Hi Authors of draft-ietf-opsawg-teas-attachment-circuit,

First of all my apologies for taking all this time to review this document. 
This was no small document, specially if you combine with the fact that there 
are 3 other supporting documents. Regardless, here are some of my comments. I 
would like to see some discussion around the COMMENTs, and leave you to deal 
with the NITS as you feel.

-------------------------------------------------------------------------------
COMMENT
-------------------------------------------------------------------------------

Overall comments:

The four documents
- this draft,
- draft-ietf-opsawg-ntw-attachment-circuit
- draft-ietf-opsawg-teas-common-ac
- draft-ietf-opsawg-ac-lxlm-lxnm-glue

as I understand should be treated as a cluster. That includes the fact that 
they should be have been shephered by a single person, and sent up for AD 
review as a cluster. As I put the pieces together, here are general comments 
that apply to all the drafts. Individual comments on each draft will be 
provided in their own review.

Also note that this review is for -14 version of the document. The present 
version of the draft would be more like -17.

First of all, the models are fairly comprehensive in themselves. So thank you 
for putting all the word behind them. I can see it working as a template, where 
different users pick different pieces of the model. The authors have worked to 
add more deployment scenarios to explain how the model could be used in those 
scenarios as part of overall discussion on the model.

The rest of the review will focus on aspects of this draft.

I found it amusing that the 5 authors and 5 contributors formed the major 
portion of the "broad consensus" the document got from the WG. That combined 
with the fact that the document got few WG members supporting it concerns me. I 
am not sure if it is the lack of interest, or the document was difficult to 
follow.

"Abstract", paragraph 2
>    Also, the document specifies a set of reusable groupings.  Whether
>    other service models reuse structures defined in the AC models or
>    simply include an AC reference is a design choice of these service
>    models.  Utilizing the AC service model to manage ACs over which a
>    service is delivered has the advantage of decoupling service
>    management from upgrading AC components to incorporate recent AC
>    technologies or features.

This paragraph could be moved into the Introduction section, thus keeping the 
Abstract concise.

Section 4.1, paragraph 7
>    *  Customers may request protection schemes in which the ACs
>       associated with their endpoints are terminated by the same PE
>       (e.g., CE#3), distinct PEs (e.g., CE#34), etc.  The network
>       provider uses this request to decide where to terminate the AC in
>       the provider network (i.e., select which PE(s) to use) and also
>       whether to enable specific capabilities (e.g., Virtual Router
>       Redundancy Protocol (VRRP) [RFC9568]).  Note that placement
>       constraints may also be requested during the instantiation of the
>       underlying bearers (Section 5.1).

There is no node called CE#34 in the diagram.

Section 5.1, paragraph 3
>       +--rw locations
>       |  +--rw customer-name?   string

Not clear on what the difference is between this customer-name, and the 
customer name under bearers, and the customer-name under bearer. Are these 
different customers? 

Shouldn't bearers be under each location? Isn't the bearer an underlay between 
a particular CE and PE? In other words, do all locations have access to all 
bearers?

Section 5.1, paragraph 2
>       |  +--rw local-as?        inet:as-number
>       |  +--rw peer-as?         inet:as-number
>       |  +--ro location* [location-name]
>       |     +--ro location-name    string
>       |     +--ro address?         string
>       |     +--ro postal-code?     string
>       |     +--ro state?           string
>       |     +--ro city?            string
>       |     +--ro country-code?    string

The IVY WG has a inventory model that defines locations in the form of a 
grouping. Can those definitions be used here instead of redefining them?

Section 5.2, paragraph 1
>    The full tree diagram of the module can be generated using, e.g., the
>    "pyang" tool [PYANG].  That tree is not included here because it is
>    too long (Section 3.4 of [I-D.ietf-netmod-rfc8407bis]).  Instead,
>    subtrees are provided for the reader's convenience.  The full tree of
>    the 'ac-svc' is provided in [AC-svc-Tree].

While an abridged tree diagram is what should be used to describe a model, 
depending on the discussion that is happening on the netmod mailing list, I 
hope the authors will consider adding a full tree diagram in the Appendix.

Section 5.2.2.1, paragraph 1
>    The 'specific-provisioning-profiles' container (Figure 6) can be used
>    by a service provider to maintain a set of reusable profiles.  The
>    profiles definitions are similar to those defined in [RFC9181],
>    including: Quality of Service (QoS), BFD, forwarding, and routing
>    profiles.  The exact definition of the profiles is local to each
>    service provider.  The model only includes an identifier for these
>    profiles in order to facilitate identifying and binding local
>    policies when building an AC.

I was unable to determine whether the 'specific-provisioning-profiles' defined 
in RFC9181 were reused here or redefined in this model.

Section 5.2.5.5, paragraph 4
>    The 'security' container specifies the authentication and the
>    encryption to be applied to traffic for a given AC.  Tthe model can
>    be used to directly control the encryption to be applied (e.g., Layer
>    2 or Layer 3 encryption) or invoke a local encryption profile.

Can the authors provide an example of what kind of traffic would be encrypted 
using this encryption profile? As I understand it, this is not end-to-end 
encrypted traffic. It is traffic encrypted as it is traversing the AC. Is that 
right?

Section 7, paragraph 1
>    This section uses the template described in Section 3.7 of
>    [I-D.ietf-netmod-rfc8407bis].

I hope this section will be updated with the new text that has been agreed upon.

Section 7, paragraph 18
>    Several data nodes ('bgp', 'ospf', 'isis', and 'rip') rely upon
>    [RFC8177] for authentication purposes.  As such, the AC service
>    module inherits the security considerations discussed in Section 5 of
>    [RFC8177].  Also, these data nodes support supplying explicit keys as
>    strings in ASCII format.  The use of keys in hexadecimal string
>    format would afford greater key entropy with the same number of key-
>    string octets.  However, such a format is not included in this
>    version of the AC service model because it is not supported by the
>    underlying device modules (e.g., [RFC8695]).

Do the authors want to add a statement that says no rpcs are defined, and 
therefore no security considerations need to be documented for them.

Section 9.2, paragraph 4
>    [I-D.ietf-opsawg-ac-lxsm-lxnm-glue]
>               Boucadair, M., Roberts, R., Barguil, S., and O. G. de
>               Dios, "A YANG Data Model for Augmenting VPN Service and
>               Network Models with Attachment Circuits", Work in
>               Progress, Internet-Draft, draft-ietf-opsawg-ac-lxsm-lxnm-
>               glue-10, 10 June 2024,
>               <https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-
>               ac-lxsm-lxnm-glue-10>.
> 
>    [I-D.ietf-opsawg-ntw-attachment-circuit]
>               Boucadair, M., Roberts, R., de Dios, O. G., Barguil, S.,
>               and B. Wu, "A Network YANG Data Model for Attachment
>               Circuits", Work in Progress, Internet-Draft, draft-ietf-
>               opsawg-ntw-attachment-circuit-11, 15 May 2024,
>               <https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-
>               ntw-attachment-circuit-11>.

Are the YANG modules from these drafts not being imported by the YANG modules 
defined in this draft? If so, these should be moved to Normative Section of 
references.

"Appendix A.", paragraph 0
>    This section includes a non-exhaustive list of examples to illustrate
>    the use of the service models defined in this document.  An example
>    instance data can also be found at [Instance-Data].

I am hoping that these examples have been validated with tools such as yanglint 
or similar. Since these examples are not marked as code, it is difficult to 
extract them from the draft for me to validate them.

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

 * Term "natively"; alternatives might be "built-in", "fundamental",
   "ingrained", "intrinsic", "original"

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 5.2.1, paragraph 9
>    Features are used to tag conditional protions of the model in order
>    to accomodate various deployments (support of layer 2 ACs, Layer 3
>    ACs, IPv4, IPv6, routing protocols, Bidirectional Forwarding
>    Detection (BFD), etc.).

s/protions/portions/


Document references draft-ietf-opsawg-teas-common-ac-11, but -12 is the latest
available revision.

Document references draft-ietf-netmod-rfc8407bis-14, but -20 is the latest
available revision.

Document references draft-ietf-opsawg-ntw-attachment-circuit-11, but -13 is the
latest available revision.

Document references draft-ietf-teas-ietf-network-slice-nbi-yang-13, but -16 is
the latest available revision.

Document references draft-ietf-idr-bgp-model-17, but -18 is the latest
available revision.

"OPSAWG", paragraph 0
> 024 YANG Data Models for Bearers and 'Attachment Circuits'-as-a-Service (ACa
>                                      ^
Unpaired symbol: "'" seems to be missing.

Section 1.1, paragraph 3
> roviding programmatic means to expose 'Attachment Circuits'-as-a-Service (ACa
>                                       ^
Unpaired symbol: "'" seems to be missing.

Section 9.2, paragraph 1
> The attachment circuit in this case use a SAP identifier to refer to the phy
>                                     ^^^
The verb form "use" does not seem to match the subject "case".

Mahesh Jethanandani
mjethanand...@gmail.com



_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to