[netmod] Re: WGLC on system-config-05

"Jason Sterne (Nokia)" <jason.sterne@nokia.com> Fri, 10 May 2024 16:29 UTC

Return-Path: <jason.sterne@nokia.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D793CC18DBB4; Fri, 10 May 2024 09:29:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.666
X-Spam-Level:
X-Spam-Status: No, score=-2.666 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PfKVFnQNyGI7; Fri, 10 May 2024 09:29:07 -0700 (PDT)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2078.outbound.protection.outlook.com [40.107.236.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BCFEC1519A9; Fri, 10 May 2024 09:29:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Wlk7Reit23ctP1SblXWBCUrwJ/PNMSs9GQ7OkeaX1uNCgLtnnOEO9wG2x5ZZyPIVfHl5Kw/eJ9HzqXiXkTaKUrBclv40o5KVHpr1D06NibASCQGc04Ew3tHn7XEostiVpoHdv2KjXn7da1i/hZdEJ4L8bX73vICY20wuRMv4B+1ZAyBFM3KR3lDszylQWeUbbV0QIuOLGVeA2mO4tqwxrder2K3CKL64VZxZfGXZzroy+fmcn0rfNsAljhcZqjJmxhxMR77vO+o208SMBWhcvfsAC6T+WYOyO4Bsp2e6oK9fSjSK+wJkApBniIzxhKS3tjR+Kvagh/rXmuh/5qX/VA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5MALNzAOZdkYjCsKtxSeyASV4Lb2BhtfsHMVcFQDV6s=; b=kSgWNsnw3YLtOeDGIiGSxttT0r6jvduZ75PjmGwAymOfM25PFSjiwDGvGZ/ENQZutJfjATqi6I/2GuDrhVQ1W+L0p+LW+bH16PioLMrM64ZLiqloRlpYKVPuW5KYfHjV6Yoe4m66jeCp40sL/yObRH0du3k7ryEWxY/HnAyPzTf6iqeq895byKOb1tBXk0AnPhLenXKxejb/nMg8iLWjvVYLHeKtckYE4SRxfHmySpxtozujS5h5ZvHJgDZX1mXMTFdNZlOntX8/4/KQmJfNGteRzR2/uVdahgpk25KNqNetsdTXwaAYeDQUebFG6j+riWkthX9GEngrJHjdyiO1Sw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5MALNzAOZdkYjCsKtxSeyASV4Lb2BhtfsHMVcFQDV6s=; b=XjDEpiE3FRiQdkBz7YoWGAW7CUMcAlaEphkydqzBwRUbzap97RwzM4xcM/ECJuG/v/mwiIxemdyUr1rMQNYgOPC9qrDqJo7a6qqtxP5NvoWMJXWoPRYiupJj/1rNo9DrP+doOssldrszYPoy9xW5jCKkX4KiusKVoVMKwL25aDsFlspa9duiOpKM1HDAucYus7OZwROgPWpp9cqQQ4UVF51APxhlxbM6mhHIMfHovnCrrF/BPOCq8sgI7uZe6EX3NkO7AoHfeqa+so7p3h248m01WPcaaiTe1jz+rclIxT3rT0I7DgBt/YiSVtXXDZO5nbpGqZLXeqUbdJloMLZBBg==
Received: from SN6PR08MB4847.namprd08.prod.outlook.com (2603:10b6:805:6b::12) by SA1PR08MB7616.namprd08.prod.outlook.com (2603:10b6:806:1f3::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.47; Fri, 10 May 2024 16:28:55 +0000
Received: from SN6PR08MB4847.namprd08.prod.outlook.com ([fe80::9959:84e9:c6c3:7da]) by SN6PR08MB4847.namprd08.prod.outlook.com ([fe80::9959:84e9:c6c3:7da%7]) with mapi id 15.20.7544.046; Fri, 10 May 2024 16:28:55 +0000
From: "Jason Sterne (Nokia)" <jason.sterne@nokia.com>
To: "Rob Wilton (rwilton)" <rwilton=40cisco.com@dmarc.ietf.org>, Kent Watsen <kent+ietf@watsen.net>, "netmod@ietf.org" <netmod@ietf.org>, "draft-ietf-netmod-system-config@ietf.org" <draft-ietf-netmod-system-config@ietf.org>
Thread-Topic: [netmod] Re: WGLC on system-config-05
Thread-Index: AQHaohhU7eR1shoyaEmnxWUhiibkwLGQpSXA
Date: Fri, 10 May 2024 16:28:55 +0000
Message-ID: <SN6PR08MB48474309B94BBCA17F3CA46A9BE72@SN6PR08MB4847.namprd08.prod.outlook.com>
References: <LV8PR11MB853674511A0F69E3CF760736B5E62@LV8PR11MB8536.namprd11.prod.outlook.com>
In-Reply-To: <LV8PR11MB853674511A0F69E3CF760736B5E62@LV8PR11MB8536.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nokia.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SN6PR08MB4847:EE_|SA1PR08MB7616:EE_
x-ms-office365-filtering-correlation-id: 5d33b131-ea4c-4986-1541-08dc710e495e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|1800799015|376005|366007|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN6PR08MB4847.namprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(376005)(366007)(38070700009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SN6PR08MB48474309B94BBCA17F3CA46A9BE72SN6PR08MB4847namp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR08MB4847.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d33b131-ea4c-4986-1541-08dc710e495e
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2024 16:28:55.3711 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +yNEoH9EuOPBUi3z6KgjJAToA4iN/znZQMbl4uomLuX+EiUqtigxYPKkorQsTPHJW6P0rSF7c+VQicOyak61Lg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR08MB7616
Message-ID-Hash: 5XVHLDWGXMWR67K37CRQ72P6S3QIUKVR
X-Message-ID-Hash: 5XVHLDWGXMWR67K37CRQ72P6S3QIUKVR
X-MailFrom: jason.sterne@nokia.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-netmod.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [netmod] Re: WGLC on system-config-05
List-Id: NETMOD WG list <netmod.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/pg_Uhayzvmymi8WTALefZewGDq4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Owner: <mailto:netmod-owner@ietf.org>
List-Post: <mailto:netmod@ietf.org>
List-Subscribe: <mailto:netmod-join@ietf.org>
List-Unsubscribe: <mailto:netmod-leave@ietf.org>

Please see inline for comments on the "moderate level comments".  I'll try to reply later with more feedback on further items below.
Jason

From: Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org>
Sent: Thursday, May 9, 2024 9:55 AM
To: Kent Watsen <kent+ietf@watsen.net>; netmod@ietf.org; draft-ietf-netmod-system-config@ietf.org
Subject: [netmod] Re: WGLC on system-config-05


CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext for additional information.



[Resending due to mailer issues.]



Hi authors, chairs, WG,

I'm generally supportive of this work, but I think that there are still some potential corner cases that are not covered, or it isn't entirely obvious how they are handled.

Comments below.





Moderate level comments:



(1) p 7, sec 2.3.  Inactive-Until-Referenced



   There are some system configuration predefined (e.g., application

   ids, anti-x signatures, trust anchor certs, etc.) as a convenience

   for the clients, which must be referenced to be active.  The clients

   can also define their own configurations for their unique

   requirements.  Inactive-until-referenced system configuration is

   generated in <system> immediately when the device is powered on, but

   it is not active until being referenced.



I'm not sure whether Inactive-Until-Referenced actually needs to be defined, or to put it another way, I'm not sure whether this type of configuration is special to system datastores at all.  If a configuration (either explicitly in <running> or implicitly from <system>) defines a QoS policy that is not referenced from anywhere, (e.g., not applied to any interfaces) then I think that it up to the server to decide whether that unreferenced QoS policy is reported in operational or not, depending on server implementation.

[>>JTS:] I agree. I think section 2 may be mixing up two concepts:

  1.  Data dynamically being populated/removed from the system datastore, and
  2.  For data that is in the system datastore, whether it is "active" and present in the operational datastore



For #2 I don't think there should be anything special. We could say something like: As with the running datastore, data present in the system datastore may or may not be present in the operational datastore depending on whether it is considered as active configuration or not by the server.



For #1 there is a bit of repeat with section 4.2. We should probably just talk about system config coming and going (and changing) in one place.



We'd have to update other parts of the doc (e.g. 5.1) where these 3 types of data are mentioned.





(2) p 9, sec 5.1.  Conceptual Model of Datastores



   When the device is powered on, immediately-active system

   configuration is generated in <system> and active immediately, but

   inactive-until-referenced system configuration only becomes active if

   referenced by client-defined configuration.  However, conditionally-

   active system configuration will only be created and active when

   specific conditions on system resources are met.



I think that it should be "merged with system" not "merged into system" since the running configuration never ends up in the system datastore.

[>>JTS:] Yes. Jan mentioned the same.





(3) p 9, sec 5.1.  Conceptual Model of Datastores



                  additional nodes to a list entry or new list/leaf-

   list entries appearing in <running> extends the list entry or the

   whole list/leaf-list defined in <system> if the server allows the

   list/leaf-list to be updated.



How is this achieved?  This appears to suggest that there are two different merging behaviours (one choice is to be additive, the other is to replace), and it seems to be down to the server to choose what to do on a case-by-case basis.  I think that it would be cleaner to define a single merge behaviour if that is feasible (even if it is slightly less flexible).  Also, potentially it is appropriate for the merge behaviour to be different for list vs leaf-list (e.g., always merge list entries, but do a simple replace on leaf-lists).

[>>JTS:] I think part of the complication is that we want to allow the possibility that there is a list that contains entries in <system>, and it is a completely non-modifiable list (no new entries allowed). I think maybe that's what the "if the server allows" part is about.

I agree though that it should be a merge for lists (and the server can just error if that merge makes the list invalid, i.e. no additional entries allowed on top of what's in system).

For leaf-lists that a tough one (merge vs replace). I'm not sure what to do there (and can imagine use cases for both merge and replace).





(4) p 9, sec 5.1.  Conceptual Model of Datastores



                                      If a server implements

   <intended>, <system> MUST be merged into <intended>.



This sentence is just repetition and can be deleted.  The text above is still normative without the RFC 2119 MUST.





(5) p 13, sec 5.4.  Modifying (Overriding) System Configuration



   For instance, descendant nodes in a system-defined list entry may be

   modifiable or not, even if some system configuration has been copied

   into <running> earlier.  If a system node is non-modifiable, then

   writing a different value for that node MUST return an error.  The

   immutability of system configuration is defined in

   [I-D.ma-netmod-immutable-flag].



I think that some care is needed here.  E.g., if the modification was being done to <candidate>, then it isn't writing a different value to <candidate> that would return an error, but instead the <validate> or <commit> operation that would fail.

[>>JTS:] Agree. Maybe we can just add this?

If a system node is non-modifiable, then writing a different value for that node MUST return an error during a validate or commit operation.





(6) p 13, sec 5.4.  Modifying (Overriding) System Configuration



   A server may also allow a client to add data nodes to a list entry in

   <system> by writing those additional nodes in <running>.  Those

   additional data nodes may not exist in <system> (i.e., an *addition*

   rather than an override).



Earlier, the text in 5.1 seems to suggest that a list-entry could be overwritten.  Is the intention that this is always a merge?  I.e., it is possible to override entries, but there is no way that running can remove a list entry that is defined in <system>.

[>>JTS:] I don't think there is a way to remove an entry in <system>.  You can configure the *same* entry (key) in <running>, and then potentially modify child nodes if the entry is modifiable.



This section, 5.4., seems somewhat of a repeat of what is specified in section 5.1, and arguably it would be nice if this text could be co-located and only specified once (for brevity and to avoid ambiguity).  I'm wondering if the merge behaviour generally needs to be specified more explicitly.







Minor level comments:



(7) p 0, sec



   This document defines how a management client and server handle YANG-

   modeled configuration data that is defined by the server itself.  The

   system-defined configuration can be referenced (e.g. leafref) by

   configuration explicitly created by a client.



Perhaps 'instantiated' by the server itself rather than 'defined' by the server.





(8) p 0, sec



   The Network Management Datastore Architecture (NMDA) defined in RFC

   8342 is updated with a read-only conventional configuration datastore

   called "system" to hold system-defined configuration.



Perhaps 'expose system-defined configuration' to clients rather than 'hold'.





(9) p 0, sec



   As an alternative to clients explicitly copying referenced system-

   defined configuration into the target configuration datastore (e.g.,

   <running>) so that the datastore is valid, a "resolve-system"

   parameter is defined to allow the server acting as a "system client"

   to copy referenced system nodes automatically.  This solution enables

   clients manipulating the target configuration datastore (e.g.,

   <running>) to reference nodes defined in <system>, override system-

   provided values, and configure descendant nodes of system-defined

   configuration.



I think that this paragraph is too detailed to be in the abstract and should be removed from the abstract.





(10) p 4, sec 1.1.  Terminology



   The following terms are defined in this document:

   System configuration:  Configuration that is provided by the system

      itself.  System configuration is present in the system

      configuration datastore (regardless of whether it is applied or

      referenced) and appears in <intended> unless explicitly

      overridden.  System configuration that is considered active

      appears in <operational> with origin="system".  It is a different

      and separate concept from factory default configuration defined in

      RFC 8808 (which represents a preset initial configuration that is

      used to initialize the configuration of a server).



RFC 8808 should turn into a proper reference, it looks like it is just text here.





(11) p 5, sec 1.4.  Updates to RFC 6241 and RFC 8526



   This document defines a NETCONF protocol capability to indicate

   support for this parameter.  NETCONF server that supports "resolve-

   system" parameter MUST advertise the following capability identifier:



Are we ambiguous as to whether this must be supported, or is optional to implement?  Ah, I see that this is specified later in the document (which is arguably the right place).  Is the capability really an update to RFC 6241 and 8526?  I wonder whether this last paragraph (i.e., the capability definition) would be better under section 5.3.





(12) p 5, sec 1.5.  Updates to RFC 8040



   This document extends Sections 4.8 and 9.1.1 of [RFC8040] to add a

   new query parameter "resolve-system" and corresponding query

   parameter capability URI.



Again, I think that possibly sections 1.5.1 and 1.5.2 would be better outside of the introduction, perhaps as subsections of 5.3.  Then section 1.5, could then forward reference to those sections.





(13) p 6, sec 2.  Kinds of System Configuration



   Active system configuration refers to system configuration that is

   currently in use.  As per definition of the operational state

   datastore in [RFC8342], if system configuration is inactive, it does

   not appear in <operational>.  However, system configuration is

   present in <system> once it is generated, regardless of whether it is

   active or not.



I'm not sure that calling this "active configuration" is a great choice, because it seems to be a slightly different concept to inactive configuration defined in RFC 8342.  Specifically, I thought that the inactive configuration in RFC 8342 controlled whether or not it would appear in <intended>, but in this case, presumably it always turns up in <intended> if it is in <system> and instead doesn't appear in <operational>?







(15) p 7, sec 3.  The System Configuration Datastore (<system>)



   *  Management operations: The content of the datastore is set by the

      server in an implementation dependent manner.  The content can not

      be changed by management operations via protocols such as NETCONF,

      RESTCONF, but may change itself by license change, device upgrade

      and/or system-controlled resources change.  The datastore can be

      read using the standard network management protocols such as

      NETCONF and RESCTCONF.



Rather than saying that the contents can change itself, I think that it would be better to say that the server may change the contents under various conditions, such as ...





(16) p 7, sec 3.  The System Configuration Datastore (<system>)



   *  Origin: This document does not define any new origin identity when

      it interacts with <intended> and flows into <operational>.  The

      "system" origin Metadata Annotation [RFC7952] is used to indicate

      the origin of a data item is system, which is achieved by updating

      the definition of "intended" origin metadata annotation in

      [RFC8342].



If a different value is configured in <running> that overrides a value in <system> then it is clear that the origin should be <intended>.  Do we specify what the origin should be if the same value exists in both <running> and <system> (which could be a very common occurrence if resolve-system is used)?





(17) p 8, sec 3.  The System Configuration Datastore (<system>)



   The system datastore is defined as a conventional configuration

   datastore and shares a common datastore schema with other

   conventional datastores.



This paragraph should probably move up to "YANG modules".





(18) p 8, sec 4.2.  May Change via Software Upgrades or Resource Changes



   *  Servers rejects the operation to change system configuration

      (e.g., device upgrade fails) and needs the client to correct the

      configuration in <running> as a prerequisite to ensure validity



Should we add a recommendation for servers to document how they handle these issues?





(19) p 10, sec 5.1.  Conceptual Model of Datastores



    ct = config true; cf = config false

    rw = read-write; ro = read-only

    boxes denote named datastores



In this diagram, (1) please move the system box 1 line to the left to keep is more cleanly separate from the arrow into running.  (2) I think that we should discuss whether the running and system arrows should merge at a common point rather than running flowing into the side.





(20) p 10, sec 5.1.  Conceptual Model of Datastores



    ct = config true; cf = config false

    rw = read-write; ro = read-only

    boxes denote named datastores



I know that it isn't directly related to this work, but I wonder whether the "default configuration" arrow is really in the right place, and whether that shouldn't also be feeding this arrow into <intended>, since validation would surely take default values into account.  But this is perhaps a question for another day ...





(21) p 11, sec 5.1.  Conceptual Model of Datastores



   Any deletable system-provided configuration that is populated as part

   of <running> by the system at boot up, without being part of the

   contents of a <startup> datastore, must be defined in <factory-

   default> [RFC8808], which is used to initialize <running> when the

   device is first-time powered on or reset to its factory default

   condition.



I agree with the sentiment of what is written here, but I'm not sure that it is wise to restate it in this document, or whether it would be better to delete this paragraph and just reference RFC 8808.



E.g., maybe something like ..

<factory-default> [RFC8808] defines a mechanism for populating <running> at system boot up with regular configuration data nodes, that hence can be deleted.





(22) p 12, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   The "resolve-system" parameter is optional and has no value.  If it

   is present, and the server supports this capability, the server MUST

   copy referenced system nodes into the target datastore (e.g.,

   <running>) without the client doing the copy/paste explicitly, to

   resolve any references not resolved by the client.  The server acting

   as a "system client" like any other remote clients copies the

   referenced system-defined nodes when triggered by the "resolve-

   system" parameter.  Legacy clients interacting with servers that

   support this parameter don't see any changes in <edit- config>/<edit-

   data> and <copy-config> behaviors.



How does resolve-system interplay with the candidate configuration datastore?  E.g., should it also be listed in the examples of datastores.  What about the <validate> or <commit> operations?  Is there any impact of private-candidate datastores, and if so, where should that be documented?





(23) p 12, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   The server's copy referenced nodes from <system> to the target

   datastore MUST be enforced at the end of the <edit-config>/<edit-

   data> or <copy-config> operations during the validation processing,

   regardless of which target datastore it is.



This probably means that it isn't a separate "system client" because I would expect that to turn in the commit history as a separate commit, but instead, the update to running via resolve-system is exactly the same as if the client had made the modification directly as part of an edit-data (or similar) operation.





(24) p 13, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   If the "resolve-system" parameter is not given by the client, the

   server should not modify <running> in any way otherwise not specified

   by the client.  Not using capitalized "SHOULD NOT" in the previous

   sentence is intentional.  The intention is to bring awareness to the

   general need to not surprise clients with unexpected changes.  It is

   desirable for clients to always opt into using mechanisms having

   server-side changes.  This document enables a client to opt into this

   behavior using the "resolve-system" parameter.  An example of this

   type of opt-in behavior can also be found in RFC 7317, which enables

   a client to opt into its behavior using a "$0$" prefix (see

   ianach:crypt-hash type defined in [RFC7317]).



Arguably, I don't think that above paragraph is needed at all and can just be removed.  Otherwise, you could argue that it perhaps conflicts with the text in 4.2?





(25) p 13, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   Implementation specifics are beyond the scope of this document,

   however, due to the extra complexity brought by the "resolve-system"

   parameter, clients should be aware that it would cost a reasonable

   amount of time for the server to resolve reference, retrieve and copy

   the referenced system configuration from <system>, which could take

   multiple rounds since some errors may depend on the resolution of

   previous ones.



Suggest changing "it would cost" to "it may take".  But I'm also not really sure that this paragraph should be in the document (e.g., what is a reasonable amount of time?  Is it 1 second, or a minute, or a few minutes).





(26) p 24, sec 6.2.  Example Usage



   The local port and remote port are used when the BGP peer connection

   is established.  Since both are not supplied explicitly in <running>

   and <intended>, the default value for "bgp/peer/remote-port" is used,

   and there is no default statement for "bgp/peer/local-port", the

   system will select a value for it.  So the contents of <system> are

   shown as follows:



There is some level of interplay here between YANG default values and the information present in system.  E.g., depending on how the YANG data model is written (i.e., sometimes complex default values are specifying in description statements rather than as formal YANG defaults), then the choice as to whether to report a value in system vs a default value in the configuration may be a bit ambiguous.  E.g., this example of using the local-port as an example of system configuration potentially feels like the weakest of the alternative justifications that have been provided.





(27) p 29, sec 7.3.  YANG Module



         description

           "When present, the server is allowed to automatically

            configure referenced system configuration into the

            target configuration datastore.";



Should this be "is allowed to automatically configure", or should it be "must automatically configure"?





(28) p 31, sec 9.2.  Regarding the "ietf-netconf-resolve-system" YANG Module



   The security considerations for the base NETCONF protocol operations

   (see Section 9 of [RFC6241] apply to the new extended RPC operations

   defined in this document.



Possibly, this section should say a bit more about the security impacts of supporting the resolve-system option, i.e., that there aren't any beyond the potential performance impacts of implementing resolve-system, which may mean that employing some form of rate limiting of requests specifying this option might be a good idea to avoid DoS attacks.





(29) p 35, sec Appendix A.  Key Use Cases



A.1.  Device Powers On



Please provide a short prose description of what the example illustrates.





(30) p 35, sec Appendix A.  Key Use Cases



   <running>:



Please expand these, e.g.  The <running> datastore contains:





(31) p 35, sec Appendix A.  Key Use Cases



   <system>:



Please expand these, e.g.  The <system> datastore contains:





(32) p 35, sec Appendix A.  Key Use Cases



   <intended>:



Please expand these, e.g.  After merging,the <intended> datastore contains:





(33) p 35, sec Appendix A.  Key Use Cases



   <operational>:



Please expand these, e.g.  Once the configuration is applied, the <operational> datastore contains:





(34) p 36, sec Appendix A.  Key Use Cases



   <running>:



Please expand these simiarly to above for the other examples, A.2 and A.3.





(35) p 36, sec Appendix A.  Key Use Cases



   <interfaces xmlns:or="urn:ietf:params:xml:ns:yang:ietf-origin"

               or:origin="or:intended">



As per a previous comment, I wonder whether the origin of the 'interfaces' container itself should be 'intended' or 'system' (given than loopback always exists and hence it can never be removed).





(36) p 37, sec Appendix A.  Key Use Cases



     <interface or:origin="or:system">

       <name>lo0</name>

       <ip-address>127.0.0.1</ip-address>

       <ip-address>::1</ip-address>

     </interface>

   </interfaces>

A.3.  Operator Installs Card into a Chassis



Please provide a short prose description of what the example illustrates.







Nit level comments:



(37) p 5, sec 1.3.  Updates to RFC 8342



   Configuration in <running> is merged into <system> to create the

   contents of <intended> after the configuration transformations to

   <running> (e.g., template expansion, removal of inactive

   configuration defined in [RFC8342]) have been performed.  This

   document updates the definition of "intended" origin metadata

   annotation identity to allow a subset of configuration provided by

   <intended> to use "system" as origin value as it flows into

   <operational>.  Applied system configuration appears in <operational>

   with origin value being reported as "system" (Section 5.1).



I think that "<running> is merged into <system>" is confusing.  I would say that <running> is merged with the contents of <system> and how that merge is performed must be specified.





(38) p 8, sec 3.  The System Configuration Datastore (<system>)



   *  Defining YANG module: "ietf-system-datastore".

   The datastore's content is defined by the server and read-only to

   clients.  Upon the content is created or changed, it will be merged

   into <intended>.  Unlike <factory-default> [RFC8808], it MAY change

   dynamically, e.g., depending on factors like license change, device

   upgrade or system-controlled resources change (e.g., HW available).

   The system configuration datastore doesn't persist across reboots;

   <factory-reset> RPC operation defined in [RFC8808] can reset it to

   its factory default configuration without including configuration

   generated due to the system update or client-enabled functionality.



Upon the content => When the content.  Some of the content here seems to repeat the text in "Management operations", I think the examples would be better in only a single place.





(39) p 8, sec 4.2.  May Change via Software Upgrades or Resource Changes



   If system configuration changes (e.g., due to device upgrade),

   <running> MAY become invalid.  The server behaviors of migrating

   updated system data into <running> is beyond the scope of this

   document.  That said, the following gives a list of examples of

   server implementations that might be possible:



Suggest rewording to: "That said, here are some examples of how a server might handle this scenario:"





(40) p 9, sec 4.3.  No Impact to <operational>



   This work intends to have no impact to <operational>.  System

   configuration appears in <operational> with origin value being

   reported as "system" if not configured or overridden explicitly in

   <running>.  This document enables a subset of those system generated

   nodes to be defined like configuration, i.e., made visible to clients

   in order for being referenced or configurable prior to present in

   <operational>.  "Config false" nodes are out of scope, hence existing

   "config false" nodes are not impacted by this work.



As per above, does "Overridden explicitly" mean "has a different value" in running?





(41) p 12, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   Note that even an auto-configured node is allowed to be deleted from

   the target datastore by the client, the system may automatically

   configure the deleted node again to make configuration valid, when a

   "resolve-system" parameter is carried.  It is also possible that the

   operation request (e.g., <edit-config>) may not succeed due to

   incomplete referential integrity.



Perhaps "recreate the deleted node" rather than "configure the deleted node".





(42) p 12, sec 5.3.  Servers Auto-configuring Referenced System Configuration

      ("resolve-system" parameter)



   Support for the "resolve-system" parameter is OPTIONAL.  Servers not

   supporting NMDA [RFC8342] MAY also implement this parameter without

   implementing the system configuration datastore, which would only

   eliminate the ability to expose the system configuration via protocol

   operations.  If a server implements <system>, referenced system

   configuration is copied from <system> into the target datastore

   (e.g., <running>) when the "resolve-system" parameter is used;

   otherwise it is an implementation decision where to copy referenced

   system configuration into the target datastore (e.g., <running>).



Perhaps 'examine' rather than 'expose'.





(43) p 21, sec 5.5.3.  Modifying a System-instantiated Leaf's Value



   <interfaces xmlns="urn:example:interface">

     <interface>

       <name>lo0</name>

       <mtu>65536</mtu>

       <ip-address>127.0.0.1</ip-address>

       <ip-address>::1</ip-address>

     </interface>

   </interfaces>

   A client modifies the value of MTU to 65535 and adds the following

   configuration into <running>:



I initially hadn't spotted the subtle change, perhaps use an MTU value that is more obviosuly different from the value in system.  E.g., perhaps 9216.



Regards,

Rob




From: netmod <netmod-bounces@ietf.org<mailto:netmod-bounces@ietf.org>> on behalf of Kent Watsen <kent+ietf@watsen.net<mailto:kent+ietf@watsen.net>>
Date: Friday, 29 March 2024 at 14:09
To: netmod@ietf.org<mailto:netmod@ietf.org> <netmod@ietf.org<mailto:netmod@ietf.org>>
Subject: [netmod] WGLC on system-config-05
This email begins a two-week WGLC on:
System-defined Configuration
https://datatracker.ietf.org/doc/draft-ietf-netmod-system-config/

Please take time to review this draft and post comments by April 12.  Favorable comments are especially welcomed.
There is no known IPR for this document:
https://mailarchive.ietf.org/arch/msg/netmod/IpzWIAbgifXoKaNfLhEDmYbyXkY/
Kent  // co-chair