Andy: 

On Ephemeral-REQ-05/06:  You are correct, the ephemeral indication in Yang 
could be an extension.   Do you have a suggestion to revise the text for 
Ephemeral-REQ-05? 

   Ephemeral-REQ-05: The ability to augment an object with appropriate
   YANG structures that have the property of being ephemeral.  An object
   defined as Yang module, schema tree, a schema node, submodule or
   components of a submodule (derived types, groupings, data node, RPCs,
   actions, and notifications".

    Ephemeral-REQ-06: Yang MUST have a way to indicate in a data model
   that nodes have the following properties: ephemeral, writable/not-
   writable, status/configuration, and secure/non-secure transport.  (If
   you desire examples, please see [I-D.hares-i2rs-protocol-strawman]
   for potential yang syntax).

Sue 

From: i2rs [mailto:[email protected]] On Behalf Of Andy Bierman
Sent: Wednesday, May 25, 2016 10:13 PM
To: Juergen Schoenwaelder; Susan Hares; Jeffrey Haas; [email protected]
Subject: Re: [i2rs] I-D Action: draft-ietf-i2rs-ephemeral-state-06.txt --


On Wed, May 25, 2016 at 3:33 PM, Juergen Schoenwaelder 
<[email protected]> wrote:
On Wed, May 25, 2016 at 05:59:54PM -0400, Susan Hares wrote:
>> Juergen:
>> Thank you for your comments on the ephemeral state\
>> On Ephemeral-REQ-05, does this clarify the requirement:
>> Ephemeral-REQ-05: The ability to add on an object (or a hierarchy of
>> objects) that have the property of being ephemeral.  An object defined as
> Yang module, schema tree, a schema node, submodule or components of a 
> submodule (derived types, groupings, data node, RPCs, actions, and 
> notifications).

> [Juergen]: I have no clue what the above sentence is trying to say. Please 
> try to
use YANG terminology.

>> Any ephemeral object must be able to be identified by a yang key word.

>[Andy]: Why does there have to be a YANG keyword?
>This could be an extension and not a keyword, depending on how it is done. The 
> extension vs. keyword debate will not be rehashed here, but there is an issue 
> wrt/ >how the data definition is interpreted by tools/protocols that do not 
> understand the >extension and just ignore it.

>Shared:
>
> list foo {
>    i2rs:ephemeral true;
 >    ....
> }

I2RS-only:

>  i2rs:ephemeral {
>    list foo {  ... }
> }

Sue: This works for me. 

>> On Ephemeral-REQ-06, does this text restrict the definition to just
>> requirements:
>> "Ephemeral-REQ-06:  Yang MUST have a way to
>> indicate in a data model that nodes have the following
>> properties: ephemeral, writable/not-writable, status/configuration,
>> and secure/non-secure transport.
>> (If you desire examples, please see draft-hares-i2rs-protocol-strawman for
>> potential yang syntax).  

> [Andy]: We do have config true/false this implies writable/not-writable. I
> find the idea strange that a data model defines secure/non-secure
> transport as a property of an data model definition since it usually
> depends on the deployment context whether it is acceptable to carry
> data over a non-secure transport.

Sue:  You are correct that config true/false implies that 
writable/non-writeable.  
Sue:  On Secure/non-secure: The data model defines information that must be 
passed over secure or non-secure transport.   The type of transport is left to 
the protocol. 

>This is a very expensive feature wrt/ standards resources.
> First the WG has to agree that all the subtree data is OK to send in the 
> clear  under all circumstances. (Including augmenting nodes?)  
> Then this needs to be carefully reviewed by the SECDIR and IESG.  
> Both steps will require lots of IETF time.

Sue: Agreed.  However, the WG set this in its architecture and its initial 
requirements.   

> I agree that operators need to have the final say.

Sue: Ok, then we should design it and see if the operators use it. 

>This extension is the opposite of the nacm:default-deny-all extension.
>But it is designed to allow operators to configure access through NACM.
>How does an operator override the extension?
>And if the operator can override, why is an extension even needed?
>If not, then what criteria is used to decide the data is universally 
>non-secure?

Sue:  I do not see how this extension is the opposite of 
"nacm:default-deny-all" extension or relates to the operators access through 
NACM.   The purpose is not to change who can connect, only what type of 
transport the messages go over. 
  
>>Andy

Thanks for commenting.

Sue  
=
[snip]
 


_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to