Re: [yang-doctors] [I2nsf] Need YANG Doctor reviewing the YANG module of draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF is about to call WGLC

Paul Wouters <paul@nohats.ca> Tue, 09 April 2019 07:53 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: yang-doctors@ietfa.amsl.com
Delivered-To: yang-doctors@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4524A12076D; Tue, 9 Apr 2019 00:53:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g11RwFwQ-v7F; Tue, 9 Apr 2019 00:53:44 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE640120628; Tue, 9 Apr 2019 00:53:43 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 44dfg96M8Nz3HK; Tue, 9 Apr 2019 09:53:41 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1554796421; bh=f2yOoBvp2J/ZAYdGpBGV2O3fmdWpcmXbh5NhqVuVMtk=; h=Subject:From:In-Reply-To:Date:Cc:References:To; b=UAWxY9apLCxlfmNGWEpbRSDbiViHqwWGKAO7aJ56N1uwi0XB+7qOJCzPzDlHRtsnR k7YN6SE1VS9gBp50OvXpVqGHVpEFYvZHPnFyK0+hFEu8QZ+VXbZGIPQPl5U5oPQfeN tWD6nuQ7/v6o6KSPqHEoiPH1xAk5bdYqYRKYGZus=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id i5IKPFP7xxHp; Tue, 9 Apr 2019 09:53:39 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Tue, 9 Apr 2019 09:53:38 +0200 (CEST)
Received: from [192.168.2.227] (25bc4551.ftth.concepts.nl [37.188.69.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bofh.nohats.ca (Postfix) with ESMTPSA id C8F9E5C856; Tue, 9 Apr 2019 03:53:36 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca C8F9E5C856
Content-Type: multipart/alternative; boundary=Apple-Mail-E41E007A-FE0F-4B85-9252-3479ED6F0437
Mime-Version: 1.0 (1.0)
From: Paul Wouters <paul@nohats.ca>
X-Mailer: iPhone Mail (16D57)
In-Reply-To: <D19CB266-D1D8-429E-A215-6BE866098E90@um.es>
Date: Tue, 9 Apr 2019 09:53:34 +0200
Cc: Yoav Nir <ynir.ietf@gmail.com>, "i2nsf@ietf.org" <i2nsf@ietf.org>, Andy Bierman <andy@yumaworks.com>, Linda Dunbar <linda.dunbar@huawei.com>, Mahesh Jethanandani <mjethanandani@gmail.com>, "yang-doctors@ietf.org" <yang-doctors@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <FB3FA1D1-5485-4287-A83E-AFA2C3F1575B@nohats.ca>
References: <4A95BA014132FF49AE685FAB4B9F17F66B363EB2@sjceml521-mbs.china.huawei.com> <420D3E9A-9E3C-4575-9C92-200CAA0B868C@gmail.com> <CABCOCHRf3iGUt9wb3htpDYGJ+pAKErvq8OrozndgELUVKYT4Kg@mail.gmail.com> <80347D5B-C4DB-4F0C-BD73-A927585442BF@gmail.com> <D19CB266-D1D8-429E-A215-6BE866098E90@um.es>
To: Rafa Marin-Lopez <rafa@um.es>
Archived-At: <https://mailarchive.ietf.org/arch/msg/yang-doctors/NCY95EL35Pk3-NHNhxjS3598nvo>
Subject: Re: [yang-doctors] [I2nsf] Need YANG Doctor reviewing the YANG module of draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF is about to call WGLC
X-BeenThere: yang-doctors@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Email list of the yang-doctors directorate <yang-doctors.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/yang-doctors/>
List-Post: <mailto:yang-doctors@ietf.org>
List-Help: <mailto:yang-doctors-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/yang-doctors>, <mailto:yang-doctors-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Apr 2019 07:53:47 -0000


> On Apr 9, 2019, at 09:49, Rafa Marin-Lopez <rafa@um.es>; wrote:
> 
> Hi Yoav:
> 
> After thinking about these past days, I personally think the same. 
> 
> I would add a uint16 and a comment in the description. As we agreed in the last IETF meeting, I do not think our I-D should solve this problem, since this problem happens in general.
> 
> As an example:
> 
> typedef ike-integrity-algorithm-t {
> 			type uint32; 
> 			description “The acceptable numbers are defined in IANA Registry - Internet Key Exchange Version 2 (IKEv2) Parameters - IKEv2  Transform Type 1 - Encryption Algorithm Transform IDs";
> }
> 
> Is this reasonable?

This would be much better, yes.

Paul

> 
> 
>> El 5 abr 2019, a las 20:13, Yoav Nir <ynir.ietf@gmail.com>; escribió:
>> 
>> At this point I’m wondering if it would not be a better strategy to avoid all enumerations of algorithms, whether they are spelled out or imported from draft-ietf-netconf-crypto-types, and instead use the numbers from the IANA registry for IPsec.
>> 
>> That does not help us deprecate old algorithms, but it solves the other issue, which is what to do when a new algorithm is added to IPsec. We don’t want to have to publish a new i2nsf document whenever that happens, and if the algorithm identifier is just a number, new values can be added by IANA.
>> 
>> Yoav
>> 
>>> On 5 Apr 2019, at 20:42, Andy Bierman <andy@yumaworks.com>; wrote:
>>> 
>>> Hi,
>>> 
>>> I think conformance for identities is handled very poorly in YANG.
>>> There is an if-feature-stmt allowed inside an identity in YANG 1.1.
>>> This implies that any identity without if-feature is mandatory-to-implement.
>>> 
>>> If the identities are in a separate module, the server can list it as an imported module,
>>> which tells the client the server does not implement any of the identities.
>>> 
>>> There is no standard way for the server to inform the client which identities it supports
>>> for a given identityref data node.
>>> 
>>> The common implementation strategy is to completely ignore YANG conformance for identities
>>> (as Mahesh explained). You just try setting the leaf and see if the server accepts it.
>>> 
>>> Andy
>>> 
>>> 
>>>> On Fri, Apr 5, 2019 at 10:33 AM Mahesh Jethanandani <mjethanandani@gmail.com>; wrote:
>>>> Hi Linda,
>>>> 
>>>> 
>>>>> On Apr 5, 2019, at 9:51 AM, Linda Dunbar <linda.dunbar@huawei.com>; wrote:
>>>>> 
>>>>> Dear YANG Doctor:
>>>>>  
>>>>> We need your help in reviewing the YANG model in draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF WG is about to call WGLC.
>>>>>  
>>>>> In particular, we need your advice on the following issue:
>>>>>  
>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-04 imports from draft-ietf-netconf-crypto-types, which appears to be a generic list of algorithms.
>>>>> The problem is that the list in draft-ietf-netconf-crypto-types could contain algorithms that are not suitable for IPsec (such as secp192r1 for key agreement), and right now it seems to lack some older algorithms that have fallen out of fashion (3DES) but is still needed in IPsec.  
>>>> 
>>>> All the algorithms in draft-ietf-netconf-crypto-types are defined as identities. If you do not find the algorithm you are looking for in the list of defined algorithms, you can go ahead and define your own in your own draft, using the same base identity from the ietf-crypto-types module.
>>>> 
>>>>>  
>>>>>  
>>>>> Questions to the YANG Doctor:
>>>>> 1.       Is it better to list the IPsec specific algorithms in draft-ietf-i2nsf-sdn-ipsec-flow-protection (which is a subset of draft-ietf-netconf-crypto-types? Or to import all crypto algorithms many of which are not relevant to IPsec? What is the common practice? 
>>>> 
>>>> Importing ietf-crypto-types does not mean you have to implement every algorithm listed in the module. You can import the module and chose to implement the algorithms you want to implement, including defining any new ones.
>>>> 
>>>>> 2.      If we do import from draft-ietf-netconf-crypto-types, does it mean draft-ietf-i2nsf-sdn-ipsec-flow-protection cannot be published until draft-ietf-netconf-crypto-types is published?
>>>> 
>>>> Yes. The i2nsf draft will hit the state of MISSREF in the RFC Editor queue. But that should not prevent anyone from starting implementation of the module. As a side note, the NETCONF WG is planning on sending the crypto-types draft to IESG shortly. What you do not want is to duplicate the definition of the algorithms in your own draft.
>>>> 
>>>> HTH.
>>>> 
>>>>>  
>>>>>  
>>>>> Thank you very much, 
>>>>>  
>>>>> Linda & Yoav
>>>>>  
>>>>> _______________________________________________
>>>>> yang-doctors mailing list
>>>>> yang-doctors@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/yang-doctors
>>>> 
>>>> Mahesh Jethanandani
>>>> mjethanandani@gmail.com
>>>> 
>>>> 
>>>> 
>>>> _______________________________________________
>>>> yang-doctors mailing list
>>>> yang-doctors@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/yang-doctors
>>> _______________________________________________
>>> I2nsf mailing list
>>> I2nsf@ietf.org
>>> https://www.ietf.org/mailman/listinfo/i2nsf
>> 
>> _______________________________________________
>> I2nsf mailing list
>> I2nsf@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2nsf
> 
> -------------------------------------------------------
> Rafa Marin-Lopez, PhD
> Dept. Information and Communications Engineering (DIIC)
> Faculty of Computer Science-University of Murcia
> 30100 Murcia - Spain
> Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
> -------------------------------------------------------
> 
> 
> 
> 
> _______________________________________________
> I2nsf mailing list
> I2nsf@ietf.org
> https://www.ietf.org/mailman/listinfo/i2nsf