Re: [netmod] [Lsr] I-D Action: draft-ietf-lsr-ospfv3-extended-lsa-yang-10.txt

"Rob Wilton (rwilton)" <rwilton@cisco.com> Wed, 20 April 2022 13:18 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F3D13A1593; Wed, 20 Apr 2022 06:18:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.595
X-Spam-Level:
X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Ca6Yp+NR; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=aqsaLnG0
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5wu5rndUPpXK; Wed, 20 Apr 2022 06:18:46 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4ABE3A1590; Wed, 20 Apr 2022 06:18:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=33064; q=dns/txt; s=iport; t=1650460725; x=1651670325; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=0JssI1AguPr5Tc8I3qpJ5xjzRW6c8sam7xfa4kQZH6E=; b=Ca6Yp+NRNfJgC/Xg9oi8wXLDPrr47zHZSJl/fdBOr+wAAQhliG95Ly5l VGfX2iy3MMGgnVlHROlshJF/9Wlyg5jkqrWLAHvph/haT6eAyyijvTVtH 99K+AYClHChtU4EZgmzuFogI+4mWIJOrjZ3r0bsTIMXZneUs0ovY+aZAZ E=;
X-IPAS-Result: A0AJAQCfB2BimIoNJK1QCg4QAQELEgxAgUsLgSExKC58Alg5Q4geA4U5hQ9dgiUDmz2BLoElA08FCwEBAQ0BASwBCgwEAQGEPkUChQcCJTQJDgECBAEBAQEDAgMBAQEBAQEDAQEFAQEBAgEHBBQBAQEBAQEBAQkUBwYMBQ4QJ4VoDYZCAQEBAQIBAQEQGxMBASwMBAcEAgEIEQQBASEBBgcnCxQJCAIEARIIGoJjAYIOVwMNJAEOoA8BgT4Cih94gTOBAYIIAQEGBASFCxiCOAMGgT2DEYQnhx8nHIFJRIEVQ4JnPoJjAQECgTEVGisJg1eCLpshChBhARRTMhEQIi4LKhMtFSkTJ6AQQqA4CoNJl1iISRWoU5ZeIKFbhHICBAIEBQIOAQEGgWGCFXAVO4JpURkPjiAZg1mFFIUFRXUCNgIGCwEBAwmRPwEB
IronPort-PHdr: A9a23:DWghIBGvknWiV6A2+hX9vp1GfiYY04WdBeZdwpYkircbdKOl8tyiO UHE/vxigRfPWpmT8PNLjefa8sWCEWwN6JqMqjYOJZpLURJWhcAfhQd1BsmDBAXyJ+LraCpvG sNEWRdl8ni3PFITFtz5YgjZo2a56ngZHRCsXTc=
IronPort-Data: A9a23:KA0vwa1Mqseqrw3Y6fbD5eVxkn2cJEfYwER7XKvMYLTBsI5bpzEBn GEaWWrTa/zeNGHzedAlaonk9hhXvJHSn95jSAI63Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+cUsxNbVU8En151Ug7w7dRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMa7/4SNOAwW2hrsgqDj91vm O0cvMLpcFJ8VkHMsLx1vxhwGiV6O+hN/6XKZCX5us2IxEqAeHzpqxlsJBhpZstDpKAuWicXr qxwxDMlNnhvg8qs37O/Vu5qrs8iN8LseogYvxmMyBmJUa52EcqcE/WiCdlw9jlgj55zAKjnY PE4TGphMB7fICNdAwJCYH45tL742iagG9FCk3qTqLYy5GT7zQFt3v7qKtW9UtiRX+1Uk1qW4 GXc8AzRGBgcOM2o0SCI6W+sgMfGmT7+XoNUD6Gx8PBtmlHVy2AOYCD6TnOypf2/z0W5Qd8ad gof+zElqu4580nDosTBswOQnSatvgQwafVsKtIw+AyTmpKF6ljAPz1RJtJeU+AOuMgzTD0s8 1aGmdL1GDBi2IF5r1rAqN94ShvvZUAowX8+iTwsFlBcuoa9yG0npleeEIg8QffdYsjdQ2mY/ tyckMQpa1z/Z+Yi06G2+zgraBrz+8CQFWbZCugrN19JAytwYIqjIoev81WesLBLLZ2SSR+Ku 31sdymiAAImUM/leM+lGbhl8FSVCxCta2C0bblHRMVJythV0yT/Fb28GRknTKuTDu4KeCXyf GjYsh5L6ZlYMROCNPEqO97pUpV3lfK6S7wJs8w4iPITPfCdkyfao0lTibK4gwgBbWB1y/hkY MfHGSpSJS9GVvgPIMWKqxc1iO93mX9WKZL7TpHgxBPvyquFeHOQUt843KimMIgEAFe/iFyNq b53bpLSoz0GCbGWSnSHoOY7cAFRRVBmVM+eg5IMLIarfFE5cFzN/teMm9vNjaQ/wfQM/goJl 1ngMnJlJK3X3CSZclTbNio+MNsCn/9X9BoGAMDlBn7ws1BLXGplxPl3m0cfFVX/yNFe8A==
IronPort-HdrOrdr: A9a23:9+0OPavmrYWrHcUrIOayzHMS7skCy4Mji2hC6mlwRA09TyXGra 6TdaUguiMc1gx8ZJh5o6H8BEDyewKhyXcV2/hdAV7GZmjbUQSTXfhfBOfZsl/d8mjFh5RgPM RbAuRD4b/LfCBHZK/BiWHSebtBsbq6GeKT9JzjJhxWPGVXgtRbnmFE43GgYypLrWd9dP8EPa vZwvACiyureHwRYMj+LGICRfL/q9rCk4+jSQIaBjY8gTP+wg+A2frfKVy1zx0eWzRAzfMJ6m 7eiTH04a2lrrWS1gLc7WnO9J5b8eGRhOerRfb8y/T9GA+cyTpAV74RGYFqewpF5d1H3Wxa0O UkZS1Qe/ibpUmhOV1d6iGdpDUImAxelUMKj2Xox0cKZafCNWoH4w0rv/MBTvKR0TtQgPhslK 1MxG6XrJxREFfJmzn8/cHBU1VwmlOzumdKq59as5Vza/ppVFZql/1XwKqVKuZ0IAvqrIQ8VO V+BsDV4/hbNVuccnDCp2FqhNihRG46EBuKSlUL/pX96UkdoFlpi08DgMAPlHYJ85wwD5FC+u TfK6xt0LVDVNUfY65xDPoIBcG3FmvOSxTRN3/6GyWtKIgXf3bW75Ln6rQ84++nPJQO0ZspgZ zEFEhVsGYjEniefvFmHKc7hiwlbF/NLggFkPsul6SRkoeMNobWDQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,275,1643673600"; d="scan'208,217";a="840882788"
Received: from alln-core-5.cisco.com ([173.36.13.138]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Apr 2022 13:18:43 +0000
Received: from mail.cisco.com (xfe-aln-002.cisco.com [173.37.135.122]) by alln-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 23KDIgL9015096 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 20 Apr 2022 13:18:43 GMT
Received: from xfe-aln-002.cisco.com (173.37.135.122) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Wed, 20 Apr 2022 08:18:06 -0500
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-002.cisco.com (173.37.135.122) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Wed, 20 Apr 2022 08:18:06 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A1MXi+IFZLfh9rQ2K6rUkZyMm854LQyEiQ8csM53qBUjjM7OcCIBB/OUiH41KcohyazLTtjXMqnXidFhCB3BL9ukyw4+PMLhpZFS5z7wG0/or1xyZVM+Db4ewBpstiO7lMAoZSAj2m94qwoqa/m+Y2Aszv+DCXYBZNKxtomd+Alg1TQmtOPbOrLVJxiNCxpoi2rpj+4oilFt3PxiCf2/NbToev7VN3zY9uKvNVNqLxiMbUimH8EYniymqeBEva3t0FwS3uUfTpWtdSwWIPK/R7HQMxqbuRja0ZpBhUV8lAgv5On7AhDaqqnlKtE5Igl0rhFp0h9jgXzfgKSiJWeJEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=eH0+rDSWZr3B9bSjQPhdtWWKQsP8YiTb8n0NY6hnxhA=; b=C54Tl+Kf1TM88rDtL+s6VIxkOYEI+4lfc2OP0RmP+b9U6j9IrUXMJFeFRWSlB1QPc/SY70w4sxH3TaCjJOt9tYOdpKm61ad0koVB4qgcSix1rDMf0YAxUrPcovdPwwoG+GIsKqm8GFs5jvpaOUpkehhM/nOoXT7o1N/6LXQOXI71GYVO0fCQczxuA0T7jmvKra8U96lblMlDbNkM76FToIRJtrscdz9kdMVUjNDC2tbqHzL2fxqm/m2x1ZZLX+HBxAWu4KTtcJGpABrut8Z52/XmjYzRuCp1RdZ9ejkV2eWo0R5evFMIpPIDmuweKEdSJ/5KvaVLKFD8h0604BRVLg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=eH0+rDSWZr3B9bSjQPhdtWWKQsP8YiTb8n0NY6hnxhA=; b=aqsaLnG0xhHa7D0kMfb/19rq1opAdqt6chhgwSIhS9szlQRDMSRenvuJZYxwUhy8Bdkm7sbk0hdKHqzicqzi3vuqm0vaZZ4VF1VePVSQLXsjfuPMmsYR+bKxhbday5MBoT1bo+RFbB2MNR82fB+/3xWI8NTjGOVKK/58pbNNuHM=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by PH0PR11MB4997.namprd11.prod.outlook.com (2603:10b6:510:31::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5164.20; Wed, 20 Apr 2022 13:18:05 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::b9eb:9cb1:5ee0:169e]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::b9eb:9cb1:5ee0:169e%5]) with mapi id 15.20.5164.026; Wed, 20 Apr 2022 13:18:05 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Randy Presuhn <randy_presuhn@alumni.stanford.edu>, "lsr@ietf.org" <lsr@ietf.org>, "netmod@ietf.org" <netmod@ietf.org>
Thread-Topic: [netmod] [Lsr] I-D Action: draft-ietf-lsr-ospfv3-extended-lsa-yang-10.txt
Thread-Index: AQHYUBwWjZnGWjo0K0qzwhAP1iocVKzvzj4AgAACtgCAAAbsAIAABcWAgAACFQCAAAyEAIABQ8OAgAAYkYCAABRDAIAHIYtw
Date: Wed, 20 Apr 2022 13:18:05 +0000
Message-ID: <BY5PR11MB419630D751A74A78BD3834B2B5F59@BY5PR11MB4196.namprd11.prod.outlook.com>
References: <BY5PR11MB41966C83474B52949C2B660FB5EF9@BY5PR11MB4196.namprd11.prod.outlook.com> <20220414.152331.1522036488630734842.id@4668.se> <20220414134730.62e3fyhl7e4pvuz4@anna> <20220414.160345.1807693114840953491.id@4668.se> <1347E93F-F193-4677-8070-5E28EDB2F14F@cisco.com> <CABCOCHTPZ+ieLeNRhDR7AmyYYhEgq2bjyHsW-ARM3_9sAip0vQ@mail.gmail.com> <20220414193836.ufqzfhnitb5l5w3h@anna> <CABCOCHQApdv7U15kYZFGopeFE8dR9Xr9SN9vSrwWobwoX-9jyg@mail.gmail.com> <20220414201304.mrx72eycemhb2q6q@anna> <CABCOCHQWhMD=kXZugUNZ6VwsDChC33tP3fPPHgWuQYpirdhOoQ@mail.gmail.com> <a3b12c7a-2d78-47f7-4729-a5e8f6b8b19d@alumni.stanford.edu> <CABCOCHTKQT03Q25Le1TiVobsiKgMe7-OABFEhTzkoTK4NbqqoA@mail.gmail.com> <AM7PR07MB62482308F03E31BDEFBAC60DA0EE9@AM7PR07MB6248.eurprd07.prod.outlook.com> <CABCOCHRT67BvKhqU1ApdCUziBF2bs9t+KXWPj6Wp5cdXj+Vnzw@mail.gmail.com> <79b9bda5-391d-e082-1acb-f87ccc0dd79e@alumni.stanford.edu>
In-Reply-To: <79b9bda5-391d-e082-1acb-f87ccc0dd79e@alumni.stanford.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7eac13bb-0de7-451e-ddd9-08da22d0343e
x-ms-traffictypediagnostic: PH0PR11MB4997:EE_
x-microsoft-antispam-prvs: <PH0PR11MB4997BF7E8E0029BCB94CF6CEB5F59@PH0PR11MB4997.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(33656002)(66476007)(8676002)(64756008)(66446008)(110136005)(8936002)(5660300002)(508600001)(2906002)(66556008)(52536014)(53546011)(7696005)(122000001)(9326002)(6506007)(9686003)(83380400001)(71200400001)(316002)(966005)(76116006)(66946007)(55016003)(38070700005)(166002)(38100700002)(86362001)(26005)(186003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: TV51J62isP1BNMztoPUGjTTAU1cD5FfJIBvw1SfMQaiPxHnLj6h5Gc3UL/d73AAz9ffi0n6QAxNVJ/6YLu32u2f9atonKXezZYCAI7lJzaxvdVWUvgZW2QyDCN7CvVxySpJ2QZjAlpV0joYIBgHYvnHmlyMc1eJqXdbiqF4zieruULT8zM6X7AMX4ucYfKwn4ZL0tXdNzyJxQ2UgTB7KiQbYNe/TrbEqRoJNvz5uCqrIsMziHdaM0+/cbR0Hoh7N2s44AUJxKkkBVdpF84XYUeaIYrGqnxDpfuWQS5YLThPxeqj/kwuz6odYizUbBGlRZYS0LeUWQWA0tpYsdZ9QiR052hkb4gCdBEy1YoXj3hnWiOFX/VsL6iPE9DQJaGD6sCBYrC79JsuAtqO6s24mS8rVNcyae/RcmZphlz9jSPeruck2nLSrX4xIWu0HbKRQhTFeHScfrCQS+lqnl6VLvNDIVSpX160jtXQ+/sq8i9VNINGxOah6hs0uiwIGpvSj3J9DnZYMTLHTEGNi0PoRIINudvqi+X2rqzQs/U2yo/ZDDxGhGvhHdk7v7tsoPG9cGgP7Yos8M1joaVIkJN6vr82TwzSnW30PQi2jqAH1jMqTc7Az3fHu8ojHG7MmN5bE8OojYu5xD4a4JNcVKGYY0DRXEOhpHESF82UQvTsDdPNtKcnr1d5MvIxi8ZjyUmboAbI08v1OFy/8tcLJ965SaDYsK127/xTd8YO7PZLbwSgDXpqwLYEn3X292bXD8omsWU2wgHOPIlU5n4aeHbP17QVkbpkrtVtgdqVSmJaHe+9Or8gPsculKSu9JNUyoQ2Z/uOHRr2lYJ0B7GPffN2fRXTmlynARqr9hhzo+77FRmD3y/I5WhyqCVg7ZCAKf9ys/EHNFv7qknL1FQxdzr3HQNPw95eGJp5djmAPJ4ufmVLR8qj8DTiDoi+n/dzODzPUmlewyoWv5s+mMzesTsVFCjq0gnwGi1LxiuuGKQdkswe2kBviU4ezgNdU1MqN7nDRsszPU2hEzISt46ygHHWcgBulbEM3SH4QWlWnBGiiAdZNKtOVC76j1OSOl9NW42YFCHWPExYZvP3O0qXghhziEWYd+YKIdJq5GtjENC1ICl+va5Tzz7s0n3sgJ/iZEWVxU3XCG9k3bf7ozrr4hoAtn8bOJ0lXA7vpCpVZn8sPqWBuzTgJP4DtwsO6Rc2WlHBODS4dnRQfriZmFGzHZqitq0wFoRIb8RWWKH3AbM2RSh5ntzYa2tYmqFNeFp7fbWO6fRr42/0B7MJZrvlbTf9ar8aQhHyc+sFk2MHbEZ2aasCkOBaStRNdHyWElThMCi/HApzzz1L35jf94s37+l3ON7aGTgZ7kej5WFmxD7/sA2mXnoXECx0MCzmw9RiRejLs9FzLMPr0J0WwLM7WNP/wRdRSoiz3lX9Fc6CT3riu9XfzNColHEtpi/yZ75kY1oui3iK4vZjRZc+pIx1oo+qpo+Kx++WeY4Tdt8O1lbBZYFiancGdl8BjHQriL088VZy6NdU3PQXMgSmQbkUPg3QxKPSzp+35CnB5a44/Qj4RrGh459KHQq8LVOPQbThfLwQb5l7oHaQS+3EvmouB8P/RYf3tGiC/UA30neMAurWjLaljK6ELetK4u9zVNe8VJV+K9SlK787xjZ4k5zmATEBNV61NysoNcPi1nQECe/OUL5RuOH5e16uy3yEhTMzNP2kO/b+2wTbwZDQknYUTo/67AQ==
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB419630D751A74A78BD3834B2B5F59BY5PR11MB4196namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7eac13bb-0de7-451e-ddd9-08da22d0343e
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Apr 2022 13:18:05.0486 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EKFplIDeIMxAtXEnR+9xSB0vIK99m6q7zNDiZivWhS989Kv8v4VmQPs/da/ha7uAhnEvLIp7L19Kpjku7IMQPQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4997
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.135.122, xfe-aln-002.cisco.com
X-Outbound-Node: alln-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/netmod/q9Mylw_XR4DhXG9RVB7ouPH8YoE>
Subject: Re: [netmod] [Lsr] I-D Action: draft-ietf-lsr-ospfv3-extended-lsa-yang-10.txt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2022 13:18:51 -0000

Hi Randy,



Thanks for summarizing, but I don't really agree with your categorization for (1) or (3).



My interpretation of ip-address and the related v4/v6 types, based on RFC 7950, is that implementations MUST allow clients to configure zoned IP addresses to be fully complaint with the module definition.  If a server implementation does not support zoned ip-addresses then it is expected to use a deviation (e.g., to replace the type with ip-address-no-zone) to indicate how it does not conform to the model.  I don't see that is being any different than an integer datatype with a range "1..255" and the server only supporting the client configuring values in the range "1..100".



The "may include a zone index" in the ip-address definitions relates to the client when writing a value (or server when returning a value), i.e., they don't have to always provide zones for all IP addresses.  They can leave them out, and when the zone is left out the "default zone of the device will be used".



E.g., considering the RFC 6991 and the IP RIB YANG model,


     typedef ipv6-address {
       type string {
         pattern '...'
       }
       description
        "The ipv6-address type represents an IPv6 address in full,
         mixed, shortened, and shortened-mixed notation.  The IPv6
         address may include a zone index, separated by a % sign.

         The zone index is used to disambiguate identical address
         values.  For link-local addresses, the zone index will
         typically be the interface index number or the name of an
         interface.  If the zone index is not present, the default
         zone of the device will be used.



         The canonical format of IPv6 addresses uses the textual

         representation defined in Section 4 of RFC 5952<https://www.rfc-editor.org/rfc/rfc5952#section-4>.  The

         canonical format for the zone index is the numerical

         format as described in Section 11.2 of RFC 4007<https://www.rfc-editor.org/rfc/rfc4007#section-11.2>.";




     |  |        +--rw v6ur:ipv6
     |  |           +--rw v6ur:route* [destination-prefix]
     |  |              +--rw v6ur:destination-prefix
     |  |              |       inet:ipv6-prefix
     |  |              +--rw v6ur:description?          string
     |  |              +--rw v6ur:next-hop
     |  |                 +--rw (v6ur:next-hop-options)
     |  |                    +--:(v6ur:simple-next-hop)
     |  |                    |  +--rw v6ur:outgoing-interface?
     |  |                    |  |       if:interface-ref
     |  |                    |  +--rw v6ur:next-hop-address?
     |  |                    |          inet:ipv6-address



So, considering the model above, if a link local IP address was provided as the next-hop-address without a zone, then according to the type definition, that link-local IP address is associated with the default zone of the device, not the "outgoing interface" for the next hop!  If a zone is returned with a link-local address (e.g., for a get request) then my expectation is that servers return the data using the "interface index number" (since that is the canonical form, this should be returned even if it was configured using an interface name to identify the zone).  Further, as far as I can tell, "interface index number" isn't really well specified in a YANG management API and is probably far less meaningful that the interface name in a YANG context.  I presume that this is if-index in RFC 8343 but that doesn't need to be supported if the server doesn't also support SNMP's if-mib.



I suspect that the reason why ip-address (and the v4/v6) variants haven't caused any problems in practice is because implementations are mostly wrongly treating them as ip-address-no-zone, and assuming that the scope information is being provided by other context (e.g., outgoing-interface in the example above), or perhaps most operators just configure their devices using global IP addresses.



Some further comments inline ...



> -----Original Message-----

> From: netmod <netmod-bounces@ietf.org> On Behalf Of Randy Presuhn

> Sent: 15 April 2022 20:25

> To: lsr@ietf.org; netmod@ietf.org

> Subject: Re: [netmod] [Lsr] I-D Action: draft-ietf-lsr-ospfv3-extended-lsa-yang-

> 10.txt

>

> Hi -

>

> I took a fresh look at RFC 6991, and a couple of things that have

> already been mentioned in this thread bear repetition.

>

> (1) in both the ipv4-address and ipv6-address typdefs, the zone

> is only optionally present.  This is made clear both in the

> string patterns as well as the descriptions, which state that

> it "may" be present, and clearly specify how its absence is

> to be understood.  Thus it's no surprise that their use has not

> caused any problems.  If the definitions go unchanged, there's

> no demonstrated need for any of the existing uses of these typedefs

> to be revised to employ something else, even if other typedefs

> are available that are more precisely targeted.

>

> (2) since both the ipv4-address and ipv6-address typdefs are

> used in the ip-address typedef, which is in turn used in the

> host typedef, any proposal changing the syntax or semantics

> of ipv4-address or ipv6-address  needs to deal with the potential

> collateral damage to any module (IETF or otherwise) employing

> ip-address or host.

>

> (3) since the proposed change is to narrow the syntax / semantics

> of a typedef (along with any other typdefs that directly or indirectly

> incorporate that typedef), the consequence for interoperability is

> that some values go from "MAY reject" (such is the nature of Netconf

> servers - well-formedness is not sufficient to guarantee that a server

> will accept an attempt to apply a particular value to a configuration)

> to "MUST reject" (due to the narrowed pattern and description).  This is

> where stuff breaks.



I agree that a NETCONF server might reject any config change but rejecting a zoned IP address provided in an ip-address type still means that the server is violating the data model.  Further, assuming that a link-local IP address without a zone is associated with an interface rather than the device's default zone is violating the data model.



>

> (4) since ipv4-address-no-zone is derived from ipv4-address (by

> narrowing the pattern), and ipv6-address-no-zone is likewise

> derived from ipv6-address, the proposed change will also require

> these typedefs to be changed, which will in turn bubble up to

> ip-address-no-zone.

>

> It still makes no sense to me to engage in making such wide-ranging

> changes affecting both specifications and implementations with a real

> risk to interoperability in order to "fix" a non-problem.



As far as I can see it, interoperability is already broken:

  *   Clients don't really know whether a server is implementing "ip-address" as the RFC 6991 definition or using the definition of "ip-address-no-zone", and potentially this could vary for different leaves.
  *   If servers do support zones then returning the interface index as the canonical representation of the zone, rather than the interface name, seems wrong/unhelpful.
  *   If servers do support clients configuring link-local addresses without a zone then I suspect that most of them would default to the local interface scope (presuming the scope is provided/available) and not the "default zone of the device".
  *   IETF YANG models widely use ip-address when in many/most cases they probably mean ip-address-no-zone.



OpenConfig recognized that the based definitions were wrong (i.e., not intuitive) and fixed them.  If we have no way of fixing similar issues in IETF YANG models and improving them over time then I don't think that leaves us in a good place.



Regards,

Rob





>

> Randy

>

> _______________________________________________

> netmod mailing list

> netmod@ietf.org<mailto:netmod@ietf.org>

> https://www.ietf.org/mailman/listinfo/netmod