Re: [netmod] True for NETCONF/YANG as well (was: RE: [Isms] [OPS-AREA] status and future of the isms working group)

Jon Saperia <saperia@jdscons.com> Tue, 05 October 2010 15:29 UTC

Return-Path: <saperia@jdscons.com>
X-Original-To: netmod@core3.amsl.com
Delivered-To: netmod@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6C71C3A6C96 for <netmod@core3.amsl.com>; Tue, 5 Oct 2010 08:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.413
X-Spam-Level:
X-Spam-Status: No, score=-2.413 tagged_above=-999 required=5 tests=[AWL=0.185, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z3N-YeSNl2ta for <netmod@core3.amsl.com>; Tue, 5 Oct 2010 08:29:40 -0700 (PDT)
Received: from rs69.luxsci.com (rs69.luxsci.com [64.49.254.154]) by core3.amsl.com (Postfix) with ESMTP id 2F8FD3A6AD2 for <netmod@ietf.org>; Tue, 5 Oct 2010 08:29:40 -0700 (PDT)
Received: from [10.0.1.2] (c-98-229-133-101.hsd1.ma.comcast.net [98.229.133.101]) (authenticated bits=0) by rs69.luxsci.com (8.13.8/8.13.8) with ESMTP id o95FUWke022977 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Tue, 5 Oct 2010 10:30:33 -0500
Mime-Version: 1.0 (Apple Message framework v1081)
Content-Type: multipart/alternative; boundary="Apple-Mail-168-895271102"
From: Jon Saperia <saperia@jdscons.com>
In-Reply-To: <D6.CC.05246.E924BAC4@cm-omr4>
Date: Tue, 05 Oct 2010 11:30:32 -0400
Message-Id: <BD37664F-0EBD-4E5F-9960-B4415EC39FAC@jdscons.com>
References: <D6.CC.05246.E924BAC4@cm-omr4>
To: Andy Bierman <ietf@andybierman.com>
X-Mailer: Apple Mail (2.1081)
Cc: netmod@ietf.org
Subject: Re: [netmod] True for NETCONF/YANG as well (was: RE: [Isms] [OPS-AREA] status and future of the isms working group)
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Oct 2010 15:29:42 -0000

Yes.

Many objects that are used in SNMP today were developed outside of the SNMP WG.  The larger community now has to look at the body of work completed in NETCONF/YANG and see how they might want to define standard configuration objects for their respective areas.


/jon


On Oct 5, 2010, at 11:22 AM, Andy Bierman wrote:

> It is going to require domain-specific WG efforts, not more netmod work.
> 
> Andy
> 
> ----- Reply message -----
> From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
> Date: Tue, Oct 5, 2010 02:22
> Subject: [netmod] True for NETCONF/YANG as well (was: RE: [Isms] [OPS-AREA]	status and future of the isms working group)
> To: "Jon Saperia" <saperia@jdscons.com>, "Randy Presuhn" <randy_presuhn@mindspring.com>
> Cc: <netmod@ietf.org>
> 
> 
> I cannot agree more as well to:  
> 
> >  What we need 
> > are widely implemented objects (however you want to call the 
> > structures) that give real visibility into what is going on 
> > in the devices and networks.
> 
> And I am copying the netmod list on purpose because I hold the opinion
> that this statement made in the SNMP / ISMS context is true for the
> current state of the NETCONF and YANG evolution as well. 
> 
> I hope that the rechartering of the NETMOD WG will be soon approved as a
> step in this direction. 
> 
> Dan
> 
> 
> 
> > -----Original Message-----
> > From: isms-bounces@ietf.org [mailto:isms-bounces@ietf.org] On 
> > Behalf Of Jon Saperia
> > Sent: Monday, September 20, 2010 7:44 PM
> > To: Randy Presuhn
> > Cc: isms@ietf.org; ops-area@ietf.org
> > Subject: Re: [Isms] [OPS-AREA] status and future of the isms 
> > working group
> > 
> > I could not agree more. 
> > 
> > I would add  that additional protocol/architecture/framework 
> > on any of the management infrastructures we have does not 
> > address the key point I took from Randy's post.  What we need 
> > are widely implemented objects (however you want to call the 
> > structures) that give real visibility into what is going on 
> > in the devices and networks.  That has always been the 
> > problem and until we address that who cares how we transport 
> > the data. I would settle for RFC2549, if it contained the 
> > right information.
> > 
> > /jon
> > On Sep 20, 2010, at 1:04 PM, Randy Presuhn wrote:
> > 
> > > Hi -
> > > 
> > >> From: "t.petch" <ietfc@btconnect.com>
> > > ...
> > >> I think that our resources are limited, and tend to decay with the 
> > >> age of a working group, so I would rather see them applied 
> > elsewhere.  
> > >> I look back at the effort that went into RFC3411, over many years, 
> > >> and yet it fell at the first hurdle, not accommodating the move of 
> > >> security from deep inside the engine to off the bottom of 
> > the radar; why should we do any better this time?
> > > ...
> > > 
> > > The problem as I see it was that RFC3411 was intended to be 
> > the glue 
> > > describing how a particular set of specifications fit 
> > together, *not* 
> > > as
> > > *the* architecture for all future SNMP work.  *Requiring* 
> > extensions, 
> > > additions, and embellishments to adhere to that 
> > architecture is in my 
> > > opinion a huge mistake.  From my perspective, the real problem 
> > > addressed by RFC 3411 was that some of the preceding proposals for 
> > > securing SNMP had so many convolutions and interactions 
> > that a lot of 
> > > folks had trouble wrapping their heads around them.  The modularity 
> > > brought by RFC 3411 was modularity of *specification*, not 
> > necessarily 
> > > implementation.  The ASIs were rather controversial because 
> > folks were 
> > > (rightly, in retrospect) concerned that they would be 
> > understood in a 
> > > prescriptive sense, rather than descriptive sense in which 
> > they were 
> > > intended.
> > > 
> > > More importantly, I think focusing energy on this "problem" 
> > (which is 
> > > tempting because it's something we think we understand) would be a 
> > > huge distraction from the *real* problem: the kinds of information 
> > > models this infrastructure should provide access to.  If the 
> > > information models can't support the high-value functions 
> > > administrators / operators need, then embellishing the 
> > protocol engine architecture is a waste of time.
> > > 
> > > Randy
> > > 
> > > _______________________________________________
> > > OPS-AREA mailing list
> > > OPS-AREA@ietf.org
> > > https://www.ietf.org/mailman/listinfo/ops-area
> > > 
> > 
> > _______________________________________________
> > Isms mailing list
> > Isms@ietf.org
> > https://www.ietf.org/mailman/listinfo/isms
> > 
> _______________________________________________
> netmod mailing list
> netmod@ietf.org
> https://www.ietf.org/mailman/listinfo/netmod
> 
> 
>