Hi Yoav:
After thinking about these past days, I personally think the same.
I would add a uint16 and a comment in the description. As we agreed in the last
IETF meeting, I do not think our I-D should solve this problem, since this
problem happens in general.
As an example:
typedef ike-integrity-algorithm-t {
type uint32;
description “The acceptable numbers are defined in IANA
Registry - Internet Key Exchange Version 2 (IKEv2) Parameters - IKEv2
Transform Type 1 - Encryption Algorithm Transform IDs";
}
Is this reasonable?
> El 5 abr 2019, a las 20:13, Yoav Nir <[email protected]> escribió:
>
> At this point I’m wondering if it would not be a better strategy to avoid all
> enumerations of algorithms, whether they are spelled out or imported from
> draft-ietf-netconf-crypto-types, and instead use the numbers from the IANA
> registry for IPsec.
>
> That does not help us deprecate old algorithms, but it solves the other
> issue, which is what to do when a new algorithm is added to IPsec. We don’t
> want to have to publish a new i2nsf document whenever that happens, and if
> the algorithm identifier is just a number, new values can be added by IANA.
>
> Yoav
>
>> On 5 Apr 2019, at 20:42, Andy Bierman <[email protected]
>> <mailto:[email protected]>> wrote:
>>
>> Hi,
>>
>> I think conformance for identities is handled very poorly in YANG.
>> There is an if-feature-stmt allowed inside an identity in YANG 1.1.
>> This implies that any identity without if-feature is mandatory-to-implement.
>>
>> If the identities are in a separate module, the server can list it as an
>> imported module,
>> which tells the client the server does not implement any of the identities.
>>
>> There is no standard way for the server to inform the client which
>> identities it supports
>> for a given identityref data node.
>>
>> The common implementation strategy is to completely ignore YANG conformance
>> for identities
>> (as Mahesh explained). You just try setting the leaf and see if the server
>> accepts it.
>>
>> Andy
>>
>>
>> On Fri, Apr 5, 2019 at 10:33 AM Mahesh Jethanandani <[email protected]
>> <mailto:[email protected]>> wrote:
>> Hi Linda,
>>
>>
>>> On Apr 5, 2019, at 9:51 AM, Linda Dunbar <[email protected]
>>> <mailto:[email protected]>> wrote:
>>>
>>> Dear YANG Doctor:
>>>
>>> We need your help in reviewing the YANG model in
>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF WG is about to call
>>> WGLC.
>>>
>>> In particular, we need your advice on the following issue:
>>>
>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-04 imports from
>>> draft-ietf-netconf-crypto-types, which appears to be a generic list of
>>> algorithms.
>>> The problem is that the list in draft-ietf-netconf-crypto-types could
>>> contain algorithms that are not suitable for IPsec (such as secp192r1 for
>>> key agreement), and right now it seems to lack some older algorithms that
>>> have fallen out of fashion (3DES) but is still needed in IPsec.
>>
>> All the algorithms in draft-ietf-netconf-crypto-types are defined as
>> identities. If you do not find the algorithm you are looking for in the list
>> of defined algorithms, you can go ahead and define your own in your own
>> draft, using the same base identity from the ietf-crypto-types module.
>>
>>>
>>>
>>> Questions to the YANG Doctor:
>>> 1. Is it better to list the IPsec specific algorithms in
>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection (which is a subset of
>>> draft-ietf-netconf-crypto-types? Or to import all crypto algorithms many of
>>> which are not relevant to IPsec? What is the common practice?
>>
>> Importing ietf-crypto-types does not mean you have to implement every
>> algorithm listed in the module. You can import the module and chose to
>> implement the algorithms you want to implement, including defining any new
>> ones.
>>
>>> 2. If we do import from draft-ietf-netconf-crypto-types, does it mean
>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection cannot be published until
>>> draft-ietf-netconf-crypto-types is published?
>>
>> Yes. The i2nsf draft will hit the state of MISSREF in the RFC Editor queue.
>> But that should not prevent anyone from starting implementation of the
>> module. As a side note, the NETCONF WG is planning on sending the
>> crypto-types draft to IESG shortly. What you do not want is to duplicate the
>> definition of the algorithms in your own draft.
>>
>> HTH.
>>
>>>
>>>
>>> Thank you very much,
>>>
>>> Linda & Yoav
>>>
>>> _______________________________________________
>>> yang-doctors mailing list
>>> [email protected] <mailto:[email protected]>
>>> https://www.ietf.org/mailman/listinfo/yang-doctors
>>> <https://www.ietf.org/mailman/listinfo/yang-doctors>
>> Mahesh Jethanandani
>> [email protected] <mailto:[email protected]>
>>
>>
>>
>> _______________________________________________
>> yang-doctors mailing list
>> [email protected] <mailto:[email protected]>
>> https://www.ietf.org/mailman/listinfo/yang-doctors
>> <https://www.ietf.org/mailman/listinfo/yang-doctors>
>> _______________________________________________
>> I2nsf mailing list
>> [email protected] <mailto:[email protected]>
>> https://www.ietf.org/mailman/listinfo/i2nsf
>> <https://www.ietf.org/mailman/listinfo/i2nsf>
> _______________________________________________
> I2nsf mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/i2nsf
-------------------------------------------------------
Rafa Marin-Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: [email protected]
-------------------------------------------------------
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf