Re: [netmod] Benjamin Kaduk's No Objection on draft-ietf-netmod-nmda-diff-09: (with COMMENT)

Alexander L Clemm <ludwig@clemm.org> Fri, 06 August 2021 19:07 UTC

Return-Path: <ludwig@clemm.org>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C71F3A1150; Fri, 6 Aug 2021 12:07:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ppganOjoPwIw; Fri, 6 Aug 2021 12:07:43 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.197]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F30E63A114A; Fri, 6 Aug 2021 12:07:42 -0700 (PDT)
Received: from [172.16.0.44] ([73.189.160.186]) by mrelay.perfora.net (mreueus002 [74.208.5.2]) with ESMTPSA (Nemesis) id 0Lnh2P-1mmXCP37yJ-00ht9L; Fri, 06 Aug 2021 21:07:38 +0200
To: Benjamin Kaduk <kaduk@mit.edu>, Andy Bierman <andy@yumaworks.com>
Cc: The IESG <iesg@ietf.org>, draft-ietf-netmod-nmda-diff@ietf.org, NetMod WG Chairs <netmod-chairs@ietf.org>, NetMod WG <netmod@ietf.org>, Joel Jaeggli <joelja@gmail.com>
References: <162578071895.23622.6414701243842084826@ietfa.amsl.com> <CABCOCHQvC+M-=shm0axFSpbjMB4iVm3jfrvcEZvu1shgeDO9DQ@mail.gmail.com> <20210715182748.GU74365@kduck.mit.edu>
From: Alexander L Clemm <ludwig@clemm.org>
Message-ID: <f6f9ac26-2a06-b020-7f59-716bd02b7d4b@clemm.org>
Date: Fri, 06 Aug 2021 12:07:36 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0
MIME-Version: 1.0
In-Reply-To: <20210715182748.GU74365@kduck.mit.edu>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Provags-ID: V03:K1:HIUrYv3Z5U+qjpIJFcn76vbA1m3ccJL1jDqaJSoFls8bSimXhUi LosTC+c8C+xhAfkGYhJQCu1jW0WKuExaF4WDFsMGeMye70+TspUURhFV+i+kuxv4eyiMz2w rXIEYz5os7NtnCUR/qYIaMTwb0JwarHOxz8c70A4gnpMstuNJFFPsWeNuGjF18/q0icNtqc cJf0hptuWCbPsypdm1TWA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:cTVCs8ixBbc=:q7QxaS3PlUfFdJIA/kSM8+ IiweZUDMJhcNgiCnm+G0ey6A/wEa0gW5nzLw/QGxPZExD9RrX89cWwJgaf6WrkqxzZN2IHe1/ kyKxmfuJWxpX3cXRW58QKeybKEjmMJqk077bhFZ3ThF6lzZRe6fzv7ugwwylOjjVa+2j5SUVX wkCCvmsLHGoMs3tz808HF/Y7ZNqAPj4SXWmPXJeN3ot23o4c7g1Q8WOQPPOqlp+XbQF9xgAdL 4mHpTdS5fUYGQSUzwxE4D5ONfd84aNo+dR6A71PUiTa9xgZi92iQhbpS3g0QlSjVQ1DH++tvq gZq2qKBmJ5D5kwZ3PjYYrErtICFaUz7AO7b6LsjmkpEkEl2HJoJ/4j780dFyoWwlaHMOpoOHP FULW0+Ep+TsQ8WOCcz6zwpUlvlDvaC6Y+M3kb5rkXSpTnVkEO5+mCJKSwsw57YCid2jHtg+Pg 2p9vHdbbxRbC7wxQ3FZbrKl/nbUZAXgy51zmR1NCrohgA3j1kAkBhSA8ZWRUZW/16BvSKLswJ 6VRAInbJH/YtfZfh1VfPpBp8+B71tkB2MvBADxxzTjIm3qF06bcy0W8m2LuKKznbch64XhGNK vn1plQDVONt8W6JPCzVUWxmj56gosw6VzNQJ6xQeNdBJx1vPr26oAaYK1LQ4R48TBsMWZfUIW IbWZDrbD4WI1EgRvozSfvUuXLzhocpr8fjRB6RcHlgUZ/EC7M+ERyuQF98rO7318LHGsERNT5 sULf2mPzaqrI4vWZwFsO2U0+eJN2P+FVaTfF80dfViLjQsFYUt1Lw27MNyM5Lf+ILRnzj22Kr 2ZvymMmae4Ze2hMMn4hFexBeE0AnLlwMl0Je3wmj/tHlMaOi6BXyoCpCuQ/9WZSZ4XcMled
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/P-2wPBfGwzR2hgGCBSbmF0uAvzA>
Subject: Re: [netmod] Benjamin Kaduk's No Objection on draft-ietf-netmod-nmda-diff-09: (with COMMENT)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Aug 2021 19:07:49 -0000

Hello Benjamin,

thank you for your review. Two quick additional responses inline, <ALEX>

Kind regards

--- Alex

On 7/15/2021 11:27 AM, Benjamin Kaduk wrote:
> Hi Andy,
>
> On Mon, Jul 12, 2021 at 03:42:30PM -0700, Andy Bierman wrote:
>> On Thu, Jul 8, 2021 at 2:45 PM Benjamin Kaduk via Datatracker <
>> noreply@ietf.org> wrote:
>>
>>> Benjamin Kaduk has entered the following ballot position for
>>> draft-ietf-netmod-nmda-diff-09: No Objection
>>>
>>> When responding, please keep the subject line intact and reply to all
>>> email addresses included in the To and CC lines. (Feel free to cut this
>>> introductory paragraph, however.)
>>>
>>>
>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>>> for more information about DISCUSS and COMMENT positions.
>>>
>>>
>>> The document, along with other ballot positions, can be found here:
>>> https://datatracker.ietf.org/doc/draft-ietf-netmod-nmda-diff/
>>>
>>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> Thanks to Alexey Melnikov for the secdir review.
>>>
>>> I'm not experienced enough with YANG to know whether or how problematic
>>> it is that the "anydata subtree-filter" node contents are described by
>>> reference to the NETCONF specification, which has a particular (XML)
>>> representation of YANG data and does not give a clear presentation of
>>> the abstract YANG structure/semantics to be used.  Is it possible to use
>>> the filter-spec choice option when, for example, RESTCONF is used with
>>> JSON encoding?
>>>
>>>
>> There is not a standard specification for subtree filtering using JSON
>> encoding
>> instead of XML. RESTCONF has its own somewhat compatible filtering
>> mechanism.
>> It would require a new NETCONF work item to officially expand subtree
>> filtering
>> to support JSON.  (Unofficially, there is RFC for JSON encoding of YANG
>> data and an
>> implementation could map the RFC 6241 text to JSON).
> Okay, this sounds a little familiar now that you mention it.
>
> Should we mention in a comment of some form that this filtering mechanism
> is currently only usable with the XML encoding?

<ALEX> Since we are not defining a new filtering mechanism here, just
making use of what has been defined, presumably the references in the
YANG spec should be sufficient. While the limitations you state are
correct, those lie in the nature of the current filtering
state-of-the-art and not specific to the specification here. it is well
possible that JSON filtering might be standardized in the future, in
which case such filter would equally apply / be accommodated.  So, I am
not sure that commenting on the current state in filter standardization
would be helpful and prefer to keep the text as is. </ALEX> 

>>
>>> Section 4
>>>
>>>    o  report-origin: When set, this parameter indicates that origin
>>>       metadata should be included as part of RPC output.  When this
>>>       parameter is omitted, origin metadata in comparisons that involve
>>>       <operational> is by default omitted.
>>>
>>> Why is it important to complicate the semantics of this parameter with a
>>> dependence on the datastore?  It seems like it would be simpler to get
>>> this effect by having clients specify report-origin when the target is
>>> not <operational>.  Note that changing the semantics would require text
>>> changes in subsequent parts of the document for consistency.  (If
>>> retaining the current semantics, please clarify whether "comparisons
>>> that involve <operational>" applies when operational is source, target,
>>> or either.)
>>>
>>>
>> IMO NMDA is way too complicated, so I cannot argue with that complaint.
>> The origin attribute only applies to the <operational> datastore.
>> I think it is not allowed to appear elsewhere.
> Ah, I see what you are saying now (on second read): the "origin" being
> reported is the origin attribute of the data in the datastore being
> compared, but only the <operational> datastore will every have that
> attribute available.  The text here would be a lot more clear if it
> reminded the reader that the origin attribute has such a limited scope,
> perhaps:
>
> o report-origin: data in the <operational> datastore has an associated
>   "origin" attribute that indicates the origin of the reported value.  When
>   set, this parameter indicates that the origin metadata should be included
>   as part of the RPC output.  It has no effect when the target datastore is
>   anything other than <operational>.  When this parameter is omitted, the
>   origin metadata is omitted from the RPC output.
<ALEX> I think this is clearly explained in the bullet item:  "Note that
origin metadata only applies to <operationa>; it is therefore also
omitted in comparisons that do not involve <operational>; regardless of
whether or not the parameter is set. Adding the first sentence would
seem a bit redundant.  </ALEX>
>> Section 9
>>> In addition to noting that the "compare" RPC is sensitive and should be
>>> restricted to authorized parties, I suggest to reiterate that the
>>> "compare" operation should not provide a mechanism to work around access
>>> control on other nodes -- that is, a result should only be returned if
>>> the requestor would be allowed to access both the "source" and "target"
>>> trees independently of the RPC.  In particular, even a "no-matches"
>>> output should not be returned, as that might provide a way to determine
>>> the structure of the datastore even without accessing it.
>>>
>> Fortunately the access control model (NACM) is per server and not per
>> datastore
>> so the same access rules apply to all datastores. I agree the no-access
>> subtrees
>> should be silently skipped, the same way that GET operations are treated in
>> NACM.
> Ah, okay.  (I think Roman may have mentioned a similar concern about
> no-access subtrees, too.)
>
> Thanks,
>
> Ben
>
>>
>>> We might also incorporate by reference the security considerations for
>>> subtree filtering (RFC 6241) and xpath filtering (RFC 6991).
>>>
>>> NITS
>>>
>>> Section 1
>>>
>>>    an unusually long time to do so.  This can be the case due to certain
>>>    conditions not being met, certain parts of the configuration not
>>>    propagating because considered inactive, resource dependencies not
>>>    being resolved, or even implementation errors in corner conditions.
>>>
>>> "because considered inactive" seems like an incomplete clause; maybe
>>> "because they are considered inactive"?
>>>
>>> Section 4
>>>
>>>    o  differences: This parameter contains the list of differences.
>>>       Those differences are encoded per YANG-Patch data model defined in
>>>
>>> s/YANG-Patch/the YANG-Patch/
>>> I'd also consider s/per/according to/, since this is not exactly a
>>> logic-driven deduction but rather more of a new requirement.
>>>
>>> Section 6
>>>
>>>    for the management of interfaces defined in [RFC8343].  The excerpt
>>>    of the data model whose instantiation is the basis of the comparison
>>>    is as follows:
>>>
>>> I feel like this phrasing is a little misleading, as not only is the
>>> following snippet only a subset of the nodes contained within "container
>>> interfaces" but the descriptions have been greatly abbreviated as well.
>>> Perhaps we could say something about "for the purposes of understanding
>>> the subsequent example, the following subset of the [RFC8343] data model
>>> is provided".
>>>
>>>    Accept: application/yang-d
>>>
>>> (I believe this truncated header field was already noted by another
>>> reviewer.)
>>>
>>>
>> Andy