2017 13:55:05 +0000 (UTC)
References: <87shnogymx.fsf@chopps.org> <20170208.231709.2214078600549867460.mbj@tail-f.com> <CABCOCHQJ+ef4C=TAfH9NK47mWgO0XOy1gg-cggigWq7Fqdfkgw@mail.gmail.com> <87d1eouby0.fsf@chopps.org> <20170211135417.GC6490@elstar.local> <8737fju4n5.fsf@chopps.org> <20170212104106.GA8142@elstar.local> <871sv3r7xf.fsf@chopps.org> <20170212115135.GB8250@elstar.local> <87wpcvpo0z.fsf@chopps.org> <20170212130412.GA8415@elstar.local>
User-agent: mu4e 0.9.18; emacs 25.1.1
From: Christian Hopps <chopps@chopps.org>
To: Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de>
In-reply-to: <20170212130412.GA8415@elstar.local>
Date: Sun, 12 Feb 2017 08:55:04 -0500
Message-ID: <87vasfpl8n.fsf@chopps.org>
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/OmWVB-WiN3hDkH09t6iriegQaqE>
Cc: "netmod@ietf.org" <netmod@ietf.org>
Subject: Re: [netmod] Module tags
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Feb 2017 13:55:08 -0000

Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> writes:
> On Sun, Feb 12, 2017 at 07:54:52AM -0500, Christian Hopps wrote:
>> Juergen Schoenwaelder <j.schoenwaelder@jacobs-university.de> writes:
>> > It was suggested (I think) that tags originate either (a) from the
>> > data model it self, (b) from the implementation itself, (c) from the
>> > operator. You want to be able to overwrite (remove) (a) and (b) tags?
>> > Are tags not scoped by something that represents some form of
>> > ownership? If so, does it make sense to step on other people's
>> > carefully design tags? What if this creates conflicts for different
>> > applications, some like to have a certain tag some don't?
>>
>> > Perhaps what you are requesting is useful but I think it needs a bit
>> > more thinking and clarity about what tags mean and how tags are
>> > scoped.
>>
>> Yes indeed tags can be created in 3 ways, but the ultimate authority is
>> the user as they are the ones actually deploying devices to implement
>> something (e.g., a network). The designer and implementer cannot
>> ultimately know how the user will use their devices and their modules.
>
> Then there should only be type (c) tags.
>
>> I guess I'm drawing from my unix background here, give the user the rope;
>> I'm not sure how they would hang themselves with this particular rope,
>> but worrying about that seems to be the only reason to not give them the
>> control. :)
>
> There are many things a device can implement differently. Do we
> generally need a way to overwrite things? I am trying to understand
> why tags are different and considered to require this ability. And as
> I said, there is always the option to trust only the tags an operator
> has assigned himself.

The tags defined by (a) and (b) are still for the users use. In fact
aren't there plenty of defaults in configuration on devices that the
user can override or remove? I guess I don't understand why this is so
controversial.

Thanks,
Chris.

>
> /js