Hurry?!  Please look at the history of this draft.

On 11/18/16 3:27 PM, David Bannister wrote:
> If you are in a hurry use your vendor model.
>
> On Fri, Nov 18, 2016 at 11:24 PM Eliot Lear <l...@cisco.com
> <mailto:l...@cisco.com>> wrote:
>
>     It's already useful to me.  And we've seen other people say it is
>     useful to them.  If you need something specific, say so now
>     please, but otherwise let's please move along.
>
>     Eliot
>
>
>     On 11/18/16 3:07 PM, David Bannister wrote:
>>     This draft should not move forward, it needs more work to be
>>     useful. Will be working with Dean next week to fix things up.
>>
>>     On Fri, Nov 18, 2016 at 11:02 PM Eliot Lear <l...@cisco.com
>>     <mailto:l...@cisco.com>> wrote:
>>
>>         Dean and friends,
>>
>>         I'd just like to add one additional point.  This draft has
>>         been in numerous forms of WGLC for a while now.   Can we
>>         please agree that as a proposed standard we have passed the
>>         point where perfect is the enemy of good?  Some of us need
>>         this work finished.
>>
>>         Thanks,
>>
>>         Eliot
>>
>>
>>
>>
>>
>>         On 11/18/16 1:55 PM, Acee Lindem (acee) wrote:
>>>         Hi Dean, 
>>>         If you make this a list of heterogeneous IPv4 header fields,
>>>         how will you constrain specification to only one field of
>>>         each type? For example, one source address? Existing
>>>         implementations do not support multiples and generate all
>>>         permutations (given multiple specifications of each field)
>>>         could be complex. 
>>>         Thanks,
>>>         Acee 
>>>
>>>
>>>         From: netmod <netmod-boun...@ietf.org
>>>         <mailto:netmod-boun...@ietf.org>> on behalf of Dean
>>>         Bogdanovic <ivand...@gmail.com <mailto:ivand...@gmail.com>>
>>>         Date: Tuesday, November 15, 2016 at 10:06 AM
>>>         To: Kent Watsen <kwat...@juniper.net
>>>         <mailto:kwat...@juniper.net>>
>>>         Cc: "netmod@ietf.org <mailto:netmod@ietf.org>"
>>>         <netmod@ietf.org <mailto:netmod@ietf.org>>
>>>         Subject: Re: [netmod] WG Last Call for
>>>         draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>>
>>>             I have something that might delay WGLC, but found out an
>>>             optimization which would help in the future
>>>
>>>             In ietf-packet-fields.yang, example below
>>>
>>>             grouping acl-ipv4-header-fields {
>>>                description
>>>                  "Fields in IPv4 header.";
>>>                leaf destination-ipv4-network {
>>>                  type inet:ipv4-prefix;
>>>                  description
>>>                    "Destination IPv4 address prefix.";
>>>                }
>>>                leaf source-ipv4-network {
>>>                  type inet:ipv4-prefix;
>>>                  description
>>>                    "Source IPv4 address prefix.";
>>>                }
>>>              }
>>>
>>>             Instead of using "leaf" for "destination-ipv4-network"
>>>             and "source-ipv4-network", "leaf-list" reduces the
>>>             number of terms/ace needed.
>>>
>>>             If we would agree with this change, then would propose
>>>             one more 
>>>
>>>             for mac-addresses, having the mask under the address
>>>             itself look better in the data itself:
>>>
>>>               <destination-mac-address>
>>>                 <address>01:01:01:00:00:00</address>
>>>                 <mask>ff:ff:ff:00:00:00</mask>
>>>               </destination-mac-address>
>>>
>>>               Or create a new type 'mac-address-prefix'.
>>>
>>>               This allows having matching multiple destinations to 1
>>>             source, or multiple sources to 1 destination, if they
>>>             cannot be easily combined into 1 entry.
>>>
>>>               <destination-mac-address>
>>>                 <address>01:01:01:00:00:00</address>
>>>                 <mask>ff:ff:ff:00:00:00</mask>
>>>               </destination-mac-address>
>>>               <destination-mac-address>
>>>                 <address>01:04:01:00:00:00</address>
>>>                 <mask>ff:ff:ff:00:00:00</mask>
>>>               </destination-mac-address>
>>>               <source-mac-address>
>>>                 ....
>>>               </source-mac-address>
>>>>             On Nov 14, 2016, at 7:35 AM, Dean Bogdanovic
>>>>             <ivand...@gmail.com <mailto:ivand...@gmail.com>> wrote:
>>>>
>>>>             Kent,
>>>>
>>>>             Thank you for the answer
>>>>>             On Nov 13, 2016, at 1:20 PM, Kent Watsen
>>>>>             <kwat...@juniper.net <mailto:kwat...@juniper.net>> wrote:
>>>>>
>>>>>             Hi Dean,
>>>>>              
>>>>>             > Don’t understand your question. What is the
>>>>>             difference between system and user generated acls?
>>>>>              
>>>>>             User-generated would be, for instance, configured via
>>>>>             NETCONF or RESTCONF, whereas system-generated would be
>>>>>             ACLs that get created by default.  For example, RFC
>>>>>             7223 has the top-level /interfaces-state to support
>>>>>             system-generated interfaces (e.g., lo) so, when
>>>>>             running `shows interfaces`, the result includes both
>>>>>             configured and system-generated interfaces.   Makes sense?
>>>>
>>>>             I understand now what you meant. Where I can see for
>>>>             the interfaces the use case you describe (for loopback
>>>>             and physical interfaces), for ACLs have much harder
>>>>             time to find an example use case where a system would
>>>>             generate an ACL. Maybe for a highly secure system would
>>>>             generate an ACL to deny all traffic to and from, except
>>>>             to access it via console when it comes up. Can you come
>>>>             with some other use cases? If we can find viable use
>>>>             cases, then yes, would say that reporting opstate for
>>>>             system generated ACLs is useful.
>>>>
>>>>             Dean
>>>>
>>>>>              
>>>>>             Thanks,
>>>>>             Kent
>>>>>              
>>>>>             *From: *Dean Bogdanovic <ivand...@gmail.com
>>>>>             <mailto:ivand...@gmail.com>>
>>>>>             *Date: *Friday, November 11, 2016 at 3:45 PM
>>>>>             *To: *Kent Watsen <kwat...@juniper.net
>>>>>             <mailto:kwat...@juniper.net>>
>>>>>             *Cc: *"netmod@ietf.org <mailto:netmod@ietf.org>"
>>>>>             <netmod@ietf.org <mailto:netmod@ietf.org>>
>>>>>             *Subject: *Re: [netmod] WG Last Call for
>>>>>             draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>>>>              
>>>>>              
>>>>>>             On Oct 29, 2016, at 4:01 AM, Kent Watsen
>>>>>>             <kwat...@juniper.net <mailto:kwat...@juniper.net>> wrote:
>>>>>>              
>>>>>>             The last call period for this draft has ended. 
>>>>>>              Thank you to all that responded.  Given the
>>>>>>             responses received, my co-chair and I believe that
>>>>>>             the draft is ready to move forward.  I will begin the
>>>>>>             shepherd write-up shortly.
>>>>>>             In parallel, prompted by a conversation I had this
>>>>>>             morning, I’m wondering about the YANG module’s use of
>>>>>>             the config false nodes ‘acl-oper-data’ and
>>>>>>             ‘ace-oper-data’.  In particular, are the lifetimes of
>>>>>>             these nodes always the same as the configured nodes? 
>>>>>              
>>>>>             Yes, they are. When the nodes are created, they are
>>>>>             don’t have to be attached to an another object, like
>>>>>             interface or RIB, etc, but they get operational state.
>>>>>             Once attached, (to continue with the example)
>>>>>             operational status of counters is changing. When
>>>>>             detached from the interface, the last know counter is
>>>>>             kept, until the ace is deleted. Same is for acl-oper-data.
>>>>>              
>>>>>>             - is there any need to support reporting opstate for
>>>>>>             system-generated acts?
>>>>>              
>>>>>             Don’t understand your question. What is the difference
>>>>>             between system and user generated acls?
>>>>>              
>>>>>             Dean
>>>>>              
>>>>>>              
>>>>>>             Thanks,
>>>>>>             Kent (as shepherd)
>>>>>>              
>>>>>>              
>>>>>>             *From: *netmod <netmod-boun...@ietf.org
>>>>>>             <mailto:netmod-boun...@ietf.org>> on behalf of Kent
>>>>>>             Watsen <kwat...@juniper.net <mailto:kwat...@juniper.net>>
>>>>>>             *Date: *Thursday, October 13, 2016 at 5:05 PM
>>>>>>             *To: *"netmod@ietf.org <mailto:netmod@ietf.org>"
>>>>>>             <netmod@ietf.org <mailto:netmod@ietf.org>>
>>>>>>             *Subject: *[netmod] WG Last Call for
>>>>>>             draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>>>>>              
>>>>>>              
>>>>>>             This is a notice to start a two-week NETMOD WG last
>>>>>>             call for the document:
>>>>>>              
>>>>>>                            Network Access Control List (ACL) YANG
>>>>>>             Data Model
>>>>>>                            
>>>>>> _https://tools.ietf.org/html/draft-ietf-netmod-acl-model-09_
>>>>>>              
>>>>>>             Please indicate your support or concerns by Thursday,
>>>>>>             October 27, 2016.
>>>>>>              
>>>>>>             We are particularly interested in statements of the form:
>>>>>>               * I have reviewed draft-ietf-netmod-acl-model-09
>>>>>>             and found no issues.
>>>>>>               * I have reviewed draft-ietf-netmod-acl-model-09
>>>>>>             and found the following issues: ...
>>>>>>              
>>>>>>             As well as:
>>>>>>              * I have implemented the data model in
>>>>>>             draft-ietf-netmod-acl-model-09.
>>>>>>               * I am implementing the data model in
>>>>>>             draft-ietf-netmod-acl-model-09.
>>>>>>               * I am considering to implement the data model in
>>>>>>             draft-ietf-netmod-acl-model-09.
>>>>>>               * I am not considering to implement the data model
>>>>>>             in draft-ietf-netmod-acl-model-09.
>>>>>>              
>>>>>>             Thank you,
>>>>>>             NETMOD WG Chairs
>>>>>>              
>>>>>>              
>>>>>>             _______________________________________________
>>>>>>             netmod mailing list
>>>>>>             netmod@ietf.org <mailto:netmod@ietf.org>
>>>>>>             https://www.ietf.org/mailman/listinfo/netmod
>>>>>
>>>>>
>>>>
>>>
>>>
>>>
>>>         _______________________________________________
>>>         netmod mailing list
>>>         netmod@ietf.org <mailto:netmod@ietf.org>
>>>         https://www.ietf.org/mailman/listinfo/netmod
>>
>>         _______________________________________________
>>         netmod mailing list
>>         netmod@ietf.org <mailto:netmod@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/netmod
>>
>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod

Reply via email to