It's already useful to me.  And we've seen other people say it is useful
to them.  If you need something specific, say so now please, but
otherwise let's please move along.

Eliot


On 11/18/16 3:07 PM, David Bannister wrote:
> This draft should not move forward, it needs more work to be useful.
> Will be working with Dean next week to fix things up.
>
> On Fri, Nov 18, 2016 at 11:02 PM Eliot Lear <l...@cisco.com
> <mailto:l...@cisco.com>> wrote:
>
>     Dean and friends,
>
>     I'd just like to add one additional point.  This draft has been in
>     numerous forms of WGLC for a while now.   Can we please agree that
>     as a proposed standard we have passed the point where perfect is
>     the enemy of good?  Some of us need this work finished.
>
>     Thanks,
>
>     Eliot
>
>
>
>
>
>     On 11/18/16 1:55 PM, Acee Lindem (acee) wrote:
>>     Hi Dean, 
>>     If you make this a list of heterogeneous IPv4 header fields, how
>>     will you constrain specification to only one field of each type?
>>     For example, one source address? Existing implementations do not
>>     support multiples and generate all permutations (given multiple
>>     specifications of each field) could be complex. 
>>     Thanks,
>>     Acee 
>>
>>
>>     From: netmod <netmod-boun...@ietf.org
>>     <mailto:netmod-boun...@ietf.org>> on behalf of Dean Bogdanovic
>>     <ivand...@gmail.com <mailto:ivand...@gmail.com>>
>>     Date: Tuesday, November 15, 2016 at 10:06 AM
>>     To: Kent Watsen <kwat...@juniper.net <mailto:kwat...@juniper.net>>
>>     Cc: "netmod@ietf.org <mailto:netmod@ietf.org>" <netmod@ietf.org
>>     <mailto:netmod@ietf.org>>
>>     Subject: Re: [netmod] WG Last Call for
>>     draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>
>>         I have something that might delay WGLC, but found out an
>>         optimization which would help in the future
>>
>>         In ietf-packet-fields.yang, example below
>>
>>         grouping acl-ipv4-header-fields {
>>            description
>>              "Fields in IPv4 header.";
>>            leaf destination-ipv4-network {
>>              type inet:ipv4-prefix;
>>              description
>>                "Destination IPv4 address prefix.";
>>            }
>>            leaf source-ipv4-network {
>>              type inet:ipv4-prefix;
>>              description
>>                "Source IPv4 address prefix.";
>>            }
>>          }
>>
>>         Instead of using "leaf" for "destination-ipv4-network" and
>>         "source-ipv4-network", "leaf-list" reduces the number of
>>         terms/ace needed.
>>
>>         If we would agree with this change, then would propose one more 
>>
>>         for mac-addresses, having the mask under the address itself
>>         look better in the data itself:
>>
>>           <destination-mac-address>
>>             <address>01:01:01:00:00:00</address>
>>             <mask>ff:ff:ff:00:00:00</mask>
>>           </destination-mac-address>
>>
>>           Or create a new type 'mac-address-prefix'.
>>
>>           This allows having matching multiple destinations to 1
>>         source, or multiple sources to 1 destination, if they cannot
>>         be easily combined into 1 entry.
>>
>>           <destination-mac-address>
>>             <address>01:01:01:00:00:00</address>
>>             <mask>ff:ff:ff:00:00:00</mask>
>>           </destination-mac-address>
>>           <destination-mac-address>
>>             <address>01:04:01:00:00:00</address>
>>             <mask>ff:ff:ff:00:00:00</mask>
>>           </destination-mac-address>
>>           <source-mac-address>
>>             ....
>>           </source-mac-address>
>>>         On Nov 14, 2016, at 7:35 AM, Dean Bogdanovic
>>>         <ivand...@gmail.com <mailto:ivand...@gmail.com>> wrote:
>>>
>>>         Kent,
>>>
>>>         Thank you for the answer
>>>>         On Nov 13, 2016, at 1:20 PM, Kent Watsen
>>>>         <kwat...@juniper.net <mailto:kwat...@juniper.net>> wrote:
>>>>
>>>>         Hi Dean,
>>>>          
>>>>         > Don’t understand your question. What is the difference between
>>>>         system and user generated acls?
>>>>          
>>>>         User-generated would be, for instance, configured via
>>>>         NETCONF or RESTCONF, whereas system-generated would be ACLs
>>>>         that get created by default.  For example, RFC 7223 has the
>>>>         top-level /interfaces-state to support system-generated
>>>>         interfaces (e.g., lo) so, when running `shows interfaces`,
>>>>         the result includes both configured and system-generated
>>>>         interfaces.   Makes sense?
>>>
>>>         I understand now what you meant. Where I can see for the
>>>         interfaces the use case you describe (for loopback and
>>>         physical interfaces), for ACLs have much harder time to find
>>>         an example use case where a system would generate an ACL.
>>>         Maybe for a highly secure system would generate an ACL to
>>>         deny all traffic to and from, except to access it via
>>>         console when it comes up. Can you come with some other use
>>>         cases? If we can find viable use cases, then yes, would say
>>>         that reporting opstate for system generated ACLs is useful.
>>>
>>>         Dean
>>>
>>>>          
>>>>         Thanks,
>>>>         Kent
>>>>          
>>>>         *From: *Dean Bogdanovic <ivand...@gmail.com
>>>>         <mailto:ivand...@gmail.com>>
>>>>         *Date: *Friday, November 11, 2016 at 3:45 PM
>>>>         *To: *Kent Watsen <kwat...@juniper.net
>>>>         <mailto:kwat...@juniper.net>>
>>>>         *Cc: *"netmod@ietf.org <mailto:netmod@ietf.org>"
>>>>         <netmod@ietf.org <mailto:netmod@ietf.org>>
>>>>         *Subject: *Re: [netmod] WG Last Call for
>>>>         draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>>>          
>>>>          
>>>>>         On Oct 29, 2016, at 4:01 AM, Kent Watsen
>>>>>         <kwat...@juniper.net <mailto:kwat...@juniper.net>> wrote:
>>>>>          
>>>>>         The last call period for this draft has ended.   Thank you
>>>>>         to all that responded.  Given the responses received, my
>>>>>         co-chair and I believe that the draft is ready to move
>>>>>         forward.  I will begin the shepherd write-up shortly.
>>>>>         In parallel, prompted by a conversation I had this
>>>>>         morning, I’m wondering about the YANG module’s use of the
>>>>>         config false nodes ‘acl-oper-data’ and ‘ace-oper-data’. 
>>>>>         In particular, are the lifetimes of these nodes always the
>>>>>         same as the configured nodes? 
>>>>          
>>>>         Yes, they are. When the nodes are created, they are don’t
>>>>         have to be attached to an another object, like interface or
>>>>         RIB, etc, but they get operational state. Once attached,
>>>>         (to continue with the example) operational status of
>>>>         counters is changing. When detached from the interface, the
>>>>         last know counter is kept, until the ace is deleted. Same
>>>>         is for acl-oper-data.
>>>>          
>>>>>         - is there any need to support reporting opstate for
>>>>>         system-generated acts?
>>>>          
>>>>         Don’t understand your question. What is the difference
>>>>         between system and user generated acls?
>>>>          
>>>>         Dean
>>>>          
>>>>>          
>>>>>         Thanks,
>>>>>         Kent (as shepherd)
>>>>>          
>>>>>          
>>>>>         *From: *netmod <netmod-boun...@ietf.org
>>>>>         <mailto:netmod-boun...@ietf.org>> on behalf of Kent Watsen
>>>>>         <kwat...@juniper.net <mailto:kwat...@juniper.net>>
>>>>>         *Date: *Thursday, October 13, 2016 at 5:05 PM
>>>>>         *To: *"netmod@ietf.org <mailto:netmod@ietf.org>"
>>>>>         <netmod@ietf.org <mailto:netmod@ietf.org>>
>>>>>         *Subject: *[netmod] WG Last Call for
>>>>>         draft-ietf-netmod-acl-model-09 (until Oct 27, 2016)
>>>>>          
>>>>>          
>>>>>         This is a notice to start a two-week NETMOD WG last call
>>>>>         for the document:
>>>>>          
>>>>>                        Network Access Control List (ACL) YANG Data
>>>>>         Model
>>>>>                        
>>>>> _https://tools.ietf.org/html/draft-ietf-netmod-acl-model-09_
>>>>>          
>>>>>         Please indicate your support or concerns by Thursday,
>>>>>         October 27, 2016.
>>>>>          
>>>>>         We are particularly interested in statements of the form:
>>>>>           * I have reviewed draft-ietf-netmod-acl-model-09 and
>>>>>         found no issues.
>>>>>           * I have reviewed draft-ietf-netmod-acl-model-09 and
>>>>>         found the following issues: ...
>>>>>          
>>>>>         As well as:
>>>>>          * I have implemented the data model in
>>>>>         draft-ietf-netmod-acl-model-09.
>>>>>           * I am implementing the data model in
>>>>>         draft-ietf-netmod-acl-model-09.
>>>>>           * I am considering to implement the data model in
>>>>>         draft-ietf-netmod-acl-model-09.
>>>>>           * I am not considering to implement the data model in
>>>>>         draft-ietf-netmod-acl-model-09.
>>>>>          
>>>>>         Thank you,
>>>>>         NETMOD WG Chairs
>>>>>          
>>>>>          
>>>>>         _______________________________________________
>>>>>         netmod mailing list
>>>>>         netmod@ietf.org <mailto:netmod@ietf.org>
>>>>>         https://www.ietf.org/mailman/listinfo/netmod
>>>>
>>>>
>>>
>>
>>
>>
>>     _______________________________________________
>>     netmod mailing list
>>     netmod@ietf.org <mailto:netmod@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/netmod
>
>     _______________________________________________
>     netmod mailing list
>     netmod@ietf.org <mailto:netmod@ietf.org>
>     https://www.ietf.org/mailman/listinfo/netmod
>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
netmod mailing list
netmod@ietf.org
https://www.ietf.org/mailman/listinfo/netmod

Reply via email to