For the record, I prefer Lada’s solution of having a union that takes both a 
number and an identity/enum. 


> On Apr 9, 2019, at 4:25 AM, Yoav Nir <[email protected]> wrote:
> 
> Good.  But since we are getting a YANG doctor review, let’s wait for that 
> before revving the draft.
> 
> Yoav
> 
> 
>> On 9 Apr 2019, at 10:49, Rafa Marin-Lopez <[email protected]> wrote:
>> 
>> Hi Yoav:
>> 
>> After thinking about these past days, I personally think the same. 
>> 
>> I would add a uint16 and a comment in the description. As we agreed in the 
>> last IETF meeting, I do not think our I-D should solve this problem, since 
>> this problem happens in general.
>> 
>> As an example:
>> 
>> typedef ike-integrity-algorithm-t {
>>                      type uint32; 
>>                      description “The acceptable numbers are defined in IANA 
>> Registry - Internet Key Exchange Version 2 (IKEv2) Parameters - IKEv2  
>> Transform Type 1 - Encryption Algorithm Transform IDs";
>> }
>> 
>> Is this reasonable?
>> 
>> 
>>> El 5 abr 2019, a las 20:13, Yoav Nir <[email protected]> escribió:
>>> 
>>> At this point I’m wondering if it would not be a better strategy to avoid 
>>> all enumerations of algorithms, whether they are spelled out or imported 
>>> from draft-ietf-netconf-crypto-types, and instead use the numbers from the 
>>> IANA registry for IPsec.
>>> 
>>> That does not help us deprecate old algorithms, but it solves the other 
>>> issue, which is what to do when a new algorithm is added to IPsec. We don’t 
>>> want to have to publish a new i2nsf document whenever that happens, and if 
>>> the algorithm identifier is just a number, new values can be added by IANA.
>>> 
>>> Yoav
>>> 
>>>> On 5 Apr 2019, at 20:42, Andy Bierman <[email protected]> wrote:
>>>> 
>>>> Hi,
>>>> 
>>>> I think conformance for identities is handled very poorly in YANG.
>>>> There is an if-feature-stmt allowed inside an identity in YANG 1.1.
>>>> This implies that any identity without if-feature is 
>>>> mandatory-to-implement.
>>>> 
>>>> If the identities are in a separate module, the server can list it as an 
>>>> imported module,
>>>> which tells the client the server does not implement any of the identities.
>>>> 
>>>> There is no standard way for the server to inform the client which 
>>>> identities it supports
>>>> for a given identityref data node.
>>>> 
>>>> The common implementation strategy is to completely ignore YANG 
>>>> conformance for identities
>>>> (as Mahesh explained). You just try setting the leaf and see if the server 
>>>> accepts it.
>>>> 
>>>> Andy
>>>> 
>>>> 
>>>>> On Fri, Apr 5, 2019 at 10:33 AM Mahesh Jethanandani 
>>>>> <[email protected]> wrote:
>>>>> Hi Linda,
>>>>> 
>>>>> 
>>>>>> On Apr 5, 2019, at 9:51 AM, Linda Dunbar <[email protected]> wrote:
>>>>>> 
>>>>>> Dear YANG Doctor:
>>>>>>  
>>>>>> We need your help in reviewing the YANG model in 
>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection which I2NSF WG is about to 
>>>>>> call WGLC.
>>>>>>  
>>>>>> In particular, we need your advice on the following issue:
>>>>>>  
>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection-04 imports from 
>>>>>> draft-ietf-netconf-crypto-types, which appears to be a generic list of 
>>>>>> algorithms.
>>>>>> The problem is that the list in draft-ietf-netconf-crypto-types could 
>>>>>> contain algorithms that are not suitable for IPsec (such as secp192r1 
>>>>>> for key agreement), and right now it seems to lack some older algorithms 
>>>>>> that have fallen out of fashion (3DES) but is still needed in IPsec.  
>>>>> 
>>>>> All the algorithms in draft-ietf-netconf-crypto-types are defined as 
>>>>> identities. If you do not find the algorithm you are looking for in the 
>>>>> list of defined algorithms, you can go ahead and define your own in your 
>>>>> own draft, using the same base identity from the ietf-crypto-types module.
>>>>> 
>>>>>>  
>>>>>>  
>>>>>> Questions to the YANG Doctor:
>>>>>> 1.       Is it better to list the IPsec specific algorithms in 
>>>>>> draft-ietf-i2nsf-sdn-ipsec-flow-protection (which is a subset of 
>>>>>> draft-ietf-netconf-crypto-types? Or to import all crypto algorithms many 
>>>>>> of which are not relevant to IPsec? What is the common practice? 
>>>>> 
>>>>> Importing ietf-crypto-types does not mean you have to implement every 
>>>>> algorithm listed in the module. You can import the module and chose to 
>>>>> implement the algorithms you want to implement, including defining any 
>>>>> new ones.
>>>>> 
>>>>>> 2.      If we do import from draft-ietf-netconf-crypto-types, does it 
>>>>>> mean draft-ietf-i2nsf-sdn-ipsec-flow-protection cannot be published 
>>>>>> until draft-ietf-netconf-crypto-types is published?
>>>>> 
>>>>> Yes. The i2nsf draft will hit the state of MISSREF in the RFC Editor 
>>>>> queue. But that should not prevent anyone from starting implementation of 
>>>>> the module. As a side note, the NETCONF WG is planning on sending the 
>>>>> crypto-types draft to IESG shortly. What you do not want is to duplicate 
>>>>> the definition of the algorithms in your own draft.
>>>>> 
>>>>> HTH.
>>>>> 
>>>>>>  
>>>>>>  
>>>>>> Thank you very much, 
>>>>>>  
>>>>>> Linda & Yoav
>>>>>>  
>>>>>> _______________________________________________
>>>>>> yang-doctors mailing list
>>>>>> [email protected]
>>>>>> https://www.ietf.org/mailman/listinfo/yang-doctors
>>>>> 
>>>>> Mahesh Jethanandani
>>>>> [email protected]
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> yang-doctors mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/yang-doctors
>>>> _______________________________________________
>>>> I2nsf mailing list
>>>> [email protected]
>>>> https://www.ietf.org/mailman/listinfo/i2nsf
>>> 
>>> _______________________________________________
>>> I2nsf mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/i2nsf
>> 
>> -------------------------------------------------------
>> Rafa Marin-Lopez, PhD
>> Dept. Information and Communications Engineering (DIIC)
>> Faculty of Computer Science-University of Murcia
>> 30100 Murcia - Spain
>> Telf: +34868888501 Fax: +34868884151 e-mail: [email protected]
>> -------------------------------------------------------
>> 
>> 
>> 
>> 
> 
Mahesh Jethanandani 
[email protected]
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to