On 4/8/19, 10:55 AM, "yang-doctors on behalf of Ladislav Lhotka" 
<[email protected] on behalf of [email protected]> wrote:

    Yoav Nir <[email protected]> writes:
    
    > At this point I’m wondering if it would not be a better strategy to
    > avoid all enumerations of algorithms, whether they are spelled out or
    > imported from draft-ietf-netconf-crypto-types, and instead use the
    > numbers from the IANA registry for IPsec.
    >
    > That does not help us deprecate old algorithms, but it solves the
    > other issue, which is what to do when a new algorithm is added to
    > IPsec. We don’t want to have to publish a new i2nsf document whenever
    > that happens, and if the algorithm identifier is just a number, new
    > values can be added by IANA.
    
    IMO the best option is to combine an enumeration and numbers in a union
    type. We used this approach in this draft:
    
    https://tools.ietf.org/html/draft-lhotka-dnsop-iana-class-type-yang-01

For iana-routing-types (RFC 8294), we just used enums with the IANA assigned 
values. We went back and forth with identities but settled on this when another 
SDO said they'd only use our model if we have the actual values in an enum. For 
these types, nobody has complained. 

https://www.rfc-editor.org/rfc/rfc8294.txt

Thanks,
Acee


    
    Lada
    
    >
    > Yoav
    >
    >> On 5 Apr 2019, at 20:42, Andy Bierman <[email protected]> wrote:
    >> 
    >> Hi,
    >> 
    >> I think conformance for identities is handled very poorly in YANG.
    >> There is an if-feature-stmt allowed inside an identity in YANG 1.1.
    >> This implies that any identity without if-feature is 
mandatory-to-implement.
    >> 
    >> If the identities are in a separate module, the server can list it as an 
imported module,
    >> which tells the client the server does not implement any of the 
identities.
    >> 
    >> There is no standard way for the server to inform the client which 
identities it supports
    >> for a given identityref data node.
    >> 
    >> The common implementation strategy is to completely ignore YANG 
conformance for identities
    >> (as Mahesh explained). You just try setting the leaf and see if the 
server accepts it.
    >> 
    >> Andy
    >> 
    >> 
    >> On Fri, Apr 5, 2019 at 10:33 AM Mahesh Jethanandani 
<[email protected] <mailto:[email protected]>> wrote:
    >> Hi Linda,
    >> 
    >> 
    >>> On Apr 5, 2019, at 9:51 AM, Linda Dunbar <[email protected] 
<mailto:[email protected]>> wrote:
    >>> 
    >>> Dear YANG Doctor:
    >>>  
    >>> We need your help in reviewing the YANG model in 
draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF WG is about to call WGLC.
    >>>  
    >>> In particular, we need your advice on the following issue:
    >>>  
    >>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-04 imports from 
draft-ietf-netconf-crypto-types, which appears to be a generic list of 
algorithms.
    >>> The problem is that the list in draft-ietf-netconf-crypto-types could 
contain algorithms that are not suitable for IPsec (such as secp192r1 for key 
agreement), and right now it seems to lack some older algorithms that have 
fallen out of fashion (3DES) but is still needed in IPsec.  
    >> 
    >> All the algorithms in draft-ietf-netconf-crypto-types are defined as 
identities. If you do not find the algorithm you are looking for in the list of 
defined algorithms, you can go ahead and define your own in your own draft, 
using the same base identity from the ietf-crypto-types module.
    >> 
    >>>  
    >>>  
    >>> Questions to the YANG Doctor:
    >>> 1.       Is it better to list the IPsec specific algorithms in 
draft-ietf-i2nsf-sdn-ipsec-flow-protection (which is a subset of 
draft-ietf-netconf-crypto-types? Or to import all crypto algorithms many of 
which are not relevant to IPsec? What is the common practice? 
    >> 
    >> Importing ietf-crypto-types does not mean you have to implement every 
algorithm listed in the module. You can import the module and chose to 
implement the algorithms you want to implement, including defining any new ones.
    >> 
    >>> 2.      If we do import from draft-ietf-netconf-crypto-types, does it 
mean draft-ietf-i2nsf-sdn-ipsec-flow-protection cannot be published until 
draft-ietf-netconf-crypto-types is published?
    >> 
    >> Yes. The i2nsf draft will hit the state of MISSREF in the RFC Editor 
queue. But that should not prevent anyone from starting implementation of the 
module. As a side note, the NETCONF WG is planning on sending the crypto-types 
draft to IESG shortly. What you do not want is to duplicate the definition of 
the algorithms in your own draft.
    >> 
    >> HTH.
    >> 
    >>>  
    >>>  
    >>> Thank you very much, 
    >>>  
    >>> Linda & Yoav
    >>>  
    >>> _______________________________________________
    >>> yang-doctors mailing list
    >>> [email protected] <mailto:[email protected]>
    >>> https://www.ietf.org/mailman/listinfo/yang-doctors 
<https://www.ietf.org/mailman/listinfo/yang-doctors>
    >> Mahesh Jethanandani
    >> [email protected] <mailto:[email protected]>
    >> 
    >> 
    >> 
    >> _______________________________________________
    >> yang-doctors mailing list
    >> [email protected] <mailto:[email protected]>
    >> https://www.ietf.org/mailman/listinfo/yang-doctors 
<https://www.ietf.org/mailman/listinfo/yang-doctors>
    >> _______________________________________________
    >> I2nsf mailing list
    >> [email protected] <mailto:[email protected]>
    >> https://www.ietf.org/mailman/listinfo/i2nsf 
<https://www.ietf.org/mailman/listinfo/i2nsf>
    > _______________________________________________
    > yang-doctors mailing list
    > [email protected]
    > https://www.ietf.org/mailman/listinfo/yang-doctors
    
    -- 
    Ladislav Lhotka
    Head, CZ.NIC Labs
    PGP Key ID: 0xB8F92B08A9F76C67
    
    _______________________________________________
    yang-doctors mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/yang-doctors
    

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to