Hi Tero

For draft-fedyk-ipsecme-yang-iptfs-01 we are asking for adoption as WG draft 
which means it does not need to be perfect.  
The intention is supports the draft-ietf-ipsecme-iptfs-05 which is at a 
different stage and Chris is the sole author so I'll let him address. 

Please see the answers [don] inline:  

Thanks
Don

-----Original Message-----
Subject: [IPsec] IP-TFS drafts calls.

Christian Hopps writes:
> Also, as per the last IETF meeting, can we please start an WG adoption 
> call on the supporting YANG draft?
> 
>   https://datatracker.ietf.org/doc/draft-fedyk-ipsecme-yang-iptfs/

I think this draft is not exactly in sync with the main iptfs, as it still has 
some counters etc that would indicate there could be non aggregated and 
aggregated packets mixed in same SA, 
[don] We can clarify.  The stats are not per type of SA but only the relevant 
stats would be updated per SA. So yes it is in sync but some counters would be 
zero per SA. (my understanding). 

and it says that IP-TFS may be run only in one direction, but when using IKE I 
think the IP-TFS is always for in both directions, but of course the paramters 
and data rates might be different in different directions.

[don] We can clarify. The intention is IP-TFS encapsulation may not be 
operating in both directions.  

Also there is ietf-i2nsf-ikel...@20202-10-30.yang which looks like typo, and it 
has this use-path-mtu, which does not tell which algorithm is used etc.
[don] Not a typo The base draft draft-ietf-i2nsf-sdn-ipsec-flow-protection-12 
contains 3 related YANG models. 
ietf-i2nsf-ikel...@20202-10-30.yang 
ietf-i2nsf-i...@2020-10-30.yang
ietf-i2nsf-...@2020-10-30.yang

We augment the ike and the ikless with use-path-mtu for the IP-TFS tunnel 
packet size computation.  
I think you may be referring to the sample configuration data. This data shows 
IP-TFS configuration samples only.  But encalg encryption algorithm is a 
configuration mandatory object in YANG schema we are augmenting.  Therefore we 
supplied a minimal configuration for this schema - enough to satisfy yanglint. 
We can add a note - this is common policy for test modules as far as I know.  
The  draft-ietf-i2nsf-sdn-ipsec-flow-protection-12 contains much more extensive 
sample configuration for the cases when encryption algorithm is specified. 

Also I do not know what tx-drop-packets is supposed to mean? If we have already 
sent them how can we find out information whether it was dropped or not. Or is 
that supposed to be tx-queue-drop-packets, i.e., packets that were dropped 
before added to the outer ESP packet?
[don] The description is Outbound dropped packets so your understanding is my 
understanding we have overrun the ability to transmit the packets either due to 
queuing or other.  We will clarify. 

Also it is difficult to say whether some of the counters are counting inner or 
outer packets, so it would be better to be more exact with the wordings, i.e., 
in addition of using -inner- perhaps also use -outer-.
[don] The current wording is inner for packets that are encapsulated. The 
ipsec-stats capture outer packets. (Outers is redundant at that level.   All 
pad packets are outer (within iptfs- we could make inter an outer more 
explicit. Whereas extra pad packets are inner. (I assume this what you would 
like clarified.


Is there going to be update for this draft to get it in sync with the main 
draft?
[don]It is in sync but we can clarify your points (and any other clarifications 
of course). 

Thanks
Don 
--
kivi...@iki.fi

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to