Re: [netmod] Unknown bits - backwards compatibility

"Jason Sterne (Nokia)" <jason.sterne@nokia.com> Thu, 13 April 2023 21:00 UTC

Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F138AC151B1C for <netmod@ietfa.amsl.com>; Thu, 13 Apr 2023 14:00:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3CyWDNsMI0ab for <netmod@ietfa.amsl.com>; Thu, 13 Apr 2023 14:00:27 -0700 (PDT)
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam04on20729.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e8d::729]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 566B5C14CE24 for <netmod@ietf.org>; Thu, 13 Apr 2023 14:00:26 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Tco06Zz0GenuqG5AgjzE0/w1TYe6If8ZD0QsRSwGjpitj/3k4qZMGoLCjdROeX94HpEpFhe2kkyledb1WmaZptKqcLY4zh0VNGub/p1sOJ6+EwxdWGs966un1XpxixMQBTZK9iIDRLnUTKritCfR9+HcGMTValH78sEnUwYgx7CWwcy0IDJjY19mQlxJA9biandQx53/9mIYRmn+xJj4e849q2d2ILY2RFdUjnxB2Sj6ed9DZiysk8gtTS48Nj37R2VQW2x7g93z8aD4ejYVnb4mdJ5lU6mlvhEQbLTOKO7Q3GR8eSxkmCOy8mbz/JHbRB0tebGTQNKBlWNsxwdrbw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cwQ5a+hMdtXN5o+sSoIyUAbgjjeDpixJXGJqFE+2PIA=; b=DNR97UBjxTmH/JthBoFicBhiVMkO1fcWs3md9baJc2heBUKY9EpB7Gd3hOGOb/AhqVnE28R22BmsYnO2Xc00ZwkYntX8D/EANrjjxjISB5o8YQH/94NS2X+lUXK+xY2tA4P325G9Wg2baNWDl6vBLlUUO225hqXVYUmt/GCxAxcM62F3QwoI0zZ1dw//MYfbjItvqYxnNjvwalfQeOH2MbL5Q5ZkmPEV9n0Pdtb+HBEGt0iwhvOcGGpF0BeF6/0k+UQfzGDMZICkB0ZK/7ol71DLWKaNSWdG+po4P8evx/Z0e6M460bAaQs1rMz/mHF+fK/NVT382J2tD+3TleWtpg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cwQ5a+hMdtXN5o+sSoIyUAbgjjeDpixJXGJqFE+2PIA=; b=Oa/z23y22HJIgtn/K4J+/rm435ice+zyzUlF+5ErLge388iDdZnZHCJcxivb5JsEhg13zJ3j36Oq9WTvZWgYz+O9mVSAdGRBmOW6vYYocmjpIdAF8IK08QxDlOVwypEDlJvSH6cERrytnyrPm3aTK0X2/6qnPyVN7FEdv2cpTFMxnz4EwkTHEwZwXobbg1IjFe4dMz69WrjUiyGqjU9kDo+UPE234OYcnr6fVEriQ95NF9GwAYJZLKyLAChQmZ8ce/gf25TSGimQ/pYCVvncsoDQ1O9KKEIzA8XUMAJOu5AxE1TP4R8NhutTdWD4kP05FJ/qYafVsLJbRD28ZHQMyw==
Received: from DM6PR08MB5084.namprd08.prod.outlook.com (2603:10b6:5:41::29) by BY3PR08MB7137.namprd08.prod.outlook.com (2603:10b6:a03:355::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6298.30; Thu, 13 Apr 2023 21:00:23 +0000
Received: from DM6PR08MB5084.namprd08.prod.outlook.com ([fe80::6e5c:8f58:eada:3d49]) by DM6PR08MB5084.namprd08.prod.outlook.com ([fe80::6e5c:8f58:eada:3d49%3]) with mapi id 15.20.6277.038; Thu, 13 Apr 2023 21:00:23 +0000
From: "Jason Sterne (Nokia)" <jason.sterne@nokia.com>
To: Jeffrey Haas <jhaas@pfrc.org>
CC: "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: Unknown bits - backwards compatibility
Thread-Index: AdltglsGqm4GljjWQwuatQ9p2g9JFQAAu3WAAC9rAwAAAJNK4AAA2OYAAABZ6TA=
Date: Thu, 13 Apr 2023 21:00:22 +0000
Message-ID: <DM6PR08MB50847617C83E424C3E323F919B989@DM6PR08MB5084.namprd08.prod.outlook.com>
References: <167510951913.30783.6878062588510633543@ietfa.amsl.com> <70DA36EA-F90A-4800-A4C8-0DDCF6FFD845@pfrc.org> <0F8C57E5-F7F8-4383-A9BE-E98D2C6A6E42@pfrc.org> <DM6PR08MB50841A7B84BA1D84AC0B57809B9B9@DM6PR08MB5084.namprd08.prod.outlook.com> <DM6PR08MB5084E9656CA7C388D2A229779B9B9@DM6PR08MB5084.namprd08.prod.outlook.com> <A3EFA144-664D-4F67-8565-111EF650CE0B@pfrc.org> <DM6PR08MB508452FBF0266BCDEC68464F9B989@DM6PR08MB5084.namprd08.prod.outlook.com> <44DB67B7-D1D9-4A4D-835B-8182491E803E@pfrc.org>
In-Reply-To: <44DB67B7-D1D9-4A4D-835B-8182491E803E@pfrc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nokia.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR08MB5084:EE_|BY3PR08MB7137:EE_
x-ms-office365-filtering-correlation-id: dc811956-6122-43a3-db6c-08db3c62190e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: A93+nI53PCYs8Ld47/88gi8eHaD2oi9F0vuxIIpCQPl/ZZzA30BpwppwcyCH7iWAZUzl+dWBNHFAvQRePKN/iPTc7sAKYCPfIUYrSPUI7nsClF0L561Q2esZQFW04cUl5uBWIgGnW/mfpSywNwtIYVLPXggvYWHdAgkYPvtAOWexgMOc8k3+qZRgOdzM+YlpyXMGhgkjFU0Qc1zhB7sqRgQg4jzlLPbfbwKzYWc85EV+eaL/e4JBeFUsjISoNKPXnWQ9z17asEJDgIWPgSdsE7XGEkRBop0jqVrP3Igvx3bUUHjNws/tk4Sdbv5qLAUuS2VpCg+CmtJc/6GCG9zdPW7tWfjMeFFpiqU1I0gWIzksVVnwYXCfoXWjJDJ4ceNqrWvaJLnnonumffNznz1jas7Dpp564Mh2va0aSGHdCqI64zJGtcVMW2ZuoZxO1CsO0IGR6ZHo7LJIJPM9jW+fWKoQ7nAb1yaX+Pjs07vDG2abotfNR6Npg4xZo3f4tPmbye90kY+n2z2TVOX1QgOY/RRgfoMTv2o65aPY2do1gfyGg4HcxxjjPovBF4qKxPjit60a7VGcwGHJYK13OjCZtcgvczbLK+wEwtZkwh/wmoxp/QbSGdHqY1UGi2KeF3+DFfj/jc6hEE/QGqnj4Ue6Jw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB5084.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(376002)(396003)(39860400002)(346002)(366004)(136003)(451199021)(21615005)(83380400001)(122000001)(82960400001)(41300700001)(5660300002)(52536014)(2906002)(84970400001)(166002)(38070700005)(9326002)(8936002)(38100700002)(8676002)(186003)(9686003)(53546011)(6506007)(26005)(66899021)(64756008)(66446008)(71200400001)(66476007)(66556008)(7696005)(6916009)(4326008)(66946007)(86362001)(76116006)(55016003)(966005)(316002)(478600001)(33656002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB50847617C83E424C3E323F919B989DM6PR08MB5084namp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR08MB5084.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dc811956-6122-43a3-db6c-08db3c62190e
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2023 21:00:22.7447 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XhzgaCOHKbS3tUbEvwmiIgcRePu1iV475goRvGiXcVSFn0BBkwixMr8AAryFEquro5tMJG+YiceRijj4i1FQ/A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR08MB7137
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/aOEmneHt2W-0Zr0EYJKMlp-rMbc>
Subject: Re: [netmod] Unknown bits - backwards compatibility
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Apr 2023 21:00:32 -0000

Hi Jeff,

We avoided getting into subtleties about “severity” of an NBC change (hard enough to just get agreement on basic rules). But I do think it is useful to come up with changes and approaches that have lower impact on users/clients even if they are still marked as NBC.

For the new versioning marking, it would basically be the following. In the “revision” statement of the new module:

  1.  Add "rev:non-backwards-compatible" as per draft-ietf-netmod-yang-module-versioning-08 - Updated YANG Module Revision Handling<https://datatracker.ietf.org/doc/draft-ietf-netmod-yang-module-versioning/>
  2.  Increment the major version of the YANG Semver (i.e. go from 1.0.0 to 2.0.0) as per draft-ietf-netmod-yang-semver-11 - YANG Semantic Versioning<https://datatracker.ietf.org/doc/draft-ietf-netmod-yang-semver/11/>

That may seem harsh, but we leaned towards being strict on flagging any NBC change in order to avoid false-negatives (i.e. false-positives aren’t as bad). Users can then diff the module versions, see that only the unknown-bits stuff has changed, and then decide if they need to update their client, etc.

Jason

From: Jeffrey Haas <jhaas@pfrc.org>
Sent: Thursday, April 13, 2023 4:44 PM
To: Jason Sterne (Nokia) <jason.sterne@nokia.com>
Cc: netmod@ietf.org
Subject: Re: Unknown bits - backwards compatibility


CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext for additional information.


Jason,



On Apr 13, 2023, at 4:29 PM, Jason Sterne (Nokia) <jason.sterne@nokia.com<mailto:jason.sterne@nokia.com>> wrote:
[>>JTS:] Yeah – I see that perspective. But a client using the old API/contract gets new/different behavior for the unknown-flags leaf from a new server. Hence NBC – unless we decide in the end to somehow make this specific case/typedef an exception but I’m not sure about that yet. The typedef and behavior you are describing there may still be useful as-is even if we decide to still officially consider the change to unknown-flags behavior as NBC (i.e. in new the version of the module that changes a bit from unknown to known).

Understood.  True to form, I seldom seem to come to netmod with easy problems. :-)

Not having read the current versioning material, this would seem to be a case where you could consider this NBC, but likely not-problematic.  I'm not sure if you have "severity" as a concept in the discussions thus far.

If there's current verbiage about documenting NBC considerations, feel free to point me to the appropriate documents.  As a general purpose mechanism, the draft could simply describe that any time an update to the known leaf type is done that the unknown leaf type is flagged for NBC for the newly assigned bits.


I wish to point you and others concerned on these points to the BGP YANG modeling for Extended Communities, which will have these problems in a different flavor: Known communities will render via the typedefs, unknown will render using the prefix 'raw'.  (See typedef bgp-ext-community-type.)  This headache is already a consideration in every BGP implementation that deals with extended communities in changing meaning.
[>>JTS:] Can you point me to a repository or RFC where I can see this? I’m not familiar with where this YANG work is being done.

Sorry for not including the URL.  This document went to WGLC for IDR a few days ago.  We'll be asking (yet yet yet again) for YANG doctor review.
https://www.ietf.org/archive/id/draft-ietf-idr-bgp-model-16.html

You'll find the typedef issue for extended communities in there, and also the field for unknown bits in the operational state that is the genesis for this conversation.

Figure 4 in draft version -02 shows how the type gets modified to add the new bit. The model doesn't change between step 1/ step 2 beyond this.  [>>JTS:] Sure – maybe just mention explicitly that the model for unknown-flags stays unchanged.

If you'd find it helpful, I could add to the text covering Figure 8 "after assignment, bit-1 is no longer returned in unknown-flags".  Is that what you're looking for?[>>JTS:] Yes – that would probably help.

I'll try to roll in these changes soon. Thanks.

-- Jeff