[netmod] Changes to IPv6 zone definition in draft-ietf-netmod-rfc6991-bis-15

"Rob Wilton (rwilton)" <rwilton@cisco.com> Wed, 22 March 2023 13:33 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0339FC1522C6; Wed, 22 Mar 2023 06:33:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.899
X-Spam-Level:
X-Spam-Status: No, score=-11.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Fx1g4RX+"; dkim=pass (1024-bit key) header.d=cisco.com header.b="EEnIBOF/"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVEhw7HGBEiw; Wed, 22 Mar 2023 06:33:06 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B97F0C15152E; Wed, 22 Mar 2023 06:33:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4653; q=dns/txt; s=iport; t=1679491985; x=1680701585; h=from:to:subject:date:message-id: content-transfer-encoding:mime-version; bh=j5qqThnG0oFe9M2Yfg+0Tkrd1Ef2wKvQdq+PjU0bjSU=; b=Fx1g4RX+EetjpzrptkBSgynJNJx6a/cPYZxtVlKaNPIKLMIlwGFuYKsr 0sXb11rLGA2tSQ2qUhZiEYydBcN7Iu1A0a2cQ/eKiu+wfAyZ9cN4oN3mF JRQodEiw70ifAdDP0iVrFYBTCBxQkn24Ix0+FCUCRKlloikcFf3UW/PZi I=;
X-IPAS-Result: A0AZAgCgAhtkmIkNJK1agQmBT4FcUnNbO0aIHgOFL4gxnCuBLIElA1YPAQEBDQEBRAQBAYFSAYMyAoU1AiU0CQ4BAgQBAQEBAwIDAQEBAQEBAwEBBQEBAQIBBwQUAQEBAQEBAQEeGQUOECeFaA2Gbi4BATgRAYEAJgEEARoTB4Jcgl0DAaVYAYE/AoofeIE0gQGCCAEBBgQEnyAJgUGEQoxzJxuBSUSBWIIwB4NQAoFihA+CLo11ikVqgTR2gSAOgT2BBAIJAhFrgRIIa4F9QQINZQsOcYFLAmRNMzcDRB1AAwt1PzUGDiAFBFV2IyQFAwsVKkcECDkGTxECCA8SDyxEDkI3NBMGgQYLDhEDT4FHBHOBGwJPnBprBmgNWg6BEjYZCwUqkmyOb4EzoFkKg3oFoR0Wg32kYGKXaiCCLqUjAgQCBAUCDgEBBoFjOoFbcBWDIlIZD445g1mPeXU7AgcBCgEBAwmLQwEB
IronPort-PHdr: A9a23:uKhM6BweKvsUt1fXCzPZngc9DxPP8534PQ8Qv5wgjb8GMqGu5I/rM 0GX4/JxxETIUoPW57Mh6aLWvqnsVHZG7cOHt3YPI5BJXgUO3MMRmQFoCcWZCEr9efjtaSFyH MlLWFJ/uX+hNk0AE8flbFqUqXq3vlYv
IronPort-Data: A9a23:LyIoC6ld6jQjO6xK7yAj6+ro5gxDJkRdPkR7XQ2eYbSJt1+Wr1Gzt xIcWW+CO/bcZTD9Kox0b97j9RgP7ZXdmtFlSQo5rng1FFtH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZ2YgFWeIdA970Ug4w7Vj2NYy6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HPoMUVp8hGiNpdMr6 JJipbK6GRoGEISZzYzxUzEAe81/FaRC/LmCKn+lvInPiUbHaHDrhf5pCSnaP6VBpb0xWj8Ir KdecWtSBvyAr7reLLaTUPZtgtgkKuHgPZgUvTdryjSx4fMOEcyYE/6TvYIwMDEYmcRHDeSPR fElY3lUNEvSeRgTGl07Icdr9AuvriCvL2IHwL6PnoI7+WHd0Elw3aTjdYTQc9rPX8tewBbH+ mjH5CLwBhUyNdGDx3yC6H3EruPVlC3nHYMfCLP98PN2hVqfg3YdA0NHBAL+q/iizEe6X/peJ lAavC00osAa8kG3S97xdxy1vHDCuQQTM+e8CMUz7AWLj6HT+QvcWi4PTyVKb5ots8peqSEWO kGhn8PRGBdg7bmvSii9sZiEgzniJAc7BDpXDcMbdjct797mqYA1qxvASNd/DaK45uEZ/xmtn 1hmSwBj290uYd43O7aTpguf0mj8znTdZktkuFuLAz7NAhZROdb9D7FE/2Q3+hqpwGyxZ12Fs X5sdyO2s71WVcvleMBgvIww8FyB7vKBNnjXhkRiWsVn/DW28HnldodViN2fGKuLGptfEdMKS BaM0e+02HO1FCD2BUOQS9ntY/nGNYC6SbzYugn8N7KimKRZeg6d5z1JbkWNxW3rm0VEufhhZ sbHK53wVixEUvoPIN+KqwE1jO9DKscWmD27eHwH50/PPUe2PSTMEu5VbDNikMhmvf/sTPrpH yZ3bpvWlEo3vBzWaSjM+olbNkERMXU+HvjLRz9/KIa+zv5dMDh5UZf5mOp5E6Q8xvg9vrmTp BmVBBQHoGcTcFWac21mnFg5NuO2NXu+xFpmVRER0aGAgSJ4MNv3sP9AK/Pav9APrYRe8BK9d NFdE+3oPxiFYm6vF+g1BXUlkLFfSQ==
IronPort-HdrOrdr: A9a23:DeynOqp9EGKZglP4DLtF95caV5uqL9V00zEX/kB9WHVpm5Oj+f xGzc516farslossSkb6Ku90dq7MAnhHPlOkMIs1NaZLUHbUQ6TTb2KgrGSugEIdxeOlNK1tp 0QOZSWaueAdWSS5PySiGLTfrZQo+Vvm5rY4ds2uk0dKz2CHJsQiDuRZDzrd3FedU1jP94UBZ Cc7s1Iq36LYnIMdPm2AXEDQqzqu8DLvIiOW29KOzcXrC21yR+44r/zFBaVmj0EVSlU/Lsk+W /Z1yTk+6SYte2hwBO07R6e030Woqqv9jJwPr3MtiEnEESttu9uXvUjZ1S2hkF6nAho0idprD CDmWZkAy050QKtQoj8m2qQ5+Cn6kdr15cnomXox0cKZqfCNXUH4oN69P1kWwqc5Ew6sN5m1q VXm2qfqppMFBvF2D/w/t7SSnhR5z2JSFcZ4JsuZkZkIP8jQa4UqZZa8FJeEZ8GEi6/4Ic7EP N2BMWZ4PpNa1uVY33Qo2EqmbWXLz0ONwbDRlJHtt2e0jBQknw8x0wExNYHlnNF8J4mUZFL6+ nNL6wtnrBTSc0da757GY46ML2KI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw/+2ucIxg9upBpH 0AaiIqiYcfQTOfNSTV5uw0zvnkehTNYQjQ
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.98,282,1673913600"; d="scan'208";a="84383105"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Mar 2023 13:33:04 +0000
Received: from mail.cisco.com (xfe-rtp-002.cisco.com [64.101.210.232]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 32MDWw7Y007388 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 22 Mar 2023 13:33:02 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25; Wed, 22 Mar 2023 09:32:47 -0400
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.25 via Frontend Transport; Wed, 22 Mar 2023 08:32:47 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WMQQFrMDWajBQpMunljK4n46+SETFgwozIJkgmFHWdMD6Ox+0sMQx+hDulfyUuwqtvw/Za9ZayeusWUCu7JFIRnbCgw6zE4gIrNOiw0pUBMdl/MvottcN1Wv0+fUN608utQ8e1oArEO1n0XFyVTtaXof18CTx93D2IGDmmPmdshf9tUfaFybCWeqtTv2DhXQQMjEI+BxCK/QzlfVviTYEsJa4fv6ZF0Jnfis4TJE2aek99bT2/ILNUonghdqLxUEIOn+DZSqiy9llC97nUPNuHlgOuPIBApmSafA9YWmBWGQN7NeKp5Av9lwXpeLPEU9r9CymjoZrIN8pNtkX5vPUg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XVCFVLv7hmmzHZ52YGX9z9OTq2BExmPe+azX4TYaLHE=; b=EphDUh6gycsKkpFC4x89ADOPvKHX6Ej9J+cFjxnE7P6OP1Jcj0Mdehxpu4EWI2g/FTzDnAIVoLCGoPaVBxMCc69MebZpPNxbrdw3cdNk35fmqoQNYByv1QumhDDvjFYAAdTWvsAXAki+cIczFSi8A746dLcBguhL7n8pqgQs+TGqsq+jSUvMUI/w26t/hN8wD/2tCvsARrsI8eaGEWEcgAbneCykf6RBMJO63tqvN4jZjR4Mp1PJKEVo0JFGZGYziGvWPCFPUxdBheZPEo1TkqwkoXPDANcl3ji/+MeycYbPabsE8WCiR9PLUFry3wlW2OS0W0jBfF5RSD8vjlEVQA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XVCFVLv7hmmzHZ52YGX9z9OTq2BExmPe+azX4TYaLHE=; b=EEnIBOF/LCubGR4qDITw3DKbjeAXJVEpEfvKQZOQ54Dgq6M49JkOC8OxOARa7hs0Xo6kqHarcvSCTWYvbxNV6S7aokla6CVxztRdDlLGIRV5K92lA6EGFkcOWv6ebZ5SCtXtPOWzmF+dUuJK1WJwfGZKCxkl6Pt5ATvJ/liHdN0=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by MN2PR11MB4535.namprd11.prod.outlook.com (2603:10b6:208:24e::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.37; Wed, 22 Mar 2023 13:32:45 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::4671:25af:94b6:7d36]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::4671:25af:94b6:7d36%6]) with mapi id 15.20.6178.037; Wed, 22 Mar 2023 13:32:44 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-rfc6991-bis.all@ietf.org" <draft-ietf-netmod-rfc6991-bis.all@ietf.org>, "draft-ietf-6man-rfc6874bis.all@ietf.org" <draft-ietf-6man-rfc6874bis.all@ietf.org>
Thread-Topic: Changes to IPv6 zone definition in draft-ietf-netmod-rfc6991-bis-15
Thread-Index: AdlcquKL5B3Pj8BbQmuY38KtMlE6sw==
Date: Wed, 22 Mar 2023 13:32:44 +0000
Message-ID: <BY5PR11MB41966FD2ECEFB84708C5A325B5869@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|MN2PR11MB4535:EE_
x-ms-office365-filtering-correlation-id: 8895d8b6-e395-44e0-98fb-08db2ad9eb69
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(376002)(39860400002)(396003)(366004)(346002)(136003)(451199018)(38100700002)(66574015)(71200400001)(83380400001)(7696005)(6506007)(55016003)(66946007)(316002)(8676002)(33656002)(110136005)(76116006)(450100002)(8936002)(52536014)(66556008)(5660300002)(41300700001)(64756008)(66476007)(66446008)(478600001)(2906002)(122000001)(86362001)(38070700005)(186003)(9686003)(66899018); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8895d8b6-e395-44e0-98fb-08db2ad9eb69
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2023 13:32:44.8424 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: S9fmjxDJlnEj0pNbrsbXTipkCqK0pvtojT69GUC3tw7DPWspCMHRcU6f+2Xh+7+xDGd/7645zP6/TChObn8sNw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4535
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.232, xfe-rtp-002.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/ci96bks0yLVxBwqe3JYmkSZitLw>
Subject: [netmod] Changes to IPv6 zone definition in draft-ietf-netmod-rfc6991-bis-15
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Mar 2023 13:33:10 -0000

Hi Jürgen, Netmod, & rfc6874bis interested parties,

In my AD review of draft-ietf-netmod-rfc6991-bis-15, Jurgen has proposed a change to definition of the zone-id in the ip-address, ipv4-address, and ipv6-address types.  These changes move the definition somewhat closer to what is in rfc6874bis, but they are still different enough that we don't have wide compatibility.

I think that it may be useful to have a discussion to see if we can find a technical solution that works both for YANG models and that is compatible with being used in URIs.  Hence, I've separated my AD review comments for these two specific issues into this separate thread to try and ensure that interested parties can be involved in the discussion:

(2) In RFC 6991:
     typedef ipv6-address {
       type string {
         pattern '((:|[0-9a-fA-F]{0,4}):)([0-9a-fA-F]{0,4}:){0,5}'
               + '((([0-9a-fA-F]{0,4}:)?(:|[0-9a-fA-F]{0,4}))|'
               + '(((25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])\.){3}'
               + '(25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])))'
               + '(%[\p{N}\p{L}]+)?';

In draft-ietf-netmod-rfc6991-bis-15, p 27, sec 4.  Internet Protocol Suite Types
     typedef ipv6-address {
       type string {
         pattern '((:|[0-9a-fA-F]{0,4}):)([0-9a-fA-F]{0,4}:){0,5}'
               + '((([0-9a-fA-F]{0,4}:)?(:|[0-9a-fA-F]{0,4}))|'
               + '(((25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])\.){3}'
               + '(25[0-5]|2[0-4][0-9]|[01]?[0-9]?[0-9])))'
               + '(%[A-Za-z0-9][A-Za-z0-9\-\._~/]*)?';

I'm not saying that this change is wrong, but this technically looks to be a non-backwards-compatible change (depending on whether interface names could ever use non-ASCII characters).  Where is the set of allowed characters for zone-ids defined?  I couldn't find them in an RFC, RFC 4007 section 11.2 seems to indicate that there is no restriction.  draft-ietf-6man-rfc6874bis, which I'm currently holding a 'discuss' ballot position on, effectively limits the usable character set of zone-ids to the unreserved set in URIs, which seems to match those above except for '/' that is allowed above (and used in many interface names), but not in the URI's unreserved character set.  A further difference is that upper case characters are allowed in this typedef but are not allowed when used in the host part of URIs.

Update - I've now seen the thread 'ipv6-address in RFC 6991 (and bis)', and Jürgen has put together a useful blog post, thanks!

Given that "interface-name" in RFC 8343, and the text in RFC 4007 section 11.2, then arguably the safest thing here would be to allow the zone-id to be unrestricted, i.e., "(%.*)?"  However, this would leave draft-ietf-6man-rfc6874bis as only being able to support a small fraction of interface names as zone-ids in URLs.  The authors of draft-ietf-6man-rfc6874bis seem to indicate that it works for all interface names that currently matter for their use case.

An alternative solution could be to somewhere define the zone-ids in YANG to match the restrictive set in draft-ietf-6man-rfc6874bis (i.e., lower case only, and disallow '/').  I think that this would then require that we recommend a conversion of interface names into draft-ietf-6man-rfc6874bis compatible zone-ids interface-names.  E.g., such a conversion could take the interface name, and change any uppercase characters to lower case, and replace any symbol that isn't in the allowed character set with '_'.  This conversion is effectively one way, and there is a theoretical risk that the converted interface names could collide, but this may be unlikely in practice.  Obviously, this conversation doesn't handle non-ASCII interface names, but I'm not sure how realistic it is that they would be used anyway.

This general comment also applies for the same change for 'ipv4-address'.


(3) draft-ietf-netmod-rfc6991-bis-15, p 28, sec 4.  Internet Protocol Suite Types

         The canonical format of IPv6 addresses uses the textual
         representation defined in Section 4 of RFC 5952.  The
         canonical format for the zone index is the numerical
         format as described in Section 11.2 of RFC 4007.";

Would it make sense to also change the canonical format for the zone index to be interface name (or converted interface name) rather than numeric id (when used in YANG models)?

This comment also applies for the same change for 'ipv4-address'.


Thoughts and comments on these two issues are welcome.

Regards,
Rob