Re: [netmod] WG Last Call: draft-ietf-netmod-acl-extensions-03

Mahesh Jethanandani <mjethanandani@gmail.com> Tue, 26 March 2024 01:26 UTC

Return-Path: <mjethanandani@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2E84C1C637B for <netmod@ietfa.amsl.com>; Mon, 25 Mar 2024 18:26:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.212
X-Spam-Level:
X-Spam-Status: No, score=-1.212 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uzDtuis4MzMM for <netmod@ietfa.amsl.com>; Mon, 25 Mar 2024 18:26:34 -0700 (PDT)
Received: from mail-oi1-x22e.google.com (mail-oi1-x22e.google.com [IPv6:2607:f8b0:4864:20::22e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83182C14F6A6 for <netmod@ietf.org>; Mon, 25 Mar 2024 18:26:34 -0700 (PDT)
Received: by mail-oi1-x22e.google.com with SMTP id 5614622812f47-3c3d7e7402dso148013b6e.1 for <netmod@ietf.org>; Mon, 25 Mar 2024 18:26:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1711416394; x=1712021194; darn=ietf.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:from:to:cc:subject:date:message-id :reply-to; bh=dYspjRiw3WVcmvkWM1n6o7H7LtdEuzjzuLbUAHUEur0=; b=gt/U7PeD8uyRmK1I9coprCIx8ayJi5/timY8ORi42N6MH7BBSrCEbgRb/2zkUB37a8 gff5kJ11ujrPybUzRF/JfUABiSSozu2eQ3VCYj9RyrAA6L96cU7QPnr12U5GuRDOmJOD 9+nRcTX78FKbYNhlECuPSQeqBIDXV5i0hCVeGrZuMWN3br44CM5rrlxVEg2A9fQDF3jp Typ7BbxjQ9vCD0jG4TPaNI42Cg5eBnCgZxYqpKaxiVwW6uQkXsROTvqBNwhfkuSeWkzp JYxmXVbu8Vq1gwugaVIoebxpSNEU6jXlkGPwf5xEWrIImC6py+FDIlZ8aDox7cORIyKa o7Vw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711416394; x=1712021194; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dYspjRiw3WVcmvkWM1n6o7H7LtdEuzjzuLbUAHUEur0=; b=imQnW6YDaqZ14gUaYjRf6Oc7DiJkqzE7Km328a80ZtRAU45BipdchgiZqZr/rdGC+h OrHrpos/2UaIyfx6hzobUjY1uFAHpXah+bPGkSZ+Cndo+C2ronl/ql5zTnxgoAgoKPzL DpyepGVvCZ2bDiJ6D74dSOQsajjoZCmf4UOj3UUlrJrZw9esXosVitHTAKSMB5B6zRmT 8MKyCIc8FhFFx490RUqdezxvosnejXi14SM4Im6RMssujy7oaXqjzspDfKzvIdGIelJ0 ipGQcorkB5sAj8A/ZSD5/uqf+kH2zIo7l+co2SMPbCtcwvl7H4f5uNwkzvi0lIkFOl1J sJzw==
X-Forwarded-Encrypted: i=1; AJvYcCVHNDEQozonrtozvsGKpDzSIVOF/wgAbetWUlyKXM4/lDh929yAuRJgjcNti/unfvbmVn2B04sg8Qi0UrZmz2A=
X-Gm-Message-State: AOJu0YxgwUXhvKgYHwTE59V1OkQxfnzAoIDnSe0lV5XPSmigmO5HZAG5 aRHoMiZM6JKJgCsT0lYRqgYVslfPdis8cvh7jRGxAQHpOnaO3Q9qIn7oIZsE7J5nJw==
X-Google-Smtp-Source: AGHT+IHrsnA2cnsxHmTyHCmSiTRYCQ0z4SgRQ/x125Dn9UwbkaCeEvHDBvWKCEhlPPeEbhf5ei/PYg==
X-Received: by 2002:a05:6808:120a:b0:3c2:2cf8:b8d with SMTP id a10-20020a056808120a00b003c22cf80b8dmr9663562oil.55.1711416393481; Mon, 25 Mar 2024 18:26:33 -0700 (PDT)
Received: from smtpclient.apple (222-152-200-205-adsl.sparkbb.co.nz. [222.152.200.205]) by smtp.gmail.com with ESMTPSA id r6-20020aa78b86000000b006ea92de360esm4971207pfd.93.2024.03.25.18.26.32 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 25 Mar 2024 18:26:32 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-2F1D5E47-2809-465A-A7B8-B996FFE5A3AB"
Content-Transfer-Encoding: 7bit
From: Mahesh Jethanandani <mjethanandani@gmail.com>
Mime-Version: 1.0 (1.0)
Date: Tue, 26 Mar 2024 14:26:20 +1300
Message-Id: <7080C304-6A10-43F9-BCF1-36F0FC9A69DB@gmail.com>
References: <DU2PR02MB10160BD1BE5733F21DA2DE91188452@DU2PR02MB10160.eurprd02.prod.outlook.com>
Cc: mohamed.boucadair@orange.com, NETMOD Group <netmod@ietf.org>
In-Reply-To: <DU2PR02MB10160BD1BE5733F21DA2DE91188452@DU2PR02MB10160.eurprd02.prod.outlook.com>
To: Joe Clarke <jclarke@cisco.com>
X-Mailer: iPhone Mail (20D67)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/QrixYe6E4R9TFZ0O0S7eBaj4RyY>
Subject: Re: [netmod] WG Last Call: draft-ietf-netmod-acl-extensions-03
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Mar 2024 01:26:38 -0000

Hi Joe,

Your name popped up on this thread. See below. 

Mahesh Jethanandani 

On Feb 8, 2024, at 4:01 AM, mohamed.boucadair@orange.com wrote:



Hi Mahesh, all,

 

FWIW, we submitted an updated version of the draft to address the pending points from your reviews. A diff to track the changes vs. -04 can be seen at: https://author-tools.ietf.org/iddiff?url1=draft-ietf-netmod-acl-extensions-04&url2=draft-ietf-netmod-acl-extensions-06&difftype=--html" rel="nofollow"> https://author-tools.ietf.org/iddiff?url1=draft-ietf-netmod-acl-extensions-04&url2=draft-ietf-netmod-acl-extensions-06&difftype=--html.

 

Cheers,

Med

 

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : mardi 23 janvier 2024 16:57
À : 'Mahesh Jethanandani' <mjethanandani@gmail.com>
Cc : Lou Berger <lberger@labn.net>; NETMOD Group <netmod@ietf.org>; NetMod WG Chairs <netmod-chairs@ietf.org>
Objet : RE: [netmod] WG Last Call: draft-ietf-netmod-acl-extensions-03

 

Hi Mahesh,

 

Thanks for the follow-up. Made some changes as you can see at https://boucadair.github.io/enhanced-acl-netmod/#go.draft-ietf-netmod-acl-extensions.diff" rel="nofollow"> https://boucadair.github.io/enhanced-acl-netmod/#go.draft-ietf-netmod-acl-extensions.diff.

 

Please see inline for more context.

 

Cheers,

Med

 

 

Orange Restricted

De : Mahesh Jethanandani <mjethanandani@gmail.com>
Envoyé : mercredi 20 décembre 2023 18:20
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : Lou Berger <lberger@labn.net>; NETMOD Group <netmod@ietf.org>; NetMod WG Chairs <netmod-chairs@ietf.org>
Objet : Re: [netmod] WG Last Call: draft-ietf-netmod-acl-extensions-03

 

Hi Med,

 

Thanks for addressing some of my comments. Please see inline.

 

On Dec 19, 2023, at 12:09 AM, mohamed.boucadair@orange.com wrote:

 

Hi Mahesh, all,

 

Thank you for the review and comments. We just posed draft-ietf-netmod-acl-extensions-04.

 

Please see more context inline.

 

Cheers,

Med

 

De : netmod <netmod-bounces@ietf.org> De la part de Mahesh Jethanandani
Envoyé : mardi 5 décembre 2023 23:09
À : Lou Berger <lberger@labn.net>
Cc : NETMOD Group <netmod@ietf.org>; NetMod WG Chairs <netmod-chairs@ietf.org>
Objet : Re: [netmod] WG Last Call: draft-ietf-netmod-acl-extensions-03

 

Hi,

 

I do support this work, as it is much needed, and would like to see it progress. However, I do believe that the document needs to undergo a revision to qualify for LC. Some of the comments are editorial or minor, and can be addressed easily, but others are not. They should all be addressed for the WG to call the document ready.

 

- The Security Considerations section has both the read/write nodes and the read-only nodes as empty (or marked as TBC, which I imagine stands for To Be Completed). This needs to be filled out, or if no nodes are worth any security considerations, it should be stated so, and why.

 

[Med] ACK. We don’t repeat what is already in 8519 but focus on key additions in the spec: https://github.com/boucadair/enhanced-acl-netmod/pull/65/files" rel="nofollow">https://github.com/boucadair/enhanced-acl-netmod/pull/65/files

 

[mj] Thanks for updating the section. 

 

s/setf/set/

s/Simialr/Similar/

 

and in other place

s/modelled/modeled/

 

[Med] Thanks. Fixed.

 

 

- Isn’t the YANG model normative portion of the document? Isn’t what this document all about? Why is it then in the Appendix?

 

[Med] We are using a script to generate the IANA modules + we are actually following this part from the 8407bis:

 

   It is RECOMMENDED to include the URL from where to retrieve the

   recent version of the module.  When a script is used, the Internet-

   Draft that defines an IANA-maintained module SHOULD include an

   appendix with the initial full version of the module.  Including such

   an appendix in pre-RFC versions is meant to assess the correctness of

   the outcome of the supplied script.  The authors MUST include a note

   to the RFC Editor requesting that the appendix be removed before

   publication as RFC and that RFC IIII is replaced with the RFC number

   that is assigned to the document.  Initial versions of IANA-

   maintained modules that are published in RFCs may be misused despite

   the appropriate language to refer to the IANA registry to retrieve

   the up-to-date module.

 

[mj] I am not clear on what happens to the IANA module once the draft is published as an RFC based on what you cite from 8407bis.

[Med] It will be removed as per the note:

 

(2) The modules are provided in {{iana-icmp}}, {{iana-icmpv6}}, and {{iana-ipv6-ext}} for the users convenience before publication as RFC. Please remove these appendices from the final RFC.

 

The document states that the reference to “RFC IIII” is replaced with the actual RFC number, but  it also says that the Appendix be removed. What happens to the initial version of the module itself? Is it removed if the Appendix is removed?

[Med] It will be removed as per the note above. Please note that this practice is already followed in rfc9108, for example.

 

Or does it remain in the Appendix as an initial version, with language that indicates that the IANA registry should be used to retrieve the most up-to-date model? The language in Section 1.1 item (2) does not help.

 

The above text from 8407bis needs to be explicit on what happens to the initial version of the module as part of the RFC publication.

[Med] Please feel free to propose changes to this part of the bis for better clarity:

 

   The authors MUST include a note

   to the RFC Editor requesting that the appendix be removed before

   publication as RFC and that RFC IIII is replaced with the RFC number

   that is assigned to the document. 

 

 

- Why is the Section titled "Initial Version of the The ICMPv4 Types IANA-Maintained Module”, when the model in question is "iana-icmpv6-types@2020-09-25.yang”?

[Med] This was a typo. Fixed.

 

[mj] You fixed it another location. However, I still see the following in the -04 version of the document.

[Med] Thanks for catching this. Fixed.

 

B.2. Initial Version of the The ICMPv4 Types IANA-Maintained Module

<CODE BEGINS> file "iana-icmpv6-types@2020-09-25.yang"

 

 

module iana-icmpv6-types {

 

 

- ‘defined-sets’ and ‘aliases’ have been defined in a the separate model ‘ietf-acl-enh’. Are these sets and aliases defined to be used outside of ACL? If that is the case then having them outside the ‘ietf-access-control-list’ model makes sense. Otherwise, almost everything in the ‘ietf-acl-enh’ is an augmentation of the model defined in RFC 8519, as stated in the Introduction of the document

 

[Med] These are defined to be consumed for ACL policies.

 

 

"The YANG module in this document is solely based on augmentations to the ACL YANG module defined in [RFC8519].”

 

[Med] The intent was to highlight that we are not using a bis approach. Tweaked the paragraph that includes that text for better clarity.

 

[mj] I think it already clear that this model an augmentation and not a bis. A bis is when you take the original document and edit it for updates, and this is clearly not that.

 

I actually agree with your above statement in the Introduction that you had, about the module being solely an enhancement of the ACL YANG model, and was surprised to see it taken out. The point I was making was that just like what you have done with augmenting "/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches” to add ‘choice payload’, ‘choice alias’ etc, you could have augmented “/acl:acls” to add ‘defined-sets’ and ‘aliases’.

Right now, as is, the ietf-acl-enh module sits on the root of the config tree, with no relation to the ACL model, other than references to it from within the ACL model. If the definitions in ietf-acl-enh are to be consumed by the ACL model only, why not augment the ACL model (as shown below) to add them in the ACL tree?

 

[Med] This is fair. Now that I managed to refresh the context in my mind I confirm that we have done that in a previous version of the spec, but the feedback we received from the WG was to move those upper in the hierarchy (because there might be other cases). See for example https://datatracker.ietf.org/doc/minutes-115-netmod-202211080930/" rel="nofollow">https://datatracker.ietf.org/doc/minutes-115-netmod-202211080930/:

 

==

Joe Clarke: It would be nice in a standalone container (i.e. groupings that could be imported). I see some other use cases for these defined groupings besides just ACLs.

==


I know that routing policy uses defined-sets, but I believe they have already defined their own. Which other models do you foresee using these groupings?

 

 

If that is the case I see no reason why those containers should not be augmentations into the same model, as in

 

augment “/acl:acls” {

  container defined-sets {

  ….

  }

 

  container aliases {

     …

  }

}

  

 

- I just pulled down the latest version (-03) of the draft, and ran into this error. 

 

iana-icmpv6-types@2020-09-25.yang:1: error: unexpected latest revision "2023-04-28" in iana-icmpv6-types@2020-09-25.yang, should be "2020-09-25”.

 

[Med] Fixed. Thanks.

 

- Section 3.4. TCP Flags Handling. The document states that. 

 

"Clients that support both 'flags-bitmask' and 'flags' matching fields MUST NOT set these fields in the same request.”.

 

Can the model have a must statement to prevent this from being configured inadvertently?

 

[Med] We don’t see how to do that with a must statement, hence the normative language in the narrative text.

 

[mj] How about something like

 

must “not(/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches/acl:l4/acl:tcp/acl:flags)”  {

  error-message

    “Either flags or flags-bitmask should be configured, but not both.”;

}

 

under ‘flags-bitmask’?

[Med] Thanks.

 

If you are feeling adventurous, you could add a deviation add statement to add a similar must statement under tcp/flags also :-).

 

 

Same for Section 3.5 Fragments Handling

[Med] Same answer :-)

 

- There should be clear direction to the RFC Editor on what should be done with revision dates. The same is true for other placeholder text. For example, what is the RFC Editor to do with text "RFC XXXX"?

 

[mj] Thanks.

 

 

- References in the YANG model should be expanded to include the title of the RFC.

 

[Med] We are echoing references as listed in an IANA registry, so we do not have control over that reference.

 

- Examples are always good. Not only can they be used to validate the model, but users get to understand how it can be used. See other models such as BGP, TCP, BFD on how an example can be added.

 

[Med] We do already have many in the core document. Will consider adding more if needed.

 

[mj] I am referring to the example as stated in https://datatracker.ietf.org/doc/html/rfc8407#section-3.12" rel="nofollow">Section 3.12 of RFC 8407. If by core you are referring to RFC 8519, then unfortunately, we the authors missed it too -:( But here is a module usage example from another draft.

[Med] I’m referring to examples such as those in https://datatracker.ietf.org/doc/html/draft-ietf-netmod-acl-extensions-04#name-tcp-flags-handling" rel="nofollow"> https://datatracker.ietf.org/doc/html/draft-ietf-netmod-acl-extensions-04#name-tcp-flags-handling.

 

 

 

 

- How is this a reference?

        reference
          "- Bill Simpson <mailto:Bill.Simpson&http://um.cc.umich.edu/" rel="nofollow">um.cc.umich.edu>

 

[Med] We are echoing a reference as cited in an IANA registry, so we do not have control over that reference.

 

[mj] Regardless, and I am repeating the question, how is this a reference?

[Med] That’s a reference as per the IANA registry:

 

33  IPv6 Where-Are-You (Deprecated) [Simpson][RFC6918]

34  IPv6 I-Am-Here (Deprecated)     [Simpson][RFC6918]

35  Mobile Registration Request (Deprecated)   [Simpson][RFC6918]

36  Mobile Registration Reply (Deprecated)     [Simpson][RFC6918]

 

I think having RFC 6918 as a reference is good enough.

[Med] but this will deviate from what is in the IANA registries.

 

And that brings up another point. The sections that contain the YANG models need to list out all the references cited in the model at the beginning of the section. For example, Section 4 needs to list RFC 9293, 3032, 792, 4443 etc. at the beginning of the section, such that they are included in the Normative list of references. See https://datatracker.ietf.org/doc/html/rfc8407#section-3.9" rel="nofollow">Section 3.9 of RFC 8407.

 

[Med] We are familiar with that part. The point here is that we don’t cite them in the main text because the IANA modules will be removed from the final RFC as per the comment above.

 

Thanks.

 

 

Thanks.

[Med] Thanks for the review. Much appreciated.

 

 

Thank you.

 


Mahesh Jethanandani

 

 

 

 

 

____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.