Re: [netmod] IETF ACL model

Mahesh Jethanandani <mjethanandani@gmail.com> Wed, 29 November 2017 20:11 UTC

Return-Path: <mjethanandani@gmail.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36643128D19 for <netmod@ietfa.amsl.com>; Wed, 29 Nov 2017 12:11:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vTRjEmNPzuPQ for <netmod@ietfa.amsl.com>; Wed, 29 Nov 2017 12:11:32 -0800 (PST)
Received: from mail-pl0-x22f.google.com (mail-pl0-x22f.google.com [IPv6:2607:f8b0:400e:c01::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7FC3128C9C for <netmod@ietf.org>; Wed, 29 Nov 2017 12:11:31 -0800 (PST)
Received: by mail-pl0-x22f.google.com with SMTP id i6so2741494plt.13 for <netmod@ietf.org>; Wed, 29 Nov 2017 12:11:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to; bh=jHSF5DFy2vJaezZtzH/j5xdgNTO4jodl3rwXFnrxQq4=; b=hM/CN/jermEDxPUUTlcx03P9dmsUaIPoxY1i4lVclWGjq1XYPAh/ZokSJERwmNNMib wX7/yN/i+arEc/yzXg7JSfhkrP8yTBh3CynGd80Rjxc48aDKGr8vim/wduFWLctBqUnC 2RPZ92dMf2Os9Z8UhhXC/tOXQ5oNIJ7M2f5Emq68InI01RjX28WXD9DXX/6VnFmc56z4 TGT75Gbeb0LbPd7Uwd+70FFslHj1Y/MlzADrDzZo/kiJyUMFcXAZrEWCv3OZV7RfmWHD CyenMAgKSTlupwRHlpU9a6a4LhX3JpLGp35UpN+6NsNjBRhHT4QzRsbsQO3sTnZNlCyK 3rbg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=jHSF5DFy2vJaezZtzH/j5xdgNTO4jodl3rwXFnrxQq4=; b=IuzmNhQC28tyMG3uyslem49AxORVdv3mVxXbfuc4IFJ8kP9sDLJZNYjaWAv7SM50I6 hz9BW0+3S+IaKRsFyy3lB6/vQ79oN43K2px7hJXVu133iYvhd3i1x0nTTJsbpWdiqYC3 CfJQELmC9As+ujjTiPzNOqD5g8UoPIw71jtxsKCxBgf2PL9CdsWTlZ1rzc7V++KnlMWH FHnStFFvyFJqqR0dES979JTPAY1xwjWlLtRQacqVGK5ZimP+FWPj8zU6vMRpGcKqaQfr ZIQZYDq9o7yF9FWMja/xY+7i5yMMxHSNUej4EEmK5mnT1yjt14N7ghcxTlsvldBfcBrP E+Gw==
X-Gm-Message-State: AJaThX4PJJ0SJU4P8elhRLzzSr3JOe9UL023GVVH/q3+EOGjelj2lGaN Aokg6DqJuQjGB5DIHxvJFgdSdyXU
X-Google-Smtp-Source: AGs4zMY1CrXUsYvktVFNsb9Ot2b32tzA8emRRYeVFQPz94fyhiZkmd9sB765uweQeVD5Vpk3OVzhXQ==
X-Received: by 10.84.131.35 with SMTP id 32mr50748pld.347.1511986291052; Wed, 29 Nov 2017 12:11:31 -0800 (PST)
Received: from mahesh-m-m8d1.attlocal.net ([2600:1700:edb0:8fd0:64e3:eccb:ea65:7763]) by smtp.gmail.com with ESMTPSA id x22sm4806491pfa.169.2017.11.29.12.11.24 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 29 Nov 2017 12:11:30 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_01DE3777-7819-42F6-BB11-FE7CB34D0EBE"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Mahesh Jethanandani <mjethanandani@gmail.com>
In-Reply-To: <20171128.111715.2283575031970124402.mbj@tail-f.com>
Date: Wed, 29 Nov 2017 12:11:17 -0800
Cc: Robert Wilton <rwilton@cisco.com>, Jeffrey Haas <jhaas@juniper.net>, Sonal Agarwal <agarwaso@cisco.com>, Kristian Larsson <kll@spritelink.net>, Kristian Larsson <kll@dev.terastrm.net>, Martin Bjorklund <mbj@tail-f.com>
Message-Id: <C872578A-CBA9-434B-B11E-C9F934627A1D@gmail.com>
References: <e1fe6796-c124-b663-8e9f-e66c23b10eea@cisco.com> <87y3mr3loc.fsf@dev.terastrm.net> <A6290183-E975-4BDA-83C3-640E237BD5F2@gmail.com> <20171128.111715.2283575031970124402.mbj@tail-f.com>
To: NetMod WG <netmod@ietf.org>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/VPIg8WOkjTTdEVzpbP5lLnCxr18>
Subject: Re: [netmod] IETF ACL model
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Nov 2017 20:11:35 -0000

The updated commit here <https://github.com/netmod-wg/acl-model/pull/19/commits/37e4c030180ae052a5fae26ca86813970fc6b4bf> takes care of restoring “type" to "acl-type", fixes some indentation issues, adds a choice for “l3" where either “ipv4" or “ipv6" can be selected, and a similar choice at “l4" that allows either “tcp", “udp" or “icmp" to be selected, and removes changes for “global" attachment point. Will add the last item as a separate commit.

Unless I hear objections, I will roll the pr/18 changes into the master branch in 48 hours.

> On Nov 28, 2017, at 2:17 AM, Martin Bjorklund <mbj@tail-f.com> wrote:
> 
> Mahesh Jethanandani <mjethanandani@gmail.com> wrote:
>> An updated version of the model has been posted as part of the PR here
>> <https://github.com/netmod-wg/acl-model/commit/2477cd400cce6d39933c908ad97da27ff759588b>.
>> 
>> The particular change removes any-acl from the model, expands on eth
>> (to ethernet), removes acl- prefix for things like acl-type and
>> acl-name. Please review.
> 
> I think 99% of the changes in this PR look good.  The one
> exception is the typedef that used to be called "acl-type".  I think
> it should still be called "acl-type".  "type" is too broad.  NOTE,
> this is just the typedef; the leaf /access-lists/acl/type should keep
> its name ("type").
> 
> 
> /martin
> 
> 
> 
>> 
>>> On Nov 27, 2017, at 5:17 AM, Kristian Larsson <kll@dev.terastrm.net>
>>> wrote:
>>> 
>>> 
>>> Robert Wilton <rwilton@cisco.com> writes:
>>> 
>>>> Thinking about this some more. I'm not sure what it means for the "ACL
>>>> Type" to be "any-acl". It seems that the "match any packet" should be
>>>> a
>>>> type of ACE, e.g. perhaps as the last entry of an ACL, rather than a 
>>>> type of ACL.
>>> 
>>> Yes, I agree as so far that any-acl makes no sense as an acl-type. The
>>> way I understood acl-type, and the way that vendors have told me it
>>> will
>>> be used, is to say "this is an IPv4 ACL" and then on an attachment
>>> point
>>> you can specify that only ACLs of acl-type ipv4-acl can be attached to
>>> the interface. That makes perfect sense. I do not see how any-acl can
>>> map into this.
>>> 
>>> I agree that any-acl is logically a type of ACE but we don't have an
>>> ace-type and the exact same information can IMHO already be conveyed
>>> WITHOUT the any-acl type and thus it has no reason to exist. Nor do we
>>> need a feature for it.
>>> 
>>> From what I can tell the any-acl container in the ACE should be used
>>> to
>>> explicitly signify a match on "any". Think of IOS style ipv4 acl:
>>> permit ip any any
>>> 
>>> We have to provide a source and destination so this would be a rather
>>> explicit mapping of that. However, our structure in this YANG model is
>>> just completely different than an IOS command so I don't see why we
>>> should try and mimic IOS in the YANg model.
>>> 
>>> Not specifying a destination IP address means we match on any
>>> destination IP address. The same is true for any other field we can
>>> match on. Not setting a match implies we don't try to match on that
>>> field, thus we allow "any" value. I think the logical continuation of
>>> this is that for an ACE with no matches defined at all, we match any
>>> packet. I think we can update the text to better explain this.
>>> 
>>> 
>>> 
>>>> Otherwise if the ACL type is "any-acl" then this only allows two types
>>>> of ACLs to be defined, neither of which seem to be particularly
>>>> useful:
>>>> (1) An ACL that matches all traffic and permits it, i.e. the same as 
>>>> having no ACL at all.
>>>> (2) An ACL that matches all traffic and drops.
>>>> 
>>>> So I think perhaps the answer here is to define neither ACL type 
>>>> "any-acl" nor leaf "any". The presumption could be that any ACE that
>>>> is
>>>> configured to match no fields implicitly matches all packets (because 
>>>> all non specified fields are treated as wildcards), and then applies
>>>> the
>>>> permit/deny rule associated with the ACE. This logic can apply to all 
>>>> ACL types.
>>> 
>>> Yes yes yes :)
>>> 
>>>  Kristian.
>> 
>> Mahesh Jethanandani
>> mjethanandani@gmail.com
>> 

Mahesh Jethanandani
mjethanandani@gmail.com