Sorry, it took a while to get back to this. Thanks for your comments. Please 
see below for the responses.

Thanks
Senthil

On 2/8/17, 1:15 PM, "Softwires on behalf of Senthil Sivakumar (ssenthil)" 
<[email protected] on behalf of [email protected]> wrote:

    I had reached out to Dan Wing and some others, as suggested by Ian to get 
reviews on the 
    https://tools.ietf.org/html/draft-sivakumar-yang-nat-05.
    
    I am just posting the response from Dan here, I will address his comments 
in a separate email and copy the alias.
    
    Thanks
    Senthil
    
    Use [email protected] as my email address, to ease sorting the email 
if someone happens to follow up.  
        
    >> was going to ask you for a favor to review a I-D for me. The 
recommendation from OPS WG was to get
        >> Some expert reviews from Behave members, finding any behave members 
willing to do a review is hard these days.
        >> 
        >> https://tools.ietf.org/html/draft-sivakumar-yang-nat-05
        > 
        >    My comments -- do you want them public somewhere?
        > 
        >    1. Why not also cover NAT66 and NPTv6?  It seems the design allows 
those, but the text doesn't mention that they can also be expressed in this 
model.

NPTv6 is definitely a possibility, I am not sure if that is something that 
needs to be in this yang model though. NAT66 is a can of worms and I would like 
to stay away from that.
If NAT66 becomes a reality, we could define a yang model for it then.
        > 
        >    2. "   A NAT function can either assign individual port numbers or 
port
        >       sets.  Both features are supported in the YANG data model."  -> 
 can you provide citation or definition of "port set"?
Ok, I will add the definition of port sets. 

        > 
        >    3. "   To accommodate deployments where [RFC6302] is not enabled, 
the NAT
        >       function can be configured to log the destination port number." 
->  that logging is not a "NAT function" (whereas the previous paragraph does 
describe a NAT function).  Logging is a function of YANG, right?  Perhaps 
instead how about text like "... this defined Yang model can be configured to 
..."

Well, semantically, the NAT must provide the destination port to be able to log 
the destination port. draft-ietf-ipfix-nat-logging provides the templates to 
log the destination ports, the logging of the destination port 
can be enabled by the Yang model. The intention of the text here is to enable 
NAT logging of destination ports through the Yang model. 

        > 
        >    4.    "This data model assumes that pools of IPv4 addresses can be
        >       provisioned to NAT function.  These pools may be contiguous or 
non-
        >       contiguous."
        > 
        >    First sentence does not read well, would be improved with "... can 
be provisioned to *the* NAT function".  Also, please provide description or 
citation to what is meant by "pool".
I agree, I rephrase the first sentence as follows:
“This data model assumes that a block of IPv4 global addresses can be 
provisioned to the NAT function.”

        > 
        >    5. "A NAT device can enabled multiple NAT instances;"
        > 
        >    does not read well.

Yes, agreed. Will rephrase as:
“A single NAT device can have multiple NAT instances;"
        > 
        >    6. "   o  Exclude/include ports (e.g.; system port) from the port 
assignment
        >          pool."
        > 
        >    Nit: That should be "system portS" (plural).

Ok.
        > 
        >    Serious:  that is a significant deficiency.
The reason I think it was excluded was that, it comes with significant 
complexity and most of the 
NAT implementations don’t have explicit configuration to allow this behavior. 
We will discuss this among the authors and 
See what is the best way to address this.
        > 
        >    7. "Deterministic NAT assignment scheme" -> provide description or 
citation about what that means.
        > 
Ok.
        >    8. "module: ietf-nat
        >       +--rw nat-config
        >       |  +--rw nat-instances
        >       |     +--rw nat-instance* [id]
        >       |        +--rw id                                 uint32
        >       |        +--rw enable?                            boolean
        >       |        +--rw external-ip-address-pool* [pool-id]
        >       |        |  +--rw pool-id             uint32
        >       |        |  +--rw external-ip-pool?   inet:ipv4-prefix"
        > 
        >    How is IPv6 expressed for NAT64?

The address pool is always a IPv4 global address pool whether is NAT64 or 
NAT44. 
This is the address block from which the source is translated to. This 
configuration applies 
To both NAT64 and NAT44 and hence no distinction is required.
        > 
        > 
        >    9.  "   |        +--rw subscriber-mask-v6?                uint8
        >       |        +--rw subscriber-mask-v4* [sub-mask-id]
        >       |        |  +--rw sub-mask-id    uint32
        >       |        |  +--rw sub-mask       inet:ipv4-prefix"
        > 
        >    Why are IPv6 masks expressed differently than IPv4 mask?

The subscriber-mask-v6 is described in the later part of the document and it 
was thought of having a single mask value that can be used
to apply to determine if the packet need to be translated or not. We thought it 
would simplify the configuration. But thinking about it again,
I think some of the implementations of NAT64 don’t understand an integer as a 
mask but they need the whole ipv6-prefix. I am going to discuss
This with the authors and change this to ipv6-prefix. At the least, we will 
have either a prefix or an integer to represent the mask length.
        > 
        >    Is "subscriber" the same as "internal"?  I mean, this whole Yang 
model seems to use "subscriber" and "external", rather than "internal" and 
"external".  What if the "internal" side isn't """subscribers""", such as a NAT 
in front of a datacenter, like a NAT64 in front of an IPv6-only datacenter, or 
a NAT44 in front of an IPv4-only datacenter; in that case the "subscriber" is 
now confusingly the server.

Subscriber does imply internal. I will add some text around this to clarify 
what subscribers mean here. If all the authors agree, I will change it to 
internal and external, rather than subscriber and external.
        > 
        > 
        >    10.     |        +--rw port-randomization-enable?         boolean
        >       |        +--rw port-preservation-enable?          boolean
        > 
        >    both of those could be set to TRUE, creating opportunity for 
configuration and implementation conflict, creating interoperability problems.  
Can you instead define a trinary value, or does Yang like to have booleans so 
much, even when they can cause interop problems?

I will discuss this with the authors and address this. I don’t know if we can 
represent this more efficiently. 
        > 
        >    11.    |        +--rw udp-timeouts?                      uint32
        > 
        >    Have you considered per-port timeouts?  Some NATs are configurable 
with short timeouts for certain ports, such as 10 seconds on port 53 (DNS) and 
NTP (123) and longer timeouts on other ports.  This Yang model doesn't allow 
that.  Seems a port list might be better to handle such configurations.

Good point. I will add the per-port timeouts with a list.
        > 
        >    12. I noticed there isn't any reference in the text to RFC7857, 
which updates and clarifies a lot of things.  Is the Yang model compliant with 
the changes caused by RFC7857?  The text should certainly cite it where it 
makes sense, but more importantly if additional settings are required by 
RFC7857, they need to be part of the yang model.
        > 

I believe it is compliant, I will talk to Med and make sure we are covered here.

        >    13.    |        +--rw logging-info
        >       |        |  +--rw destination-address    inet:ipv4-prefix
        >       |        |  +--rw destination-port       inet:port-number
        > 
        >    this doesn't indicate UDP or TCP, and doesn't seem able to log 
ICMP or other protocols that lack ports, which NATs might NAT (e.g., IPsec ESP 
protocol 50).  Should be highlighted in security considerations.
Ok.
        > 
        >    14.    |        +--rw connection-limit
        >       |        |  +--rw limit-per-subscriber?   uint32
        >       |        |  +--rw limit-per-vrf?          uint32
        >       |        |  +--rw limit-per-subnet?       inet:ipv4-prefix
        > 
        >    Can only list one subnet?
        > 
Yes, it is a per-subnet basis and optional. 

        >    This doesn't allow different limits per VRF (e.g., VRF 1 is 
limited to 100 mappings, VRF 2 is limited to 5555 mappings).  Seems restrictive.
        > 
Ok, we will discuss this again and decide if these should be an array of 
limits. 

        >    15.    |        +--rw ftp-alg-enable?                    boolean
        >       |        +--rw dns-alg-enable?                    boolean
        >       |        +--rw tftp-alg-enable?                   boolean
        >       |        +--rw msrpc-alg-enable?                  boolean
        >       |        +--rw netbios-alg-enable?                boolean
        >       |        +--rw rcmd-alg-enable?                   boolean
        >       |        +--rw ldap-alg-enable?                   boolean
        >       |        +--rw sip-alg-enable?                    boolean
        >       |        +--rw rtsp-alg-enable?                   boolean
        >       |        +--rw h323-alg-enable?                   boolean
        >       |        +--rw all-algs-enable?                   boolean
        > 
        >    OMG.  ALGs, really?  Do those need to be per-subscriber or per-VRF 
or per-subnet?  How are new ALGs added to Yang, like if I want an ALG for, um, 
I dunno, WebRTC or ssh.
        > 
The yang models are extensible, you can augment more nodes or fields. But you 
could make the above argument for anything that changes. Honestly, I haven’t 
seen a need for a new ALG
In quite a few years.

        >    16.  In mapping-table, I see:    "rw lifetime                
uint32".  Would this track the lifetime while the TCP connection is becoming 
fully-formed and hits the various Yang-defined 'timeout' values 
(tcp-idle-timeout, tcp-trans-open-timeout, and so on)?".  I suppose it does.  
Text should say so.
        > 
        >    17.             |  +--ro nat44-support?                            
  boolean
        >                |  +--ro nat64-support?                              
boolean
        > 
        > 
        >    NAT46?  NAT66?  NPTv6?  XLAT64?  CLAT?
Well, I will add NPTv6 to it, I don’t want to support non-ietf flavors like 46 
and 66. 
        > 
        >    18.  stealth-mode-support needs better description than "Indicates 
whether to respond for unsolicited traffic.", and needs to align with IETF host 
requirements and IETF router requirements RFCs.
        > 
Ok, I will improve the description and add references.
        > 
        >    -d
        > 
        > 
        > 
        > 
        > 
        
 Thanks 
Senthil
    
    _______________________________________________
    Softwires mailing list
    [email protected]
    https://www.ietf.org/mailman/listinfo/softwires
    

_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to