Hi Tom:

Please see our comments inline:

> El 28 sept 2020, a las 11:33, tom petch <daedu...@btconnect.com> escribió:
> 
> On 28/09/2020 10:01, Rafa Marin-Lopez wrote:
>> Hi Rob, Tom:
>> 
>> Renaming the modules sounds reasonable. With regard to have a different 
>> prefix, it is also ok. Perhaps the easiest way is to solve this is the 
>> following: instead of using -sdn- we could include -i2nsf- so we would have: 
>> ietf-i2nsf-common, ietf-i2nsf-ike, and ietf-i2nsf-ikeless. This would mean 
>> that this is in the context of i2nsf wg.
>> 
>> What do you think?
> 
> Ok with -ike and -ikeless

Great.

> but I would not use ietf-i2nsf-common the reason being that there is an awful 
> lot in common across the different i2nsf I-D that with hindsight would have 
> made an excellent common i2nsf module and may be will in future if these 
> modules get revised.

We agree.
> Other WG have created 'common' or 'types' modules, with more of the latter 
> and then abbreviated that to 't' or 'c' so perhaps ietf-i2nsf-iket, or -ikec.

Ok about ietf-i2nsf-ikec.


> Prefix ahould be short so something like nsfike, nsfikeless (longer than I 
> would like - nsfiken?) and nsfiket, or nsfikec.

For the prefix to the common module 

prefix "nsfikec";


For the prefix to the ietf-i2nsf-ike, nsfike seems to refer to IKE case , which 
is good.

prefix "nsfike”; 

For the prefix to the ietf-i2nsf-ikeless, nsfikeless (a shorter one could be 
nsfikels but we do not know if that is acceptable) has a clear meaning and it 
is coherent with the rest of the names. I think we can live with a few letters 
more.  

Is this acceptable?

Best Regards.

> 
> Tom Petch
> 
>>> El 23 sept 2020, a las 12:45, tom petch <daedu...@btconnect.com 
>>> <mailto:daedu...@btconnect.com>> escribió:
>>> 
>>> On 23/09/2020 11:24, Rob Wilton (rwilton) wrote:
>>>> Hi Rafa,
>>>> 
>>>> Thanks for replying with the extra background information.
>>>> 
>>>> It seems like renaming the modules, as you propose for the -09 version, is 
>>>> the pragmatic path forward here.
>>> 
>>> And the namespace and the YANG prefix IMHO.  Having ike as a prrefix for a 
>>> module which is not the 'ike' module I see as a source of confusion. If 
>>> this is nsf specific, then I would suggest nsfike although nsfikeless then 
>>> seems a bit long.
>>> 
>>> Tom Petch
>>> 
>>>> Regards,
>>>> Rob
>>>> 
>>>> 
>>>> From: Rafa Marin-Lopez <r...@um.es <mailto:r...@um.es>>
>>>> Sent: 23 September 2020 10:29
>>>> 
>>>> Hi Rob, (Chris):
>>>> 
>>>> Thank you very much for your answers. Please see our comments inline.
>>>> 
>>>> 
>>>> El 22 sept 2020, a las 17:38, Rob Wilton (rwilton) 
>>>> <rwilton=40cisco....@dmarc.ietf.org 
>>>> <mailto:rwilton=40cisco....@dmarc.ietf.org><mailto:rwilton=40cisco....@dmarc.ietf.org
>>>>  <mailto:rwilton=40cisco....@dmarc.ietf.org>>> escribió:
>>>> 
>>>> Hi Rafa,
>>>> 
>>>> Thanks for getting back to me.
>>>> 
>>>> Yes, changing the name of the module is an okay, if not ideal, resolution. 
>>>>  But I appreciate that you also want to be done with this work.
>>>> 
>>>> Correct, especially at this point of time. We have been discussing this 
>>>> I-D for a long time. There was a consensus in the WG. I2NSF WG chairs can 
>>>> comment about this. In our opinion, the changes that need to be applied 
>>>> are major changes from what it was approved in the WG. However, this is 
>>>> coming in the “last minute” and we feel this is not merely moving a few 
>>>> lines from here to there. We need to understand the impact of this. 
>>>> Therefore, it is not so trivial as it may seem. See below.
>>>> 
>>>> But I would like to check:  My understanding is that the changes that 
>>>> Chris is proposing are pretty small.  I.e. move the SA structure under 
>>>> ipsec-common, and put it under a YANG feature.  Are you sure that it is 
>>>> impractical to accommodate this change which would allow a single ipsec 
>>>> module to be shared and extended via YANG augmentations?
>>>> 
>>>> In the context of our I-D, if we move SAD structure to ipsec-common, what 
>>>> we are meaning is that IPsec SA configuration data (setting values to the 
>>>> SAD structure) are common to the IKE case and the IKE-less cases, which 
>>>> are not. It is confusing. Moreover, the usage of feature means that, after 
>>>> all, this “common” is not “common” to both cases IKE case and IKE-less. 
>>>> Again, it seems confusing. In the IKE case, the SDN/I2NSF controller does 
>>>> not configure the SAD at all but the IKE implementation in the NSF. In our 
>>>> opinion, in order to properly add this IPsec SA operational state to the 
>>>> IKE case we should include operational data about the IPsec SAs (config 
>>>> false) to the ietf-ipsec-ike. Alternatively, we have certain operational 
>>>> data (ro) in the SAD structure in the IKE-less case. If only those are 
>>>> moved to the common part should be ok but we think it does not solve the 
>>>> problem.
>>>> 
>>>> Therefore it is not only an implementation aspect.
>>>> 
>>>> As you may observe, our discussion is taking into account there is an 
>>>> I2NSF Controller and we have two cases IKE case and IKE-less case, that 
>>>> have been discussed in the WG. The YANG model in the I-D has tried to 
>>>> reflect this discussion. It was never the intention to provide a general 
>>>> YANG model for IPsec.
>>>> 
>>>> Best Regards.
>>>> 
>>>> Thanks,
>>>> Rob
>>>> 
>>>> From: Rafa Marin-Lopez <r...@um.es <mailto:r...@um.es><mailto:r...@um.es 
>>>> <mailto:r...@um.es>>>
>>>> Sent: 22 September 2020 14:05
>>>> Subject: Re: [yang-doctors] Yangdoctors last call review of 
>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-08
>>>> 
>>>> Dear Rob:
>>>> 
>>>> Apologies for our delayed answer. We are now working in the revision to 
>>>> submit v09 by compiling all the comments.
>>>> 
>>>> As you mentioned, we want to avoid any further delay. As we mentioned to 
>>>> Chris in the past (i2nsf mailing list), we do not have any problem to 
>>>> include some additional text (e.g. “-sdn-" in the module names). 
>>>> Therefore, Rob, we agree with your point of view about this.
>>>> 
>>>> In summary, we are working in the next revision v09, and our idea to 
>>>> address Chris’ comments was to include -sdn- to the module names.
>>>> 
>>>> We hope this is fine.
>>>> 
>>>> Best regards.
>>>> 
>>>> 
>>>> 
>>>> El 22 sept 2020, a las 13:56, Rob Wilton (rwilton) <rwil...@cisco.com 
>>>> <mailto:rwil...@cisco.com><mailto:rwil...@cisco.com 
>>>> <mailto:rwil...@cisco.com>>> escribió:
>>>> 
>>>> Hi draft authors, Chris,
>>>> 
>>>> Can we also please try and close on this issue raised by Chris.
>>>> 
>>>> Chris, I don’t think that there is any great way to solve this issue using 
>>>> YANG features, but presumably the constraint could be enforced with a must 
>>>> statement, or groupings could be used to copy parts of the ipsec structure 
>>>> into an sdn specific ipsec tree structure.
>>>> 
>>>> I understand that there isn't any great desire to delay these drafts by 
>>>> trying to generalize the ipsec YANG model contained within it.  However, I 
>>>> think that means that the modules should have "-sdn-" in their names to 
>>>> indicate that they are intended specifically for the SDN use case, and 
>>>> should not be confused with the more generic ipsec YANG modules that have 
>>>> been proposed.
>>>> 
>>>> Regards,
>>>> Rob
>>>> 
>>>> -----Original Message-----
>>>> From: yang-doctors <yang-doctors-boun...@ietf.org 
>>>> <mailto:yang-doctors-boun...@ietf.org><mailto:yang-doctors-boun...@ietf.org
>>>>  <mailto:yang-doctors-boun...@ietf.org>>> On Behalf Of Christian
>>>> Hopps
>>>> Sent: 24 August 2020 18:08
>>>> 
>>>> [adding in ipsec@]
>>>> 
>>>> Hi,
>>>> 
>>>> This draft was discussed in ipsecme at the last IETF, and there was a
>>>> desire to look closer at a couple changes that would make these models
>>>> usable by ipsec generally rather than only for SDNs. Otherwise we will end
>>>> up with 2 models that look very similar and duplicate almost all the
>>>> functionality. This was going to be done during the next yang doctor
>>>> review, but it looks like that happened in the meantime (ships in the
>>>> night).
>>>> 
>>>> At minimum the module names should include "-sdn-" if no other changes are
>>>> made to indicate that they are only for sdn use; however, this is not the
>>>> optimal solution.
>>>> 
>>>> A better solution would be to move the containers currently under ikeless
>>>> (for SA and Policy databases) under ipsec-common.
>>>> 
>>>> The feedback I received from the authors was that the SDN controllers
>>>> didn't care about the actual SAs and policies when using IKE so they
>>>> didn't want to require someone implementing ike+common modules to have to
>>>> support them.
>>>> 
>>>> The YANG question I suppose is, is there an easy way to move these
>>>> containers from ipsec-ikeless to ipsec-common, but still allow for them to
>>>> be empty and/or unimplemented for the SDN IKE use case? If they were made
>>>> features, is there a proper YANG way to indicate that if the ikeless
>>>> module is present then those features must also be supported thus matching
>>>> the functionality as defined by the current draft?
>>>> 
>>>> Thanks,
>>>> Chris.
>>>> 
>>>> On Aug 24, 2020, at 10:37 AM, Martin Björklund via Datatracker
>>>> <nore...@ietf.org <mailto:nore...@ietf.org><mailto:nore...@ietf.org 
>>>> <mailto:nore...@ietf.org>>> wrote:
>>>> 
>>>> Reviewer: Martin Björklund
>>>> Review result: Ready with Nits
>>>> 
>>>> I did an early YANG Doctor's review of this draft.  Most of my
>>>> comments then have been addressed in this version.
>>>> 
>>>> Comments:
>>>> 
>>>> o  As I wrote in my early review, the RFC editor enforces a common
>>>>  format of YANG modules, so it is better to adhere to this format
>>>>  before sending the draft to the RFC editor.  Use
>>>> 
>>>>    pyang -f yang --yang-line-length 69 <FILE>
>>>> 
>>>>  to get a consistent look-and-feel for your module.
>>>> 
>>>>  (You will have to manually re-flow description statements after
>>>>  this.)
>>>> 
>>>> 
>>>> o  There are some leafs that are optional in the model, but w/o a
>>>>  default value and w/o an explanation of what happens if that leaf
>>>>  is not set.  You should find those and either make them mandatory,
>>>>  add a default value, or explain what it means when it isn't set.
>>>>  As an example,
>>>>  /ipsec-ike/pad/pad-entrypeer-authenticatin/pre-shared/secret
>>>>  is optional.  I suspect that this leaf needs to be mandatory.
>>>>  Another example is the leaf espencap.
>>>> 
>>>> 
>>>> /martin
>>>> 

-------------------------------------------------------
Rafa Marin-Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: r...@um.es
-------------------------------------------------------




_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to