Re: [OPSAWG] draft-ietf-opsawg-sap: Attachement Circuits définition

2023-06-01 Thread mohamed.boucadair
Hi all,

FWIW, this change was now implemented in 
https://www.rfc-editor.org/authors/rfc9408-diff.html

Cheers,
Med

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : jeudi 16 février 2023 13:59
À : opsawg@ietf.org; 'Robert Wilton' 
Cc : Wubo (lana) ; 'Richard Roberts' 
; 'Oscar González de Dios' 
; Samier Barguil 
; 'JACQUENET Christian INNOV/NET' 

Objet : draft-ietf-opsawg-sap: Attachement Circuits définition

Hi all,

As part of the ongoing effort to expose attachment circuits as a service, we 
figured out that there is a need to clearly separate the notions of "attachment 
circuits" vs. "bearers" and clearly identify the physical setup vs. required 
properties over that layer to actually be able to exchange data. The current 
use of these terms in existing RFCs [1] may be perceived as inconsistent. We 
are currently discussing (AC Definition Pull Request #32 · 
boucadair/attachment-circuit-model
 and  bearer definition Pull Request #26 · boucadair/attachment-circuit-model 
(github.com))
 to define these two concepts.

However, Bo raised a comment about the AC definition in draft-ietf-opsawg-sap: 
The suggestion distinction between bearer and AC is nullified if we also accept 
that AC covers the physical link. In order to avoid that confusion, I suggest 
we make this simple change to draft-ietf-opsawg-sap:

===
OLD:
   Attachment Circuit (AC):  A channel that connects a Customer Edge
  (CE) to a Provider Edge (PE).  The AC may be a physical or logical
  link (Section 6.1 of [RFC4026]).

NEW:

   Attachment Circuit (AC):  A channel that connects a Customer Edge

  (CE) to a Provider Edge (PE).
===

Unless there are objections, I will propose this change during AUTH48 of the 
SAP draft.

Thank you.

Cheers,
Med

[1]: Excerpts from the existing RFCs.

RFC4026:

   In a Layer 2 VPN the CE is attached to PE via an Attachment Circuit

   (AC).  The AC may be a physical or logical link.

RFC4364 (L3VPN):

   Routers can be attached to each other, or to end systems, in a

   variety of different ways: PPP connections, ATM Virtual Circuits

   (VCs), Frame Relay VCs, ethernet interfaces, Virtual Local Area

   Networks (VLANs) on ethernet interfaces, GRE tunnels, Layer 2

   Tunneling Protocol (L2TP) tunnels, IPsec tunnels, etc.  We will use

   the term "attachment circuit" to refer generally to some such means

   of attaching to a router.  An attachment circuit may be the sort of

   connection that is usually thought of as a "data link", or it may be

   a tunnel of some sort; what matters is that it be possible for two

   devices to be network layer peers over the attachment circuit.

RFC4646 (L2VPN):

   In any type of L2VPN, a CE device attaches to a PE device via some

   sort of circuit or virtual circuit.  We will call this an "Attachment

   Circuit" (AC).  We use this term very generally; an Attachment

   Circuit may be a Frame Relay DLCI, an ATM VPI/VCI, an Ethernet port,

   a VLAN, a PPP connection on a physical interface, a PPP session from

   an L2TP tunnel, an MPLS LSP, etc.  The CE device may be a router, a

   switch, a host, or just about anything, which the customer needs

   hooked up to the VPN.  An AC carries a frame between CE and PE, or

   vice versa.

RFC8299 (L3SM):

   A "site" is composed of at least one "site-network-access" and, in

   the case of multihoming, may have multiple site-network-access

   points.  The site-network-access attachment is done through a

   "bearer" with an "ip-connection" on top.  The bearer refers to

   properties of the attachment that are below Layer 3, while the

   connection refers to properties oriented to the Layer 3 protocol.

   The bearer may be allocated dynamically by the SP, and the customer

   may provide some constraints or parameters to drive the placement of

   the access.

RFC8466 (L2SM):

   A site contains at least one network access (i.e., site network

   accesses providing access to the sites, as defined in Section 5.3.2),

   and there may be multiple network accesses in the case of

   multihoming.  Site-to-network-access attachment is done through a

   bearer with a Layer 2 connection on top.  The bearer refers to

   properties of the attachment that are below Layer 2, while the

   connection refers to Layer 2 protocol-oriented properties.

RFC9291 (L2NM):

   Similar to Section 3 of [RFC8466], CE to PE attachment is achieved

   through a bearer with a Layer 2 connection on top.  The bearer refers

   to properties of the attachment that are below Layer 2, while the

   connection refers to Layer 2 protocol-oriented properties.

RFC9182 (L3NM):

   A site, as per [RFC4176], represents a VPN customer's location that

   is connected to the service provider network via a CE-PE link, which

   can access at least one VPN.  The connection from the site to the

   service 

Re: [OPSAWG] About draft-boucadair-opsawg-ipfix-tcpo-v6eh

2023-05-30 Thread mohamed.boucadair
Hi Éric, all, 

Thank you for the comments.

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de Eric Vyncke
> (evyncke)
> Envoyé : samedi 27 mai 2023 18:17
> À : opsawg@ietf.org
> Objet : [OPSAWG] About draft-boucadair-opsawg-ipfix-tcpo-v6eh
> 
> Benoît, Med,
> 
> I just found draft-boucadair-opsawg-ipfix-tcpo-v6eh and the idea
> behind this I-D seems very attractive to me. Do you intend to
> request adoption ?

[Med] As per the discussion in IETF#116, we are waiting for the WG Chairs to 
issue a call for adoption for this draft and two others 
(draft-boucla-opsawg-ipfix-fixes and draft-boucadair-opsawg-tsvwg-udp-ipfix). 

> 
> BTW, if you do not mind some comments:
> - why not covering also IPv4 options ? Or split this I-D in two
> parts ?

[Med]  The approach we followed so far is to first document issues in 
draft-boucla-opsawg-ipfix-fixes and if we conclude that a new IE is needed, 
that new IE will be moved to a separate I-D. So far, no issue was documented 
for ipv4Options (IE# 208). When rereading the text in RFC5102, a clarification 
we may consider is whether the mapping is based on the option type or the 
option number. 

> - how would an 'old' implementation (post a potential future
> publication of this I-D) differentiate between "unknown ext header"
> (this set is normally closed but who knows) and "unknown L4 header"
> and "unknow IP protocol" ?

[Med] Good question. I guess this can be achieved by the collector by 
correlating protocolIdentifier/nextHeaderIPv6 IEs with ICMP errors types. 

> - ipv6ExtensionHeadersFull is redundant (always annoying) with
> ipv6ExtensionHeaderCount

[Med] ipv6ExtensionHeadersFull was designed with the same spirit as 
ipv6ExtensionHeaders (IE# 64) (i.e., compact encoding) but without less issues. 
What I really like in ipv6ExtensionHeaderCount is that it does not need to rely 
on a mapping table to export what it is observed; only the collector will need 
to maintain an up to date set of assigned values.

> - what would also be SUPER interesting / useful is the length of
> those Ext Headers and their order...
> 

[Med] Added those as issues at 
https://github.com/boucadair/ipfix-tcpoptions-and-v6eh/issues. 

> I look forward to reading (or even working with you) more on this I-
> D

[Med] Great, thanks.

> 
> Regards
> 
> -éric
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
> w.ietf.org%2Fmailman%2Flistinfo%2Fopsawg=05%7C01%7Cmohamed.bouc
> adair%40orange.com%7C602e6339fda948514e4308db5ecdd890%7C90c7a20af34b
> 40bfbc48b9253b6f5d20%7C0%7C0%7C638208010436919708%7CUnknown%7CTWFpbG
> Zsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn
> 0%3D%7C3000%7C%7C%7C=nIqtkrl%2FS5M5Oh2yUy4X8ITGHI8E4eTjDnmRqIi
> o%2BhI%3D=0

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: (with DISCUSS)

2023-05-26 Thread mohamed.boucadair
Hi Rob,

I think so.

Cheers,
Med

De : Rob Wilton (rwilton) 
Envoyé : vendredi 26 mai 2023 11:47
À : BOUCADAIR Mohamed INNOV/NET ; Andrew Alston - 
IETF ; John Scudder 
Cc : The IESG ; draft-ietf-opsawg-ipfix-srv6-...@ietf.org; 
opsawg-cha...@ietf.org; opsawg@ietf.org
Objet : RE: Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: 
(with DISCUSS)

Hi Med,

Thanks for this.

Okay, so it is plausible that we could take the paragraph from 
draft-ietf-opsawg-ipfix-srv6-srh-13, and generalize it to describe how IPFIX 
can export multiple instances of the same EH, if they were to ever occur?

This would satisfy my desire to ensure that IPFIX can accurately exporting what 
it sees in the packet, regardless of whether those headers should really be 
there or not.

Regards,
Rob


From: mohamed.boucad...@orange.com 
mailto:mohamed.boucad...@orange.com>>
Sent: 25 May 2023 19:11
To: Rob Wilton (rwilton) mailto:rwil...@cisco.com>>; Andrew 
Alston - IETF 
mailto:andrew-ietf=40liquid.t...@dmarc.ietf.org>>;
 John Scudder mailto:j...@juniper.net>>
Cc: The IESG mailto:i...@ietf.org>>; 
draft-ietf-opsawg-ipfix-srv6-...@ietf.org;
 opsawg-cha...@ietf.org; 
opsawg@ietf.org
Subject: RE: Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: 
(with DISCUSS)

Hi Rob,

I fully agree with your analysis.

The good news is that the WG still have the opportunity to address the multiple 
EH occurrences case, and not specifically for the SRH case. FWIW, 
https://www.ietf.org/archive/id/draft-boucadair-opsawg-ipfix-tcpo-v6eh-02.txt 
defines this NEW IE:

==
3.2.  ipv6ExtensionHeaderCount Information Element

   Name:  ipv6ExtensionHeaderCount

   ElementID:  TBD2

   Description:  As per [RFC8200], IPv6 nodes must accept and attempt to
  process extension headers in occurring any number of times in the
  same packet.  This Information Element echoes the number of
  occurrences of the same EH instance in an IPv6 packet.  EH Type
  values are taken from [IPv6-EH].
==

The occurrences are displayed per EH Type (aggregated) in the current version 
of the I-D. We will discuss in the WG whether/how we will export also the 
observed occurrences of Routing Types. Of course, we will send a note to 6man 
on this.

Cheers,
Med

De : Rob Wilton (rwilton) mailto:rwil...@cisco.com>>
Envoyé : jeudi 25 mai 2023 18:31
À : Andrew Alston - IETF 
mailto:andrew-ietf=40liquid.t...@dmarc.ietf.org>>;
 John Scudder mailto:j...@juniper.net>>; BOUCADAIR Mohamed 
INNOV/NET mailto:mohamed.boucad...@orange.com>>
Cc : The IESG mailto:i...@ietf.org>>; 
draft-ietf-opsawg-ipfix-srv6-...@ietf.org;
 opsawg-cha...@ietf.org; 
opsawg@ietf.org
Objet : RE: Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: 
(with DISCUSS)

Hi,

I don't think that John's example is quite the same.  The IPv6 packet header 
format only has a space for a single source address and it is 16 bytes long.  
Two source addresses or a 20-byte address is clearly an invalid IPv6 packet 
because it doesn't match the IPv6 packet format.

But I don't think that this is quite true for IPv6 extension headers, where the 
text states:

   Each extension header should occur at most once, except for the
   Destination Options header, which should occur at most twice (once
   before a Routing header and once before the upper-layer header).

But it also states in the same section:


   IPv6 nodes must accept and attempt to process extension headers in

   any order and occurring any number of times in the same packet,

   except for the Hop-by-Hop Options header, which is restricted to

   appear immediately after an IPv6 header only.  Nonetheless, it is

   strongly advised that sources of IPv6 packets adhere to the above

   recommended order until and unless subsequent specifications revise

   that recommendation.

This second paragraph, which is just as normative as the first, seems to 
clearly indicate that IPv6 nodes are expected to handle and process extension 
headers occurring multiple times, implying that they could occur.

Hence, I suspect that it is this second paragraph as to why Thomas was trying 
to define how IPFIX works if this scenario is encountered in the wild.  E.g., 
operationally, it is better to report what you actually see rather report what 
the operator/client ideally wants to believe is in the packet.  I.e., if your 
IPv6 node does receive a packet with two SRv6 headers (which I still believe 
RFC 8200 allows for), and modulo Jim's argument that this is invalid, then I 
would still argue that it is more helpful to report that they are both there 
than just reporting the first one and ignoring the second.  YANG NMDA, RFC 8342 
is designed similarly.  Even if a YANG list states that it can only 

Re: [OPSAWG] Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: (with DISCUSS)

2023-05-25 Thread mohamed.boucadair
Hi Rob,

I fully agree with your analysis.

The good news is that the WG still have the opportunity to address the multiple 
EH occurrences case, and not specifically for the SRH case. FWIW, 
https://www.ietf.org/archive/id/draft-boucadair-opsawg-ipfix-tcpo-v6eh-02.txt 
defines this NEW IE:

==
3.2.  ipv6ExtensionHeaderCount Information Element

   Name:  ipv6ExtensionHeaderCount

   ElementID:  TBD2

   Description:  As per [RFC8200], IPv6 nodes must accept and attempt to
  process extension headers in occurring any number of times in the
  same packet.  This Information Element echoes the number of
  occurrences of the same EH instance in an IPv6 packet.  EH Type
  values are taken from [IPv6-EH].
==

The occurrences are displayed per EH Type (aggregated) in the current version 
of the I-D. We will discuss in the WG whether/how we will export also the 
observed occurrences of Routing Types. Of course, we will send a note to 6man 
on this.

Cheers,
Med

De : Rob Wilton (rwilton) 
Envoyé : jeudi 25 mai 2023 18:31
À : Andrew Alston - IETF ; John 
Scudder ; BOUCADAIR Mohamed INNOV/NET 

Cc : The IESG ; draft-ietf-opsawg-ipfix-srv6-...@ietf.org; 
opsawg-cha...@ietf.org; opsawg@ietf.org
Objet : RE: Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: 
(with DISCUSS)

Hi,

I don't think that John's example is quite the same.  The IPv6 packet header 
format only has a space for a single source address and it is 16 bytes long.  
Two source addresses or a 20-byte address is clearly an invalid IPv6 packet 
because it doesn't match the IPv6 packet format.

But I don't think that this is quite true for IPv6 extension headers, where the 
text states:

   Each extension header should occur at most once, except for the
   Destination Options header, which should occur at most twice (once
   before a Routing header and once before the upper-layer header).

But it also states in the same section:


   IPv6 nodes must accept and attempt to process extension headers in

   any order and occurring any number of times in the same packet,

   except for the Hop-by-Hop Options header, which is restricted to

   appear immediately after an IPv6 header only.  Nonetheless, it is

   strongly advised that sources of IPv6 packets adhere to the above

   recommended order until and unless subsequent specifications revise

   that recommendation.

This second paragraph, which is just as normative as the first, seems to 
clearly indicate that IPv6 nodes are expected to handle and process extension 
headers occurring multiple times, implying that they could occur.

Hence, I suspect that it is this second paragraph as to why Thomas was trying 
to define how IPFIX works if this scenario is encountered in the wild.  E.g., 
operationally, it is better to report what you actually see rather report what 
the operator/client ideally wants to believe is in the packet.  I.e., if your 
IPv6 node does receive a packet with two SRv6 headers (which I still believe 
RFC 8200 allows for), and modulo Jim's argument that this is invalid, then I 
would still argue that it is more helpful to report that they are both there 
than just reporting the first one and ignoring the second.  YANG NMDA, RFC 8342 
is designed similarly.  Even if a YANG list states that it can only contain 2 
elements, but due to some (presumably buggy) reason, the device actually has 3, 
it is better to report all three than just pretend that there are only 2 
elements, because it helps the operator debug that something is going wrong 
(section 5.3).

I would argue that Jim's argument that another SRv6 related RFC (I don't know 
which one) clearly indicates that a v6 header can only ever contain a single 
SRH header holds a little more sway and is perhaps more relevant.

Having said all that, I think that point is somewhat moot because I think that 
the authors have agreed to remove this paragraph anyway - even if IMO it 
possibly makes the spec a bit less robust/helpful.

Regards,
Rob


From: iesg mailto:iesg-boun...@ietf.org>> On Behalf Of 
Andrew Alston - IETF
Sent: 25 May 2023 16:54
To: John Scudder mailto:j...@juniper.net>>; 
mohamed.boucad...@orange.com
Cc: The IESG mailto:i...@ietf.org>>; 
draft-ietf-opsawg-ipfix-srv6-...@ietf.org;
 opsawg-cha...@ietf.org; 
opsawg@ietf.org
Subject: Re: Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: 
(with DISCUSS)

Hi Med,

Firstly - I need to second what John said below.  Secondly, while we can agree 
that IPFIX supporting this doesn't violate the RFC - what it does do - is cater 
explicitly for what I believe is a violation of RFC8200, and that is where I 
have a problem.

While there could be *many* things that are done out of spec - unless there is 
a very specific and solid reason to cater for such out of spec behavior, this 
doesn't make sense to pick 

Re: [OPSAWG] Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-13: (with DISCUSS)

2023-05-25 Thread mohamed.boucadair
Hi Andrew, 

(replying as the doc shepherd)

Éric raised a similar comment. I shared already some context about that 
section: FYI, this point was discussed in the WG especially that there is no 
SPING document that motivates/explains the use of multiple SRHs. Please check: 
https://mailarchive.ietf.org/arch/msg/opsawg/SVm4TZk1v6-a0WJwALk3FrUunFU/ for 
why the authors think this section is useful to be maintained in the document.

As currently worded, Section 6.3 does not violate any RFC. It only ensures that 
it can successfully export what it is observed in packets. This can be even 
used to detect abnormal behaviors/packs, which is one of the observability 
goals of IPFIX.

Cheers,
Med

> -Message d'origine-
> De : Andrew Alston via Datatracker 
> Envoyé : jeudi 25 mai 2023 15:03
> À : The IESG 
> Cc : draft-ietf-opsawg-ipfix-srv6-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; BOUCADAIR Mohamed INNOV/NET
> ; BOUCADAIR Mohamed INNOV/NET
> 
> Objet : Andrew Alston's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-
> 13: (with DISCUSS)
> 
> Andrew Alston has entered the following ballot position for
> draft-ietf-opsawg-ipfix-srv6-srh-13: Discuss
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> 
> 
> 
> --
> DISCUSS:
> 
> --
> 
> Hi There,
> 
> Thanks for the document.
> 
> I am issuing a discuss based on section 6.3 of the document that I'd
> like to
> talk about.  RFC8200 Section 4.1 states:
> 
> Each extension header should occur at most once, except for the
>Destination Options header, which should occur at most twice
> (once
>before a Routing header and once before the upper-layer header).
> 
> I also note that RFC8200 is not written using normative language -
> but
> considering the context I am assuming that this should be read as
> such.
> 
> This directly conflicts with section 6.3 - which makes allowance for
> multiple
> SRH in the packet.  The only way that multiple SRH's should be
> allowed to occur
> in the packet is if the packet is re-encapsulated - at which point
> section 6.3
> would still (in my view) not be referring to multiple SRH's - since
> the second
> SRH would be attached to a fully encapsulated packet.
> 
> If there is indeed a need for multiple SRH in IPFIX - this would
> require a
> pretty clear explanation as to why, how this could occur and a
> strong
> justification for violating RFC8200 in my opinion.
> 
> 
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] John Scudder's Discuss on draft-ietf-opsawg-ipfix-srv6-srh-12: (with DISCUSS and COMMENT)

2023-05-25 Thread mohamed.boucadair
Hi Thomas, 

Why sending a zero length array  is needed especially that the decompression is 
done at the data collector? Shouldn't this just work if srhIPv6Section is
omitted when there is no SRH? 

Cheers,
Med

> -Message d'origine-
> De : thomas.g...@swisscom.com 
> Envoyé : mercredi 24 mai 2023 18:05
> À : j...@juniper.net
> Cc : i...@ietf.org; draft-ietf-opsawg-ipfix-srv6-...@ietf.org;
> opsawg-cha...@ietf.org; opsawg@ietf.org; BOUCADAIR Mohamed INNOV/NET
> 
> Objet : Re: John Scudder's Discuss on draft-ietf-opsawg-ipfix-srv6-
> srh-12: (with DISCUSS and COMMENT)
> 
> Dear John,
> 
> My apology. Your assumption is correct.
> 
> In case when the compressed SID container is only used in the IPv6
> destination address of the provider data plane and the SRH is not
> being present at all, it would be a zero lenght array.
> 
> Best wishes
> Thomas
> 
> > On 24 May 2023, at 17:32, John Scudder  wrote:
> >
> > Thanks, Thomas. I think this part isn’t answered yet?
> >
> >> On May 24, 2023, at 1:03 AM, thomas.g...@swisscom.com wrote:
> >>
> >> And what
> >> of srhIPv6Section? Would it just be omitted in the case of a bare
> cSID, would
> >> it be a zero-length octetArray, ...?
> >
> > Regards,
> >
> > —John
> >


smime.p7s
Description: S/MIME cryptographic signature
___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Yes on draft-ietf-opsawg-ipfix-srv6-srh-10: (with COMMENT)

2023-05-23 Thread mohamed.boucadair
Hi Éric, 

As the Doc Shepherd, I'm sharing some context related to this comment:

> ### Section 6.3
> 
> Beside encapsulation, I do not see how multiple (S)RHs could be in
> one IPv6
> packet. Anyway, the router will, per RFC 8200, only act on the
> outermost one.
> I.e., strongly suggest that this I-D specifies that only the
> outermost SRH &
> associated behavior are specified.

FYI, this point was discussed in the WG especially that there is no SPING 
document that motivates/explains the use of multiple SRHs. Please check: 
https://mailarchive.ietf.org/arch/msg/opsawg/SVm4TZk1v6-a0WJwALk3FrUunFU/ for 
why the authors think this section is useful to be maintained in the document. 

Cheers,
Med

> -Message d'origine-
> De : Éric Vyncke via Datatracker 
> Envoyé : lundi 22 mai 2023 16:17
> À : The IESG 
> Cc : draft-ietf-opsawg-ipfix-srv6-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; BOUCADAIR Mohamed INNOV/NET
> ; BOUCADAIR Mohamed INNOV/NET
> 
> Objet : Éric Vyncke's Yes on draft-ietf-opsawg-ipfix-srv6-srh-10:
> (with COMMENT)
> 
> Éric Vyncke has entered the following ballot position for
> draft-ietf-opsawg-ipfix-srv6-srh-10: Yes
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> www.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-
> ballot-
> positions%2F=05%7C01%7Cmohamed.boucadair%40orange.com%7C288ff
> 9f6aed04ca9bbdf08db5acf2f32%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0
> %7C0%7C638203618122821508%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAw
> MDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> =%2BiI1qjYawayWZInHErAiC3k9fr4luEapIsKb%2BqPHYg0%3D
> =0
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> datatracker.ietf.org%2Fdoc%2Fdraft-ietf-opsawg-ipfix-srv6-
> srh%2F=05%7C01%7Cmohamed.boucadair%40orange.com%7C288ff9f6aed
> 04ca9bbdf08db5acf2f32%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7
> C638203618122821508%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC
> JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> =tII2%2FBSvVD6sz2LnIPkwUPwDwM3IGEWUOCHTzzhdfmM%3D=0
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-ipfix-srv6-
> srh-10
> 
> Thank you for the work put into this document.
> 
> Please find below some non-blocking COMMENT points (but replies
> would be
> appreciated even if only for my own education).
> 
> Special thanks to Mohamed Boucadair for the shepherd's detailed
> write-up
> including the WG consensus and the justification of the intended
> status.
> 
> I hope that this review helps to improve the document,
> 
> Regards,
> 
> -éric
> 
> ## COMMENTS
> 
> ### More than data plane
> 
> I like the idea of exporting srhIPv6ActiveSegmentType for
> operation, it goes
> well beyond the plain export of the SRH header. I just fear that
> the extra
> information is redundant and will be repeated quite often.
> 
> ### Section 5.1.9
> 
> What would happen if this information is learned by two sources ?
> 
> ### Section 6.3
> 
> Beside encapsulation, I do not see how multiple (S)RHs could be in
> one IPv6
> packet. Anyway, the router will, per RFC 8200, only act on the
> outermost one.
> I.e., strongly suggest that this I-D specifies that only the
> outermost SRH &
> associated behavior are specified.
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

2023-05-23 Thread mohamed.boucadair
Hi Thomas, all,

 

Thanks for implementing the changes. 

 

Looks good to me except one point: 5.1 as about new IEs. I think you
should make this change:

 

OLD:

  5.1.10. New IPFIX IPv6 SRH Segment Type Subregistry

 

NEW:

  5.2. New IPFIX IPv6 SRH Segment Type Subregistry

 

Cheers,

Med

 

De : thomas.g...@swisscom.com  
Envoyé : mardi 23 mai 2023 07:19
À : BOUCADAIR Mohamed INNOV/NET ;
pait...@ciena.com; opsawg@ietf.org
Cc : benoit.cla...@huawei.com; pierre.franc...@insa-lyon.fr
Objet : RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

 

Dear Paul and Med,

 

Excellent. Thanks a lot for your suggestions. I merged them into the
-11 version.

 

There is also an htmlized version available at:

https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-ipfix-srv6-srh
-11

 

A diff from the previous version is available at:

https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-ipfix-srv6
-srh-11

 

Best wishes

Thomas

 

From: mohamed.boucad...@orange.com
  mailto:mohamed.boucad...@orange.com> > 
Sent: Monday, May 22, 2023 2:50 PM
To: Aitken, Paul mailto:pait...@ciena.com> >; Graf
Thomas, INI-NET-VNC-HCS mailto:thomas.g...@swisscom.com> >; opsawg@ietf.org
 
Cc: benoit.cla...@huawei.com  ;
pierre.franc...@insa-lyon.fr  
Subject: RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

 

Re-,

 

The designed experts for this sub-registry should be familiar with
SRH. I think your concern can be fixed by making this change: 

 

OLD:

 The guidelines that are being followed by the designated experts for
..

 

NEW:
 The designed experts for this registry should be familiar with SRH.
 The guidelines that are being followed by the designated experts for
..

 

The AD (Rob) will take that into account when selecting the DEs for
this sub-registry. The good news is that the authors of
draft-ietf-opsawg-ipfix-srv6-srh said that they volunteer to be DE for
this registry. 

 

Cheers,

Med

 

De : Aitken, Paul mailto:pait...@ciena.com> > 
Envoyé : lundi 22 mai 2023 13:10
À : Graf Thomas, INI-NET-VNC-HCS mailto:thomas.g...@swisscom.com> >; BOUCADAIR Mohamed INNOV/NET
mailto:mohamed.boucad...@orange.com> >;
opsawg@ietf.org  
Cc : benoit.cla...@huawei.com  ;
pierre.franc...@insa-lyon.fr  
Objet : Re: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

 


1) Yes, 5.1.9.1. could be renumbered to 5.2. But also modify the name
to "New IPFIX IPv6 SRH Segment Type Subregistry", similar to the name
of section 5.1. "New SRH Information Elements".

Also watch for confusion between section 3's title and section 5.1:

3.  New SRv6 IPFIX Information Elements
5.1.  New SRH Information Elements


2) I specifically asked for the Expert Reviewers to be named, for two
reasons:

1. Each registry lists the "Registration Procedure(s)" (Expert
Review) and the corresponding "Expert(s)" (IE Doctors) - so it's
necessary to provide both pieces of information.
2. Without specifying "SRH Experts", it might incorrectly be
assumed that "IE Doctors" will be the expert reviewers.


P.

On 22/05/2023 09:38, thomas.g...@swisscom.com
  wrote:

Dear Med,
 
Thanks a lot. 
 
Regarding your feedback on expert review, for me valid and ok but I am
waiting on Paul's feedback if that make sense to him as well.
 
Regarding, IPFIX IPv6 SRH Segment Type Subregistry. I believe the
section is related to the srhIPv6ActiveSegmentType section. Therefore
in the all the previous revisions of the document it was listed that
way. For me to list it either under 5.1.9.1 or 5.2 works. Since it is
the IANA section, lets get the opinion from Paul as well. I will
adjust then accordingly.
 
Best wishes
Thomas
 
-Original Message-
From: mohamed.boucad...@orange.com

  
Sent: Monday, May 22, 2023 8:50 AM
To: opsawg@ietf.org  ; Graf Thomas,
INI-NET-VNC-HCS  

Cc: Aitken, Paul   
Subject: RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
 
Hi Thomas,
 
I think there was a bug in -10:
 
s/5.1.9.1.  IPFIX IPv6 SRH Segment Type Subregistry/5.2  IPFIX IPv6
SRH Segment Type Subregistry
 
 
Also, for this text: 
 
  The allocation policy of this new subregistry is Expert Review  
  (Section 4.5 of [RFC8126]) by SRH Experts.
 
I don't think we need to have ".. by SRH Experts" mentioned here given
that the assigned DEs for this subregistry are IMO required to be
familiar with SRH.
 
If you think this is obvious and has to be recorded in the draft, I
suggest the following: 
 
(1)
 
OLD 
  The allocation policy of this new subregistry is Expert Review  
  (Section 4.5 of [RFC8126]) by SRH Experts.
 
NEW:
  The allocation 

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

2023-05-22 Thread mohamed.boucadair
Re-,

The designed experts for this sub-registry should be familiar with SRH. I think 
your concern can be fixed by making this change:

OLD:

 The guidelines that are being followed by the designated experts for ..


NEW:

 The designed experts for this registry should be familiar with SRH.

 The guidelines that are being followed by the designated experts for ..

The AD (Rob) will take that into account when selecting the DEs for this 
sub-registry. The good news is that the authors of 
draft-ietf-opsawg-ipfix-srv6-srh said that they volunteer to be DE for this 
registry.

Cheers,
Med

De : Aitken, Paul 
Envoyé : lundi 22 mai 2023 13:10
À : Graf Thomas, INI-NET-VNC-HCS ; BOUCADAIR Mohamed 
INNOV/NET ; opsawg@ietf.org
Cc : benoit.cla...@huawei.com; pierre.franc...@insa-lyon.fr
Objet : Re: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt


1) Yes, 5.1.9.1. could be renumbered to 5.2. But also modify the name to "New 
IPFIX IPv6 SRH Segment Type Subregistry", similar to the name of section 5.1. 
"New SRH Information Elements".

Also watch for confusion between section 3's title and section 5.1:

3.  New SRv6 IPFIX Information Elements
5.1.  New SRH Information Elements


2) I specifically asked for the Expert Reviewers to be named, for two reasons:

1. Each registry lists the "Registration Procedure(s)" (Expert Review) and 
the corresponding "Expert(s)" (IE Doctors) - so it's necessary to provide both 
pieces of information.
2. Without specifying "SRH Experts", it might incorrectly be assumed that 
"IE Doctors" will be the expert reviewers.


P.

On 22/05/2023 09:38, thomas.g...@swisscom.com 
wrote:

Dear Med,



Thanks a lot.



Regarding your feedback on expert review, for me valid and ok but I am waiting 
on Paul's feedback if that make sense to him as well.



Regarding, IPFIX IPv6 SRH Segment Type Subregistry. I believe the section is 
related to the srhIPv6ActiveSegmentType section. Therefore in the all the 
previous revisions of the document it was listed that way. For me to list it 
either under 5.1.9.1 or 5.2 works. Since it is the IANA section, lets get the 
opinion from Paul as well. I will adjust then accordingly.



Best wishes

Thomas



-Original Message-

From: mohamed.boucad...@orange.com 


Sent: Monday, May 22, 2023 8:50 AM

To: opsawg@ietf.org; Graf Thomas, INI-NET-VNC-HCS 


Cc: Aitken, Paul 

Subject: RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt



Hi Thomas,



I think there was a bug in -10:



s/5.1.9.1.  IPFIX IPv6 SRH Segment Type Subregistry/5.2  IPFIX IPv6 SRH Segment 
Type Subregistry





Also, for this text:



  The allocation policy of this new subregistry is Expert Review

  (Section 4.5 of [RFC8126]) by SRH Experts.



I don't think we need to have ".. by SRH Experts" mentioned here given that the 
assigned DEs for this subregistry are IMO required to be familiar with SRH.



If you think this is obvious and has to be recorded in the draft, I suggest the 
following:



(1)



OLD

  The allocation policy of this new subregistry is Expert Review

  (Section 4.5 of [RFC8126]) by SRH Experts.



NEW:

  The allocation policy of this new subregistry is Expert Review

  (Section 4.5 of [RFC8126]).



(2)



OLD:

  The guidelines that are being followed by the designated experts for ...



NEW:

 The designed experts for this registry should be familiar with SRH.

 The guidelines that are being followed by the designated experts for ..





Thanks.



Cheers,

Med

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

2023-05-22 Thread mohamed.boucadair
Re-,

Thanks for the follow-up. 

Noted for the first point. 

On this one: 

> Regarding, IPFIX IPv6 SRH Segment Type Subregistry. 

The point is to ease IANA's job by identifying the required actions
(1) add new entries to an existing registry & (2) create a new
registry. Thanks.

Cheers,
Med

> -Message d'origine-
> De : thomas.g...@swisscom.com 
> Envoyé : lundi 22 mai 2023 10:39
> À : BOUCADAIR Mohamed INNOV/NET ;
> opsawg@ietf.org
> Cc : pait...@ciena.com; benoit.cla...@huawei.com;
> pierre.franc...@insa-lyon.fr
> Objet : RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
> 
> Dear Med,
> 
> Thanks a lot.
> 
> Regarding your feedback on expert review, for me valid and ok but
> I am waiting on Paul's feedback if that make sense to him as well.
> 
> Regarding, IPFIX IPv6 SRH Segment Type Subregistry. I believe the
> section is related to the srhIPv6ActiveSegmentType section.
> Therefore in the all the previous revisions of the document it was
> listed that way. For me to list it either under 5.1.9.1 or 5.2
> works. Since it is the IANA section, lets get the opinion from
> Paul as well. I will adjust then accordingly.
> 
> Best wishes
> Thomas
> 
> -Original Message-
> From: mohamed.boucad...@orange.com 
> Sent: Monday, May 22, 2023 8:50 AM
> To: opsawg@ietf.org; Graf Thomas, INI-NET-VNC-HCS
> 
> Cc: Aitken, Paul 
> Subject: RE: I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
> 
> Hi Thomas,
> 
> I think there was a bug in -10:
> 
> s/5.1.9.1.  IPFIX IPv6 SRH Segment Type Subregistry/5.2  IPFIX
> IPv6 SRH Segment Type Subregistry
> 
> 
> Also, for this text:
> 
>   The allocation policy of this new subregistry is Expert Review
> 
>   (Section 4.5 of [RFC8126]) by SRH Experts.
> 
> I don't think we need to have ".. by SRH Experts" mentioned here
> given that the assigned DEs for this subregistry are IMO required
> to be familiar with SRH.
> 
> If you think this is obvious and has to be recorded in the draft,
> I suggest the following:
> 
> (1)
> 
> OLD
>   The allocation policy of this new subregistry is Expert Review
> 
>   (Section 4.5 of [RFC8126]) by SRH Experts.
> 
> NEW:
>   The allocation policy of this new subregistry is Expert Review
> 
>   (Section 4.5 of [RFC8126]).
> 
> (2)
> 
> OLD:
>   The guidelines that are being followed by the designated experts
> for ...
> 
> NEW:
>  The designed experts for this registry should be familiar with
> SRH.
>  The guidelines that are being followed by the designated experts
> for ..
> 
> 
> Thanks.
> 
> Cheers,
> Med
> 
> > -Message d'origine-
> > De : I-D-Announce  De la part de
> > internet-dra...@ietf.org Envoyé : jeudi 18 mai 2023 13:11 À :
> > i-d-annou...@ietf.org Cc : opsawg@ietf.org Objet : I-D Action:
> > draft-ietf-opsawg-ipfix-srv6-srh-10.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-
> Drafts
> > directories. This Internet-Draft is a work item of the
> Operations and
> > Management Area Working Group (OPSAWG) WG of the IETF.
> >
> >Title   : Export of Segment Routing over IPv6
> > Information in IP Flow Information Export (IPFIX)
> >Authors : Thomas Graf
> >  Benoit Claise
> >  Pierre Francois
> >Filename: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
> >Pages   : 28
> >Date: 2023-05-18
> >
> > Abstract:
> >This document introduces new IP Flow Information Export
> (IPFIX)
> >Information Elements to identify a set of Segment Routing
> over
> > IPv6
> >(SRv6) related information such as data contained in a
> Segment
> >Routing Header (SRH), the SRv6 control plane, and the SRv6
> endpoint
> >behavior that traffic is being forwarded with.
> >
> > The IETF datatracker status page for this Internet-Draft is:
> >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> > datatracker.ietf.org%2Fdoc%2Fdraft-ietf-opsawg-ipfix-srv6-
> >
> srh%2F=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8eceb
> >
> 64928d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7
> >
> C638200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC
> >
> JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> > =Q%2Fl7cb4MQj4Jj4bSm4fRySHmkdnPdIkrmWIcoEUPpZ0%3D=0
> >
> > There is also an htmlized version available at:
> >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> > datatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-opsawg-ipfix-
> srv6-
> > srh-
> >
> 10=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8eceb6492
> >
> 8d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638
> >
> 200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj
> >
> oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C=QsD
> > 1F2oq5TSKove3Rx4UtUJcaOYSH16GK%2FATo%2FRxbw8%3D=0
> >
> > A diff from the previous version is available at:
> >
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> > 

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt

2023-05-22 Thread mohamed.boucadair
Hi Thomas,

I think there was a bug in -10:

s/5.1.9.1.  IPFIX IPv6 SRH Segment Type Subregistry/5.2  IPFIX IPv6 SRH Segment 
Type Subregistry


Also, for this text: 

  The allocation policy of this new subregistry is Expert Review
  (Section 4.5 of [RFC8126]) by SRH Experts.

I don't think we need to have ".. by SRH Experts" mentioned here given that the 
assigned DEs for this subregistry are IMO required to be familiar with SRH.

If you think this is obvious and has to be recorded in the draft, I suggest the 
following: 

(1)

OLD 
  The allocation policy of this new subregistry is Expert Review
  (Section 4.5 of [RFC8126]) by SRH Experts.

NEW:
  The allocation policy of this new subregistry is Expert Review
  (Section 4.5 of [RFC8126]).

(2)

OLD: 
  The guidelines that are being followed by the designated experts for ...

NEW:
 The designed experts for this registry should be familiar with SRH.
 The guidelines that are being followed by the designated experts for ..


Thanks. 

Cheers,
Med

> -Message d'origine-
> De : I-D-Announce  De la part de
> internet-dra...@ietf.org
> Envoyé : jeudi 18 mai 2023 13:11
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This Internet-Draft is a work item of the Operations
> and Management Area Working Group (OPSAWG) WG of the IETF.
> 
>Title   : Export of Segment Routing over IPv6
> Information in IP Flow Information Export (IPFIX)
>Authors : Thomas Graf
>  Benoit Claise
>  Pierre Francois
>Filename: draft-ietf-opsawg-ipfix-srv6-srh-10.txt
>Pages   : 28
>Date: 2023-05-18
> 
> Abstract:
>This document introduces new IP Flow Information Export (IPFIX)
>Information Elements to identify a set of Segment Routing over
> IPv6
>(SRv6) related information such as data contained in a Segment
>Routing Header (SRH), the SRv6 control plane, and the SRv6
> endpoint
>behavior that traffic is being forwarded with.
> 
> The IETF datatracker status page for this Internet-Draft is:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> datatracker.ietf.org%2Fdoc%2Fdraft-ietf-opsawg-ipfix-srv6-
> srh%2F=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8eceb
> 64928d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7
> C638200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC
> JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> =Q%2Fl7cb4MQj4Jj4bSm4fRySHmkdnPdIkrmWIcoEUPpZ0%3D=0
> 
> There is also an htmlized version available at:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> datatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-opsawg-ipfix-srv6-
> srh-
> 10=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8eceb6492
> 8d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638
> 200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj
> oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C=QsD
> 1F2oq5TSKove3Rx4UtUJcaOYSH16GK%2FATo%2FRxbw8%3D=0
> 
> A diff from the previous version is available at:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> author-tools.ietf.org%2Fiddiff%3Furl2%3Ddraft-ietf-opsawg-ipfix-
> srv6-srh-
> 10=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8eceb6492
> 8d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638
> 200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj
> oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C=928
> QZUj8oeWXbhOMlNfGO2Iuq0oRi%2BXa2TyiPiMOg6w%3D=0
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> I-D-Announce mailing list
> i-d-annou...@ietf.org
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> www.ietf.org%2Fmailman%2Flistinfo%2Fi-d-
> announce=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8ec
> eb64928d33308db5790ac5b%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0
> %7C638200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi
> LCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C
> ta=0dcX9zxNW6fwkPIn2ajcwOemaKPAIfx38txGwgA8LzU%3D=0
> Internet-Draft directories:
> https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fw
> ww.ietf.org%2Fshadow.html=05%7C01%7Cmohamed.boucadair%40orang
> e.com%7Cddcd5d8eceb64928d33308db5790ac5b%7C90c7a20af34b40bfbc48b92
> 53b6f5d20%7C0%7C0%7C638200051102993802%7CUnknown%7CTWFpbGZsb3d8eyJ
> WIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C
> 3000%7C%7C%7C=K0TVBDegU0uNjBh1%2B9%2Fex38zOIYdWUoctE5kFja5I6
> A%3D=0
> or
> https://eur03.safelinks.protection.outlook.com/?url=ftp%3A%2F%2Fft
> p.ietf.org%2Fietf%2F1shadow-
> sites.txt=05%7C01%7Cmohamed.boucadair%40orange.com%7Cddcd5d8e
> 

Re: [OPSAWG] [Ie-doctors] [IANA #1271817] expert review for draft-ietf-opsawg-ipfix-srv6-srh (ipfix)

2023-05-15 Thread mohamed.boucadair
Hi Paul,

Thanks for the review.

Please see one comment inline.

Cheers,
Med

De : Aitken, Paul 
Envoyé : lundi 15 mai 2023 16:17
À : drafts-expert-review-comm...@iana.org; BOUCADAIR Mohamed INNOV/NET 

Cc : ie-doct...@ietf.org; opsawg@ietf.org
Objet : Re: [Ie-doctors] [IANA #1271817] expert review for 
draft-ietf-opsawg-ipfix-srv6-srh (ipfix)

IE-doctors already looked at this under [IANA #1240167] and [IANA #1263583].

I've reviewed draft-ietf-opsawg-ipfix-srv6-srh-08 and -09 which appeared during 
the review window.

(Editors, please don't move the goalposts while reviews are in progress!)



3.  New SRv6 IPFIX Information Elements
The definitions in section 3 are inconsistent with the "IANA Considerations" in 
section 5. Sometimes there is more detail in one section or the other. Section 
3 claims "This section specifies the new SRv6 IPFIX IEs." yet section 5 will 
update IANA's registry - so these two sections must be consistent. Please 
either use the exact same words in both sections, or entirely remove the 
duplicate definitions in section 3.

5. Note to the RFC-Editor:

I would put this note right at the top, immediately after the section 5 
header, and not after table 1.


5.1 srhFlagsIPv6 / Additional Information

Remove the space from the URL:  /ipv6- parameters/


5.* / Additional Information

In each case, please mention the specific section of the RFC. eg "See 
section 2 of RFC8754".

[Med] Agree that more context is needed. The reason for providing a pointer 
should be provided each time a ref is cited. FWIW, this is tracked in this 
issue: 
https://github.com/network-analytics/draft-ietf-opsawg-ipfix-srv6-srh/issues/25.


5.5. srhSegmentIPv6BasicList / Description

"segment list" versus "Segment List" ?


5.7. srhSegmentsIPv6Left / Description
8-bit unsigned integer defining the number of segments
remaining to reach the end of the segment list from the SRH, as
specified by the "Segments Left" field in Section 4.4 of 
[RFC8200]
and mentioned part of the SRH in Section 2 of 
[RFC8754]).
Consider "from" -> "in" and removing "part of the SRH" ?


5.9.1 Subregistry

Who will be the expert reviewers for the sub-registry? Is it IE-doctors, or 
SRH-experts, or another group?


5.10. srhSegmentIPv6LocatorLength / Description

The period has been lost from "SRv6 Locator."


5.11 srhSegmentIPv6EndpointBehavior / Additional Information
"Section 4 of RFC8986." has been added with no context. eg consider:
Additional Information: See section 4 of RFC8986 and the "SRV6 Endpoint 
Behavior" registry at
https://www.iana.org/assignments/segment-routing/segment-routing.xhtml#srv6-endpoint-behaviors.
Also minor editorial comments:

"as series of octets" appears several times. Is "series" is plural, or 
should it be "as a series of octets" ?


7. Implementation Status

I would put this section in an appendix to avoid the need to renumber 
sections 8, 9, and 10 when this is removed.


P.

On 03/05/2023 00:08, David Dong via RT wrote:

Dear IE Doctors (cc: opsawg WG),



As the designated experts for the IPFIX Information Elements registry, can you 
review the proposed registration in draft-ietf-opsawg-ipfix-srv6-srh for us? 
Please see



https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-srv6-srh/__;!!OSsGDw!Olm5L_aWqtbpGyxypC2dvr2pJ8APDlZbByuYeEV-WilsP91koTwzwOeZ8QMgLIkwPKxegSjgXszfsyzTIbeaC8w$
 [datatracker[.]ietf[.]org]



The due date is May 16th, 2023.



If this is OK, when the IESG approves the document for publication, we'll make 
the registration at:



https://urldefense.com/v3/__https://www.iana.org/assignments/ipfix/__;!!OSsGDw!Olm5L_aWqtbpGyxypC2dvr2pJ8APDlZbByuYeEV-WilsP91koTwzwOeZ8QMgLIkwPKxegSjgXszfsyzTCddpnzE$
 [iana[.]org]



We will assume that your response is a consensus response, unless you tell us 
otherwise.



With thanks,



David Dong

IANA Services Specialist



___

ie-doctors mailing list

ie-doct...@ietf.org

https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ie-doctors__;!!OSsGDw!Olm5L_aWqtbpGyxypC2dvr2pJ8APDlZbByuYeEV-WilsP91koTwzwOeZ8QMgLIkwPKxegSjgXszfsyzTYbMT-j4$
 [ietf[.]org]


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information 

Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update

2023-05-09 Thread mohamed.boucadair
Re-,

FWIW, std vs. info was raised at least twice:


  *   Please look at “Which stream” in Slide 5 of 
https://datatracker.ietf.org/meeting/115/materials/slides-115-opsawg-an-update-to-the-tcpcontrolbits-ip-flow-information-export-ipfix-information-element-00
  *   https://mailarchive.ietf.org/arch/msg/opsawg/xiNdPUoDVFhNfOCKSDFWEJbwzdA/

Please note that the initial RFC that defined IE#6 was published in the 
Standard Track (https://www.rfc-editor.org/rfc/rfc5102.html).

Unless I’m mistaken, the reasoning that was given at the time for publishing 
7125 as informational is that it modifies a registry with a expert review 
policy. I’m afraid that justification is weak, especially given that the 
document includes normative behavior.

I suggest we leave the track as currently in the document. Thanks.

Cheers,
Med

De : Joe Clarke (jclarke) 
Envoyé : mardi 9 mai 2023 15:47
À : BOUCADAIR Mohamed INNOV/NET ; opsawg@ietf.org
Objet : Re: WG LC: draft-ietf-opsawg-rfc7125-update

I agree that if the intent is to use that registry as the canonical reference, 
then a normative reference makes sense.  RFC7125 leaned on TCP only, but then 
changes to the registry were not assumed.

Another point, I don’t recall seeing any discussion on why this document is a 
proposed standard whereas 7125 is informational.  As I go through the shepherd 
task list, I noticed this and as I consider both texts, I do think 
Informational might be more accurate for this bis, too.

Joe

From: mohamed.boucad...@orange.com 
mailto:mohamed.boucad...@orange.com>>
Date: Tuesday, May 9, 2023 at 02:42
To: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>, 
opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: RE: WG LC: draft-ietf-opsawg-rfc7125-update
Hi Joe,

TCP-FLAGS is listed as normative as this is the authoritative reference for 
interpreting the flags by the collector, not RFC9293. I agree that RFC9293 
would be sufficient for the exporter though.

Cheers,
Med

De : OPSAWG mailto:opsawg-boun...@ietf.org>> De la 
part de Joe Clarke (jclarke)
Envoyé : lundi 8 mai 2023 19:08
À : Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>;
 opsawg@ietf.org
Objet : Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update

I am working on the shepherd write-up for this document and saw that Paul and 
Brian were not included in the IPR poll (and they are named contributors).  
I’ve sent them an email, but it seems Brian’s email has changed since 7125.  
Does anyone have his current email?

I have reviewed the document (-03) and the IDNITS.  The document text looks 
okay.  Most of the IDNITS are false positives (Benoît, when is your name going 
to comply to ASCII  ?).  Does the TCP-FLAGS registry need to be normative for 
this document?  Should this be informative since 9293 is already normative?

Joe

From: Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, May 2, 2023 at 18:49
To: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>, 
opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: Re: WG LC: draft-ietf-opsawg-rfc7125-update
I have concluded the WG LC for this document.  We got two directorate reviews 
in, and it sounds like the authors will make one more revision.

While I was hoping we’d get a shepherd volunteer, I didn’t hear from anyone.  I 
will shepherd this document and try to have the write-up done by middle of next 
week.

Joe

From: OPSAWG mailto:opsawg-boun...@ietf.org>> on 
behalf of Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, April 25, 2023 at 18:13
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update
Again, sorry for the delay.  I’m just back to the office, and I’m catching up 
on things.  I’ve pushed for some other directorate reviews, but given that we 
want to progress this document, I’m happy to work in parallel with those.

I didn’t get any offers to shepherd, though.  I’ll ask once more to see if 
anyone in the WG is interested?  This is a good, short draft to cut one’s teeth 
on…

Joe

From: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>
Date: Tuesday, April 4, 2023 at 16:01
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: WG LC: draft-ietf-opsawg-rfc7125-update
Hello, WG.  I hope everyone that traveled for 116 is back home and healthy.

One of the items that came out of the 116 meeting was that this document is in 
decent shape for a WGLC.  We wanted to move these IPFIX maintenance documents 
through the process rather quickly.

One of the open questions Med asked of the WG (and chairs) is should this be a 
bis.  As a chair, I think a bis is cleaner here, but I would like to hear from 
the WG during this LC if that makes sense.

We will run a two week WG LC ending on April 18, 2023.  Please provide your 
comments on list.


Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update

2023-05-09 Thread mohamed.boucadair
Hi Joe,

TCP-FLAGS is listed as normative as this is the authoritative reference for 
interpreting the flags by the collector, not RFC9293. I agree that RFC9293 
would be sufficient for the exporter though.

Cheers,
Med

De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : lundi 8 mai 2023 19:08
À : Joe Clarke (jclarke) ; opsawg@ietf.org
Objet : Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update

I am working on the shepherd write-up for this document and saw that Paul and 
Brian were not included in the IPR poll (and they are named contributors).  
I’ve sent them an email, but it seems Brian’s email has changed since 7125.  
Does anyone have his current email?

I have reviewed the document (-03) and the IDNITS.  The document text looks 
okay.  Most of the IDNITS are false positives (Benoît, when is your name going 
to comply to ASCII  ?).  Does the TCP-FLAGS registry need to be normative for 
this document?  Should this be informative since 9293 is already normative?

Joe

From: Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, May 2, 2023 at 18:49
To: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>, 
opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: Re: WG LC: draft-ietf-opsawg-rfc7125-update
I have concluded the WG LC for this document.  We got two directorate reviews 
in, and it sounds like the authors will make one more revision.

While I was hoping we’d get a shepherd volunteer, I didn’t hear from anyone.  I 
will shepherd this document and try to have the write-up done by middle of next 
week.

Joe

From: OPSAWG mailto:opsawg-boun...@ietf.org>> on 
behalf of Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, April 25, 2023 at 18:13
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: Re: [OPSAWG] WG LC: draft-ietf-opsawg-rfc7125-update
Again, sorry for the delay.  I’m just back to the office, and I’m catching up 
on things.  I’ve pushed for some other directorate reviews, but given that we 
want to progress this document, I’m happy to work in parallel with those.

I didn’t get any offers to shepherd, though.  I’ll ask once more to see if 
anyone in the WG is interested?  This is a good, short draft to cut one’s teeth 
on…

Joe

From: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>
Date: Tuesday, April 4, 2023 at 16:01
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: WG LC: draft-ietf-opsawg-rfc7125-update
Hello, WG.  I hope everyone that traveled for 116 is back home and healthy.

One of the items that came out of the 116 meeting was that this document is in 
decent shape for a WGLC.  We wanted to move these IPFIX maintenance documents 
through the process rather quickly.

One of the open questions Med asked of the WG (and chairs) is should this be a 
bis.  As a chair, I think a bis is cleaner here, but I would like to hear from 
the WG during this LC if that makes sense.

We will run a two week WG LC ending on April 18, 2023.  Please provide your 
comments on list.

https://datatracker.ietf.org/doc/draft-ietf-opsawg-rfc7125-update/

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] draft-boucla-opsawg-ipfix-fixes-04

2023-05-05 Thread mohamed.boucadair
Re-,

 

Great!

 

FWIW,
https://datatracker.ietf.org/doc/draft-boucla-opsawg-ipfix-fixes/06/
includes now the note proposed below. 

 

Cheers,

Med

 

De : thomas.g...@swisscom.com  
Envoyé : vendredi 5 mai 2023 12:00
À : BOUCADAIR Mohamed INNOV/NET ;
benoit.cla...@huawei.com; opsawg@ietf.org
Cc : juans...@cisco.com; rjo...@cisco.com
Objet : RE: draft-boucla-opsawg-ipfix-fixes-04

 

Dear Med and Benoit,

 

Excellent. Thank you very much for addressing this so quickly. The
proposed changes make perfectly sense and addresses my concerns. 

 

Indeed I was miss leaded by the IANA IPFIX registry indicating
unisgned8 where RFC7270 defined unisgned32 for the IE89
forwardingStatus. Therefore reduced-size encoding makes perfectly
sense now.

 

Best wishes

Thomas

 

From: mohamed.boucad...@orange.com
  mailto:mohamed.boucad...@orange.com> > 
Sent: Friday, May 5, 2023 11:48 AM
To: Benoit Claise mailto:benoit.cla...@huawei.com> >; Graf Thomas, INI-NET-VNC-HCS
mailto:thomas.g...@swisscom.com> >;
opsawg@ietf.org  
Cc: juans...@cisco.com  ; rjo...@cisco.com
 
Subject: RE: draft-boucla-opsawg-ipfix-fixes-04

 

Hi Benoît, 

 

“To make it clear and avoid any issues (which I smell coming) with the
IE-doctors at review time, I would make it very clear in the next
version of the draft:
[IANA Note: this unsigned8 to unsigned32 is actually a bug, as
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 clearly
mentions that the Abstract Data Type must be unsigned32]”

I went with the following: 

 

NEW:

   The current entry in [IANA-IPFIX] deviates from what is provided in


  [RFC7270].  In particular, the registered Abstract Data Type is 

  unsigned8, while it must be unsigned32.  The following update fixes 

  that issue.  The description is also updated to clarify the use of  

  the reduced-size encoding as per Section 6.2 of [RFC7011].

 

Cheers,

Med

 

De : Benoit Claise mailto:benoit.cla...@huawei.com> > 
Envoyé : vendredi 5 mai 2023 11:04
À : thomas.g...@swisscom.com  ;
opsawg@ietf.org  ; BOUCADAIR Mohamed INNOV/NET
mailto:mohamed.boucad...@orange.com> >
Cc : juans...@cisco.com  ; rjo...@cisco.com
 ; me mailto:benoit.cla...@huawei.com> >
Objet : Re: draft-boucla-opsawg-ipfix-fixes-04

 

Dear Thomas,

Thanks for spotting this.
See inline.

On 5/3/2023 4:07 PM, thomas.g...@swisscom.com
  wrote:

Dear OPSAWG, Med and Benoit

 

Regarding section 6.2, forwardingStatus
(https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes
-04#section-6.2). Section 4.12 of RFC 7270
(https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12) describes
that reduced-size encoding according to Section 6.2 of RFC 7011
(https://www.rfc-editor.org/rfc/rfc7011#section-6.2) can be applied.
Further Section 4.12 of RFC 7270 describes that "The basic encoding is
8 bits. The future extensions could add one or three bytes". The IANA
IPFIX registry (https://www.iana.org/assignments/ipfix/ipfix.xhtml)
reads unisgned8 for IE89 forwardingStatus.

 

Recently we came across a vendor implementation which implemented IE89
forwardingStatus with unsigned32 instead of unsigned8 already. This
raised the following questions which I like to clarify here:

 

1.  Does "The future extensions could add one or three bytes"
means that data type can be changed from unsigned8 to unsigned32 today
already or is a new RFC document needed to update the IPFIX entity?

Actually, this is clearly a bug in the IFPIX IANA registry. 
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 mentions
unsigned32 and it's not the case in the IPFIX IANA registry

2.   
3.  Does " reduced-size encoding" also applies for increasing the
field size? 

No. That's the reason why unsigned32 must be in the IPFIX IANA
registry

4.  If yes, I find the wording rather misleading.
5.  If IE89 forwardingStatus can be implemented in unsigned8,
unsigned16 and unsigned32, shouldn't it be reflected in the IPFIX
registry accordingly?

 

Depending on the answers we might take the opportunity with
draft-boucla-opsawg-ipfix-fixes to update the IE89 forwardingStatus
description.

As I mentions, this is a bug.
We can take the opportunity to include it in
draft-boucla-opsawg-ipfix-fixes-05
Med did it, and this is perfect. Thanks.
To make it clear and avoid any issues (which I smell coming) with the
IE-doctors at review time, I would make it very clear in the next
version of the draft:
[IANA Note: this unsigned8 to unsigned32 is actually a bug, as
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 clearly
mentions that the Abstract Data Type must be unsigned32]

Thanks to Thomas for the investigaiton and Med for the speedy
reaction.

Regards, Benoit




 

Best wishes

Thomas

 


[OPSAWG] IPFIX EH Occurrences (was RE: Minutes from 116)

2023-05-05 Thread mohamed.boucadair
Hi all,

As a follow-up to this comment:

==
Thomas: IPv6 EH there can be only one occurrence. Consider multiple
types in a package.
==

I prepared a candidate proposal at: 
https://boucadair.github.io/ipfix-tcpoptions-and-v6eh/draft-boucadair-opsawg-ipfix-tcpo-v6eh.html#name-ipv6extensionheadercount-in

Comments are welcome.

Cheers,
Med

De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : mardi 25 avril 2023 23:44
À : opsawg@ietf.org
Objet : [OPSAWG] Minutes from 116

I have imported our 116 minutes into Data Tracker.  A big thanks to Rob and 
Henk for recording things (and to anyone else that jumped in).

In terms of actions, we have a WG LC for the 7125 (update bis).  I'll close 
that out in another thread.  We closed the adoption call for DMLMO.

Let us know if there are any changes needed or omissions in these minutes.

Thanks.

https://datatracker.ietf.org/meeting/116/materials/minutes-116-opsawg-202303280030-00

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] draft-boucla-opsawg-ipfix-fixes-04

2023-05-05 Thread mohamed.boucadair
Hi Benoît,

"To make it clear and avoid any issues (which I smell coming) with the 
IE-doctors at review time, I would make it very clear in the next version of 
the draft:
[IANA Note: this unsigned8 to unsigned32 is actually a bug, as 
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 clearly mentions that 
the Abstract Data Type must be unsigned32]"

I went with the following:

NEW:
   The current entry in [IANA-IPFIX] deviates from what is provided in
  [RFC7270].  In particular, the registered Abstract Data Type is
  unsigned8, while it must be unsigned32.  The following update fixes
  that issue.  The description is also updated to clarify the use of
  the reduced-size encoding as per Section 6.2 of [RFC7011].

Cheers,
Med

De : Benoit Claise 
Envoyé : vendredi 5 mai 2023 11:04
À : thomas.g...@swisscom.com; opsawg@ietf.org; BOUCADAIR Mohamed INNOV/NET 

Cc : juans...@cisco.com; rjo...@cisco.com; me 
Objet : Re: draft-boucla-opsawg-ipfix-fixes-04

Dear Thomas,

Thanks for spotting this.
See inline.
On 5/3/2023 4:07 PM, thomas.g...@swisscom.com 
wrote:
Dear OPSAWG, Med and Benoit

Regarding section 6.2, forwardingStatus 
(https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes-04#section-6.2).
 Section 4.12 of RFC 7270 
(https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12) describes that 
reduced-size encoding according to Section 6.2 of RFC 7011 
(https://www.rfc-editor.org/rfc/rfc7011#section-6.2) can be applied. Further 
Section 4.12 of RFC 7270 describes that "The basic encoding is 8 bits. The 
future extensions could add one or three bytes". The IANA IPFIX registry 
(https://www.iana.org/assignments/ipfix/ipfix.xhtml) reads unisgned8 for IE89 
forwardingStatus.

Recently we came across a vendor implementation which implemented IE89 
forwardingStatus with unsigned32 instead of unsigned8 already. This raised the 
following questions which I like to clarify here:


  1.  Does "The future extensions could add one or three bytes" means that data 
type can be changed from unsigned8 to unsigned32 today already or is a new RFC 
document needed to update the IPFIX entity?
Actually, this is clearly a bug in the IFPIX IANA registry.
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 mentions unsigned32 
and it's not the case in the IPFIX IANA registry


  1.
  2.  Does " reduced-size encoding" also applies for increasing the field size?
No. That's the reason why unsigned32 must be in the IPFIX IANA registry


  1.  If yes, I find the wording rather misleading.
  2.  If IE89 forwardingStatus can be implemented in unsigned8, unsigned16 and 
unsigned32, shouldn't it be reflected in the IPFIX registry accordingly?

Depending on the answers we might take the opportunity with 
draft-boucla-opsawg-ipfix-fixes to update the IE89 forwardingStatus description.
As I mentions, this is a bug.
We can take the opportunity to include it in draft-boucla-opsawg-ipfix-fixes-05
Med did it, and this is perfect. Thanks.
To make it clear and avoid any issues (which I smell coming) with the 
IE-doctors at review time, I would make it very clear in the next version of 
the draft:
[IANA Note: this unsigned8 to unsigned32 is actually a bug, as 
https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12 clearly mentions that 
the Abstract Data Type must be unsigned32]

Thanks to Thomas for the investigaiton and Med for the speedy reaction.

Regards, Benoit



Best wishes
Thomas


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] draft-boucla-opsawg-ipfix-fixes-04

2023-05-05 Thread mohamed.boucadair
Hi Thomas, all,

 

An updated version with a first attempt to clarify the description of
forwardingStatus can be seen at:
https://datatracker.ietf.org/doc/draft-boucla-opsawg-ipfix-fixes/05/

 

This version also fixed some wrong pointers (e.g., nat46/nat64).

 

Cheers,

Med

 

De : BOUCADAIR Mohamed INNOV/NET 
Envoyé : jeudi 4 mai 2023 09:51
À : 'thomas.g...@swisscom.com' ;
opsawg@ietf.org; benoit.cla...@huawei.com
Cc : juans...@cisco.com; rjo...@cisco.com
Objet : RE: draft-boucla-opsawg-ipfix-fixes-04

 

Hi Thomas, 

 

Thank you for raising this. 

 

RFC7270 actually uses unsigned32 + 7011#6.2. As only meanings are
assigned with the first 8 bits, RFC7270 assumes 8-bit as the base
encoding.. which is then used as type in the registry. I agree that
that the current description confusing. 

 

This is indeed something that we can clarify in the simple fixes I-D.

 

Cheers,

Med

 

De : thomas.g...@swisscom.com 
mailto:thomas.g...@swisscom.com> > 
Envoyé : mercredi 3 mai 2023 16:08
À : opsawg@ietf.org  ; BOUCADAIR Mohamed
INNOV/NET mailto:mohamed.boucad...@orange.com> >; benoit.cla...@huawei.com
 
Cc : juans...@cisco.com  ; rjo...@cisco.com
 
Objet : draft-boucla-opsawg-ipfix-fixes-04

 

Dear OPSAWG, Med and Benoit

 

Regarding section 6.2, forwardingStatus
(https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes
-04#section-6.2). Section 4.12 of RFC 7270
(https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12) describes
that reduced-size encoding according to Section 6.2 of RFC 7011
(https://www.rfc-editor.org/rfc/rfc7011#section-6.2) can be applied.
Further Section 4.12 of RFC 7270 describes that "The basic encoding is
8 bits. The future extensions could add one or three bytes". The IANA
IPFIX registry (https://www.iana.org/assignments/ipfix/ipfix.xhtml)
reads unisgned8 for IE89 forwardingStatus.

 

Recently we came across a vendor implementation which implemented IE89
forwardingStatus with unsigned32 instead of unsigned8 already. This
raised the following questions which I like to clarify here:

 

*   Does "The future extensions could add one or three bytes"
means that data type can be changed from unsigned8 to unsigned32 today
already or is a new RFC document needed to update the IPFIX entity?
*   Does " reduced-size encoding" also applies for increasing the
field size? If yes, I find the wording rather misleading.
*   If IE89 forwardingStatus can be implemented in unsigned8,
unsigned16 and unsigned32, shouldn't it be reflected in the IPFIX
registry accordingly?

 

Depending on the answers we might take the opportunity with
draft-boucla-opsawg-ipfix-fixes to update the IE89 forwardingStatus
description.

 

Best wishes

Thomas



smime.p7s
Description: S/MIME cryptographic signature
___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Minutes from 116

2023-05-04 Thread mohamed.boucadair
Hi Joe, all,

One follow-up on this point:

"Adrian Farrel (from chat): I'd like to see the ORAN draft presented in
TEAS before OPSAWG adopts. There seems to be a lot of overlap with
ongoing work in TEAS"


(1)  Not sure which draft Adrian was referring to, but an LS from O-RAN was 
received since then by OPSAWG/TEAS for the slice service + AC.

(2)  I presented the AC effort in the teas WG with a focus on how this can be 
used for slicing: "Bearers, Attachment Circuits, SAPs, & Slicing" [1]. Please 
note that the setup example in the slides can't be addressed by the slice 
service models.

(3)  The authors of the slicing service models discussed in slide 4 of [2] 
options about how the AC work complements the model. One of the outcomes of the 
discussion is that the authors of the slice service model will use references 
to the ac-svc to inherit properties of ACs that were pre-provisioned by the ac 
model. However, and although it is much more cleaner to use the refs in the AC 
model, we agreed to use strings to avoid adding a normative dependency to ac 
drafts at this stage.

I hope this clarifies the comment from Adrian.

Cheers,
Med

[1] 
https://datatracker.ietf.org/meeting/116/materials/slides-116-teas-14-bearers-attachment-circuits-saps-00
[2] 
https://datatracker.ietf.org/meeting/116/materials/slides-116-teas-sessa-04-a-yang-data-model-for-the-ietf-network-slice-service-01.


De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : mardi 25 avril 2023 23:44
À : opsawg@ietf.org
Objet : [OPSAWG] Minutes from 116

I have imported our 116 minutes into Data Tracker.  A big thanks to Rob and 
Henk for recording things (and to anyone else that jumped in).

In terms of actions, we have a WG LC for the 7125 (update bis).  I'll close 
that out in another thread.  We closed the adoption call for DMLMO.

Let us know if there are any changes needed or omissions in these minutes.

Thanks.

https://datatracker.ietf.org/meeting/116/materials/minutes-116-opsawg-202303280030-00

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] draft-boucla-opsawg-ipfix-fixes-04

2023-05-04 Thread mohamed.boucadair
Hi Thomas, 

 

Thank you for raising this. 

 

RFC7270 actually uses unsigned32 + 7011#6.2. As only meanings are
assigned with the first 8 bits, RFC7270 assumes 8-bit as the base
encoding.. which is then used as type in the registry. I agree that
that the current description confusing. 

 

This is indeed something that we can clarify in the simple fixes I-D.

 

Cheers,

Med

 

De : thomas.g...@swisscom.com  
Envoyé : mercredi 3 mai 2023 16:08
À : opsawg@ietf.org; BOUCADAIR Mohamed INNOV/NET
; benoit.cla...@huawei.com
Cc : juans...@cisco.com; rjo...@cisco.com
Objet : draft-boucla-opsawg-ipfix-fixes-04

 

Dear OPSAWG, Med and Benoit

 

Regarding section 6.2, forwardingStatus
(https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes
-04#section-6.2). Section 4.12 of RFC 7270
(https://www.rfc-editor.org/rfc/rfc7270.html#section-4.12) describes
that reduced-size encoding according to Section 6.2 of RFC 7011
(https://www.rfc-editor.org/rfc/rfc7011#section-6.2) can be applied.
Further Section 4.12 of RFC 7270 describes that "The basic encoding is
8 bits. The future extensions could add one or three bytes". The IANA
IPFIX registry (https://www.iana.org/assignments/ipfix/ipfix.xhtml)
reads unisgned8 for IE89 forwardingStatus.

 

Recently we came across a vendor implementation which implemented IE89
forwardingStatus with unsigned32 instead of unsigned8 already. This
raised the following questions which I like to clarify here:

 

*   Does "The future extensions could add one or three bytes"
means that data type can be changed from unsigned8 to unsigned32 today
already or is a new RFC document needed to update the IPFIX entity?
*   Does " reduced-size encoding" also applies for increasing the
field size? If yes, I find the wording rather misleading.
*   If IE89 forwardingStatus can be implemented in unsigned8,
unsigned16 and unsigned32, shouldn't it be reflected in the IPFIX
registry accordingly?

 

Depending on the answers we might take the opportunity with
draft-boucla-opsawg-ipfix-fixes to update the IE89 forwardingStatus
description.

 

Best wishes

Thomas



smime.p7s
Description: S/MIME cryptographic signature
___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] TR: I-D Action: draft-boro-opsawg-teas-attachment-circuit-06.txt

2023-05-03 Thread mohamed.boucadair
Hi all, 

We updated the draft to address the comments received so far, especially a 
review from Kenichi and Luis Angel to control QoS at the AC level (more details 
can be seen at [1]). The full list of closed issues can be tracked at [2].

We also updated the description and examples. 

The AC common model was also updated with new groupings to manage QoS. The 
latest version is available at: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-common-ac/

We think that these versions are more stable and ready for considering a call 
for adoption for these documents.

Cheers,
Med

[1] https://github.com/boucadair/attachment-circuit-model/issues/70
[2] 
https://github.com/boucadair/attachment-circuit-model/issues?q=is%3Aissue+is%3Aclosed

-Message d'origine-
De : I-D-Announce  De la part de 
internet-dra...@ietf.org
Envoyé : mercredi 3 mai 2023 15:35
À : i-d-annou...@ietf.org
Objet : I-D Action: draft-boro-opsawg-teas-attachment-circuit-06.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.

   Title   : YANG Data Models for 'Attachment Circuits'-as-a-Service 
(ACaaS)
   Authors : Mohamed Boucadair
 Richard Roberts
 Oscar Gonzalez de Dios
 Samier Barguil Giraldo
 Bo Wu
   Filename: draft-boro-opsawg-teas-attachment-circuit-06.txt
   Pages   : 95
   Date: 2023-05-03

Abstract:
   This document specifies a YANG service data model for Attachment
   Circuits (ACs).  This model can be used for the provisioning of ACs
   prior or during service provisioning (e.g., Network Slice Service).
   The document specifies also a module that updates other service and
   network modules with the required information to bind specific
   services to ACs that are created using the AC service model.

   Also, the document specifies a set of reusable groupings.  Whether a
   service model reuses structures defined in the AC models or simply
   include an AC reference is a design choice of these service models.
   Relying upon the AC service model to manage ACs over which a service
   is delivered has the merit to decorrelate the management of a service
   vs. upgrade the AC components to reflect recent AC technologies or
   features.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-06.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-boro-opsawg-teas-attachment-circuit-06



_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-03.txt

2023-05-03 Thread mohamed.boucadair
Hi all, 

This version implements the changes shared with directorate reviewers. Also 
made some very minor edits to enhance the readability:
https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-rfc7125-update-03

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : mercredi 3 mai 2023 13:06
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-
> 03.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This Internet-Draft is a work item of the Operations
> and Management Area Working Group (OPSAWG) WG of the IETF.
> 
>Title   : An Update to the tcpControlBits IP Flow
> Information Export (IPFIX) Information Element
>Author  : Mohamed Boucadair
>Filename: draft-ietf-opsawg-rfc7125-update-03.txt
>Pages   : 7
>Date: 2023-05-03
> 
> Abstract:
>RFC 7125 revised the tcpControlBits IP Flow Information Export
>(IPFIX) Information Element that was originally defined in RFC
> 5102
>to reflect changes to the TCP header control bits since RFC
> 793.
>However, that update is still problematic for interoperability
>because some flag values were deprecated since then.
> 
>This document removes stale information from the IPFIX registry
> and
>avoiding future conflicts with the authoritative TCP Header
> Flags
>registry.
> 
>This document obsoletes RFC 7125.


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Rtgdir last call review of draft-ietf-opsawg-rfc7125-update-02

2023-05-02 Thread mohamed.boucadair
Hi Ketan, 

Thank you for the review. Good points. 

I made some changes to take into account your suggestions: 
https://github.com/boucadair/-ipfix-rfc7125-update/commit/dbac6f4ad7617f3e0165068fb2e6e0053095459b.

Some comments from my side:

* I agree that the writeup should include a mention about the track. FWIW, the 
point was raised in 
https://datatracker.ietf.org/meeting/115/materials/slides-115-opsawg-an-update-to-the-tcpcontrolbits-ip-flow-information-export-ipfix-information-element-00
 and also in the mailing list.
* As we are not touching the data type currently defined for IE#6, I don't 
think it is worth the call out the type used here. No change is thus made to 
that part. Thanks.

Cheers,
Med

> -Message d'origine-
> De : Ketan Talaulikar via Datatracker 
> Envoyé : mardi 2 mai 2023 16:32
> À : rtg-...@ietf.org
> Cc : draft-ietf-opsawg-rfc7125-update@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Rtgdir last call review of draft-ietf-opsawg-rfc7125-
> update-02
> 
> Reviewer: Ketan Talaulikar
> Review result: Has Nits
> 
> 1) This document is Standards Track while the RFC7125 that it
> obsoletes is Informational. Standards Track seems correct to me.
> This may not be an issue - simply calling attention to this change
> in status to be explained perhaps in the Shepherd Write-up down
> the line?
> 
> 2) In Sec 1, please check if the paragraph should be updated as
> below:
> 
> This document fixes that problem by removing stale information
> from the IPFIX registry [IPFIX] and avoiding future conflicts with
> the authoritative TCP registry [TCP-FLAGS].
> 
> 3) Sec 3 does not cover all the fields of the IPFIX IANA Table.
> Notably "Additional Information" field chould have been supplied
> here instead of being described in IANA Section 4. Perhaps if
> everything is stated in Sec 3 then the IANA considerations become
> simpler and clearer?
> 
> 4) Please consider if the additional text from Security And
> Privacy Considerations from RFC7125 is required in addition to the
> reference to the RFC7011. There is discussion related to DDOS in
> section 1 of the document.
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Tsvart last call review of draft-ietf-opsawg-rfc7125-update-02

2023-05-02 Thread mohamed.boucadair
Hi Michael, 

Thank you for the review.

The review will be ACKed in the next iteration.

Cheers,
Med

> -Message d'origine-
> De : Michael Scharf via Datatracker 
> Envoyé : mardi 2 mai 2023 12:38
> À : tsv-...@ietf.org
> Cc : draft-ietf-opsawg-rfc7125-update@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Tsvart last call review of draft-ietf-opsawg-rfc7125-
> update-02
> 
> Reviewer: Michael Scharf
> Review result: Ready
> 
> This document has been reviewed as part of the transport area
> review team's ongoing effort to review key IETF documents. These
> comments were written primarily for the transport area directors,
> but are copied to the document's authors and WG to allow them to
> address any issues raised and also to the IETF discussion list for
> information.
> 
> When done at the time of IETF Last Call, the authors should
> consider this review as part of the last-call comments they
> receive. Please always CC tsv-...@ietf.org if you reply to or
> forward this review.
> 
> I have read version -02 as TSV-ART reviewer. The document is short
> and well-written.
> 
> The described solution for encoding TCP header flags in IPFIX
> seems to make sense given the recent updates of the TCP standard,
> and future changes in future. However, please note that I am not
> an IPFIX expert.
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] IPR POLL: draft-ietf-opsawg-rfc7125-update

2023-04-04 Thread mohamed.boucadair
Hi Joe, all,

No, I'm not aware of any IPR that applies to this draft.

Cheers,
Med

From: OPSAWG  On Behalf Of Joe Clarke (jclarke)
Sent: mardi 4 avril 2023 22:03
To: opsawg@ietf.org
Subject: [OPSAWG] IPR POLL: draft-ietf-opsawg-rfc7125-update

(FYI, we're going to get more consistent about doing this at adoption time, but 
this one was already adopted.)

Authors and contributors, please respond on-list as to whether or not you are 
aware of any IPR that pertains to this work.

Please state either:

"No, I'm not aware of any IPR that applies to this draft"
or
"Yes, I'm aware of IPR that applies to this draft"

If you are aware of IPR, indicate whether or not this has been disclosed per 
IETF IPR rules (see RFCs 3669, 5378, and 8179).

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Yes on draft-ietf-opsawg-add-encrypted-dns-12: (with COMMENT)

2023-03-30 Thread mohamed.boucadair
Hi Éric, 

Thanks for double checking. I also think this version is better.

Cheers,
Med

> -Original Message-
> From: Éric Vyncke via Datatracker 
> Sent: vendredi 31 mars 2023 08:48
> To: The IESG 
> Cc: draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org; bev...@gmail.com;
> bev...@gmail.com
> Subject: Éric Vyncke's Yes on draft-ietf-opsawg-add-encrypted-dns-12:
> (with COMMENT)
> 
> Éric Vyncke has entered the following ballot position for
> draft-ietf-opsawg-add-encrypted-dns-12: Yes
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut
> this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-dns/
> 
> 
> 
> -
> -
> COMMENT:
> -
> -
> 
> Thanks for addressing my previous DISCUSS[1], I sincerely think that
> the document is better now.
> 
> Regards
> 
> -éric
> 
> [1]
> https://mailarchive.ietf.org/arch/msg/opsawg/yV4NKUp6tcmFGTkXomh7s1vm
> whY/
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-02.txt

2023-03-26 Thread mohamed.boucadair
Hi all, 

This version follows the approach in 
https://mailarchive.ietf.org/arch/msg/opsawg/NB_rRxXHAko9pHW-geKIB1B9rKw/.

This version is ready for the WGLC.

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : lundi 27 mars 2023 00:31
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-02.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This Internet-Draft is a work item of the Operations and
> Management Area Working Group (OPSAWG) WG of the IETF.
> 
>Title   : An Update to the tcpControlBits IP Flow
> Information Export (IPFIX) Information Element
>Author  : Mohamed Boucadair
>Filename: draft-ietf-opsawg-rfc7125-update-02.txt
>Pages   : 7
>Date: 2023-03-26
> 
> Abstract:
>RFC 7125 revised the tcpControlBits IP Flow Information Export
>(IPFIX) Information Element that was originally defined in RFC
> 5102
>to reflect changes to the TCP Flags header field since RFC 793.
>However, that update is still problematic for interoperability
>because some flag values were deprecated since then.
> 
>This document removes stale information from the IPFIX registry
> and
>avoiding future conflicts with the authoritative TCP Header Flags
>registry.
> 
>This document obsoletes RFC 7125.
> 
> The IETF datatracker status page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-rfc7125-update/
> 
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-opsawg-rfc7125-update-
> 02.html
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-rfc7125-
> update-02
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-26 Thread mohamed.boucadair
Hi Éric, all,


FWIW, a new version with the changes discussed so far is now available online: 
A diff from the previous version can be seen at:

https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-add-encrypted-dns-12

Cheers,
Med

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : vendredi 17 mars 2023 09:21
À : 'Bernie Volz' 
Cc : Eric Vyncke (evyncke) ; The IESG ; 
draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-cha...@ietf.org; 
opsawg@ietf.org; dh...@ietf.org; jin...@wide.ad.jp
Objet : RE: Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: 
(with DISCUSS and COMMENT)

Hi Bernie,

Thank you for clarifying.

Please see inline.

Cheers,
Med

De : Bernie Volz mailto:bev...@gmail.com>>
Envoyé : jeudi 16 mars 2023 22:29
À : BOUCADAIR Mohamed INNOV/NET 
mailto:mohamed.boucad...@orange.com>>
Cc : Eric Vyncke (evyncke) mailto:evyn...@cisco.com>>; The 
IESG mailto:i...@ietf.org>>; 
draft-ietf-opsawg-add-encrypted-...@ietf.org;
 opsawg-cha...@ietf.org; 
opsawg@ietf.org; dh...@ietf.org; 
jin...@wide.ad.jp
Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: 
(with DISCUSS and COMMENT)

I’m really not sure why there is any confusion. I think changing Section 3.1 
and 3.2 (obviously with some edits for 3.2) from:


  Permitted DHCPv6 options in the DHCPv6-Options Attribute are

  maintained by IANA in the registry created in Section 8.4.1.

to:


  Permitted DHCPv6 options in the DHCPv6-Options Attribute are

  maintained by IANA in the registry created in Section 8.4.1. If a

  DHCP server finds an option not permitted, it MUST ignore that

  option.

[Med] MUST conflicts with the config knob. I made this change:

OLD:
   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
  DHCP*-Options RADIUS attribute.

NEW:
   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
   DHCP*-Options RADIUS attribute.  Absent explicit configuration,
   RADIUS implementations and DHCP server implementations SHOULD ignore
   non-permitted DHCP options received in a DHCP*-Options RADIUS
attribute.

Would be a simple and reasonable fix. This doesn’t fully address the malformed 
data, such as extra data at end of attribute value that is less than 4 octets 
(dhcpv6 options have a 4-octet header) or when an option specifies a length 
that exceeds the remaining data in the attribute, but I’ll allow those issues 
to be handled by the RADIUS documents as an invalid attribute.

[Med] ACK.

Note that I don’t believe RFC7037 documented what should happen if Radius 
Attributes that are not permitted are present in the data. But that doesn’t 
mean as time goes on we shouldn’t become wiser and improve our standards to 
cover more of the potential “bad” considerations.

Until Éric raised it, I hadn’t thought about it either. Éric might still want 
to cover these malformed data issues …

- not limit itself on the validity of the RADIUS attribute but
also clearly state what the DHCP server validation should do

Also, Section 5 is also a bit lacking in how the DHCP server handles this. Yes, 
I know what is expected as having worked with DHCP for a long time … but 
standing back a bit, really is not that clear. You might want to review Section 
6 of RFC 6422. In your case, you likely want the server to prefer this option 
over whatever it may already have.

[Med] This is already covered:

   RADIUS supplied data is specific configuration data that is returned
   as a function of authentication and authorization checks.  As such,
   absent any explicit configuration on the DHCP server, RADIUS supplied
   data by means of DHCP*-Options Attributes take precedence over any
local configuration.

- Bernie Volz

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;

Re: [OPSAWG] draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. (slice) service provisioning

2023-03-22 Thread mohamed.boucadair
Hi all,

Please find below an update of the attachment circuit effort:

  *   The content is now split into three I-Ds
 *   Common AC: 
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-common-ac
 *   AC as a Service: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/05/
 *   SAP/AC: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-ntw-attachment-circuit/02/
  *   We created a separate model for the bearer service and clarified how it 
interacts with the AC
  *   We integrated comments from Moti, Kenichi, and the rest of the team

The overall dashboard for the attachment circuit effort is available at: 
https://github.com/users/boucadair/projects/1

  *   44 closed issues
  *   11 in progress
  *   6 candidate features
  *   7 features that need more analysis

Our plan is to request adoption of this effort in OPSAWG as we are leveraging 
many pieces that were developed in opsawg and also because AC can be reusing 
beyond slicing. We commit to regularly report and seek for comments from teas.

Comments, questions, and suggestions are appreciated.

Cheers,
Med (on behalf of the AC team)

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : mercredi 22 février 2023 16:28
À : 'Richard Roberts' ; TEAS WG ; 
draft-ietf-teas-ietf-network-slice-nbi-y...@ietf.org; opsawg@ietf.org
Cc : Bo Wu ; Oscar Gonzalez de Dios 
; Samier Barguil 
; JACQUENET Christian INNOV/NET 

Objet : RE: draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning

Hi all,

Thanks Richard for sharing this update from ORAN.

FWIW, a new revision of the Attachment Circuits as a Service Module is 
available online. The main changes are as follows:


  *   Clarify the bearer concept and further elaborate the AC definition
  *   Position AC vs. bearer
  *   Position ACaaS vs. other models
  *   Add more examples, including illustrate how to use the AC module to 
connect to a cloud provider

Other changes can be tracked by looking into the diff provided below:


Title:  YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)

Document date:  2023-02-22

Group:  Individual Submission

Pages:  122

URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-02.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-02.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-attachment-circuit

Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-boro-opsawg-teas-attachment-circuit-02

Comments are welcome.

Cheers,
Med

De : Richard Roberts mailto:rrobe...@juniper.net>>
Envoyé : mercredi 8 février 2023 11:25
À : BOUCADAIR Mohamed INNOV/NET 
mailto:mohamed.boucad...@orange.com>>; TEAS WG 
mailto:t...@ietf.org>>; 
draft-ietf-teas-ietf-network-slice-nbi-y...@ietf.org
Cc : opsawg@ietf.org; Bo Wu 
mailto:lana.w...@huawei.com>>; Oscar Gonzalez de Dios 
mailto:oscar.gonzalezded...@telefonica.com>>;
 Samier Barguil 
mailto:samier.barguil_gira...@nokia.com>>; 
JACQUENET Christian INNOV/NET 
mailto:christian.jacque...@orange.com>>
Objet : RE: draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning

Hi all,

I am sharing with you the link below that deals with TN Slices within ORAN. 
This is joint WG6 (O-CLOUD) and WG9 (TN) presentation.
This presentation shows how the AC Data model can complement the Network Slice 
Service DM to create a new slice (example of a vlan hand-off model - different 
options are possible -).

https://github.com/boucadair/attachment-circuit-model/blob/main/assets/JNPR-WG6-WG9-E2E-TN-31012023.pdf

There are also a few slides related to provide better Transport Network 
automation within the  5G SMO, by extending the 3GPP Network Resource Model 
with the IETF AC YANG DM (EP_TRANSPORT/NextHopInfo). In other words, use IETF 
for network plumbing within the 3GPP ecosystem.

Of course, feel free to reach out to me if you have any questions !

Regards,
R


Juniper Business Use Only
From: mohamed.boucad...@orange.com 
mailto:mohamed.boucad...@orange.com>>
Sent: Friday, January 20, 2023 2:17 PM
To: TEAS WG mailto:t...@ietf.org>>; 
draft-ietf-teas-ietf-network-slice-nbi-y...@ietf.org
Cc: opsawg@ietf.org; Richard Roberts 
mailto:rrobe...@juniper.net>>; Bo Wu 
mailto:lana.w...@huawei.com>>; Oscar Gonzalez de Dios 
mailto:oscar.gonzalezded...@telefonica.com>>;
 Samier Barguil 
mailto:samier.barguil_gira...@nokia.com>>; 
JACQUENET Christian INNOV/NET 
mailto:christian.jacque...@orange.com>>
Subject: RE: draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning


Re: [OPSAWG] draft-ietf-opsawg-rfc7125-update: bis vs. update

2023-03-21 Thread mohamed.boucadair
Hi all,

I started identifying the changes that are required to replace 7125 instead of 
the current OLD/NEW patch. FWIW, please find below some pointers to track the 
changes:


  *   Proposed PR: https://github.com/boucadair/-ipfix-rfc7125-update/pull/3
  *   Rendered html version: 
https://boucadair.github.io/-ipfix-rfc7125-update/obsoletes-7125/draft-ietf-opsawg-rfc7125-update.html
  *   Diff with the current version of the draft Diff: 
draft-ietf-opsawg-rfc7125-update.txt - 
draft-ietf-opsawg-rfc7125-update.txt
  *   Diff with RFC7125: 
https://boucadair.github.io/-ipfix-rfc7125-update/obsoletes-7125/draft-ietf-opsawg-rfc7125-update.txt

Cheers,
Med

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : vendredi 24 février 2023 15:23
À : opsawg@ietf.org; OpsAWG-Chairs 
Objet : draft-ietf-opsawg-rfc7125-update: bis vs. update

Hi all,

One of the open questions raised in IETF#115 (3rd sub-bullet of bullet#2 in 
Slide#5 of [1]) is whether we publish this I-D as a bis, especially that each 
of the original RFC and the update draft have almost the same page count.

I personally think it is much more cleaner to go for a bis here but I'm just 
the pen holder and would like to hear from the WG/Chairs. Thanks

Cheers,
Med

[1] 
https://datatracker.ietf.org/meeting/115/materials/slides-115-opsawg-an-update-to-the-tcpcontrolbits-ip-flow-information-export-ipfix-information-element-00

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] New Version Notification for draft-feng-opsawg-incident-management-00.txt

2023-03-21 Thread mohamed.boucadair
Hi Franck, all, 

Thank you for initiating this work. Please find some comments, fwiw: 

(1) The document overstates what it achieves. I would soften many of these 
statements. For example, It would be helpful to discuss whether the approach 
eases the identification of root causes and their mitigation.
(2) Rather than opposing the alarm model with what is specified in this 
document, I would instead better articulate and highlight how they complement 
each other.
(3) The network service aspect is not highlighted as I was expecting from the 
title/abstract. For example, I was expecting to see a discussion how 
service-specific incidents are tagged/characterized and then reported. The 
current discussion is mostly device-centric.
(4) Consider positioning this work in the context of the automation framework 
in RFC8969. Likewise, call out potential interactions with the TMF incident API.
(5) You may also position this work vs. the service assurance work led by 
Benoît. I don’t see conflict between both, but it is better to discuss that in 
the draft.

Hope this helps. 

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de Fengchong
> (frank)
> Envoyé : lundi 13 mars 2023 14:19
> À : opsawg@ietf.org
> Objet : [OPSAWG] 转发: New Version Notification for draft-feng-
> opsawg-incident-management-00.txt
> 
> Hi all,
>   I submit a new draft about incident management for network
> service. Includes:
> 1. The concept and architecture of Incident management.
> 2. The incident lifecycle management.
> 3. The YANG model for incident management.
> 
>   Please give your comments. Thanks.
> 
>   Best Regards,
>   Frank
> 
> -邮件原件-
> 发件人: internet-dra...@ietf.org 
> 发送时间: 2023年3月13日 21:06
> 收件人: yuchaode ; Fengchong (frank)
> ; Luis Contreras
> ; Luis Miguel
> Contreras Murillo ;
> Qin Wu ; Qin Wu ; Tong Hu
> 
> 主题: New Version Notification for draft-feng-opsawg-incident-
> management-00.txt
> 
> 
> A new version of I-D, draft-feng-opsawg-incident-management-00.txt
> has been successfully submitted by Chong Feng and posted to the
> IETF repository.
> 
> Name: draft-feng-opsawg-incident-management
> Revision: 00
> Title:Incident Management for Network Services
> Document date:2023-03-13
> Group:Individual Submission
> Pages:35
> URL:https://www.ietf.org/archive/id/draft-feng-opsawg-
> incident-management-00.txt
> Status: https://datatracker.ietf.org/doc/draft-feng-
> opsawg-incident-management/
> Htmlized:   https://datatracker.ietf.org/doc/html/draft-feng-
> opsawg-incident-management
> 
> 
> Abstract:
>This document provides an architecture for the incident
> management
>system and related function interface requirements.
> 
>This document also defines a YANG module to support the
> incident
>lifecycle management.  This YANG module is meant to provide a
>standard way to report, diagnose, and resolve incidents for the
> sake
>of enhanced network services.
> 
> 
> 
> 
> The IETF Secretariat
> 
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] WG adoption call for draft-palmero-opsawg-dmlmo-09

2023-03-17 Thread mohamed.boucadair
Hi all,

FWIW, please find below a review of this draft:


  *   pdf: 
https://github.com/boucadair/IETF-Drafts-Reviews/raw/master/draft-palmero-opsawg-dmlmo-09-rev%20Med.pdf
  *   doc: 
https://github.com/boucadair/IETF-Drafts-Reviews/raw/master/draft-palmero-opsawg-dmlmo-09-rev%20Med.doc

I support the overall effort to provide a common (set of) model(s) to 
complement existing the in-house tools (e.g., industrialize collection of 
EoL/EoS) with the hope that inventory data is not kept stale and that it is 
actively updated.

However, I think that some more effort is needed to better scope this work. I 
don't think that the document is ready in its current state. Some "diet" effort 
is needed to keep only core components and offload other parts to 
future/companion extensions.

I have also many comments on the yang structure itself (lack of structure 
types, abuse of string, lack of meaningful descriptions, etc.), but I guess 
these can be fixed once the high level concern is handled.

Aaah, rather than "Cisco and Ohers", I suggest you simply rely in the PEN 
registry. Here is an example:

   leaf vendor-id {
 type uint32;
 description
   "The Vendor ID is a security vendor's Private Enterprise
Number as registered with IANA.";
 reference
   "IANA: Private Enterprise Numbers
(https://www.iana.org/assignments/enterprise-numbers/)";
   }

Thank you.

Cheers,
Med

De : OPSAWG  De la part de Tianran Zhou
Envoyé : vendredi 17 mars 2023 03:31
À : opsawg@ietf.org
Cc : opsawg-cha...@ietf.org
Objet : [OPSAWG] WG adoption call for draft-palmero-opsawg-dmlmo-09

Hi WG,

This mail we start a two weeks working group adoption call for:
https://datatracker.ietf.org/doc/draft-palmero-opsawg-dmlmo/

Please show your support or objection in the mailing list.
Any comment and suggestion is welcome.
As this draft is part of the inventory related work, suggestions on how to 
cooperate are expected.

The call will end on April 3.

Regards,
Tianran

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-17 Thread mohamed.boucadair
Hi Bernie,

Thank you for clarifying.

Please see inline.

Cheers,
Med

De : Bernie Volz 
Envoyé : jeudi 16 mars 2023 22:29
À : BOUCADAIR Mohamed INNOV/NET 
Cc : Eric Vyncke (evyncke) ; The IESG ; 
draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-cha...@ietf.org; 
opsawg@ietf.org; dh...@ietf.org; jin...@wide.ad.jp
Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: 
(with DISCUSS and COMMENT)

I’m really not sure why there is any confusion. I think changing Section 3.1 
and 3.2 (obviously with some edits for 3.2) from:


  Permitted DHCPv6 options in the DHCPv6-Options Attribute are

  maintained by IANA in the registry created in Section 8.4.1.

to:


  Permitted DHCPv6 options in the DHCPv6-Options Attribute are

  maintained by IANA in the registry created in Section 8.4.1. If a

  DHCP server finds an option not permitted, it MUST ignore that

  option.

[Med] MUST conflicts with the config knob. I made this change:

OLD:
   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
  DHCP*-Options RADIUS attribute.

NEW:
   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
   DHCP*-Options RADIUS attribute.  Absent explicit configuration,
   RADIUS implementations and DHCP server implementations SHOULD ignore
   non-permitted DHCP options received in a DHCP*-Options RADIUS
attribute.

Would be a simple and reasonable fix. This doesn’t fully address the malformed 
data, such as extra data at end of attribute value that is less than 4 octets 
(dhcpv6 options have a 4-octet header) or when an option specifies a length 
that exceeds the remaining data in the attribute, but I’ll allow those issues 
to be handled by the RADIUS documents as an invalid attribute.

[Med] ACK.

Note that I don’t believe RFC7037 documented what should happen if Radius 
Attributes that are not permitted are present in the data. But that doesn’t 
mean as time goes on we shouldn’t become wiser and improve our standards to 
cover more of the potential “bad” considerations.

Until Éric raised it, I hadn’t thought about it either. Éric might still want 
to cover these malformed data issues …

- not limit itself on the validity of the RADIUS attribute but
also clearly state what the DHCP server validation should do

Also, Section 5 is also a bit lacking in how the DHCP server handles this. Yes, 
I know what is expected as having worked with DHCP for a long time … but 
standing back a bit, really is not that clear. You might want to review Section 
6 of RFC 6422. In your case, you likely want the server to prefer this option 
over whatever it may already have.

[Med] This is already covered:

   RADIUS supplied data is specific configuration data that is returned
   as a function of authentication and authorization checks.  As such,
   absent any explicit configuration on the DHCP server, RADIUS supplied
   data by means of DHCP*-Options Attributes take precedence over any
local configuration.

- Bernie Volz

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-16 Thread mohamed.boucadair
Hi Éric, 

Thank you for the follow-up.

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Eric Vyncke (evyncke) 
> Envoyé : jeudi 16 mars 2023 14:43
> À : Bernie Volz ; BOUCADAIR Mohamed INNOV/NET
> 
> Cc : The IESG ; draft-ietf-opsawg-add-encrypted-
> d...@ietf.org; opsawg-cha...@ietf.org; opsawg@ietf.org;
> dh...@ietf.org; jin...@wide.ad.jp
> Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-
> encrypted-dns-11: (with DISCUSS and COMMENT)
> 
> Thank you all for this open discussion among RADIUS and DCHP
> knowledgeable people.
> 
> From what I read in various email threads and imho (that could be
> wrong of course),  this draft should still be revised to:
> - handle the differences between DHCP attributes and options (per
> Bernie's email below)

[Med] I still don't see what the issue is. I trust Bernie will further explain 
the issue. 

> - handle both IPv4 and IPv6
> - not limit itself on the validity of the RADIUS attribute but
> also clearly state what the DHCP server validation should do

[Med] If DHCP servers behave as RADIUS clients, the usual RFC6929 validation 
are followed. We have a NEW text with a reminder. This applies to both v4/v6 
attributes.
If DHCP relay agents behave as RADIUS clients, then the validation in RFC7037 
(DHCPv6) and RFC4014+Updates in this draft (DHCPv4) are followed by DHCP 
servers. 

What additional validation is missing?

> - the "SHOULD ignore" of section 4.2.2  is dangling... Why not a
> MUST or the reason why the SHOULD is not followed should be
> described
> 

[Med] That SHOULD was already in RFC4014. That’s said, and as you can see in 
https://tinyurl.com/opsawg-add-latest, we have now a NEW text to explain when 
the SHOULD is not followed. 

> Let's all work together to address those concerns, they seem easy
> to fix.
> 
> Regards
> 
> -éric
> 
> On 14/03/2023, 14:06, "iesg on behalf of Bernie Volz"  boun...@ietf.org  on behalf of
> bev...@gmail.com > wrote:
> 
> 
> Section 4.2 is about DHCPv4 and updates to RFC4014. So maybe that
> solves the issue for section 3.2 but not for 3.1? Also, while you
> say section 3 is about Radius attributes, it talks about dhcp
> options. And specifically says “ Permitted DHCPv6 options in the
> DHCPv6-Options Attribute are maintained by IANA in the registry
> created in Section 8.4.1.” So it begs the question about what
> happens if unpermitted options present (this could be an
> interoperability issue as perhaps the registry is extended and the
> radius side is updated but the dhcp server isn’t and hence finds
> options that aren’t allow by its table). Or someone stuffs a dhcp
> option in there that isn’t allowed.
> 
> 
> You also reference:
> 
> 
> > If the relay agent relays RADIUS attributes not included in the
> > IANA-maintained registry (Section 8.3 of [This-Document]), the
> DHCP
> > server SHOULD ignore them.
> 
> 
> But this is about attributes again, not options. Your new DHCPv*-
> Options Attributes can contain many DHCP options. So I think being
> clear about what happens with the potential options inside this
> single attribute is important to clarify.
> 
> 
> - Bernie (from iPad)
> 
> 
> > On Mar 14, 2023, at 7:49 AM, mohamed.boucad...@orange.com
>  wrote:
> >
> > Hi Bernie,
> >
> > Thank you for sharing your thoughts.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -Message d'origine-
> >> De : Bernie Volz mailto:bev...@gmail.com>>
> Envoyé
> >> : mardi 14 mars 2023 12:10 À : BOUCADAIR Mohamed INNOV/NET
> >>  >
> >> Cc : Éric Vyncke  >; The
> >> IESG mailto:i...@ietf.org>>;
> >> draft-ietf-opsawg-add-encrypted-...@ietf.org
> >> ; opsawg-
> >> cha...@ietf.org ; opsawg@ietf.org
> >> ; dh...@ietf.org
> ;
> >> jin...@wide.ad.jp  Objet : Re: Éric
> >> Vyncke's Discuss on draft-ietf-opsawg-add-
> >> encrypted-dns-11: (with DISCUSS and COMMENT)
> >> Med:
> >> Eric asked about how non-permitted dhcp options are to be
> handled in
> >> section 3.1/3.2; you responded about RADIUS attributes?
> >
> > [Med] Yes, because these sections are about RADIUS attributes
> (and thus not about the behavior of DHCP servers). But I may be
> missing something.
> >
> >> Wouldn’t just saying that the DHCP server should ignore non-
> >> permitted DHCP options but continue otherwise (process
> remaining)?
> >> (The server may also log about dropped options to alert
> >> administrators to a potential misconfiguration.)
> >
> > [Med] That’s is covered, e.g., in the Update in Section 4.2.2:
> >
> > If the relay agent relays RADIUS attributes not included in the
> > IANA-maintained registry (Section 8.3 of [This-Document]), the
> DHCP
> > server SHOULD ignore them.
> >
> > For DHCPv6, that is 

Re: [OPSAWG] Paul Wouters' Yes on draft-ietf-opsawg-add-encrypted-dns-11: (with COMMENT)

2023-03-15 Thread mohamed.boucadair
Hi Paul, 

Please see inline.

Cheers,
Med

> -Message d'origine-
> De : Paul Wouters 
> Envoyé : mercredi 15 mars 2023 18:00
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : The IESG ; draft-ietf-opsawg-add-encrypted-
> d...@ietf.org; opsawg-cha...@ietf.org; opsawg@ietf.org;
> dh...@ietf.org; bev...@gmail.com
> Objet : Re: Paul Wouters' Yes on draft-ietf-opsawg-add-encrypted-
> dns-11: (with COMMENT)
> 
> On Mar 15, 2023, at 02:35, mohamed.boucad...@orange.com wrote:
> >
> > 
> >>
> >>   This document targets deployments where a trusted
> relationship
> >> is in
> >>   place between the RADIUS client and server with
> communication
> >> optionally
> >>   secured by IPsec or Transport Layer Security (TLS)
> [RFC6614].
> >>
> >> I don't understand what this sentence is trying to say.
> >>
> >
> > [Med] As per today, the use of ipsec/TLs are optional in RADIUS
> in trusted networks. As you know there is an effort to make
> ipsec/TLs mandatory even for trusted networks (and deprecate the
> use of plain UDP/TCP transport) and also move 6614 to standard
> track, but all of these are still individual drafts.
> 
> But it is still always trusted for authentication. And sending ADD
> information is still possible and desirable even if radius wasn’t
> using IPsec or TLS. So I still think the sentence should just be
> removed.
> 

[Med] The use of ipsec/tls between radius client/server is superior even in 
trusted environments because, otherwise, many attacks would be possible from 
within the network (gleaning private information, etc.). I prefer to leave the 
mention of ipsec/TLS. Thank you.  


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Warren Kumari's No Objection on draft-ietf-opsawg-add-encrypted-dns-11: (with COMMENT)

2023-03-15 Thread mohamed.boucadair
Hi Warren, 

Thanks for the comments. 

> Like Eric I wonder what should happen with a RADIUS client
> receiving a
> non-permitted DHCP option - but perhaps this is already well known
> and
> understood?

Yes, that is part of 6929. For the reader's convenience, we added this reminder 
right before Section 3.1: 

NEW:
   Invalid attributes are handled as per Section 2.8 of
   [RFC6929].

Cheers,
Med

> -Message d'origine-
> De : Warren Kumari via Datatracker 
> Envoyé : mercredi 15 mars 2023 15:21
> À : The IESG 
> Cc : draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> bev...@gmail.com; bev...@gmail.com; d...@fl1ger.de; dns...@ietf.org
> Objet : Warren Kumari's No Objection on draft-ietf-opsawg-add-
> encrypted-dns-11: (with COMMENT)
> 
> Warren Kumari has entered the following ballot position for
> draft-ietf-opsawg-add-encrypted-dns-11: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-
> dns/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> Firstly, thank you to the authors for the document. Also much
> thanks to Ralf
> Weber for reviewing and updating his DNSDIR review
> (https://datatracker.ietf.org/doc/review-ietf-opsawg-add-
> encrypted-dns-10-dnsdir-telechat-weber-2023-03-12/),
> and the authors for addressing the nits.
> 
> Like Eric I wonder what should happen with a RADIUS client
> receiving a
> non-permitted DHCP option - but perhaps this is already well known
> and
> understood?
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] [dhcwg] Intdir telechat review of draft-ietf-opsawg-add-encrypted-dns-10

2023-03-15 Thread mohamed.boucadair
Hi Tatuya, 

Thank you for the follow-up. Much appreciated.

> If you're saying that this is just an example and its
> applicability doesn't matter much, then I'd be happier if it were
> clearer that the content of this section is a mere example.  

The introduction says the following: 

   A sample deployment usage of the DHCPv6-Options and DHCPv4-Options
   RADIUS attributes is described in Section 5.

To further insist this is about an example, I made the following change: 

OLD: 
  5.  Applicability to Encrypted DNS Provisioning

NEW:
  5: An Example: Applicability to Encrypted DNS Provisioning

This change together with the current text is much more clear this is an 
example to illustrate the use of

==
   Typical deployment scenarios are similar to those described, for
   ^^
   instance, in Section 2 of [RFC6911].  For illustration purposes,
 ^^ 
   Figure 1 shows an example where a Customer Premises Equipment (CPE)
   is provided with an encrypted DNS resolver.  This example assumes
   
   that the Network Access Server (NAS) embeds both RADIUS client and
   DHCPv6 server capabilities.
==

Hope this is better. 

Cheers,
Med

> -Message d'origine-
> De : JINMEI Tatuya / 神明達哉 
> Envoyé : mercredi 15 mars 2023 00:54
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : int-...@ietf.org; draft-ietf-opsawg-add-encrypted-
> dns@ietf.org; last-c...@ietf.org; opsawg@ietf.org
> Objet : Re: [dhcwg] Intdir telechat review of draft-ietf-opsawg-
> add-encrypted-dns-10
> 
> >> I'm fine with deferring such a discussion to draft-ietf-add-
> dnr; I'm
> >> also fine with just removing any reference to Reconfigure from
> this
> >> draft (and maybe stating that's an out- of-scope topic).
> 
> > [Med] I don't understand this position as what we are discussing
> here
> > is ** an example ** (not a reco or a new feature) to illustrate
> the
> > use of the attributes with CoA. That example wouldn’t be
> complete if
> > the DHCP leg is not exemplified as well. Issues with reconfigure
> are
> > well-known and adequate references for readers who want to learn
> more
> > are now provided in the document.
> 
> One main concern of mine is that it's not so clear whether it's
> just an example or not.  I actually also thought this section is
> intended just as an example.  But it's one of the body of this
> document (not in an appendix), and while the RADIUS part of the
> protocol is generic, it's obvious the primary motivation is to use
> it for ietf-add-dnr. So I also thought the applicability of this
> section may have to be discussed in more detail, either in this
> doc or in ietf-add-dnr.
> 
> If you're saying that this is just an example and its
> applicability doesn't matter much, then I'd be happier if it were
> clearer that the content of this section is a mere example.  One
> clear way for that is to move this section to an appendix.
> Another would be to add a sentence or two clarifying that intent
> at the top of that section.
> 
> If you're not willing to do either, I think we should agree to
> disagree here. In that case please feel free to dismiss my point.
> I'd also suggest removing the reference to RFC6977, since it was
> added to address my comment but it doesn't address it anyway.
> 
> --
> jinmei

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Paul Wouters' Yes on draft-ietf-opsawg-add-encrypted-dns-11: (with COMMENT)

2023-03-15 Thread mohamed.boucadair
Hi Paul,

Thank you for the review.

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Paul Wouters via Datatracker 
> Envoyé : mardi 14 mars 2023 19:21
> À : The IESG 
> Cc : draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> bev...@gmail.com; bev...@gmail.com
> Objet : Paul Wouters' Yes on draft-ietf-opsawg-add-encrypted-dns-
> 11: (with COMMENT)
> 
> Paul Wouters has entered the following ballot position for
> draft-ietf-opsawg-add-encrypted-dns-11: Yes
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-
> dns/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
>This document targets deployments where a trusted
> relationship is in
>place between the RADIUS client and server with
> communication optionally
>secured by IPsec or Transport Layer Security (TLS)
> [RFC6614].
> 
> I don't understand what this sentence is trying to say.
> 

[Med] As per today, the use of ipsec/TLs are optional in RADIUS in trusted 
networks. As you know there is an effort to make ipsec/TLs mandatory even for 
trusted networks (and deprecate the use of plain UDP/TCP transport) and also 
move 6614 to standard track, but all of these are still individual drafts.

> Does table 7 really clarify the sentences used earlier that say
> exactly the
> same thing but more compact?
> 

[Med] Yes, this is a classic table in every RADISU attribute spec. 

> Why "Expert Review" and not "Specification Required" or "RFC
> Required" ?
> 

[Med] Expert Review is consistent with the policy used in RFC7037 for a similar 
registry (already cited in the draft).  

> Registration requests are to be sent to radius-dhcp-
> rev...@ietf.org
> 
> I thought we didn't put these emails in the documents anymore? But
> I guess IANA
> will get back to you on that.
> 
> NITS:
> 
> As a reminder,
> 
> I would remove this part of the text.
> 

[Med] Will be fixed. Thanks.

> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-14 Thread mohamed.boucadair
Re-,

> solves the issue for section 3.2 but not for 3.1? Also, while you
> say section 3 is about Radius attributes, it talks about dhcp
> options.

That's normal because DHCP options are encapsulated in the RADIUS attributes. 
However, these two sections involve RADIUS client/server not DHCP entities. 

> And specifically says “ Permitted DHCPv6 options in the
> DHCPv6-Options Attribute are maintained by IANA in the registry
> created in Section 8.4.1.” So it begs the question about what
> happens if unpermitted options present (this could be an
> interoperability issue as perhaps the registry is extended and the
> radius side is updated but the dhcp server isn’t and hence finds
> options that aren’t allow by its table). Or someone stuffs a dhcp
> option in there that isn’t allowed.

The permitted option table + the local policy will govern the behavior of the 
servers:

   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.  Likewise, DHCP server implementations may support
   a configuration parameter to control the permitted DHCP options in a
   DHCP*-Options RADIUS attribute.

Options that do not match will then be considered as invalid. This is supposed 
to be covered by this NEW text:

   As a reminder, invalid attributes are handled as per
   Section 2.8 of [RFC6929].

Cheers,
Med

> -Message d'origine-
> De : Bernie Volz 
> Envoyé : mardi 14 mars 2023 14:06
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : Éric Vyncke ; The IESG ;
> draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> jin...@wide.ad.jp
> Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-
> encrypted-dns-11: (with DISCUSS and COMMENT)
> 
> Section 4.2 is about DHCPv4 and updates to RFC4014. So maybe that
> solves the issue for section 3.2 but not for 3.1? Also, while you
> say section 3 is about Radius attributes, it talks about dhcp
> options. And specifically says “ Permitted DHCPv6 options in the
> DHCPv6-Options Attribute are maintained by IANA in the registry
> created in Section 8.4.1.” So it begs the question about what
> happens if unpermitted options present (this could be an
> interoperability issue as perhaps the registry is extended and the
> radius side is updated but the dhcp server isn’t and hence finds
> options that aren’t allow by its table). Or someone stuffs a dhcp
> option in there that isn’t allowed.
> 
> You also reference:
> 
> > If the relay agent relays RADIUS attributes not included in the
> > IANA-maintained registry (Section 8.3 of [This-Document]), the
> DHCP
> > server SHOULD ignore them.
> 
> But this is about attributes again, not options. Your new DHCPv*-
> Options Attributes can contain many DHCP options. So I think being
> clear about what happens with the potential options inside this
> single attribute is important to clarify.
> 
> - Bernie (from iPad)
> 
> > On Mar 14, 2023, at 7:49 AM, mohamed.boucad...@orange.com wrote:
> >
> > Hi Bernie,
> >
> > Thank you for sharing your thoughts.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -Message d'origine-
> >> De : Bernie Volz 
> >> Envoyé : mardi 14 mars 2023 12:10
> >> À : BOUCADAIR Mohamed INNOV/NET 
> Cc :
> >> Éric Vyncke ; The IESG ;
> >> draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> >> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> jin...@wide.ad.jp
> >> Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-
> >> encrypted-dns-11: (with DISCUSS and COMMENT)
> >> Med:
> >> Eric asked about how non-permitted dhcp options are to be
> handled in
> >> section 3.1/3.2; you responded about RADIUS attributes?
> >
> > [Med] Yes, because these sections are about RADIUS attributes
> (and thus not about the behavior of DHCP servers). But I may be
> missing something.
> >
> >> Wouldn’t just saying that the DHCP server should ignore non-
> >> permitted DHCP options but continue otherwise (process
> remaining)?
> >> (The server may also log about dropped options to alert
> >> administrators to a potential misconfiguration.)
> >
> > [Med] That’s is covered, e.g., in the Update in Section 4.2.2:
> >
> > If the relay agent relays RADIUS attributes not included in the
> > IANA-maintained registry (Section 8.3 of [This-Document]), the
> DHCP
> > server SHOULD ignore them.
> >
> > For DHCPv6, that is supposed to be handled as per RFC7037. We
> are not touching any part of that spec. No?
> >
> >> Of course if the data is malformed, then following existing
> policies
> >> (rfc6929) is prudent. Though even there it isn’t 100% clear
> what to
> >> do if the attribute is well formatted but the option data is
> bad -
> >> mostly the length of the last DHCP option exceeds the remaining
> data
> >> in the RADIUS attribute. I doubt we expect RADIUS or DHCP
> servers to
> >> assure that each individual option is valid (such as the length
> is a
> >> multiple of 4 or 

Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-14 Thread mohamed.boucadair
Hi Bernie, 

Thank you for sharing your thoughts. 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Bernie Volz 
> Envoyé : mardi 14 mars 2023 12:10
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : Éric Vyncke ; The IESG ;
> draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> jin...@wide.ad.jp
> Objet : Re: Éric Vyncke's Discuss on draft-ietf-opsawg-add-
> encrypted-dns-11: (with DISCUSS and COMMENT)
> 
> Med:
> 
> Eric asked about how non-permitted dhcp options are to be handled
> in section 3.1/3.2; you responded about RADIUS attributes?

[Med] Yes, because these sections are about RADIUS attributes (and thus not 
about the behavior of DHCP servers). But I may be missing something. 

> Wouldn’t just saying that the DHCP server should ignore non-
> permitted DHCP options but continue otherwise (process remaining)?
> (The server may also log about dropped options to alert
> administrators to a potential misconfiguration.)

[Med] That’s is covered, e.g., in the Update in Section 4.2.2:

  If the relay agent relays RADIUS attributes not included in the
  IANA-maintained registry (Section 8.3 of [This-Document]), the
  DHCP server SHOULD ignore them.

For DHCPv6, that is supposed to be handled as per RFC7037. We are not touching 
any part of that spec. No?

> 
> Of course if the data is malformed, then following existing
> policies (rfc6929) is prudent. Though even there it isn’t 100%
> clear what to do if the attribute is well formatted but the option
> data is bad - mostly the length of the last DHCP option exceeds
> the remaining data in the RADIUS attribute. I doubt we expect
> RADIUS or DHCP servers to assure that each individual option is
> valid (such as the length is a multiple of 4 or 16 if data is list
> of addresses).
> 
> - Bernie (from iPad)
> 
> > On Mar 14, 2023, at 6:38 AM, mohamed.boucad...@orange.com wrote:
> >
> > Hi Éric,
> >
> > Thank you for the review. The changes to address your review can
> be seen at: https://tinyurl.com/opsawg-add-latest.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -Message d'origine-
> >> De : Éric Vyncke via Datatracker  Envoyé :
> mardi 14
> >> mars 2023 10:30 À : The IESG  Cc :
> >> draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> >> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> bev...@gmail.com;
> >> bev...@gmail.com; jin...@wide.ad.jp Objet : Éric Vyncke's
> Discuss on
> >> draft-ietf-opsawg-add-encrypted-
> >> dns-11: (with DISCUSS and COMMENT)
> >>
> >> Éric Vyncke has entered the following ballot position for
> >> draft-ietf-opsawg-add-encrypted-dns-11: Discuss
> >>
> >> When responding, please keep the subject line intact and reply
> to all
> >> email addresses included in the To and CC lines. (Feel free to
> cut
> >> this introductory paragraph, however.)
> >>
> >>
> >> Please refer to
> >> https://www.ietf.org/about/groups/iesg/statements/handling-
> ballot-
> >> positions/
> >> for more information about how to handle DISCUSS and COMMENT
> >> positions.
> >>
> >>
> >> The document, along with other ballot positions, can be found
> >> here:
> >> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-
> encrypted-
> >> dns/
> >>
> >>
> >>
> >> ---
> ---
> >> 
> >> DISCUSS:
> >> ---
> ---
> >> 
> >>
> >>
> >> # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-add-
> >> encrypted-dns-11
> >> CC @evyncke
> >>
> >> Thank you for the work put into this document. Once the trivial
> >> DISCUSS is addressed, I will be happy to ballot a YES.
> >>
> >> Please find below one blocking DISCUSS points (easy to
> address), some
> >> non-blocking COMMENT points (but replies would be appreciated
> even if
> >> only for my own education), and some nits.
> >>
> >> Special thanks to Bernie Volz for the shepherd's detailed
> write-up
> >> including the WG consensus even if the justification of the
> intended
> >> status is rather vague.
> >>
> >> Other thanks to Tatuya Jinmei, the Internet directorate
> reviewer (at
> >> my request), please consider this int-dir review:
> >> https://datatracker.ietf.org/doc/review-ietf-opsawg-add-
> encrypted-
> >> dns-10-intdir-telechat-jinmei-2023-03-09/
> >> (and I have read Med's replies and resolution of the issues)
> >>
> >> I hope that this review helps to improve the document,
> >>
> >> Regards,
> >>
> >> -éric
> >>
> >> ## DISCUSS
> >>
> >> As noted in https://www.ietf.org/blog/handling-iesg-ballot-
> >> positions/, a
> >> DISCUSS ballot is a request to have a discussion on the
> following
> >> topics:
> >>
> >> ### What to do with non-permitted DHCP option ?
> >>
> >> Sections 3.1 and 3.2 contain text like `Permitted DHCPv6
> options in
> >> the DHCPv6-Options Attribute are maintained by IANA in the
> registry
> >> created in Section 8.4.1.` but I was unable to find anywhere in
> the

Re: [OPSAWG] Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-14 Thread mohamed.boucadair
Hi Éric, 

Thank you for the review. The changes to address your review can be seen at: 
https://tinyurl.com/opsawg-add-latest.

Please see inline.

Cheers,
Med

> -Message d'origine-
> De : Éric Vyncke via Datatracker 
> Envoyé : mardi 14 mars 2023 10:30
> À : The IESG 
> Cc : draft-ietf-opsawg-add-encrypted-...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; dh...@ietf.org;
> bev...@gmail.com; bev...@gmail.com; jin...@wide.ad.jp
> Objet : Éric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-
> dns-11: (with DISCUSS and COMMENT)
> 
> Éric Vyncke has entered the following ballot position for
> draft-ietf-opsawg-add-encrypted-dns-11: Discuss
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-
> dns/
> 
> 
> 
> --
> 
> DISCUSS:
> --
> 
> 
> 
> # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-add-
> encrypted-dns-11
> CC @evyncke
> 
> Thank you for the work put into this document. Once the trivial
> DISCUSS is
> addressed, I will be happy to ballot a YES.
> 
> Please find below one blocking DISCUSS points (easy to address),
> some
> non-blocking COMMENT points (but replies would be appreciated even
> if only for
> my own education), and some nits.
> 
> Special thanks to Bernie Volz for the shepherd's detailed write-up
> including
> the WG consensus even if the justification of the intended status
> is rather
> vague.
> 
> Other thanks to Tatuya Jinmei, the Internet directorate reviewer
> (at my
> request), please consider this int-dir review:
> https://datatracker.ietf.org/doc/review-ietf-opsawg-add-encrypted-
> dns-10-intdir-telechat-jinmei-2023-03-09/
> (and I have read Med's replies and resolution of the issues)
> 
> I hope that this review helps to improve the document,
> 
> Regards,
> 
> -éric
> 
> ## DISCUSS
> 
> As noted in https://www.ietf.org/blog/handling-iesg-ballot-
> positions/, a
> DISCUSS ballot is a request to have a discussion on the following
> topics:
> 
> ### What to do with non-permitted DHCP option ?
> 
> Sections 3.1 and 3.2 contain text like `Permitted DHCPv6 options
> in the
> DHCPv6-Options Attribute are maintained by IANA in the registry
> created in
> Section 8.4.1.` but I was unable to find anywhere in the document
> what is the
> expected behaviour of a RADIUS client receiving a non-permitted
> DHCP option ?
> At the bare minimum, I would expect the I-D to mention "non-
> permitted DHCP
> options MUST silently be ignored by the RADIUS client"
> 

[Med] Absent any local policy, non-permitted attributes should be considered as 
invalid (rfc6929#section-2.8). 

RADIUS attributes specs usually don't repeat validation checks as this is 
redundant with rfc8044, especially: 

   Where the contents of a data type do not match the definition,
   implementations MUST treat the enclosing attribute as being an
   invalid attribute.  This requirement includes, but is not limited to,
   the following situations...

Unless Alan has a string objection, we can add this generic text right before 
Section 3.1:

"As a reminder, invalid attributes are handled as per Section 2.8 of [RFC6929]".


> Or did I fail to find a similar statement in the text ?
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> 
> ## COMMENTS
> 
> ### Abstract
> 
> Should the sentence `Even if the specification was initially
> motivated by the
> configuration of encrypted DNS resolvers,` be removed from the
> abstract ? It
> adds nothing but confusion.
> 

[Med] OK, deleted that part of the sentence. 

> ### Section 3
> 
> Should the whole paragraph starting with `RADIUS servers have
> conventionally
> tolerated the input of arbitrary data via the "string" data type
> (Section 3.5
> of [RFC8044])... ` rather be in the security (or operational)
> considerations
> section ?
> 

[Med] Good suggestion. Fixed. 

> ### Section 3.1
> 
> Should normative language be used in `However, the server is not
> required to
> honor such a preference.`? I.e., the rest of the paragraph uses
> normative
> language.
> 

[Med] I'm afraid that "s/is no/MAY NOT" is not justified here as the client is 
prepared that its preference to be ignored. There is no impact on interop or 
there will be a "reduced functionality".


> ### Section 4
> 
> Should 'DHCP relay' be mentioned in the section title ? It would
> of course be
> 

Re: [OPSAWG] [dhcwg] Intdir telechat review of draft-ietf-opsawg-add-encrypted-dns-10

2023-03-14 Thread mohamed.boucadair
Hi Tatuya, 

Thank you for the feedback. 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : JINMEI Tatuya / 神明達哉 
> Envoyé : lundi 13 mars 2023 20:46
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : int-...@ietf.org; draft-ietf-opsawg-add-encrypted-
> dns@ietf.org; last-c...@ietf.org; opsawg@ietf.org
> Objet : Re: [dhcwg] Intdir telechat review of draft-ietf-opsawg-
> add-encrypted-dns-10
> 
> > [Med] OK. Added a reminder of where to find dhcp-related
> security
> > issues with a specific RFC for reconfigured-specific issues
> (RFC6977).
> 
> RFC6977 is specific to reconfiguration with relay agents., and
> just provides generic discussions.

[Med] The base specs + 6977 provides good pointers for security considerations 
that are relevant to DHCP-triggered reconfiguration upon receipt of CoA. Both 
considerations at the servers/relays are covered in these specs. If you have 
better informative pointers, please share them. Thanks.

 What I expected in this draft
> in this context is how such discussions can apply to this specific
> usage of Section 5.

[Med] Section 5 illustrates how CoA-requests can be used to carry the new 
attributes and how a change of the configuration is propagated till the 
requesting client. Security considerations on the server/relay--dhcp clients 
are those that are discussed in the generic documents + specific dhcp options. 
Hence, the current wording in the Sec Sections. 

 I'm fine with deferring such a discussion to
> draft-ietf-add-dnr; I'm also fine with just removing any reference
> to Reconfigure from this draft (and maybe stating that's an out-
> of-scope topic).

[Med] I don't understand this position as what we are discussing here is ** an 
example ** (not a reco or a new feature) to illustrate the use of the 
attributes with CoA. That example wouldn’t be complete if the DHCP leg is not 
exemplified as well. Issues with reconfigure are well-known and adequate 
references for readers who want to learn more are now provided in the document. 

 But the added reference to RFC6977 doesn't
> address my point.
> 
> > [Med] Thanks. We went with a more elaborated version to better
> explain
> > the intent and call out the constraints:
> 
> Thank you for the update. It looks good to me.
> 

[Med] Great.

> --
> jinmei

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] [dhcwg] Intdir telechat review of draft-ietf-opsawg-add-encrypted-dns-10

2023-03-13 Thread mohamed.boucadair
Hi Tatuya,

Thank you for the follow-up. 

We submitted a new version to address your review: 
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-add-encrypted-dns-11.

Please see inline for more context, fwiw. 

Cheers,
Med

> -Message d'origine-
> De : JINMEI Tatuya / 神明達哉 
> Envoyé : samedi 11 mars 2023 06:51
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : int-...@ietf.org; draft-ietf-opsawg-add-encrypted-
> dns@ietf.org; last-c...@ietf.org; opsawg@ietf.org
> Objet : Re: [dhcwg] Intdir telechat review of draft-ietf-opsawg-
> add-encrypted-dns-10
> 
> On Thu, Mar 9, 2023 at 10:23 PM 
> wrote:
> 
> > [Med] What is actually more important in this para is the part
> in
> > [...]. That text is there to provide an example of when the
> attributes
> > can be present in CoA-Request.
> 
> I have no problem with that part, and I didn't mean it's less
> important than the use of DHCPv6 Reconfigure by omitting that
> part.
> 
> > [Med] These considerations are specific to the dhcp options that
> will
> > be carried in the RADIUS attribute. The security considerations
> > (including issues with the use of reconfigure) fall under this
> part:
> 
> >>  Security considerations specific to the DHCP options that are
> >> carried  in RADIUS are discussed in relevant documents that
> specify
> >> these  options.
> 
> Do you specifically mean draft-ietf-add-dnr-13?  I first expected
> that while reviewing draft-ietf-opsawg-add-encrypted-dns and
> checked it, but it didn't discuss anything about DHCPv6
> Reconfigure.  That's one reason why I raised the point in my
> review.
> 
> From your response, I'd suggest:
> - Describe the DHCP part of reconfigure operation in more detail
> in
>   draft-ietf-add-dnr (including whether to use Reconfigure message
> in
>   the first place), and/or
> - Remove the reference to DHCPv6 reconfigure from
>   opsawg-add-encrypted-dns and just say something like "How the
> DHCPv6
>   server uses the new encrypted DNS resolver information is out of
>   scope of this document."
> 

[Med] OK. Added a reminder of where to find dhcp-related security issues with a 
specific RFC for reconfigured-specific issues (RFC6977). 

> > [Med] I also hesitated, but MAY is not used here as this does
> not
> > impact interop. I had to reread Sections 5/6 of RFC2119
> regularly for
> > may/MAY.
> 
> I don't object here.
> 
> > [Med] The use of normative language is justified here because we
> don't
> > want the RADIUS servers to blindly pass data. What this text
> says is
> > that the attributes should not be seen as opaque data by the
> RADIUS
> > server but it should understand the encoding of the enclosed
> options.
> 
> Hmm, I didn't read it that way.  If that's the intent (and if I
> understand it correctly), "For ease of administrator
> configuration"
> especially sounds awkward, since it seems to say the purpose of
> this requirement is better UX.  Again, assuming I understand the
> intent correctly, I'd suggest something like this:
> 
>   The RADIUS server SHOULD reject a configuration attempt of
> including
>   a DHCP option in a DHCP*-Options RADIUS attribute if the server
> does
>   not understand that DHCP option and its format.
> 

[Med] Thanks. We went with a more elaborated version to better explain the 
intent and call out the constraints: 

NEW:
   RADIUS servers have conventionally tolerated the input of arbitrary
   data via the "string" data type (Section 3.5 of [RFC8044]).  This
   practice allows RADIUS servers to support newer standards without
   software upgrades, by allowing administrators to manually create
   complex attribute content and, then, to pass that content to a RADIUS
   server as opaque strings.  While this practice is useful, it is
   RECOMMENDED that RADIUS servers that implement the present
   specification are updated to understand the format and encoding of
   DHCP options.  Administrators can, thus, enter the DHCP options as
   options instead of manually-encoded opaque strings.  This
   recommendation increases security and interoperability by ensuring
   that the options are encoded correctly.  It also increases usability
   for administrators.


> --
> jinmei

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, 

Re: [OPSAWG] Dnsdir telechat review of draft-ietf-opsawg-add-encrypted-dns-10

2023-03-13 Thread mohamed.boucadair
Hi Ralph, 

Thanks for the review. 

Made this change to the draft: s/Thanks to Ralf Weber for the dnsdir 
review/Thanks to Ralf Weber for the dnsdir reviews :-)

Cheers,
Med

> -Message d'origine-
> De : Ralf Weber via Datatracker 
> Envoyé : lundi 13 mars 2023 06:53
> À : dns...@ietf.org
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Dnsdir telechat review of draft-ietf-opsawg-add-encrypted-
> dns-10
> 
> Reviewer: Ralf Weber
> Review result: Ready
> 
> Moin!
> 
> I'm the assigned reviewer of the DNS Directorate for this draft.
> Compared to my review of version 7 of the draft none of the DNS
> related content has changed and the nits mentioned were addressed.
> So I think this draft is ready now.
> 
> So long
> -Ralf
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Intdir telechat review of draft-ietf-opsawg-add-encrypted-dns-10

2023-03-09 Thread mohamed.boucadair
Hi Tatuya, 

Thank you for the review. 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Tatuya Jinmei via Datatracker 
> Envoyé : jeudi 9 mars 2023 23:10
> À : int-...@ietf.org
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Intdir telechat review of draft-ietf-opsawg-add-encrypted-
> dns-10
> 
> Reviewer: Tatuya Jinmei
> Review result: Ready with Issues
> 
> I am an assigned INT directorate reviewer for draft-ietf-opsawg-
> add-encrypted-dns-10.txt. These comments were written primarily
> for the benefit of the Internet Area Directors. Document editors
> and
> shepherd(s) should treat these comments just like they would treat
> comments from any other IETF contributors and resolve them along
> with any other Last Call comments that have been received. For
> more details on the INT Directorate, see
> https://datatracker.ietf.org/group/intdir/about/.
> 
> Based on my review, if I was on the IESG I would ballot this
> document as DISCUSS.
> 
> I have the following (possible) DISCUSS/ABSTAIN level issue.
> 
> The draft states in section 5:
> 
>Should any encrypted DNS-related information (e.g.,
> Authentication
>Domain Name (ADN), IPv6 address) change, [...]. 

[Med] What is actually more important in this para is the part in [...]. That 
text is there to provide an example of when the attributes can be present in 
CoA-Request.

 The NAS
>replaces the old encrypted DNS resolver information with the
> new one
>and sends a DHCPv6 Reconfigure message which leads the DHCPv6
> client
>to initiate a Renew/Reply message exchange with the DHCPv6
> server.
> 
> I suspect the use of Reconfigure is not always feasible. A
> Reconfigure message needs to be authenticated (per RFC8415), and
> the only available method for the authentication is the
> Reconfiguration Key Authentication Protocol. But this protocol is
> weak in that a shared secret first needs to be sent from the
> server to the client in plain text. It may be justifiable in the
> intended use case (between a CPE and NAS, and the communication
> path between them can be considered reasonably protected), but I
> believe such considerations should be described explicitly,
> either/both in this section or/add in Section 6.
> 
> Now, I'm not sure if such an update operation is an integral part
> of this draft. If it's considered to be a minor case (e.g. the
> information is mostly static and periodic renew would suffice), or
> the matter of updates itself is mostly out of scope of this doc,
> then my comment on this point is also minor.
> On the other hand, if it's important to describe how such an
> update works with this RADIUS extension, then I'd regard it as a
> DISCUSS level issue.  And, in the latter case, I believe DHCPv4-
> specific considerations on the same point should be included, too.
> 

[Med] These considerations are specific to the dhcp options that will be 
carried in the RADIUS attribute. The security considerations (including issues 
with the use of reconfigure) fall under this part: 

   Security considerations specific to the DHCP options that are carried
   in RADIUS are discussed in relevant documents that specify these
   options.

> The following are other (possible) issues I found with this
> document that may need be addressed before publication (I don't
> necessarily think these SHOULD be
> "corrected"):
> 
> (All of these are about Section 3)
> 
> - I wonder whether the two "may"s in this text need to be
> normative "MAY"s.
> 
>RADIUS implementations may support a configuration parameter to
>control the DHCP options that can be included in a DHCP*-
> Options
>RADIUS attribute.  Likewise, DHCP server implementations may
> support
>a configuration parameter to control the permitted DHCP options
> in a
>DHCP*-Options RADIUS attribute.
> 

[Med] I also hesitated, but MAY is not used here as this does not impact 
interop. I had to reread Sections 5/6 of RFC2119 regularly for may/MAY. 

> - This "SHOULD" looks awkward to me. While it's a nice suggestion
> for implementers, it doesn't affect interoperability.  I'd suggest
> making it a non-normative recommendation.
> 
>For ease of administrator configuration, the RADIUS server
> SHOULD
>expose the DHCP options and allow administrators to configure
> them,
>instead of requiring them to be entered as opaque data.
> 
> 

[Med] The use of normative language is justified here because we don't want the 
RADIUS servers to blindly pass data. What this text says is that the attributes 
should not be seen as opaque data by the RADIUS server but it should understand 
the encoding of the enclosed options. Thanks. 

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, 

[OPSAWG] SAPs and Attachment Circuits Provisioning (was TR: I-D Action: draft-boro-opsawg-ntw-attachment-circuit-01.txt)

2023-03-01 Thread mohamed.boucadair
Hi all, 

Now that the base SAP spec is stable, we started exploring an augmentation that 
exposes the set of attachment circuits that are terminated by the SAP. 

This network model is designed to ease the correlation between "Attachment 
Circuit-as-a-Service" request and the actual network provisioning. The model is 
also designed to accommodate various deployment schemes (a CE that maintains or 
multiple ACs with the same or distinct PEs, same AC terminated on the multiple 
SAPs, same AC terminated by more than one AC, etc.).

Please review and share comments. If you have an AC deployment case which is 
not covered by the proposed structure, please share it and let's discuss to see 
how to cover it. Thanks.

Cheers,
Med

-Message d'origine-
De : I-D-Announce  De la part de 
internet-dra...@ietf.org
Envoyé : mercredi 1 mars 2023 15:37
À : i-d-annou...@ietf.org
Objet : I-D Action: draft-boro-opsawg-ntw-attachment-circuit-01.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.


Title   : A Network YANG Data Model for Attachment Circuits
Authors : Mohamed Boucadair
  Richard Roberts
  Oscar Gonzalez de Dios
  Samier Barguil Giraldo
  Bo Wu
  Filename: draft-boro-opsawg-ntw-attachment-circuit-01.txt
  Pages   : 75
  Date: 2023-03-01

Abstract:
   This document specifies a network model for attachment circuits.  The
   model can be used for the provisioning of attachment circuits prior
   or during service provisioning (e.g., Network Slice Service).  A
   companion service model is specified in
   [I-D.boro-opsawg-teas-attachment-circuit].

   The module augments the Service Attachment Point (SAP) model with the
   detailed information for the provisioning of attachment circuits in
   Provider Edges (PEs).


The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-boro-opsawg-ntw-attachment-circuit/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-boro-opsawg-ntw-attachment-circuit-01.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-boro-opsawg-ntw-attachment-circuit-01


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
I-D-Announce mailing list
i-d-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html or 
ftp://ftp.ietf.org/ietf/1shadow-sites.txt

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] draft-ietf-opsawg-rfc7125-update: bis vs. update

2023-02-24 Thread mohamed.boucadair
Hi all,

One of the open questions raised in IETF#115 (3rd sub-bullet of bullet#2 in 
Slide#5 of [1]) is whether we publish this I-D as a bis, especially that each 
of the original RFC and the update draft have almost the same page count.

I personally think it is much more cleaner to go for a bis here but I'm just 
the pen holder and would like to hear from the WG/Chairs. Thanks

Cheers,
Med

[1] 
https://datatracker.ietf.org/meeting/115/materials/slides-115-opsawg-an-update-to-the-tcpcontrolbits-ip-flow-information-export-ipfix-information-element-00

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] draft-ietf-opsawg-rfc7125-update: std vs. Info

2023-02-24 Thread mohamed.boucadair
Hi all,

One of the open questions raised in IETF#115 (2nd sub-bullet of bullet#2 in 
Slide#5 of [1]) is whether we publish this text as Informational (same as 
RFC7125) or we go for Standard Tacks (which makes more sense given the 
normative text and also because the spec relates to interop).

draft-ietf-opsawg-rfc7125-update indicates currently std. If there are 
concerns/objections, please let's discuss. Thanks.

Cheers,
Med

[1] 
https://datatracker.ietf.org/meeting/115/materials/slides-115-opsawg-an-update-to-the-tcpcontrolbits-ip-flow-information-export-ipfix-information-element-00


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-01.txt

2023-02-24 Thread mohamed.boucadair
Hi all, 

This version addresses a comment raised by Thomas about observability (more 
details at: https://github.com/boucadair/-ipfix-rfc7125-update/issues/1). 

Thomas, please check and let me know if any change is still needed. Thanks.

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : vendredi 24 février 2023 15:03
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-rfc7125-update-
> 01.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This Internet-Draft is a work item of the Operations and
> Management Area Working Group WG of the IETF.
> 
> Title   : An Update to the tcpControlBits IP Flow
> Information Export (IPFIX) Information Element
> Author  : Mohamed Boucadair
>   Filename: draft-ietf-opsawg-rfc7125-update-01.txt
>   Pages   : 7
>   Date: 2023-02-24
> 
> Abstract:
>RFC 7125 revised the tcpControlBits IP Flow Information Export
>(IPFIX) Information Element that was originally defined in RFC
> 5102
>to reflect changes to the TCP Flags header field since RFC 793.
>However, that update is still problematic for interoperability
>because some flag values were deprecated since then.
> 
>This document updates RFC 7125 by removing stale information
> from the
>IPFIX registry and avoiding future conflicts with the
> authoritative
>TCP Header Flags registry.
> 
> 
> The IETF datatracker status page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-rfc7125-update/
> 
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-opsawg-rfc7125-update-
> 01.html
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-
> rfc7125-update-01
> 
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. (slice) service provisioning

2023-02-22 Thread mohamed.boucadair
Hi all,

Thanks Richard for sharing this update from ORAN.

FWIW, a new revision of the Attachment Circuits as a Service Module is 
available online. The main changes are as follows:


  *   Clarify the bearer concept and further elaborate the AC definition
  *   Position AC vs. bearer
  *   Position ACaaS vs. other models
  *   Add more examples, including illustrate how to use the AC module to 
connect to a cloud provider

Other changes can be tracked by looking into the diff provided below:


Title:  YANG Data Models for 'Attachment Circuits'-as-a-Service (ACaaS)

Document date:  2023-02-22

Group:  Individual Submission

Pages:  122

URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-02.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-02.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-attachment-circuit

Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-boro-opsawg-teas-attachment-circuit-02

Comments are welcome.

Cheers,
Med

De : Richard Roberts 
Envoyé : mercredi 8 février 2023 11:25
À : BOUCADAIR Mohamed INNOV/NET ; TEAS WG 
; draft-ietf-teas-ietf-network-slice-nbi-y...@ietf.org
Cc : opsawg@ietf.org; Bo Wu ; Oscar Gonzalez de Dios 
; Samier Barguil 
; JACQUENET Christian INNOV/NET 

Objet : RE: draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning

Hi all,

I am sharing with you the link below that deals with TN Slices within ORAN. 
This is joint WG6 (O-CLOUD) and WG9 (TN) presentation.
This presentation shows how the AC Data model can complement the Network Slice 
Service DM to create a new slice (example of a vlan hand-off model - different 
options are possible -).

https://github.com/boucadair/attachment-circuit-model/blob/main/assets/JNPR-WG6-WG9-E2E-TN-31012023.pdf

There are also a few slides related to provide better Transport Network 
automation within the  5G SMO, by extending the 3GPP Network Resource Model 
with the IETF AC YANG DM (EP_TRANSPORT/NextHopInfo). In other words, use IETF 
for network plumbing within the 3GPP ecosystem.

Of course, feel free to reach out to me if you have any questions !

Regards,
R


Juniper Business Use Only
From: mohamed.boucad...@orange.com 
mailto:mohamed.boucad...@orange.com>>
Sent: Friday, January 20, 2023 2:17 PM
To: TEAS WG mailto:t...@ietf.org>>; 
draft-ietf-teas-ietf-network-slice-nbi-y...@ietf.org
Cc: opsawg@ietf.org; Richard Roberts 
mailto:rrobe...@juniper.net>>; Bo Wu 
mailto:lana.w...@huawei.com>>; Oscar Gonzalez de Dios 
mailto:oscar.gonzalezded...@telefonica.com>>;
 Samier Barguil 
mailto:samier.barguil_gira...@nokia.com>>; 
JACQUENET Christian INNOV/NET 
mailto:christian.jacque...@orange.com>>
Subject: RE: draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning

[External Email. Be cautious of content]

Hi all,

We updated the draft with many examples to illustrate the use of the model. A 
new subsection was added to illustrate how slices can be bound pre-provisioned 
AC. The service slice model can be greatly simplified by imply relying upon the 
AC model. At this stage, we are defining a new model that augments the slice 
service model, but a proposal to discuss is: remove all the AC details from the 
slice service model and simply move the ac-ref into the main slice model.

We also updated the model to cover bearers managements and refined some of 
existing containers.

More changes can be tracked using the following links:


URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-01.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-01.html

Htmlized:   

Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element

2023-02-22 Thread mohamed.boucadair
Hi Joe, all,

draft draft-ietf-opsawg-rfc7125-update-00 is now online.

Please find below an update to this point mentioned in the call for adoption:
**

· Edit a second draft to "clean" other entries in registry. This 
document is intended to include only simple fixes and which do not require 
updating existing RFCs. The candidate list of these proposed fixes can be seen 
at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC."
**

# Simple fixes

We edited many iterations of draft-boucla-opsawg-ipfix-fixes to address the 
comments received in the list. This draft is scoped to cover simple fixes. We 
think that this version is stable enough.

# Implementing many of these fixes requires an IETF consensus

After digging into base specs, it appears that touching entries that were 
settled via IETF can't be touched directly by DEs (RFC7013):

This process should not in any way be construed as allowing the
IE-DOCTORS to overrule IETF consensus.  Specifically, Information
Elements in the IANA IE registry that were added with IETF
consensus require IETF consensus for revision or deprecation.


This means that we will need to publish draft-boucla-opsawg-ipfix-fixes as an 
RFC as well so that fixes can be implemented.

# New IEs to fix the issues identified in draft-boucla-opsawg-ipfix-fixes

As part of the analysis, we found that new IEs are needed to fix major issues 
with existing ones. These new IEs are now specified in 
https://datatracker.ietf.org/doc/draft-boucadair-opsawg-ipfix-tcpo-v6eh/ as per 
the initial scope for the simple-fixes I-D.

We explored in previous versions of draft-boucla-opsawg-ipfix-fixes an approach 
to build on existing IEs, but that approach implies that ordering of the IEs is 
important. I liked personally that alternate design but it appears that it is 
problematic given that RFC7011 only says SHOULD not a MUST for ordering:

   If an Information Element is required more than once in a Template,
   the different occurrences of this Information Element SHOULD follow
   the logical order of their treatments by the Metering Process.

After discussing with Benoît, and rather than using rfc6313.html#section-4.4.6, 
we decided to use a property that is provided in the base spec: 
rfc7011.html#section-6.2.

This I-D can be used to interact with TCP and 6man WGs.

# UDP surplus area

Together with Tiru, we edited  
https://datatracker.ietf.org/doc/draft-boucadair-opsawg-tsvwg-udp-ipfix/ to 
cover UDP options. The design is similar to the one we are proposing for TCP 
options.

I think that it is reasonable to consider adoption for these three I-Ds as a 
set.

I let Benoît and Tiru further comment as appropriate.

Cheers,
Med

De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : mardi 21 février 2023 17:56
À : Joe Clarke (jclarke) ; opsawg@ietf.org
Objet : Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element

Sorry, all.  I was out of the office since late Jan, and I forgot to close this 
out.

There has been considerable support for this work to be adopted with Paul 
Aitken dissenting.  However, in looking at the follow-up from Benoit, perhaps 
this issue is resolved.  Nonetheless, there is enough to call rough consensus 
and adopt this work to move it forward.

Authors, please rename this draft draft-ietf-opsawg-rfc7125-update-00 - making 
no other changes - and submit to Data Tracker.

Thanks.

Joe

From: OPSAWG mailto:opsawg-boun...@ietf.org>> on 
behalf of Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, January 17, 2023 at 11:24
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element
Happy new year, all.  One of the AIs that slipped through the cracks coming out 
of 115 was a call for adoption for draft-boucadair-opsawg-rfc7125-update.   One 
of the asks of Med at 115 was to look at what else might need to be done from 
an IE registry standpoint.  He replied on-list to that a while ago:

"Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

· draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.

· Edit a second draft to "clean" other entries in registry. This 
document is intended to include only simple fixes and which do not require 
updating existing RFCs. The candidate list of these proposed fixes can be seen 
at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC."

So, let this serve as a two-week call for adoption for the 

Re: [OPSAWG] [Last-Call] Genart last call review of draft-ietf-opsawg-add-encrypted-dns-09

2023-02-21 Thread mohamed.boucadair
Re-,

> Ah - I missed that draft-ietf-add-dnr was already in the RFC Ed
> Queue.

:-)

I consider that this issue is fixed. 

Cheers,
Med

> -Message d'origine-
> De : Robert Sparks 
> Envoyé : mardi 21 février 2023 18:52
> À : Bernie Volz ; BOUCADAIR Mohamed INNOV/NET
> 
> Cc : gen-...@ietf.org; draft-ietf-opsawg-add-encrypted-
> dns@ietf.org; last-c...@ietf.org; opsawg@ietf.org
> Objet : Re: [Last-Call] Genart last call review of draft-ietf-
> opsawg-add-encrypted-dns-09
> 
> 
> On 2/21/23 11:47 AM, Bernie Volz wrote:
> > Section 9 of
> > https://datatracker.ietf.org/doc/draft-ietf-add-dnr/13/ does
> indeed
> > request those assignments. And given that RFC-editor is working
> on
> > converting this into an RFC, IANA must make the assignments for
> the
> > RFC to be published.
> Ah - I missed that draft-ietf-add-dnr was already in the RFC Ed
> Queue.
> >
> > - Bernie (from iPad)
> >
> >> On Feb 21, 2023, at 10:54 AM, mohamed.boucad...@orange.com
> wrote:
> >>
> >> Hi Robert,
> >>
> >> Thanks for the follow-up.
> >>
> >> Bernie has provided the context for 162/144 codes.
> >>
> >> For your second comment, a first attempt to tweak the text can
> be
> >> seen at: https://tinyurl.com/opsawg-add-latest. This may be
> tweaked a
> >> little bit for better readability.
> >>
> >> Cheers,
> >> Med
> >>
> >>> -Message d'origine-
> >>> De : last-call  De la part de
> Robert
> >>> Sparks Envoyé : mardi 21 février 2023 15:49 À : BOUCADAIR
> Mohamed
> >>> INNOV/NET ; gen-...@ietf.org
> Cc :
> >>> draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> >>> c...@ietf.org; opsawg@ietf.org Objet : Re: [Last-Call] Genart
> last
> >>> call review of draft-ietf-
> >>> opsawg-add-encrypted-dns-09
> >>>
> >>>
> >>> On 2/20/23 12:42 AM, mohamed.boucad...@orange.com wrote:
>  Hi Robert,
> 
>  Thank you for the review.
> 
>  Please see inline.
> 
>  Cheers,
>  Med
> 
> > -Message d'origine-
> > De : Robert Sparks via Datatracker 
> Envoyé :
> > vendredi 17 février 2023 21:30 À : gen-...@ietf.org Cc :
> > draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> > c...@ietf.org; opsawg@ietf.org Objet : Genart last call
> review
> >>> of
> > draft-ietf-opsawg-add-
> > encrypted-dns-09
> >
> > Reviewer: Robert Sparks
> > Review result: Ready with Issues
> >
> > I am the assigned Gen-ART reviewer for this draft. The
> General
> >>> Area
> > Review Team (Gen-ART) reviews all IETF documents being
> >>> processed by
> > the IESG for the IETF Chair.  Please treat these comments
> just
> >>> like
> > any other last call comments.
> >
> > For more information, please see the FAQ at
> >
> > .
> >
> > Document: draft-ietf-opsawg-add-encrypted-dns-09
> > Reviewer: Robert Sparks
> > Review Date: 2023-02-17
> > IETF LC End Date: 2023-02-23
> > IESG Telechat date: Not scheduled for a telechat
> >
> > Summary: After addressing an issue, this will be ready for
> > publication as a Proposed Standard RFC
> >
> > Issue: draft-ietf-add-dnr needs to be a normative reference,
> or
> >>> some
> > other mechanic needs to be used to ensure draft-ietf-add-dnr
> is
> > published as an RFC before IANA follows the instructions in
> >>> this
> > document.
> >
>  [Med] 142/166 are permanent assignments. The IANA registry is
> >>> authoritative here.
> >>>
> >>> Ok, digging into the registries, I see 144 for OPTION_V6_DNR
> and
> >>> 162 for OPTION_V4_DNR. Is that what you meant? If not, what
> are
> >>> 142/166 pointing to?
> >>>
> >>> That these are already in the registries addresses the issue I
> >>> raised, but please remind me how to find the artifacts that
> _put_
> >>> these points in the registry? I assume something triggered
> early
> >>> permanent assignments for these? I wonder if those should be
> more
> >>> transparently tracked.
> >>>
> 
> 
>  Please note that we have the following to make sure that the
> >>> registry is in sync vs. DHCP and have this note for IANA:
> 
>     The initial content of this sub-registry is listed in
> Table
> >>> 4.  The
>     Value and Description fields echo those of [DHCPv6].
> 
>  Changes to the entry in the dhcp options registry will be
> >>> automatically reflected in the registry defined by this
> document.
> 
> > Nit: The discussion in paragraph 3 of section 3 and the note
> >>> that
> > follows are currently ambiguous. When it calls out that 2865
> >>> limits
> > the size of DHCP options and that 7499 and 7930 relaxes the
> >>> limit, is
> > it only trying to inform where the recommendation of
> supporting
> >>> 65535
> > bytes came from? Or is it trying to constrain the size of
> any
> >>> DHCP
> > option added to the the attributes defined here to 4096?
> >
>  [Med] Alan already clarified this 

Re: [OPSAWG] [Last-Call] Genart last call review of draft-ietf-opsawg-add-encrypted-dns-09

2023-02-21 Thread mohamed.boucadair
Hi Robert, 

Thanks for the follow-up. 

Bernie has provided the context for 162/144 codes. 

For your second comment, a first attempt to tweak the text can be seen at: 
https://tinyurl.com/opsawg-add-latest. This may be tweaked a little bit for 
better readability. 

Cheers,
Med

> -Message d'origine-
> De : last-call  De la part de Robert
> Sparks
> Envoyé : mardi 21 février 2023 15:49
> À : BOUCADAIR Mohamed INNOV/NET ;
> gen-...@ietf.org
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Re: [Last-Call] Genart last call review of draft-ietf-
> opsawg-add-encrypted-dns-09
> 
> 
> On 2/20/23 12:42 AM, mohamed.boucad...@orange.com wrote:
> > Hi Robert,
> >
> > Thank you for the review.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> >> -Message d'origine-
> >> De : Robert Sparks via Datatracker  Envoyé :
> >> vendredi 17 février 2023 21:30 À : gen-...@ietf.org Cc :
> >> draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> >> c...@ietf.org; opsawg@ietf.org Objet : Genart last call review
> of
> >> draft-ietf-opsawg-add-
> >> encrypted-dns-09
> >>
> >> Reviewer: Robert Sparks
> >> Review result: Ready with Issues
> >>
> >> I am the assigned Gen-ART reviewer for this draft. The General
> Area
> >> Review Team (Gen-ART) reviews all IETF documents being
> processed by
> >> the IESG for the IETF Chair.  Please treat these comments just
> like
> >> any other last call comments.
> >>
> >> For more information, please see the FAQ at
> >>
> >> .
> >>
> >> Document: draft-ietf-opsawg-add-encrypted-dns-09
> >> Reviewer: Robert Sparks
> >> Review Date: 2023-02-17
> >> IETF LC End Date: 2023-02-23
> >> IESG Telechat date: Not scheduled for a telechat
> >>
> >> Summary: After addressing an issue, this will be ready for
> >> publication as a Proposed Standard RFC
> >>
> >> Issue: draft-ietf-add-dnr needs to be a normative reference, or
> some
> >> other mechanic needs to be used to ensure draft-ietf-add-dnr is
> >> published as an RFC before IANA follows the instructions in
> this
> >> document.
> >>
> > [Med] 142/166 are permanent assignments. The IANA registry is
> authoritative here.
> 
> Ok, digging into the registries, I see 144 for OPTION_V6_DNR and
> 162 for OPTION_V4_DNR. Is that what you meant? If not, what are
> 142/166 pointing to?
> 
> That these are already in the registries addresses the issue I
> raised, but please remind me how to find the artifacts that _put_
> these points in the registry? I assume something triggered early
> permanent assignments for these? I wonder if those should be more
> transparently tracked.
> 
> >
> >
> > Please note that we have the following to make sure that the
> registry is in sync vs. DHCP and have this note for IANA:
> >
> > The initial content of this sub-registry is listed in Table
> 4.  The
> > Value and Description fields echo those of [DHCPv6].
> >
> > Changes to the entry in the dhcp options registry will be
> automatically reflected in the registry defined by this document.
> >
> >> Nit: The discussion in paragraph 3 of section 3 and the note
> that
> >> follows are currently ambiguous. When it calls out that 2865
> limits
> >> the size of DHCP options and that 7499 and 7930 relaxes the
> limit, is
> >> it only trying to inform where the recommendation of supporting
> 65535
> >> bytes came from? Or is it trying to constrain the size of any
> DHCP
> >> option added to the the attributes defined here to 4096?
> >>
> > [Med] Alan already clarified this one. Please let us know if any
> text tweak is needed.
> Yes, I do think the document would be improved if it more directly
> stated what Alan said in his earlier response.
> >
> >
> >
> __
> 
> > ___
> >
> > Ce message et ses pieces jointes peuvent contenir des
> informations
> > confidentielles ou privilegiees et ne doivent donc pas etre
> diffuses,
> > exploites ou copies sans autorisation. Si vous avez recu ce
> message
> > par erreur, veuillez le signaler a l'expediteur et le detruire
> ainsi que les pieces jointes. Les messages electroniques etant
> susceptibles d'alteration, Orange decline toute responsabilite si
> ce message a ete altere, deforme ou falsifie. Merci.
> >
> > This message and its attachments may contain confidential or
> > privileged information that may be protected by law; they should
> not be distributed, used or copied without authorisation.
> > If you have received this email in error, please notify the
> sender and delete this message and its attachments.
> > As emails may be altered, Orange is not liable for messages that
> have been modified, changed or falsified.
> > Thank you.
> >
> 
> --
> last-call mailing list
> last-c...@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call


Re: [OPSAWG] Genart last call review of draft-ietf-opsawg-add-encrypted-dns-09

2023-02-19 Thread mohamed.boucadair
Hi Robert, 

Thank you for the review.

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Robert Sparks via Datatracker 
> Envoyé : vendredi 17 février 2023 21:30
> À : gen-...@ietf.org
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Genart last call review of draft-ietf-opsawg-add-
> encrypted-dns-09
> 
> Reviewer: Robert Sparks
> Review result: Ready with Issues
> 
> I am the assigned Gen-ART reviewer for this draft. The General
> Area Review Team (Gen-ART) reviews all IETF documents being
> processed by the IESG for the IETF Chair.  Please treat these
> comments just like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> .
> 
> Document: draft-ietf-opsawg-add-encrypted-dns-09
> Reviewer: Robert Sparks
> Review Date: 2023-02-17
> IETF LC End Date: 2023-02-23
> IESG Telechat date: Not scheduled for a telechat
> 
> Summary: After addressing an issue, this will be ready for
> publication as a Proposed Standard RFC
> 
> Issue: draft-ietf-add-dnr needs to be a normative reference, or
> some other mechanic needs to be used to ensure draft-ietf-add-dnr
> is published as an RFC before IANA follows the instructions in
> this document.
> 

[Med] 142/166 are permanent assignments. The IANA registry is authoritative 
here.  

Please note that we have the following to make sure that the registry is in 
sync vs. DHCP and have this note for IANA:

   The initial content of this sub-registry is listed in Table 4.  The
   Value and Description fields echo those of [DHCPv6]. 

Changes to the entry in the dhcp options registry will be automatically 
reflected in the registry defined by this document. 

> Nit: The discussion in paragraph 3 of section 3 and the note that
> follows are currently ambiguous. When it calls out that 2865
> limits the size of DHCP options and that 7499 and 7930 relaxes the
> limit, is it only trying to inform where the recommendation of
> supporting 65535 bytes came from? Or is it trying to constrain the
> size of any DHCP option added to the the attributes defined here
> to 4096?
> 

[Med] Alan already clarified this one. Please let us know if any text tweak is 
needed. 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] draft-ietf-opsawg-sap: Attachement Circuits définition

2023-02-16 Thread mohamed.boucadair
Hi all,

As part of the ongoing effort to expose attachment circuits as a service, we 
figured out that there is a need to clearly separate the notions of "attachment 
circuits" vs. "bearers" and clearly identify the physical setup vs. required 
properties over that layer to actually be able to exchange data. The current 
use of these terms in existing RFCs [1] may be perceived as inconsistent. We 
are currently discussing (AC Definition Pull Request #32 · 
boucadair/attachment-circuit-model
 and  bearer definition Pull Request #26 · boucadair/attachment-circuit-model 
(github.com))
 to define these two concepts.

However, Bo raised a comment about the AC definition in draft-ietf-opsawg-sap: 
The suggestion distinction between bearer and AC is nullified if we also accept 
that AC covers the physical link. In order to avoid that confusion, I suggest 
we make this simple change to draft-ietf-opsawg-sap:

===
OLD:
   Attachment Circuit (AC):  A channel that connects a Customer Edge
  (CE) to a Provider Edge (PE).  The AC may be a physical or logical
  link (Section 6.1 of [RFC4026]).

NEW:

   Attachment Circuit (AC):  A channel that connects a Customer Edge

  (CE) to a Provider Edge (PE).
===

Unless there are objections, I will propose this change during AUTH48 of the 
SAP draft.

Thank you.

Cheers,
Med

[1]: Excerpts from the existing RFCs.

RFC4026:

   In a Layer 2 VPN the CE is attached to PE via an Attachment Circuit

   (AC).  The AC may be a physical or logical link.

RFC4364 (L3VPN):

   Routers can be attached to each other, or to end systems, in a

   variety of different ways: PPP connections, ATM Virtual Circuits

   (VCs), Frame Relay VCs, ethernet interfaces, Virtual Local Area

   Networks (VLANs) on ethernet interfaces, GRE tunnels, Layer 2

   Tunneling Protocol (L2TP) tunnels, IPsec tunnels, etc.  We will use

   the term "attachment circuit" to refer generally to some such means

   of attaching to a router.  An attachment circuit may be the sort of

   connection that is usually thought of as a "data link", or it may be

   a tunnel of some sort; what matters is that it be possible for two

   devices to be network layer peers over the attachment circuit.

RFC4646 (L2VPN):

   In any type of L2VPN, a CE device attaches to a PE device via some

   sort of circuit or virtual circuit.  We will call this an "Attachment

   Circuit" (AC).  We use this term very generally; an Attachment

   Circuit may be a Frame Relay DLCI, an ATM VPI/VCI, an Ethernet port,

   a VLAN, a PPP connection on a physical interface, a PPP session from

   an L2TP tunnel, an MPLS LSP, etc.  The CE device may be a router, a

   switch, a host, or just about anything, which the customer needs

   hooked up to the VPN.  An AC carries a frame between CE and PE, or

   vice versa.

RFC8299 (L3SM):

   A "site" is composed of at least one "site-network-access" and, in

   the case of multihoming, may have multiple site-network-access

   points.  The site-network-access attachment is done through a

   "bearer" with an "ip-connection" on top.  The bearer refers to

   properties of the attachment that are below Layer 3, while the

   connection refers to properties oriented to the Layer 3 protocol.

   The bearer may be allocated dynamically by the SP, and the customer

   may provide some constraints or parameters to drive the placement of

   the access.

RFC8466 (L2SM):

   A site contains at least one network access (i.e., site network

   accesses providing access to the sites, as defined in Section 5.3.2),

   and there may be multiple network accesses in the case of

   multihoming.  Site-to-network-access attachment is done through a

   bearer with a Layer 2 connection on top.  The bearer refers to

   properties of the attachment that are below Layer 2, while the

   connection refers to Layer 2 protocol-oriented properties.

RFC9291 (L2NM):

   Similar to Section 3 of [RFC8466], CE to PE attachment is achieved

   through a bearer with a Layer 2 connection on top.  The bearer refers

   to properties of the attachment that are below Layer 2, while the

   connection refers to Layer 2 protocol-oriented properties.

RFC9182 (L3NM):

   A site, as per [RFC4176], represents a VPN customer's location that

   is connected to the service provider network via a CE-PE link, which

   can access at least one VPN.  The connection from the site to the

   service provider network is the bearer.  Every site is associated

   with a list of bearers.  A bearer is the Layer 2 connection with the

   site.

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou 

Re: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

2023-02-09 Thread mohamed.boucadair
Re-,

Thanks Rob for the follow-up. 

A new version with the proposed changes is now online: 
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-add-encrypted-dns-09.

Cheers,
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : jeudi 9 février 2023 11:04
> À : BOUCADAIR Mohamed INNOV/NET ;
> Alan DeKok 
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> opsawg@ietf.org
> Objet : RE: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-
> dns-07
> 
> Hi Med, Alan,
> 
> > -Original Message-
> > From: mohamed.boucad...@orange.com
> > 
> > Sent: 09 February 2023 09:02
> > To: Rob Wilton (rwilton) ; Alan DeKok
> > 
> > Cc: draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> opsawg@ietf.org
> > Subject: RE: [OPSAWG] AD review of
> > draft-ietf-opsawg-add-encrypted-dns-07
> >
> > Hi Rob, all,
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -Message d'origine-
> > > De : Rob Wilton (rwilton)  Envoyé :
> mercredi 8
> > > février 2023 20:39 À : Alan DeKok 
> Cc :
> > > draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> > > opsawg@ietf.org
> > > Objet : RE: [OPSAWG] AD review of draft-ietf-opsawg-add-
> encrypted-
> > > dns-07
> > >
> > > Hi Alan,
> > >
> > > Sorry for the delay.  Please see inline ...
> > >
> > > > -Original Message-
> > > > From: Alan DeKok 
> > > > Sent: 19 December 2022 17:13
> > > > To: Rob Wilton (rwilton) 
> > > > Cc: draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> > > opsawg@ietf.org
> > > > Subject: Re: [OPSAWG] AD review of
> > > > draft-ietf-opsawg-add-encrypted-dns-07
> > > >
> > > > On Dec 19, 2022, at 11:53 AM, Rob Wilton (rwilton)
> > > >  wrote:
> > > > > It isn't really clear to me why some of the registries are
> > > needed,
> > > > > specifically
> > > > the ones in 8.4.1 and 8.4.2.  Why not allow any v4 or v6
> DHCP
> > > > attribute to be carried within the DHCPv6-Options or DHCPv4-
> > > Options field?
> > > >
> > > >   The original intent of the document was to define a
> limited
> > > set of
> > > > DHCP options which could be carried in RADIUS.  i.e. option
> X
> > > would
> > > > map to RADIUS attribute Y.  After some discussion, this was
> > > deemed to
> > > > be unworkable, and changed to the current method.
> > > >
> > > >   The previous limitations were still kept, however.
> > > >
> > > >   While it is useful, I could see issues with allowing any
> DHCP
> > > option
> > > > to be transported in RADIUS.  I'll have to dig deeper to get
> > > into details.
> > > [Rob Wilton (rwilton)]
> > >
> > > Okay.
> > >
> > > >
> > > > >
> > > > > (2) p 4, sec 3.  DHCP Options RADIUS Attributes
> > > > >
> > > > >   Absent any explicit configuration on the DHCP server,
> RADIUS
> > > supplied
> > > > >   data by means of DHCP*-Options Attributes take
> precedence
> > > over any
> > > > >   local configuration.
> > > > >
> > > > > This point may be worth discussing.  Naturally, I would
> > > explicit
> > > > > configuration
> > > > to a network device to generally take precedent over
> implicitly
> > > > learned configuration from the network.
> > > >
> > > >  I'm not sure which options are "implicitly learned" from
> the
> > > network.
> > > > One set is configured in the device, and another is
> configured
> > > on a
> > > > per-user / per- session basis.  This allows for sane
> defaults,
> > > with
> > > > specific over-rides where those are needed.
> > > >
> > > >   If the options configured on the device always take
> precedence
> > > over
> > > > the per- session options (via RADIUS), then there isn't much
> > > point in
> > > > sending per-session options.
> > > [Rob Wilton (rwilton)]
> > > To give a regular configuration example, if you were to enable
> the
> > > Ethernet auto-negotiation protocol but also explicitly
> configure an
> > > 10/100/1000 Ethernet interface to run at 100 Mb/s then I would
> > > expect the explicit client provided configuration to take
> precedence
> > > over negotiating the speed value.
> > >
> > > It sounds like, in what you describe, the configuration is
> > > effectively hierarchical.  I.e., it is really because the
> RADIUS
> > > supplied configuration is more-specific that it takes
> precedence
> > > over the local configuration.  If so, that is expected, but I
> think
> > > that it would be helpful to clarify the description to make
> that
> > > clear.
> > >
> >
> > [Med] OK. We can make this change:
> >
> > OLD:
> >Absent any explicit configuration on the DHCP server, RADIUS
> >supplied data by means of DHCP*-Options Attributes take
> precedence
> >over any local configuration.
> >
> > NEW:
> >RADIUS supplied data is specific configuration data that is
> >returned as a function of authentication and authorization
> checks.
> >As such, absent any explicit configuration on the DHCP
> server, RADIUS
> >supplied data by means of DHCP*-Options Attributes take
> precedence
> >over any local configuration.
> [Rob Wilton (rwilton)]
> 
> 

Re: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

2023-02-09 Thread mohamed.boucadair
Hi Rob, all, 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : mercredi 8 février 2023 20:39
> À : Alan DeKok 
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> opsawg@ietf.org
> Objet : RE: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-
> dns-07
> 
> Hi Alan,
> 
> Sorry for the delay.  Please see inline ...
> 
> > -Original Message-
> > From: Alan DeKok 
> > Sent: 19 December 2022 17:13
> > To: Rob Wilton (rwilton) 
> > Cc: draft-ietf-opsawg-add-encrypted-dns@ietf.org;
> opsawg@ietf.org
> > Subject: Re: [OPSAWG] AD review of
> > draft-ietf-opsawg-add-encrypted-dns-07
> >
> > On Dec 19, 2022, at 11:53 AM, Rob Wilton (rwilton)
> >  wrote:
> > > It isn't really clear to me why some of the registries are
> needed,
> > > specifically
> > the ones in 8.4.1 and 8.4.2.  Why not allow any v4 or v6 DHCP
> > attribute to be carried within the DHCPv6-Options or DHCPv4-
> Options field?
> >
> >   The original intent of the document was to define a limited
> set of
> > DHCP options which could be carried in RADIUS.  i.e. option X
> would
> > map to RADIUS attribute Y.  After some discussion, this was
> deemed to
> > be unworkable, and changed to the current method.
> >
> >   The previous limitations were still kept, however.
> >
> >   While it is useful, I could see issues with allowing any DHCP
> option
> > to be transported in RADIUS.  I'll have to dig deeper to get
> into details.
> [Rob Wilton (rwilton)]
> 
> Okay.
> 
> >
> > >
> > > (2) p 4, sec 3.  DHCP Options RADIUS Attributes
> > >
> > >   Absent any explicit configuration on the DHCP server, RADIUS
> supplied
> > >   data by means of DHCP*-Options Attributes take precedence
> over any
> > >   local configuration.
> > >
> > > This point may be worth discussing.  Naturally, I would
> explicit
> > > configuration
> > to a network device to generally take precedent over implicitly
> > learned configuration from the network.
> >
> >  I'm not sure which options are "implicitly learned" from the
> network.
> > One set is configured in the device, and another is configured
> on a
> > per-user / per- session basis.  This allows for sane defaults,
> with
> > specific over-rides where those are needed.
> >
> >   If the options configured on the device always take precedence
> over
> > the per- session options (via RADIUS), then there isn't much
> point in
> > sending per-session options.
> [Rob Wilton (rwilton)]
> To give a regular configuration example, if you were to enable the
> Ethernet auto-negotiation protocol but also explicitly configure
> an 10/100/1000 Ethernet interface to run at 100 Mb/s then I would
> expect the explicit client provided configuration to take
> precedence over negotiating the speed value.
> 
> It sounds like, in what you describe, the configuration is
> effectively hierarchical.  I.e., it is really because the RADIUS
> supplied configuration is more-specific that it takes precedence
> over the local configuration.  If so, that is expected, but I
> think that it would be helpful to clarify the description to make
> that clear.
> 

[Med] OK. We can make this change: 

OLD:
   Absent any explicit configuration on the DHCP server, RADIUS
   supplied data by means of DHCP*-Options Attributes take precedence
   over any local configuration.

NEW:
   RADIUS supplied data is specific configuration data that is
   returned as a function of authentication and authorization checks.
   As such, absent any explicit configuration on the DHCP server, RADIUS
   supplied data by means of DHCP*-Options Attributes take precedence
   over any local configuration.

> 
> >
> > > (3) p 6, sec 3.2.  DHCPv4-Options Attribute
> > >
> > >  Permitted DHCPv4 options in the DHCPv4-Options Attribute
> are
> > >  maintained by IANA in the registry created in Section
> 8.4.2.
> > >
> > > Comparing this text to the description for v6, this
> description is
> > > silent on
> > whether multiple instances of the same DHCPv4 option MAY be
> included.
> > Should that be specified here?
> >
> >   Likely, yes.  The RADIUS attributes are simply carrying DHCP
> > options, as if they were in a DHCP packet.  So all of the DHCP
> rules
> > about option handling should apply here.
> [Rob Wilton (rwilton)]
> Okay.
> 
> >
> > >
> > > (4) p 10, sec 7.  Table of Attributes
> > >
> > >   The following table provides a guide as what type of RADIUS
> packets
> > >   that may contain these attributes, and in what quantity.
> > >
> > > Am I right that this is just a duplication of what is
> described in
> > > section 3?  If
> > so, perhaps change "guide" to "informative guide" and include
> text to
> > refer back to the  canonical definition in section 3.
> >
> >   Sure.  This table is traditional in RADIUS RFCs, so the text
> here
> > mirrors previous RADIUS RFCs.
> [Rob Wilton (rwilton)]
> Okay.
> 
> 
> >
> > > (8) p 3, sec 3.  DHCP Options RADIUS Attributes
> > >
> > >   These attributes use the "Long 

Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element

2023-01-31 Thread mohamed.boucadair
Hi Alex,

For the side note, there is already 
https://www.rfc-editor.org/rfc/rfc7013#section-5.1, specifically this part:

   This process should not in any way be construed as allowing the IE-
   DOCTORS to overrule IETF consensus.  Specifically, Information
   Elements in the IANA IE registry that were added with IETF consensus
   require IETF consensus for revision or deprecation.

Cheers,
Med

De : OPSAWG  De la part de Alexander L Clemm
Envoyé : mardi 31 janvier 2023 00:01
À : thomas.g...@swisscom.com; jclarke=40cisco@dmarc.ietf.org; 
opsawg@ietf.org
Objet : Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element


Clearly we need to keep the registries up to date.  I support the adoption as 
well, including the other draft as mentioned by Thomas.

As a side note, for future reference it would be good to have some guideline 
when the registry can simply be updated versus when a separate draft is 
required to update or introduce a new Information Element.  (Perhaps this has 
been discussed and someone has a pointer they can share.)

--- Alex
On 1/21/2023 7:20 AM, thomas.g...@swisscom.com 
wrote:
Dear opsawg,

I support the adoption and think draft-boucla-opsawg-ipfix-fixes should follow 
the adoption call next as well. Both are very valuable to keep the IPFIX 
registry up to date.

I agree with the author that IE6 tcpControlBits should mirror the TCP header 
flags registry 
(https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml#tcp-header-flags).

With this update network operators understand when packets are being observed 
with bit 7 set which application in the network should be upgraded to reflect 
the change being introduced with RFC 8311.

I suggest in the introduction to take the angle of correct observability vs. 
TCP protocol interoperability to describe the motivation.

Best wishes
Thomas

From: OPSAWG  On 
Behalf Of Joe Clarke (jclarke)
Sent: Tuesday, January 17, 2023 5:25 PM
To: opsawg@ietf.org
Subject: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element

Happy new year, all.  One of the AIs that slipped through the cracks coming out 
of 115 was a call for adoption for draft-boucadair-opsawg-rfc7125-update.   One 
of the asks of Med at 115 was to look at what else might need to be done from 
an IE registry standpoint.  He replied on-list to that a while ago:

“Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

  1.  draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.
  2.  Edit a second draft to “clean” other entries in registry. This document 
is intended to include only simple fixes and which do not require updating 
existing RFCs. The candidate list of these proposed fixes can be seen at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC.”

So, let this serve as a two-week call for adoption for the existing 
draft-boucadair-opsawg-rfc7125-update document.  Please reply on-list with your 
comments, support, or dissent by January 31, 2023.

Thanks.

Joe



___

OPSAWG mailing list

OPSAWG@ietf.org

https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or 

Re: [OPSAWG] [IPFIX] Review of draft-boucla-opsawg-ipfix-fixes

2023-01-24 Thread mohamed.boucadair
Hi Paul,

Thanks for the follow-up. Good catches. These should be now fixed in the 
candidate -04: 
https://boucadair.github.io/simple-ipfix-fixes/#go.draft-boucla-opsawg-ipfix-fixes.html

The diff can be tracked here: 
https://boucadair.github.io/simple-ipfix-fixes/#go.draft-boucla-opsawg-ipfix-fixes.diff

As you can see, Section 3 includes now a proposal to address the issues with 
tcpOptions and ipv6ExtensionHeaders. As these changes are not “simple fixes”, 
we may move this part into a separate draft.

Cheers,
Med

De : Aitken, Paul 
Envoyé : lundi 23 janvier 2023 20:32
À : BOUCADAIR Mohamed INNOV/NET ; opsawg 
; Benoit Claise 
Cc : ip...@ietf.org
Objet : Re: [IPFIX] Review of draft-boucla-opsawg-ipfix-fixes

Thanks Med, this looks great. Thanks for updating so quickly. Some further 
feedback:


Parenthesise "Section 6" for consistency with the previous paragraphs:

1.  Introduction

 *  Miscellaneous updates that fix broken pointers, orphan section
  references, etc.  Section 6.


This does not make sense:

4. Point to An Existing IANA Registry

  IANA is requested to update the following entries by adding the
  indicated "Additional Information" of [IANA-IPFIX]:

Possibly:

  IANA is requested to update the following entries by adding the
  indicated "Additional Information" to the [IANA-IPFIX] registry:


Section 4 says, "IANA is requested to update the following entries". Section 5 
says, "IANA is requested to update [IANA-IPFIX]". Sections 3 and 6 should say 
something similar so they're clearly requests for IANA to update the entries.


6.3 anonymizationFlags

This is the table that needs fixed, right?


6.6. externalAddressRealm

The detailed definition is similar to the one provided for the 
internalAddressRealm IE.

"similar" allows for some ambiguity. Perhaps, "See the internalAddressRealm IE 
for the detailed definition".


Also, at one time Benoit was strict about not using "IE", but always using 
"Information Element" - possibly because "IE" is not defined in the IPFIX 
terminology.


8. IANA Considerations

   This document also requests IANA to update the reference 
clause of
   the "IPFIX Information Elements" subregistry with teh 
reference to
   this document.

Typo, "teh".


P.

On 23/01/2023 12:35, 
mohamed.boucad...@orange.com wrote:
Re-,  Paul,

Many thanks for the comments. All good points.

An updated version to address almost all these points is online:


URL:
https://www.ietf.org/archive/id/draft-boucla-opsawg-ipfix-fixes-03.txt

Status: 
https://datatracker.ietf.org/doc/draft-boucla-opsawg-ipfix-fixes/

Html:   
https://www.ietf.org/archive/id/draft-boucla-opsawg-ipfix-fixes-03.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes

Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-boucla-opsawg-ipfix-fixes-03

(There is a formatting issue with a table; this will be fixed in the next 
iteration)

For the comment about references, I prefer to leave those to make idnits happy.

Cheers,
Med

De : Aitken, Paul 
Envoyé : vendredi 20 janvier 2023 23:17
À : opsawg ; BOUCADAIR Mohamed 
INNOV/NET ; 
Benoit Claise 
Cc : ip...@ietf.org
Objet : Review of draft-boucla-opsawg-ipfix-fixes

This cleanup seems good and useful. Thanks for the draft. Please find some 
feedback below, with quoted text in black and my comments in blue.


1. Introduction

This document intends to update the IANA registry and bringing some consistency.

Consistency with ... ?


3. Update the Description

This section should propose/request updates just as section 4 does.


3.1. tcpOptions

Only options having a kind =< 56 can be included in a tcpOptions IE.

The tcpOptions IE supports options 0 through 63.


4. Point to An Existing IANA Registry

I found this line difficult to parse:

IANA is requested to update the following entries by adding the indicated 
pointer to an IANA registry under "Additional Information" of [IANA-IPFIX]:

I suggest:

IANA is requested to update the following entries by adding the indicated 
"Additional Information".


5. Consistent Citation of Registries

Many of these changes move the relevant registry from the Description to the 
Additional Information, so it's presented as "See " without any 
explanation. The general form of the Addition Information column is "See [url] 
for the definition...", so these updates should follow the same format. ie, say 
why to see that URL.

Some of the existing Additional Information entries simply cite an RFC without 
explanation. These should also be improved.


5.1 mplsTopLabelType / NEW

Additional Information: See 

[OPSAWG] TR: I-D Action: draft-boucadair-opsawg-tsvwg-udp-ipfix-02.txt

2023-01-24 Thread mohamed.boucadair
Hi all, 

Now that I-D.ietf-tsvwg-udp-options is finally in the tsvwg WGLC, there is a 
need to provide more operational tools, e.g., to measure the 
support/introduction of UDP options. This is even exciting given that transport 
protocols are usually extended by defining header options, while UDP options 
use protocol trailers.

Note that the plan is to leverage the approach in this draft to fix the 
limitations of tcpOptions already described in the simple-fix I-D.

Comments and suggestions are welcome.

Cheers,
Med & Tiru

-Message d'origine-
De : I-D-Announce  De la part de 
internet-dra...@ietf.org
Envoyé : lundi 23 janvier 2023 17:44
À : i-d-annou...@ietf.org
Objet : I-D Action: draft-boucadair-opsawg-tsvwg-udp-ipfix-02.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.


Title   : Export of UDP Options Information in IP Flow 
Information Export (IPFIX)
Authors : Mohamed Boucadair
  Tirumaleswar Reddy.K
  Filename: draft-boucadair-opsawg-tsvwg-udp-ipfix-02.txt
  Pages   : 7
  Date: 2023-01-23

Abstract:
   This document specifies new IP Flow Information Export (IPFIX)
   Information Elements for UDP options.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Discussion of this document takes place on the Operations and
   Management Area Working Group Working Group mailing list
   (opsawg@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/browse/opsawg/.

   Source for this draft and an issue tracker can be found at
   https://github.com/boucadair/udp-ipfix.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-boucadair-opsawg-tsvwg-udp-ipfix/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-boucadair-opsawg-tsvwg-udp-ipfix-02.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-boucadair-opsawg-tsvwg-udp-ipfix-02


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
I-D-Announce mailing list
i-d-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html or 
ftp://ftp.ietf.org/ietf/1shadow-sites.txt

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Review of draft-boucla-opsawg-ipfix-fixes

2023-01-23 Thread mohamed.boucadair
Re-,  Paul,

Many thanks for the comments. All good points.

An updated version to address almost all these points is online:


URL:
https://www.ietf.org/archive/id/draft-boucla-opsawg-ipfix-fixes-03.txt

Status: 
https://datatracker.ietf.org/doc/draft-boucla-opsawg-ipfix-fixes/

Html:   
https://www.ietf.org/archive/id/draft-boucla-opsawg-ipfix-fixes-03.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boucla-opsawg-ipfix-fixes

Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-boucla-opsawg-ipfix-fixes-03

(There is a formatting issue with a table; this will be fixed in the next 
iteration)

For the comment about references, I prefer to leave those to make idnits happy.

Cheers,
Med

De : Aitken, Paul 
Envoyé : vendredi 20 janvier 2023 23:17
À : opsawg ; BOUCADAIR Mohamed INNOV/NET 
; Benoit Claise 
Cc : ip...@ietf.org
Objet : Review of draft-boucla-opsawg-ipfix-fixes

This cleanup seems good and useful. Thanks for the draft. Please find some 
feedback below, with quoted text in black and my comments in blue.


1. Introduction

This document intends to update the IANA registry and bringing some consistency.

Consistency with ... ?


3. Update the Description

This section should propose/request updates just as section 4 does.


3.1. tcpOptions

Only options having a kind =< 56 can be included in a tcpOptions IE.

The tcpOptions IE supports options 0 through 63.


4. Point to An Existing IANA Registry

I found this line difficult to parse:

IANA is requested to update the following entries by adding the indicated 
pointer to an IANA registry under "Additional Information" of [IANA-IPFIX]:

I suggest:

IANA is requested to update the following entries by adding the indicated 
"Additional Information".


5. Consistent Citation of Registries

Many of these changes move the relevant registry from the Description to the 
Additional Information, so it's presented as "See " without any 
explanation. The general form of the Addition Information column is "See [url] 
for the definition...", so these updates should follow the same format. ie, say 
why to see that URL.

Some of the existing Additional Information entries simply cite an RFC without 
explanation. These should also be improved.


5.1 mplsTopLabelType / NEW

Additional Information: See 
[RFC3031]
 for the MPLS label structure. See 
https://www.iana.org/assignments/ipfix/ipfix.xhtml#ipfix-mpls-label-type.

Please put the IANA registry first and explain why to see it, eg:

Additional Information: See the MPLS label type registry at 
[https://www.iana.org/assignments/ipfix/ipfix.xhtml#ipfix-mpls-label-type]. See 
[RFC3031]
 for the MPLS label structure.


5.3. classificationEngineId / NEW

Additional Information: See the Classification Engine IDs registry 
[https://www.iana.org/assignments/ipfix/ipfix.xhtml#classification-engine-ids].


5.22. dataLinkFrameType

Additional Information: See 
https://www.iana.org/assignments/ipfix/ipfix.xhtml#ipfix-data-link-frame-type. 
[IEEE802.3][IEEE802.11][ISO/IEC.7498-1:1994]

Please add some explanatory text to the IEEE + ISO/IEC links, eg:

Additional Information: See the dataLinkFrameType registry at 
[https://www.iana.org/assignments/ipfix/ipfix.xhtml#ipfix-data-link-frame-type].
 See [IEEE802.3] for the definition of something, and [IEEE802.11] for the 
definition of something else. See [ISO/IEC.7498-1:1994] for further 
specifications."

Should "The data link layer is defined in [ISO/IEC.7498-1:1994]." also be moved 
into the Additional Information?


Similar comments apply for sections 5.4 through 5.25.


5.15. informationElementUnits / NEW

This field may take the values in Table 3 below

There is no Table 3.

The registry would benefit from cleanup of "below" as used in 
collectionTimeMilliseconds, messageMD5Checksum, selectorAlgorithm, 
informationElementUnits, distinctCountOfDestinationIPAddress, and "above" as 
used in externalAddressRealm, since these have no meaning when the element's 
definition is read stand-alone.

Also cleanup of "section N" without any reference which seem to refer to 
sections of the defining RFC and have no context in the registry:

anonymizationFlags:

"Stability Class: see the Stability Class table below, and section 
Section 5.1."

"see Section 7.2.2 for details."

Classification Engine IDs (Value 101) value 6:

"based on the methods described in section 2."

flowSelectorAlgorithm

"as defined in the Scope (Section 1)."



8.2. Informative References

It doesn't seem necessary or useful to list each RFC which was quoted from the 
registry. Only cite those which pertain to the draft itself.


Thanks,
P.

On 19/01/2023 16:53, Joe Clarke (jclarke) wrote:
Forwarding to ipfix@ for more eyes 

Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element

2023-01-22 Thread mohamed.boucadair
Hi Thomas,

Thanks for sharing your thoughts.

Point taken: Comment from thomas.g...@swisscom.com · Issue #1 · 
boucadair/ipfix-rfc7125-update 
(github.com).

Cheers,
Med

De : OPSAWG  De la part de thomas.g...@swisscom.com
Envoyé : samedi 21 janvier 2023 16:21
À : jclarke=40cisco@dmarc.ietf.org; opsawg@ietf.org
Objet : Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element

Dear opsawg,

I support the adoption and think draft-boucla-opsawg-ipfix-fixes should follow 
the adoption call next as well. Both are very valuable to keep the IPFIX 
registry up to date.

I agree with the author that IE6 tcpControlBits should mirror the TCP header 
flags registry 
(https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml#tcp-header-flags).

With this update network operators understand when packets are being observed 
with bit 7 set which application in the network should be upgraded to reflect 
the change being introduced with RFC 8311.

I suggest in the introduction to take the angle of correct observability vs. 
TCP protocol interoperability to describe the motivation.

Best wishes
Thomas

From: OPSAWG mailto:opsawg-boun...@ietf.org>> On 
Behalf Of Joe Clarke (jclarke)
Sent: Tuesday, January 17, 2023 5:25 PM
To: opsawg@ietf.org
Subject: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element

Happy new year, all.  One of the AIs that slipped through the cracks coming out 
of 115 was a call for adoption for draft-boucadair-opsawg-rfc7125-update.   One 
of the asks of Med at 115 was to look at what else might need to be done from 
an IE registry standpoint.  He replied on-list to that a while ago:

"Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

  *   draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.
  *   Edit a second draft to "clean" other entries in registry. This document 
is intended to include only simple fixes and which do not require updating 
existing RFCs. The candidate list of these proposed fixes can be seen at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC."

So, let this serve as a two-week call for adoption for the existing 
draft-boucadair-opsawg-rfc7125-update document.  Please reply on-list with your 
comments, support, or dissent by January 31, 2023.

Thanks.

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] [IPFIX] FW: CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element

2023-01-22 Thread mohamed.boucadair
Hi Paul, all,

Thank you for sharing your thoughts.

If we follow the reasoning below, the IETF should never publish RFC7125 to fix 
the misalignment issue that was in RFC5102! It is unfortunate that the fix in 
7125 is broken (which is fair because there was no complete (*) TCP flag 
registry at that time).

RFC7125 is broken not only because it reflects a stale interpretation of the 
flags and also because it leaves the room for an exporter to decide to not 
export some flags as observed, which is suboptimal (e.g., DDoS 
detection/mitigation).

The proposal does not require an exporter to associate a meaning with the 
flags. So, no implementation change will be needed in the future when a new 
flag is associated with a meaning or deprecated. The behavior of the exporter 
is thus simplified and will always reflect what was observed.

(*): There was actually the registry create by rfc3540, but that registry is 
incomplete. We fixed that in TCPM as you can see here: 
https://mailarchive.ietf.org/arch/msg/tcpm/RK1ixEOA6HaP7TGmtNLXGI2RBdM/.

Cheers,
Med

De : OPSAWG  De la part de Aitken, Paul
Envoyé : vendredi 20 janvier 2023 23:03
À : Joe Clarke (jclarke) ; ip...@ietf.org; 
opsawg 
Objet : Re: [OPSAWG] [IPFIX] FW: CALL FOR ADOPTION: An Update to the 
tcpControlBits IP Flow Information Export (IPFIX) Information Element

As a co-author of many of the IPFIX RFCs, expert reviewer for IANA, and author 
of IPFIX code, I disagree with the premise that the current tcpControlBits 
definition is problematic for interoperability because some values have since 
been deprecated.

Rather, the interoperability risk is in making non backwards compatible changes 
to the existing definition.

Since IANA has changed bit 7 from Nonce Sum to "Reserved for future use" rather 
than deprecating it, a time will come when it's allocated for a future purpose. 
This will guarantee non-interoperability since new IPFIX devices will export 
the bit with a different meaning than existing / old devices.

There may be many devices in the field which cannot be found or updated which 
will continue to export the existing tcpControlBits definition. It's impossible 
to guarantee that all such devices have been updated or removed. And all 
existing IPFIX code libraries must be updated.

If we want to put IPFIX's tcpControlBits under IANA's control with an IPFIX 
Information Element which follows IANA's TCP Header Flags specification, then a 
new Information Element should be allocated. However this seems dangerous since 
the same could happen again: an in-use bit could be marked as "Reserved" then 
re-allocated for a different purpose, and we'd have non-interoperable IPFIX 
devices.

TLDR: this document should not be adopted.

P.


On 19/01/2023 16:53, Joe Clarke (jclarke) wrote:
Forwarding to ipfix@ for more eyes on this.  Please reply to opsawg@ with any 
comments or questions.

Joe

From: OPSAWG  on 
behalf of Joe Clarke (jclarke) 

Date: Tuesday, January 17, 2023 at 11:24
To: opsawg@ietf.org 

Subject: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element
Happy new year, all.  One of the AIs that slipped through the cracks coming out 
of 115 was a call for adoption for draft-boucadair-opsawg-rfc7125-update.   One 
of the asks of Med at 115 was to look at what else might need to be done from 
an IE registry standpoint.  He replied on-list to that a while ago:

“Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

1.   draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.

2.   Edit a second draft to “clean” other entries in registry. This 
document is intended to include only simple fixes and which do not require 
updating existing RFCs. The candidate list of these proposed fixes can be seen 
at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html
 
[boucadair.github.io].
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC.”

So, let this serve as a two-week call for adoption for the existing 
draft-boucadair-opsawg-rfc7125-update document.  Please reply on-list with your 
comments, support, or dissent by January 31, 2023.

Thanks.

Joe



___

IPFIX mailing list

ip...@ietf.org


Re: [OPSAWG] draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. (slice) service provisioning

2023-01-20 Thread mohamed.boucadair
Hi all,

We updated the draft with many examples to illustrate the use of the model. A 
new subsection was added to illustrate how slices can be bound pre-provisioned 
AC. The service slice model can be greatly simplified by imply relying upon the 
AC model. At this stage, we are defining a new model that augments the slice 
service model, but a proposal to discuss is: remove all the AC details from the 
slice service model and simply move the ac-ref into the main slice model.

We also updated the model to cover bearers managements and refined some of 
existing containers.

More changes can be tracked using the following links:


URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-01.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-01.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-attachment-circuit

Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-boro-opsawg-teas-attachment-circuit-01

We are seeking for more use cases to exercise the model.

Cheers,
Med

De : BOUCADAIR Mohamed INNOV/NET
Envoyé : mardi 10 janvier 2023 11:36
À : TEAS WG 
Cc : opsawg@ietf.org; Richard Roberts ; Bo Wu 
; Oscar Gonzalez de Dios 
; Samier Barguil 
; JACQUENET Christian INNOV/NET 

Objet : draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. 
(slice) service provisioning

Hi all,

(ccing OPSAWG as the generic AC work may belong there)

draft-ietf-teas-ietf-network-slice-nbi-yang includes some very few details 
about ACs, but those details can be hardly useful to actually provision ACs. 
Assuming that ACs will be created by "some magic" is not helpful either.

An approach to address this issue, not only for the slice service case but for 
other services, is to separate the provisioning of the ACs (as a service) vs. 
advanced service provisioning. draft-boro-opsawg-teas-attachment-circuit 
proposes a new service module managing ACs: ac-svc (see below). A slice service 
request can simply include references to ACs that were requested using the 
ac-svc model. Given that multiple SAPs can be bound to the same AC, it is also 
envisaged that multiple peer-sap-ids can be indicated in a request.

This approach has also the merit to simplify the slice service model as it will 
focus exclusively on slice-specific matters. The core slice service module is 
likely to be stable, while the AC part may require augmentations in the future 
given that it is technology-specific.



URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-00.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-00.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-attachment-circuit





Abstract:

   This document specifies a YANG service data model for Attachment

   Circuits (ACs).  The model can be used for the provisioning of ACs

   prior or during service provisioning (e.g., Network Slice Service).



   The model is designed with the intent to be reusable.  Whether a

   service model reuses structures defined in the AC service model or

   simply include an AC reference is a design choice of these service

   models.  Relying upon the AC model to manage ACs over which a service

   is delivered has the merit to decorrelate the management of a service

   vs. upgrade the AC components to reflect recent AC technologies or

   features.



   Each AC is identified with a unique identifier within a domain.  The

   mapping between this AC and a PE that terminates the AC is hidden to

   the application/customer that makes use of the AC service model.

   Such an information is internal to the network controller.  Thus, the

   details about the (network node-specific) attachment interfaces are

   not exposed in this service model.
=

Comments, questions, and contributions are more than welcome.

Cheers,
Med (on behalf of the authors)


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without 

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-sap-15.txt

2023-01-20 Thread mohamed.boucadair
Hi all, 

This version implements the changes agreed with Roman and Zahed.  

-15 is ready to be sent to the RFC Editor. Thanks.

Cheers,
Med

> -Message d'origine-
> De : I-D-Announce  De la part de
> internet-dra...@ietf.org
> Envoyé : jeudi 19 janvier 2023 07:28
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : I-D Action: draft-ietf-opsawg-sap-15.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Operations and Management Area
> Working Group WG of the IETF.
> 
> Title   : A YANG Network Model for Service
> Attachment Points (SAPs)
> Authors : Mohamed Boucadair
>   Oscar Gonzalez de Dios
>   Samier Barguil
>   Qin Wu
>   Victor Lopez
>   Filename: draft-ietf-opsawg-sap-15.txt
>   Pages   : 43
>   Date: 2023-01-18
> 
> Abstract:
>This document defines a YANG data model for representing an
> abstract
>view of the provider network topology that contains the points
> from
>which its services can be attached (e.g., basic connectivity,
> VPN,
>network slices).  Also, the model can be used to retrieve the
> points
>where the services are actually being delivered to customers
>(including peer networks).
> 
>This document augments the 'ietf-network' data model by adding
> the
>concept of Service Attachment Points (SAPs).  The SAPs are the
>network reference points to which network services, such as
> Layer 3
>Virtual Private Network (L3VPN) or Layer 2 Virtual Private
> Network
>(L2VPN), can be attached.  One or multiple services can be
> bound to
>the same SAP.  Both User-Network Interface (UNI) and Network-
> to-
>Network Interface (NNI) are supported in the SAP data model.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-sap/
> 
> There is also an htmlized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-sap-15
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-sap-15
> 
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> I-D-Announce mailing list
> i-d-annou...@ietf.org
> https://www.ietf.org/mailman/listinfo/i-d-announce
> Internet-Draft directories: http://www.ietf.org/shadow.html or
> ftp://ftp.ietf.org/ietf/1shadow-sites.txt

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Zaheduzzaman Sarker's No Objection on draft-ietf-opsawg-sap-14: (with COMMENT)

2023-01-18 Thread mohamed.boucadair
Hi Zahed, 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Zaheduzzaman Sarker via Datatracker 
> Envoyé : mercredi 18 janvier 2023 22:03
> À : The IESG 
> Cc : draft-ietf-opsawg-...@ietf.org; opsawg-cha...@ietf.org;
> opsawg@ietf.org; adr...@olddog.co.uk; adr...@olddog.co.uk
> Objet : Zaheduzzaman Sarker's No Objection on draft-ietf-opsawg-
> sap-14: (with COMMENT)
> 
> Zaheduzzaman Sarker has entered the following ballot position for
> draft-ietf-opsawg-sap-14: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-sap/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> Thanks for working on this specification.
> 
> I must say, without the right context and knowledge about network
> topology in
> this context it is very hard to follow figure 3. A description of
> the figure or
> reference of the document one should read to understand the
> topology would be a
> great help.
> 

[Med] Added this NEW text right after Figure 1:

NEW:
 The reader may refer to Section 5 of [RFC4026] for an overview of the
 building blocks that are usually invoked when characterizing a
 network.



_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Roman Danyliw's No Objection on draft-ietf-opsawg-sap-14: (with COMMENT)

2023-01-18 Thread mohamed.boucadair
Hi Roman, 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Roman Danyliw via Datatracker 
> Envoyé : mardi 17 janvier 2023 22:08
> À : The IESG 
> Cc : draft-ietf-opsawg-...@ietf.org; opsawg-cha...@ietf.org;
> opsawg@ietf.org; adr...@olddog.co.uk; adr...@olddog.co.uk
> Objet : Roman Danyliw's No Objection on draft-ietf-opsawg-sap-14:
> (with COMMENT)
> 
> Roman Danyliw has entered the following ballot position for
> draft-ietf-opsawg-sap-14: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-sap/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> Thank you to Ivaylo Petrov for the SECDIR review
> 
> ** Section 1.
>e.g., to feed an intelligence that
> 
> Is the “intelligence” referenced here talking about some
> autonomous or
> automated process?
> 

[Med] Yes. An example is the decision-making process in Section 3.2 of 
[RFC8969]. Updated the text with a pointer to that RFC. 

> ** Section 8.
>   This subtree specifies the configurations of the nodes in a
> SAP
>   network model.  Unexpected changes to this subtree (e.g.,
>   associating a SAP with another parent termination point)
> could
>   lead to service disruption and/or network misbehavior.
> 
> Could “network misbehavior” be described less colloquially?  Is it
> “configuration of the network inconsistent with the intent of the
> operator and
> customer”?

[Med] Sure. Added this NEW:

  Such
  network misbehavior results mainly from a network configuration
  that is inconsistent with the intended behavior as defined by the 
operator (e.g.,
  Section 4.2.1 of [RFC8969]).


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element

2023-01-18 Thread mohamed.boucadair
Hi Joe, all,

I support this work, obviously.

FWIW, I don't have any IPR related to this I-D.

Cheers,
Med

De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : mardi 17 janvier 2023 17:25
À : opsawg@ietf.org
Objet : [OPSAWG] CALL FOR ADOPTION: An Update to the tcpControlBits IP Flow 
Information Export (IPFIX) Information Element

Happy new year, all.  One of the AIs that slipped through the cracks coming out 
of 115 was a call for adoption for draft-boucadair-opsawg-rfc7125-update.   One 
of the asks of Med at 115 was to look at what else might need to be done from 
an IE registry standpoint.  He replied on-list to that a while ago:

"Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

  *   draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.
  *   Edit a second draft to "clean" other entries in registry. This document 
is intended to include only simple fixes and which do not require updating 
existing RFCs. The candidate list of these proposed fixes can be seen at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC."

So, let this serve as a two-week call for adoption for the existing 
draft-boucadair-opsawg-rfc7125-update document.  Please reply on-list with your 
comments, support, or dissent by January 31, 2023.

Thanks.

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Yangdoctors telechat review of draft-ietf-opsawg-sap-13

2023-01-17 Thread mohamed.boucadair
Hi Martin,

Thanks for the review. 

Good catch. Fixed in -14.

Cheers,
Med

> -Message d'origine-
> De : Martin Björklund via Datatracker 
> Envoyé : mardi 17 janvier 2023 13:03
> À : yang-doct...@ietf.org
> Cc : draft-ietf-opsawg-sap@ietf.org; last-c...@ietf.org;
> opsawg@ietf.org
> Objet : Yangdoctors telechat review of draft-ietf-opsawg-sap-13
> 
> Reviewer: Martin Björklund
> Review result: Ready
> 
> Hi,
> 
> This is my second YANG doctors review of this draft.  The first
> review was for version -02, and all of my comments on that version
> are now resolved.
> 
> I only found one nit; the example URI values in this draft should
> use the "example" scheme, i.e., change "foo:an-id" to "example:an-
> id" etc.
> 
> /martin
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Rtgdir telechat review of draft-ietf-opsawg-sap-13

2023-01-17 Thread mohamed.boucadair
Hi Mach, 

Thanks for the review. 

Cheers,
Med

> -Message d'origine-
> De : Mach Chen via Datatracker 
> Envoyé : mardi 17 janvier 2023 09:29
> À : rtg-...@ietf.org
> Cc : draft-ietf-opsawg-sap@ietf.org; last-c...@ietf.org;
> opsawg@ietf.org
> Objet : Rtgdir telechat review of draft-ietf-opsawg-sap-13
> 
> Reviewer: Mach Chen
> Review result: Ready
> 
> Hello,
> 
> I have been selected as the Routing Directorate reviewer for this
> draft. The Routing Directorate seeks to review all routing or
> routing-related drafts as they pass through IETF last call and
> IESG review, and sometimes on special request. The purpose of the
> review is to provide assistance to the Routing ADs.
> For more information about the Routing Directorate, please see 
> http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir
> 
> Although these comments are primarily for the use of the Routing
> ADs, it would be helpful if you could consider them along with any
> other IETF Last Call comments that you receive, and strive to
> resolve them through discussion or by updating the draft.
> 
> Document: draft-ietf-opsawg-sap-13
> Reviewer: Mach Chen
> Review Date: 2023/1/17
> Intended Status: Standards Track
> 
> Summary:
> No issues found. This document is ready for publication.
> 
> Comments:
> This document is clearly written and easy to read.
> I have reviewed version 04 of this document, and my comments have
> been addressed.
> 
> Major Issues:
> No major issues found.
> 
> Minor Issues:
> No minor issues found.
> 
> Nits:
> No nits found.
> 
> Best regards,
> Mach
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Lars Eggert's No Objection on draft-ietf-opsawg-sap-13: (with COMMENT)

2023-01-13 Thread mohamed.boucadair
Hi Lars, 

Thanks for the review. 

Updated the draft to fix the nits 
https://github.com/IETF-OPSAWG-WG/lxnm/commit/f19848036917bf9821f0088eba26eed34d8e00c0.

Cheers,
Med

> -Message d'origine-
> De : Lars Eggert via Datatracker 
> Envoyé : vendredi 13 janvier 2023 13:29
> À : The IESG 
> Cc : draft-ietf-opsawg-...@ietf.org; opsawg-cha...@ietf.org;
> opsawg@ietf.org; adr...@olddog.co.uk; adr...@olddog.co.uk
> Objet : Lars Eggert's No Objection on draft-ietf-opsawg-sap-13:
> (with COMMENT)
> 
> Lars Eggert has entered the following ballot position for
> draft-ietf-opsawg-sap-13: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-sap/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> # GEN AD review of draft-ietf-opsawg-sap-13
> 
> CC @larseggert
> 
> Thanks to Linda Dunbar for the General Area Review Team (Gen-ART)
> review
> (https://mailarchive.ietf.org/arch/msg/gen-
> art/ItsyANCW6Oj_lsbpj7gAxWiyOfU).
> 
> ## Comments
> 
> ### Inclusive language
> 
> Found terminology that should be reviewed for inclusivity; see
> https://www.rfc-editor.org/part2/#inclusive_language for
> background and more
> guidance:
> 
>  * Term `traditional`; alternatives might be `classic`,
> `classical`, `common`,
>`conventional`, `customary`, `fixed`, `habitual`, `historic`,
>`long-established`, `popular`, `prescribed`, `regular`,
> `rooted`,
>`time-honored`, `universal`, `widely used`, `widespread`
> 
> ## Nits
> 
> All comments below are about very minor potential issues that you
> may choose to
> address in some way - or ignore - as you see fit. Some were
> flagged by
> automated tools (via https://github.com/larseggert/ietf-
> reviewtool), so there
> will likely be some false positives. There is no need to let me
> know what you
> did with these suggestions.
> 
> ### Outdated references
> 
> Document references `draft-ietf-teas-ietf-network-slices-17`, but
> `-18` is the
> latest available revision.
> 
> ### Grammar/style
> 
>  "Table of Contents", paragraph 1
> ```
> iew can be used, e.g., to feed an intelligence that is responsible
> for servic
>^^^
> ```
> Uncountable nouns are usually not used with an indefinite article.
> Use simply
> "intelligence".
> 
>  Section 2, paragraph 1
> ```
> RFC4026]). Customer Edge (CE): An equipment that is dedicated to a
> particular
>
> ```
> Uncountable nouns are usually not used with an indefinite article.
> Use simply
> "equipment".
> 
>  Section 2, paragraph 3
> ```
> itch, etc. Provider Edge (PE): An equipment owned and managed by
> the service
>
> ```
> Uncountable nouns are usually not used with an indefinite article.
> Use simply
> "equipment".
> 
>  Section 5, paragraph 22
> ```
> and its parent interface are present but the parent interface is
> disabled, t
> 
> ```
> Use a comma before "but" if it connects two independent clauses
> (unless they
> are closely connected and short).
> 
>  Section 10.2, paragraph 29
> ```
> oses, this section focuses on the so called "Option A" but similar
> examples c
>   ^
> ```
> The expression "so-called" is usually spelled with a hyphen.
> 
> ## Notes
> 
> This review is in the ["IETF Comments" Markdown format][ICMF], You
> can use the
> [`ietf-comments` tool][ICT] to automatically convert this review
> into
> individual GitHub issues. Review generated by the [`ietf-
> reviewtool`][IRT].
> 
> [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
> [ICT]: https://github.com/mnot/ietf-comments
> [IRT]: https://github.com/larseggert/ietf-reviewtool
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information 

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-08.txt

2023-01-11 Thread mohamed.boucadair
Hi all, 

This version takes into account the AD and dnsdir reviews. 

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : mercredi 11 janvier 2023 14:37
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-
> 08.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Operations and Management Area
> Working Group WG of the IETF.
> 
> Title   : RADIUS Extensions for DHCP Configured
> Services
> Authors : Mohamed Boucadair
>   Tirumaleswar Reddy
>   Alan DeKok
>   Filename: draft-ietf-opsawg-add-encrypted-dns-08.txt
>   Pages   : 19
>   Date: 2023-01-11
> 
> Abstract:
>This document specifies two new Remote Authentication Dial-In
> User
>Service (RADIUS) attributes that carry DHCP options.  Even if
> the
>specification was initially motivated by the configuration of
>encrypted DNS resolvers, the specification is generic and can
> be
>applicable to any service that relies upon DHCP.  Both DHCPv4
> and
>DHCPv6 configured services are covered.
> 
>Also, this document updates RFC 4014 by relaxing a constraint
> on
>permitted RADIUS Attributes in the RADIUS Attributes DHCP
> suboption.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-
> dns/
> 
> There is also an htmlized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-add-
> encrypted-dns-08
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-add-
> encrypted-dns-08
> 
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Dnsdir last call review of draft-ietf-opsawg-add-encrypted-dns-07

2023-01-11 Thread mohamed.boucadair
Hi Ralf, 

Thank you for the review. 

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Ralf Weber via Datatracker 
> Envoyé : mercredi 11 janvier 2023 13:14
> À : dns...@ietf.org
> Cc : draft-ietf-opsawg-add-encrypted-dns@ietf.org; last-
> c...@ietf.org; opsawg@ietf.org
> Objet : Dnsdir last call review of draft-ietf-opsawg-add-
> encrypted-dns-07
> 
> Reviewer: Ralf Weber
> Review result: Ready with Nits
> 
> Moin!
> 
> I'm the assigned reviewer of the DNS Directorate for this draft.
> Given that the add working group defines drafts for getting
> encrypted DNS resolver settings to clients I was initially
> surprised to see this draft coming from ops area to the DNS
> directorate for review.
> 
> However looking into while reviewing it is this has become clear
> as the attributes defined by add DNR draft are just one user of
> the specification of this draft. The draft uses and existing
> specifications on interactions between DHCP and Radius and adds
> DNR as one use case. As such while the draft was started with,
> explains this use case and does so fine there is not much for the
> DNS directorate to review.
> 

[Med] FWIW, the WGLC was also shared with ADD, RADEXT, and DHC. This is a 
cross-area effort :-) 

> I see this draft as ready with the following nits:
> - The table of attributes under 7 Table of attributes only have
> two values which both start with 0. As the main distinction is
> that attributes MUST NOT appear when 0 is there and MAY appeare
> when 0+ is defined making this boolean with e.g Y/N seems easier
> to understand IMHO.

[Med] This is a well-established RADIUS nomenclature. We prefer to maintain it. 
Thanks.


 - In 8.1 New Radius Attributes the table is
> called "Table 1: Encrypted DNS RADIUS Attributes", while the table
> describer generic DHCP Options attributes. The table name should
> reflect that.
> 

[Med] Good catch. Fixed.  

> So long
> -Ralf
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] draft-ietf-teas-ietf-network-slice-nbi-yang: AC provisioning vs. (slice) service provisioning

2023-01-10 Thread mohamed.boucadair
Hi all,

(ccing OPSAWG as the generic AC work may belong there)

draft-ietf-teas-ietf-network-slice-nbi-yang includes some very few details 
about ACs, but those details can be hardly useful to actually provision ACs. 
Assuming that ACs will be created by "some magic" is not helpful either.

An approach to address this issue, not only for the slice service case but for 
other services, is to separate the provisioning of the ACs (as a service) vs. 
advanced service provisioning. draft-boro-opsawg-teas-attachment-circuit 
proposes a new service module managing ACs: ac-svc (see below). A slice service 
request can simply include references to ACs that were requested using the 
ac-svc model. Given that multiple SAPs can be bound to the same AC, it is also 
envisaged that multiple peer-sap-ids can be indicated in a request.

This approach has also the merit to simplify the slice service model as it will 
focus exclusively on slice-specific matters. The core slice service module is 
likely to be stable, while the AC part may require augmentations in the future 
given that it is technology-specific.



URL:
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-00.txt

Status: 
https://datatracker.ietf.org/doc/draft-boro-opsawg-teas-attachment-circuit/

Html:   
https://www.ietf.org/archive/id/draft-boro-opsawg-teas-attachment-circuit-00.html

Htmlized:   
https://datatracker.ietf.org/doc/html/draft-boro-opsawg-teas-attachment-circuit





Abstract:

   This document specifies a YANG service data model for Attachment

   Circuits (ACs).  The model can be used for the provisioning of ACs

   prior or during service provisioning (e.g., Network Slice Service).



   The model is designed with the intent to be reusable.  Whether a

   service model reuses structures defined in the AC service model or

   simply include an AC reference is a design choice of these service

   models.  Relying upon the AC model to manage ACs over which a service

   is delivered has the merit to decorrelate the management of a service

   vs. upgrade the AC components to reflect recent AC technologies or

   features.



   Each AC is identified with a unique identifier within a domain.  The

   mapping between this AC and a PE that terminates the AC is hidden to

   the application/customer that makes use of the AC service model.

   Such an information is internal to the network controller.  Thus, the

   details about the (network node-specific) attachment interfaces are

   not exposed in this service model.
=

Comments, questions, and contributions are more than welcome.

Cheers,
Med (on behalf of the authors)


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Secdir last call review of draft-ietf-opsawg-sap-13

2023-01-09 Thread mohamed.boucadair
Hi Ivaylo, 

Thank you for the review. This will be ACKed in the next iteration: 
https://tinyurl.com/sap-latest.

Please see inline. 

Cheers,
Med

> -Message d'origine-
> De : Ivaylo Petrov 
> Envoyé : lundi 9 janvier 2023 22:47
> À : draft-ietf-opsawg-sap@ietf.org; sec...@ietf.org; The IESG
> 
> Objet : Secdir last call review of draft-ietf-opsawg-sap-13
> 
> Reviewer: Ivaylo Petrov
> Review result: Has Nits
> 
> Hi,
> 
> I have reviewed this document as part of the security
> directorate's ongoing effort to review all IETF documents being
> processed by the IESG. These comments were written primarily for
> the benefit of the security area directors.  Document editors and
> WG chairs should treat these comments just like any other last
> call comments.
> 
> For me the Security considerations section contains enough
> information, but what seems to be the recommendations can be made
> more explicit. The sentences
> 

[Med] FWIW, these sentences are part of the recommendations in 
rfc8407#section-3.7:

   This section MUST be patterned after the latest approved template
   (available at ).

We are not planning to change that wording for this specific draft.


> > Write operations (e.g., edit-config) to these data nodes without
> proper protection can have a negative effect on network
> operations.
> 
> and
> 
> >  It is thus important to control read access (e.g., via get,
> get-config, or notification) to these data nodes.
> 
> don't mention how those goals can be achieved. At the same time
> the paragraph
> 

[Med] This is mentioned in the 1st and the paragraph you quoted below.

> > The Network Configuration Access Control Model (NACM) [RFC8341]
> provides the means to restrict access for particular NETCONF or
> RESTCONF users to a preconfigured subset of all available NETCONF
> or RESTCONF protocol operations and content.
> 
> is not directly connected to the other ones in the section. My
> understanding is that the authors considered the usage of NACM a
> good solution for those two, but if so please make that more
> explicit.
> 
> Best regards,
> Ivaylo

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Genart last call review of draft-ietf-opsawg-sap-12

2023-01-09 Thread mohamed.boucadair
Hi Linda,


Sure. Please see 
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-sap-13.



Thanks.


Cheers,
Med

De : Linda Dunbar 
Envoyé : mercredi 4 janvier 2023 17:47
À : BOUCADAIR Mohamed INNOV/NET ; gen-...@ietf.org
Cc : draft-ietf-opsawg-sap@ietf.org; last-c...@ietf.org; opsawg@ietf.org
Objet : Re: Genart last call review of draft-ietf-opsawg-sap-12

Med,

Thank you very much for the explanation.
It would be nice to add the explanation to the draft.

Linda

From: mohamed.boucad...@orange.com 
mailto:mohamed.boucad...@orange.com>>
Date: Wednesday, January 4, 2023 at 8:06 AM
To: Linda Dunbar 
mailto:linda.dun...@futurewei.com>>, 
gen-...@ietf.org 
mailto:gen-...@ietf.org>>
Cc: 
draft-ietf-opsawg-sap@ietf.org 
mailto:draft-ietf-opsawg-sap@ietf.org>>,
 last-c...@ietf.org 
mailto:last-c...@ietf.org>>, 
opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: RE: Genart last call review of draft-ietf-opsawg-sap-12
Hi Linda,

Thank you for the review.

SAPs can be seen as an abstraction of customer-facing Termination Points (TPs) 
with specific service provisions. However, a difference between SAPs and TPs is 
that (1) links are terminated by a single TP, not sets of TPs while (2) an 
Attachment Circuit can be terminated by multiple SAPs. Will add a mention about 
this to draft.

The association between a SAP and a TP is ensured by the following data node:

==
   'parent-termination-point':  Includes a reference to the parent
  termination point to which the SAP is bound.  As per Section 4.2
  of [RFC8345], a termination point terminates a link in a node.  A
  termination point can be a physical port, an interface, etc.

  This attribute is used, e.g., to associate an interface with its
  sub-interfaces as all these interfaces may be listed under the
  SAPs of a node.  It is also used to link a SAP with the physical
  topology.
==

Cheers,
Med

> -Message d'origine-
> De : Linda Dunbar via Datatracker mailto:nore...@ietf.org>>
> Envoyé : mardi 3 janvier 2023 21:11
> À : gen-...@ietf.org
> Cc : 
> draft-ietf-opsawg-sap@ietf.org;
>  last-c...@ietf.org;
> opsawg@ietf.org
> Objet : Genart last call review of draft-ietf-opsawg-sap-12
>
> Reviewer: Linda Dunbar
> Review result: Ready
>
> I am the assigned Gen-ART reviewer for this draft. The General
> Area Review Team (Gen-ART) reviews all IETF documents being
> processed by the IESG for the IETF Chair.  Please treat these
> comments just like any other last call comments.
>
> For more information, please see the FAQ at
>
> .
>
> Document: draft-ietf-opsawg-sap-12
> Reviewer: Linda Dunbar
> Review Date: 2023-01-03
> IETF LC End Date: 2023-01-09
> IESG Telechat date: Not scheduled for a telechat
>
> Summary: The document specifies the YANG data model for the
> Network Service Attachment Points.
>
> Major issues: None
>
> Minor issues: None
>
> Nits/editorial comments:
>
> It seems to me that the Network Service Attachment Points are very
> similar to Network Termination Points. What are the major
> differences?
>
> Thank you
> Linda Dunbar
>


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou 

[OPSAWG] Shepherd Write-up for draft-ietf-opsawg-ipfix-srv6-srh

2023-01-05 Thread mohamed.boucadair
Hi all,

FWIW, the shepherd writeup for draft-ietf-opsawg-ipfix-srv6-srh is now 
available: 
https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-srv6-srh/shepherdwriteup/

Unless there are comments about the writeup, I think that the document can be 
sent to the IESG for publication.

Cheers,
Med

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-05.txt

2023-01-05 Thread mohamed.boucadair
Hi Benoît,

You got it. We are not defining a new ordering behavior, but simply adhering to 
what the IPFIX spec says on this matter.

I would mix your proposed wording with what Thomas already implemented in 
https://raw.githubusercontent.com/graf3net/draft-ietf-opsawg-ipfix-srv6-srh/main/draft-ietf-opsawg-ipfix-srv6-srh-06.txt:

NEW:
   If multiple SRHs are observed (for reasons that are not detailed
   here), the export of the same IE multiple times in one data record
   and related template record is supported. In such a case,
   the following IPFIX behavior in Section 8 of [RFC7011] applies:
   "If an Information Element is required more than once in a Template,
   the different occurrences of this Information Element SHOULD follow
   the logical order of their treatments by the Metering Process".
   If the network node is not capable to export IPFIX for
   more than one SRH, it MUST export IPFIX for the SRH of the active
   segment.

Thank you.

Cheers,
Med

De : Benoit Claise 
Envoyé : mercredi 4 janvier 2023 18:43
À : BOUCADAIR Mohamed INNOV/NET ; 
thomas.g...@swisscom.com; opsawg@ietf.org
Cc : pierre.franc...@insa-lyon.fr
Objet : Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-05.txt

Hi Med,

Thanks for your continuous effort to improve this draft.

Help me understand your point of view regarding your comment:

Thanks for preparing this revised version. The changes look good.

However, and as discussed previously, I was expecting to see s/packet

SHOULD be preserved in the IPFIX export according/packet should be

preserved in the IPFIX export according.
Actually, we have this specific sentence in 
https://www.rfc-editor.org/rfc/rfc7011#section-8

If an Information Element is required more than once in a Template,

the different occurrences of this Information Element SHOULD follow

the logical order of their treatments by the Metering Process.
This sentence applies to the case of multiple SRHs in a Flow Record and this 
specification MUST be followed in such a case.
This was actually our intent with this paragraph in the draft version 5, that 
is drawing attention to that specific sentence:

6.3.  Multiple Segment Routing Headers



   [RFC8200] describes the support of multiple extension headers such as

   the SRH in one IPv6 packet.  The export of the same IE multiple times

   in one data record and related template is supported and the order

   within the packet SHOULD be preserved in the IPFIX export according

   to Section 8 of [RFC7011].  If the network node is not capable to

   export IPFIX for more than one SRH, it MUST export IPFIX for the

   active SRH

Do we agree so far on the intent of this paragraph?
I believe so when I re-read your initial comment:

I suggest to simplify the wording of 6.3 to basically say: if

multiple SRHs are observed (for reasons that are not detailed

here), exporting multiple IEs is allowed + follow the base reco in

7011 for the ordering. No normative language is needed for this

behavior.
Reco?

Granted, we most likely did not express ourselves correctly in section 6.3.
For ex, we used a SHOULD to be aligned with the sentence in RFC7011.
Is this this issue at stake here: this might be perceived as we are writing a 
new IPFIX spec?

If we agree till this point, what about this?

6.3.  Multiple Segment Routing Headers



   [RFC8200] describes the support of multiple extension headers such as

   the SRH in one IPv6 packet.  The export of the same IE multiple times

   in one flow record and related template record is supported. In such case

   the following IPFIX specification in Section 8 of [RFC7011] applies:

   "If an Information Element is required more than once in a Template,

   the different occurrences of this Information Element SHOULD follow

   the logical order of their treatments by the Metering Process."

   If the network node is not capable to export IPFIX for more than

   one SRH, it MUST export IPFIX for the active SRH
Please let us know.

Regards, Benoit

On 1/4/2023 5:05 PM, 
mohamed.boucad...@orange.com wrote:

Hi Thomas,



Thanks for preparing this revised version. The changes look good.

However, and as discussed previously, I was expecting to see s/packet

SHOULD be preserved in the IPFIX export according/packet should be

preserved in the IPFIX export according.



Some minor nits:

* Please note that there are still some occurrences in the draft about

many subregistries, while only ** one ** is created, e.g.,



   This document specifies eleven new IPFIX Information Elements (IEs)

   and three new subregistries within the "IPFIX Information Elements"

   registry [RFC7012], for SRv6 purposes.



or



   This document requests IANA to create new IEs (see table 1) and

three

   new subregistries called "IPFIX IPv6 SRH Flags" (table 2), "IPFIX

   IPv6 SRH Segment Type" (table 3), and "IPFIX SRv6 Endpoint

Behavior"

   (table 4) under the "IPFIX Information Elements" 

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-05.txt

2023-01-04 Thread mohamed.boucadair
Hi Thomas, 

Thanks for preparing this revised version. The changes look good.
However, and as discussed previously, I was expecting to see s/packet
SHOULD be preserved in the IPFIX export according/packet should be
preserved in the IPFIX export according.

Some minor nits:
* Please note that there are still some occurrences in the draft about
many subregistries, while only ** one ** is created, e.g.,  

   This document specifies eleven new IPFIX Information Elements (IEs)
   and three new subregistries within the "IPFIX Information Elements"
   registry [RFC7012], for SRv6 purposes.
 
or 

   This document requests IANA to create new IEs (see table 1) and
three
   new subregistries called "IPFIX IPv6 SRH Flags" (table 2), "IPFIX
   IPv6 SRH Segment Type" (table 3), and "IPFIX SRv6 Endpoint
Behavior"
   (table 4) under the "IPFIX Information Elements" registry [RFC7012]
   available at [IANA-IPFIX].

* Please fix the numbering of your tables. 
* s/RFC8986 Section 3.1/Section 3.1 of RFC8986 
* s/RFC8986 Section 4/ Section 4 of RFC8986 
* s/The SID Locator as described in section 3.1 [RFC8986]/ The SID
Locator as described in Section 3.1 of [RFC8986]
* This is not a new requirement:

OLD:
 (*) The Length MUST be calculated to include the optional Type Length
   Value objects.

NEW:
(*) The Length must be calculated to include the optional Type Length
   Value objects.

(There are two occurrences in the draft to be fixed). 

* "for the values presented in Table 12": couldn't find that table.

Cheers,
Med

> -Message d'origine-
> De : thomas.g...@swisscom.com 
> Envoyé : samedi 17 décembre 2022 08:16
> À : BOUCADAIR Mohamed INNOV/NET ;
> opsawg@ietf.org
> Cc : pierre.franc...@insa-lyon.fr; benoit.cla...@huawei.com
> Objet : RE: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-
> 05.txt
> 
> Dear Med,
> 
> Many thanks for the review and my apology that we missed your
> input on section 5.9
> 
> I updated the document on section 5.9 and 6.3 as per input. Please
> review and comment before we submit.
> 
> https://author-
> tools.ietf.org/iddiff?url1=https://www.ietf.org/archive/id/draft-
> ietf-opsawg-ipfix-srv6-srh-
> 05.txt=https://raw.githubusercontent.com/graf3net/draft-ietf-
> opsawg-ipfix-srv6-srh/main/draft-ietf-opsawg-ipfix-srv6-srh-06.txt
> 
> We agree that RFC 8200 doesn't explicitly describe the use of
> multiple SRH and therefore the wording in section 6.3 is
> misleading as you pointed out. Therefore we removed the RFC 8200
> reference and used your wording proposal.
> 
> In section 6.3 we want to ensure that there is no ambiguity how
> IPFIX needs to be implemented in case more than one SRH is
> present. Section 8 of RFC 7011 describes only the case when both
> SRH can be exported. Since section 6 is devoted to operational
> considerations, the authors believe it make sense to spend a
> paragraph in describing both cases, when both SRH can be export
> versus when only the SRH of the active segment can be exported in
> IPFIX to have a complete description. Does that make sense?
> 
> Best wishes
> Thomas
> 
> -Original Message-
> From: mohamed.boucad...@orange.com 
> Sent: Friday, December 16, 2022 9:24 AM
> To: opsawg@ietf.org; Graf Thomas, INI-NET-TCZ-ZH1
> 
> Subject: RE: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-
> srh-05.txt
> 
> Hi Thomas, all,
> 
> Thanks for preparing this version. However, I think that not all
> the issues were fixed:
> 
> * Section "5.9.  srhActiveSegmentIPv6Type": please add the pointer
> to the IANA registry under "Additional Information". Please see
> the proposal from Benoît at:
> https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2F
> mailarchive.ietf.org%2Farch%2Fmsg%2Fopsawg%2FZZ5anFVYpabnmm12sfkmG
> B6nHYI%2F=05%7C01%7CThomas.Graf%40swisscom.com%7Cf3bfd5fa3dea
> 48ca6a0d08dadf3ef5aa%7C364e5b87c1c7420d9beec35d19b557a1%7C0%7C0%7C
> 638067758737320741%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ
> QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C=
> 1X%2BI2yBo6C5NApGb053NIyCj2LYIdWlZWaxjbj0kr5A%3D=0
> 
> * The text about multiple SRH is somehow "misleading" as it can be
> interpreted  as 8200 discusses explicitly multiple SRHs case.
> Also, and unless I' mistaken, there is no spring document that
> motivates the need for multiple SRHs or how these can be used. I
> suggest to simplify the wording of 6.3 to basically say: if
> multiple SRHs are observed (for reasons that are not detailed
> here), exporting multiple IEs is allowed + follow the base reco in
> 7011 for the ordering. No normative language is needed for this
> behavior.
> 
> * Please define what is meant by "active SRH".
> 
> Thank you.
> 
> Cheers,
> Med
> 
> > -Message d'origine-
> > De : OPSAWG  De la part de internet-
> > dra...@ietf.org Envoyé : vendredi 16 décembre 2022 08:50 À :
> > i-d-annou...@ietf.org Cc : opsawg@ietf.org Objet : [OPSAWG] I-D
> > Action: draft-ietf-opsawg-ipfix-srv6-srh- 05.txt
> >
> >
> > A New Internet-Draft is 

Re: [OPSAWG] Genart last call review of draft-ietf-opsawg-sap-12

2023-01-04 Thread mohamed.boucadair
Hi Linda, 

Thank you for the review. 

SAPs can be seen as an abstraction of customer-facing Termination Points (TPs) 
with specific service provisions. However, a difference between SAPs and TPs is 
that (1) links are terminated by a single TP, not sets of TPs while (2) an 
Attachment Circuit can be terminated by multiple SAPs. Will add a mention about 
this to draft.  

The association between a SAP and a TP is ensured by the following data node:  

==
   'parent-termination-point':  Includes a reference to the parent
  termination point to which the SAP is bound.  As per Section 4.2
  of [RFC8345], a termination point terminates a link in a node.  A
  termination point can be a physical port, an interface, etc.

  This attribute is used, e.g., to associate an interface with its
  sub-interfaces as all these interfaces may be listed under the
  SAPs of a node.  It is also used to link a SAP with the physical
  topology.
==

Cheers,
Med

> -Message d'origine-
> De : Linda Dunbar via Datatracker 
> Envoyé : mardi 3 janvier 2023 21:11
> À : gen-...@ietf.org
> Cc : draft-ietf-opsawg-sap@ietf.org; last-c...@ietf.org;
> opsawg@ietf.org
> Objet : Genart last call review of draft-ietf-opsawg-sap-12
> 
> Reviewer: Linda Dunbar
> Review result: Ready
> 
> I am the assigned Gen-ART reviewer for this draft. The General
> Area Review Team (Gen-ART) reviews all IETF documents being
> processed by the IESG for the IETF Chair.  Please treat these
> comments just like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> .
> 
> Document: draft-ietf-opsawg-sap-12
> Reviewer: Linda Dunbar
> Review Date: 2023-01-03
> IETF LC End Date: 2023-01-09
> IESG Telechat date: Not scheduled for a telechat
> 
> Summary: The document specifies the YANG data model for the
> Network Service Attachment Points.
> 
> Major issues: None
> 
> Minor issues: None
> 
> Nits/editorial comments:
> 
> It seems to me that the Network Service Attachment Points are very
> similar to Network Termination Points. What are the major
> differences?
> 
> Thank you
> Linda Dunbar
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

2023-01-03 Thread mohamed.boucadair
Hi Rob, 

Thanks for the review. 

Candidate changes to address this review can be tracked at: 
https://tinyurl.com/opsawg-add-latest

Please find inline some inputs in addition to the replies from Alan. 

Cheers,
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : lundi 19 décembre 2022 17:53
> À : draft-ietf-opsawg-add-encrypted-dns@ietf.org
> Cc : opsawg@ietf.org
> Objet : AD review of draft-ietf-opsawg-add-encrypted-dns-07
> 
> Hi,
> 
> Thanks for this document.  Here are my AD review comments for
> draft-ietf-opsawg-add-encrypted-dns-07
> 
> Moderate level comments:
> 
> (1) p 2, sec 1.  Introduction
> 
>This document specifies two new RADIUS attributes: DHCPv6-
> Options
>(Section 3.1) and DHCPv4-Options (Section 3.2) Attributes.
> These
>attributes can include DHCP options that are listed under the
> IANA
>registries that are created in Sections 8.4.1 and 8.4.1.  These
> two
>attributes are specified in order to accommodate both IPv4 and
> IPv6
>deployment contexts while taking into account the constraints
> in
>Section 3.4 of [RFC6158].
> 
> It isn't really clear to me why some of the registries are needed,
> specifically the ones in 8.4.1 and 8.4.2.  Why not allow any v4 or
> v6 DHCP attribute to be carried within the DHCPv6-Options or
> DHCPv4-Options field?
> 

[Med] We considered that design but we went with the current approach to 
address a concern from DHC WG (see 
https://mailarchive.ietf.org/arch/msg/opsawg/7GzmUQbpqett2V0GSlhPY6AL6t0/ and 
follow-ups). Some options do not make sense to encapsulate them. 

> 
> (2) p 4, sec 3.  DHCP Options RADIUS Attributes
> 
>Absent any explicit configuration on the DHCP server, RADIUS
> supplied
>data by means of DHCP*-Options Attributes take precedence over
> any
>local configuration.
> 
> This point may be worth discussing.  Naturally, I would explicit
> configuration to a network device to generally take precedent over
> implicitly learned configuration from the network.
> 

[Med] Alan addressed this one. 

> 
> (3) p 6, sec 3.2.  DHCPv4-Options Attribute
> 
>   Permitted DHCPv4 options in the DHCPv4-Options Attribute are
>   maintained by IANA in the registry created in Section 8.4.2.
> 
> Comparing this text to the description for v6, this description is
> silent on whether multiple instances of the same DHCPv4 option MAY
> be included.  Should that be specified here?
> 

[Med] There are some DHCPv4 specifics. Added this NEW text to explicit the 
behavior: 

  Multiple instances
  of the same DHCPv4 option MAY be included, especially for
  concatenation-requiring options that exceed the maximum DHCPv4
  option size of 255 octets.  The mechanism specified in [RFC3396]
  MUST be used for splitting and concatenating the instances of a
  concatenation-requiring option.

> 
> (4) p 10, sec 7.  Table of Attributes
> 
>The following table provides a guide as what type of RADIUS
> packets
>that may contain these attributes, and in what quantity.
> 
> Am I right that this is just a duplication of what is described in
> section 3?  If so, perhaps change "guide" to "informative guide"
> and include text to refer back to the  canonical definition in
> section 3.
> 

[Med] Alan clarified this point.  

> 
> (5) p 13, sec 8.4.3.  Guidelines for the Designated Experts
> 
>Registration requests that are undetermined for a period longer
> than
>28 days can be brought to the IESG's attention for resolution.
> 
> I'm wondering whether we need the process related text in this
> document at all, or whether we let IANA apply their standard
> policies?  I may be misinformed, but I'm not aware of many *-
> review mailing lists.
> 

[Med] The latest I'm aware of is 
draft-ietf-drip-rid-37.html#name-new-iana-drip-registry.

> 
> (6) p 15, sec 10.2.  Informative References
> 
>[I-D.ietf-add-dnr]
>   Boucadair, M., Reddy, T., Wing, D., Cook, N., and T.
>   Jensen, "DHCP and Router Advertisement Options for
> the
>   Discovery of Network-designated Resolvers (DNR)",
> Work in
>   Progress, Internet-Draft, draft-ietf-add-dnr-13, 13
> August
>   2022,  add-dnr-
>   13.txt>.
> 
> Should this be a normative reference?  E.g., if feels like the
> IANA registry values are bound to whatever is published in ietf-
> add-dnr.
> 
> 

[Med] 144/162 are permanent IANA assignments. Please note that the IANA section 
says the following:

   The initial content of this sub-registry is listed in Table 5.  The
   reference may include the document that registers the option or the
 ^^ 
   document that specifies the option. 

IANA registries are authoritative here as well. 

> 
> Minor level comments:
> 
> (7) p 2, sec 1.  Introduction
> 
>With the advent of encrypted DNS (e.g., DNS-over-HTTPS (DoH)
>[RFC8484], 

Re: [OPSAWG] AD review of draft-ietf-opsawg-sap-09

2023-01-03 Thread mohamed.boucadair
Hi Tom, all,

We already have the following in the Introduction: 

   A network may support multiple services, potentially of different
   types.  Whether a SAP topology is dedicated to services of a specific
   service type, an individual service, or shared among many services of
   different types is deployment specific.  This document supports all
   of these deployment schemes.

Added this NEW text to the Abstract: 

 One or multiple services can be bound to the same SAP.

Thanks.

Cheers,
Med

> -Message d'origine-
> De : tom petch 
> Envoyé : lundi 19 décembre 2022 17:29
> À : Rob Wilton (rwilton) ; BOUCADAIR Mohamed
> INNOV/NET 
> Cc : draft-ietf-opsawg-sap@ietf.org; opsawg@ietf.org
> Objet : Re: AD review of draft-ietf-opsawg-sap-09
> 
> From: Rob Wilton (rwilton) 
> Sent: 19 December 2022 14:19
> 
> Hi Tom,
> 
> My understanding is that service is the top list (i.e.,
> node/service) and the saps are in the per service child list:
> 
> augment /nw:networks/nw:network/nw:node:
>   +--rw service* [service-type]
>  +--rw service-type   identityref
>  +--rw sap* [sap-id]
> 
> The text is section 5 states:
> 
>'sap-id':  Includes an identifier that uniquely identifies a
> SAP
>   within a node.
> 
>   The same SAP may appear under distinct service types.  In
> such a
>   case, the same identifier is used for these service types in
>   association.
> 
> So, I think that the answer is yes, the same SAP can support
> multiple services, but they are keyed by service then sap, rather
> than the other way round, and some presumably common SAP
> properties will appear duplicated per service.  For SAP properties
> that must be common across all services on the same SAP then I
> think that the authors and WG considered have a separate per node
> SAP list but presumably decided that aligning this under the
> service made the model easier to use, particularly in the case
> where there is only a single service per SAP.
> 
> 
> Ah yes,I can see it now on page 10.  I did not understand that
> from Abstract or Introduction.
> 
> Tom Petch
> 
> Regards,
> Rob
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] AD review of draft-ietf-opsawg-sap-09

2022-12-16 Thread mohamed.boucadair
Hi Rob, 

The proposed edits look good to me. These are now implemented in the public 
-12. Thanks.

cheers, 
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : vendredi 16 décembre 2022 12:11
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : draft-ietf-opsawg-sap@ietf.org; opsawg@ietf.org
> Objet : RE: AD review of draft-ietf-opsawg-sap-09
> 
> Hi Med,
> 
> Thanks for persevering, I think that we are pretty much there.
> 
> I've have proposed some minor tweaks the description and YANG leaf
> descriptions that I think may improve clarity, but I'll leave it
> to you to decide whether it would be helpful to incorporate these.
> Please either merge/some all of these and post an updated version
> or indicate whether you would like to stick with -11, and then I
> can kick off the IETF LC.
> 
> OLD:
>'service-status':  Indicates the administrative and operational
>   status of the service for a given SAP.  This information is
>   particularly useful when many services are enabled for the
> same
>   SAP, but only a subset of these services are activated.  As
> such,
>   the administrative 'service-status' MUST NOT be influenced
> by the
>   value of the 'sap-status'.
> 
>   The service 'oper-status' reflects the service operational
> status
>   as observed for a specific SAP, not the status that is
> determined
>   at the network level for a service that involves many SAPs.
> That
>   network level status can be retrieved using specific network
>   models, e.g., Section 7.3 of [RFC9182] or Section 7.3 of
>   [RFC9291].
> 
>   In order to assess the service delivery status for a given
> SAP, it
>   is recommended to check both the administrative and
> operational
>   service status ('service-status') in addition to the 'sap-
> status'.
>   In doing so, a network controller (or an operator) can
> detect
>   anomalies.  For example, if a service is administratively
> enabled
>   for a SAP and the 'sap-status' of that SAP is reported as
> being
>   down, the service 'oper-status' is also expected to be down.
>   Retrieving a distinct service operational status under these
>   conditions can be used as a trigger to detect an anomaly.
>   Likewise, administrative status and operational status can
> be used
>   as a trigger to detect service-specific SAP activation
> anomalies.
>   For example, a service that is administratively declared as
>   inactive for a SAP but reported as operationally active for
> that
>   SAP is an indication that some service provision actions are
>   needed to align the observed service status with the
> expected
>   service status.
> 
> NEW:
>   'service-status':  Indicates the administrative and
> operational
>   status of the service for a given SAP.  This information is
>   particularly useful when many services are provisioned for
> the same
>   SAP, but only a subset of these services are activated.  As
> such,
>   the administrative 'service-status' MUST NOT be influenced
> by the
>   value of the operational 'sap-status'.
> 
>   The service 'oper-status' reflects the operational status of
> the
>   service only as observed at a specific SAP, not the overall
>   network level status of the service connecting many SAPs.
> The
>   network level service status can be retrieved using specific
>   network models, e.g., Section 7.3 of [RFC9182] or Section
> 7.3 of
>   [RFC9291].
> 
>   In order to assess the service delivery status for a given
> SAP, it
>   is recommended to check both the administrative and
> operational
>   service status ('service-status') in addition to the 'sap-
> status'.
>   In doing so, a network controller (or operator) can detect
>   anomalies.  For example, if a service is administratively
> enabled
>   for a SAP and the 'sap-status' of that SAP is reported as
> being
>   down, the service 'oper-status' is also expected to be down.
>   Retrieving a distinct service operational status under these
>   conditions can be used as a trigger to detect an anomaly.
>   Likewise, administrative status and operational status can
> be
>   compared to detect service-specific SAP activation
> anomalies.
>   For example, a service that is administratively declared as
>   inactive for a SAP but reported as operationally active for
> that
>   SAP is an indication that some service provision actions are
>   needed to align the observed service status with the
> expected
>   service status.
> 
> Some proposed tweaks to YANG container/leaf descriptions:
> 
>  container sap-status {
>config false;
>description
>  "Indicates the operational status of the SAP,
> independent
>  of any service provisioned over it.";
> 
>container admin-status {
>  description
>  

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-05.txt

2022-12-16 Thread mohamed.boucadair
Hi Thomas, all,

Thanks for preparing this version. However, I think that not all the issues 
were fixed: 

* Section "5.9.  srhActiveSegmentIPv6Type": please add the pointer to the IANA 
registry under "Additional Information". Please see the proposal from Benoît 
at: https://mailarchive.ietf.org/arch/msg/opsawg/ZZ5anFVYpabnmm12sfkmGB6nHYI/

* The text about multiple SRH is somehow "misleading" as it can be interpreted  
as 8200 discusses explicitly multiple SRHs case. Also, and unless I' mistaken, 
there is no spring document that motivates the need for multiple SRHs or how 
these can be used. I suggest to simplify the wording of 6.3 to basically say: 
if multiple SRHs are observed (for reasons that are not detailed here), 
exporting multiple IEs is allowed + follow the base reco in 7011 for the 
ordering. No normative language is needed for this behavior. 

* Please define what is meant by "active SRH". 

Thank you. 

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : vendredi 16 décembre 2022 08:50
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-ipfix-srv6-srh-
> 05.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Operations and Management Area
> Working Group WG of the IETF.
> 
> Title   : Export of Segment Routing over IPv6
> Information in IP Flow Information Export (IPFIX)
> Authors : Thomas Graf
>   Benoit Claise
>   Pierre Francois
>   Filename: draft-ietf-opsawg-ipfix-srv6-srh-05.txt
>   Pages   : 28
>   Date: 2022-12-15
> 
> Abstract:
>This document introduces new IP Flow Information Export (IPFIX)
>Information Elements to identify a set of Segment Routing over
> IPv6
>(SRv6) related information such as data contained in a Segment
>Routing Header (SRH), the SRv6 control plane, and the SRv6
> endpoint
>behavior that traffic is being forwarded with.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-srv6-srh/
> 
> There is also an htmlized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-ipfix-
> srv6-srh-05
> 
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-ipfix-
> srv6-srh-05
> 
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] AD review of draft-ietf-opsawg-sap-09

2022-12-12 Thread mohamed.boucadair
Hi Rob, 

Thanks for the follow-up. 

After rereading the initial proposed updated text, I think that you have a 
valid point about the need for more clarity when describing the relationship 
between the various status data nodes. I released -11 with an attempt to make 
that better. Both the data nodes description and the examples are updated to 
reflect the intent. The relationship (including what should be considered as 
anomalies) are also described. 

The new text also clarifies that the per-SAP service status should not be 
confused with the global service status (which may involved more than one SAP). 
Adrian's comment that a SAP failure does not imply a service failure is true 
for that global service status, not for the (per-SAP) service status included 
in the SAP.

The new text is available at: 

URL:https://www.ietf.org/archive/id/draft-ietf-opsawg-sap-11.txt
Diff:   
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-sap-11

Hope this is better. Thanks. 

Cheers,
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : vendredi 9 décembre 2022 15:22
> À : BOUCADAIR Mohamed INNOV/NET ;
> draft-ietf-opsawg-sap@ietf.org; opsawg@ietf.org
> Objet : RE: AD review of draft-ietf-opsawg-sap-09
> 
> Hi Med,
> 
> Sorry, still not clear (in my head) on the exact differentiation
> between sap-status and service-status.
> 
> Also, a few other nits that I spotted:
> s/is capable to host/is capable of hosting/ (two places) s/ that
> uniquely identifies SAP/ that uniquely identifies a SAP/ s/ are
> tagged as ready to host/ are tagged as being capable of hosting/
> 
> Please see inline ...
> 
> > -Original Message-
> > From: mohamed.boucad...@orange.com
> > 
> > Sent: 09 November 2022 15:11
> > To: Rob Wilton (rwilton) ; draft-ietf-opsawg-
> > sap@ietf.org; opsawg@ietf.org
> > Subject: RE: AD review of draft-ietf-opsawg-sap-09
> >
> > > > >
> > > > > But how do you distinguish between a SAP that hasn't been
> > > > > provisioned yet to a service vs a SAP that has been
> provisioned
> > > > > but the service is down?  E.g., trying to find a free SAP
> just
> > > > > by looking for a SAP with a service-status of op-down
> doesn't
> > > > > appear to be sufficient on its own.
> > > >
> > > > [Med] A SAP that is not provisioned yet will have a
> > > > sap-status=down,
> > > while
> > > > the one that is provision but the service is not activated
> will
> > > > have
> > > sap-
> > > > status=up and service-status=down. Isn't that sufficient?
> > >
> > > I would have assumed:
> > >  - If sap-status is down then the service-status must also be
> down,
> > > right?
> >
> > [Med] Actually, no. The service status indicates whether a
> service is
> > associated with the SAP. Added both the admin and op status of
> the
> > service status and added this NEW text:
> >
> > "This data node indicates whether a service is bound to this SAP
> and,
> > as such, it is not influenced by the value of the 'sap-status'."
> [Rob Wilton (rwilton)]
> 
> " 'service-status':  Reports the status of the service for a given
> SAP. ...".  This states that it is reporting the status of the
> service for a given SAP.
> 
> For the service-status/admin-status I can see how the service can
> be admin-up for a SAP that is down (e.g., perhaps there is a
> broken fiber such that the physical interface or sub-interface is
> down).  But I would still find it confusing to say that the
> service at the SAP is operationally up on a SAP that is down.
> 
> Specifically, if a customer was to ask whether there are able to
> get service at a particular SAP, is it sufficient for the operator
> to check service-status/oper-status on the SAP, or must they check
> both service-status/oper-status and service-status/sap-status to
> know whether or not they will be receiving service at a particular
> SAP?
> 
> If the draft description, and perhaps even more critically, the
> YANG model description, can be really clear on this, I think that
> will help implementors and users.
> 
> Regards,
> Rob


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for 

Re: [OPSAWG]  WG LC: Export of Segment Routing over IPv6 Information in IP Flow Information Export (IPFIX)

2022-11-30 Thread mohamed.boucadair
Hi all,

This version addresses all the comments raised in my previous review of the 
document. I have only very few comments:


  *   Section “5.9.  srhActiveSegmentIPv6Type”: please add the pointer to the 
IANA registry under “Additional Information”.
  *   Section 6.3:
 *   Is there any SPRING document that explains the motivation for having 
more than one SRH?
 *   Please reword these two sentences:

   OLD:

   [RFC8200] describes the support of multiple extension headers in one

   IPv6 packet.  Allowing the use of multiple SRH per SRv6 packet.


 *   I’m afraid the SHOULD normative language for the ordering is not 
required as it is redundant (?) with this part from RFC7011:

   If an Information Element is required more than once in a Template,
   the different occurrences of this Information Element SHOULD follow
   the logical order of their treatments by the Metering Process.


 *   What is an “active SRH”?

I support advancing this spec assuming these comments are addressed. Thanks.

Cheers,
Med

De : OPSAWG  De la part de Joe Clarke (jclarke)
Envoyé : mercredi 30 novembre 2022 14:54
À : opsawg@ietf.org
Objet : [OPSAWG]  WG LC: Export of Segment Routing over IPv6 Information in IP 
Flow Information Export (IPFIX)

Hello, WG.  As discussed at IETF 115, we want to conduct a WG LC for 
draft-ietf-opsawg-ipfix-srv6-srh.  The authors believe this work is stable and 
moreover used the 115 hackathon to develop a interoperable implementations 
(linked in Data Tracker) .  Additionally, IANA has already weighed in on this 
work and agree with the considerations approach.

Therefore, we are calling for a two week LC.  We will conclude on December 14.

https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-srv6-srh/

Please review the current -04 draft, post your comments and/or your thoughts on 
the current text.

Thanks.

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] TR: I-D Action: draft-boucla-opsawg-ipfix-fixes-00.txt

2022-11-30 Thread mohamed.boucadair
Hi Joe, all, 

FWIW, the simple fixes I-D is now public. 

Cheers,
Med

-Message d'origine-
De : I-D-Announce  De la part de 
internet-dra...@ietf.org
Envoyé : mercredi 30 novembre 2022 09:45
À : i-d-annou...@ietf.org
Objet : I-D Action: draft-boucla-opsawg-ipfix-fixes-00.txt


A New Internet-Draft is available from the on-line Internet-Drafts directories.


Title   : Simple Fixes to the IP Flow Information Export 
(IPFIX) IANA Registry
Authors : Mohamed Boucadair
  Benoit Claise
  Filename: draft-boucla-opsawg-ipfix-fixes-00.txt
  Pages   : 22
  Date: 2022-11-30

Abstract:
   This document describes simple fixes to the IANA IP Flow Information
   Export (IPFIX) registry.  These fixes are mainly updates to point to
   newer IANA registries and also updates to the description of some
   Information Elements (IEs).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-boucla-opsawg-ipfix-fixes/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-boucla-opsawg-ipfix-fixes-00.html


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


___
I-D-Announce mailing list
i-d-annou...@ietf.org
https://www.ietf.org/mailman/listinfo/i-d-announce
Internet-Draft directories: http://www.ietf.org/shadow.html or 
ftp://ftp.ietf.org/ietf/1shadow-sites.txt

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Research on additional registry work

2022-11-29 Thread mohamed.boucadair
Hi Joe, all,

Yes, I had a discussion with Benoît during the IETF meeting to see how to 
handle this. We agreed to proceed with at least two documents:

  *   draft-boucadair-opsawg-rfc7125-update to update the TCP IPFIX RFC.
  *   Edit a second draft to "clean" other entries in registry. This document 
is intended to include only simple fixes and which do not require updating 
existing RFCs. The candidate list of these proposed fixes can be seen at 
https://boucadair.github.io/simple-ipfix-fixes/draft-boucla-opsawg-ipfix-fixes.html.
 New IEs, if needed, will be moved to a separate document. simple-ipfix-fixes 
may or may not be published as an RFC.


Cheers,
Med

De : Joe Clarke (jclarke) 
Envoyé : lundi 28 novembre 2022 20:23
À : opsawg@ietf.org
Cc : BOUCADAIR Mohamed INNOV/NET 
Objet : Research on additional registry work

Hello, Med.  I was curious if you had a chance to dig into the IANA registries 
to see where else there might be a need for updates.  What we had said at 115 
was that you would take a look and see what the scope of work might be.  That 
might turn into more docs to track those various registry changes.

Thanks.

Joe

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] [Add] [dhcwg]  WG LC: RADIUS Extensions for Encrypted DNS [EXTENDED]

2022-11-20 Thread mohamed.boucadair
Hi Bernie,

Thanks for the comment.

I agree that reference may be confusing for some readers. I went with a less 
verbose text by simply replacing the OLD reference with “Section 8.3 of 
[This-Document]”. Please see https://tinyurl.com/opsawg-add-latest.

[This-Document] will be replaced by the RFC Editor with the RFC number to be 
assigned to this draft.

Cheers,
Med

De : Add  De la part de Bernie Volz
Envoyé : dimanche 20 novembre 2022 13:30
À : Joe Clarke (jclarke) 
Cc : opsawg@ietf.org; dh...@ietf.org; a...@ietf.org
Objet : Re: [Add] [dhcwg]  WG LC: RADIUS Extensions for Encrypted DNS 
[EXTENDED]

The changes related to 4014 are really minor as just changes text to use IANA 
registry instead of list in original 4014. So not sure why this is really that 
significant.

My only concern is that the “new” text references section 8.3 of this new draft 
and so the replacement text is a bit “odd”? It is not referring to section 8.3 
in 4014.


   NEW:

  To avoid dependencies between the address allocation and other

  state information between the RADIUS server and the DHCP server,

  the DHCP relay agent SHOULD include only the attributes in the

  IANA-maintained registry (Section 8.3) in an instance of the

  RADIUS Attributes suboption.

I wonder if using the following might be better instead of referencing section 
8.3 from the new document? (In both “new” sections.)


   NEW:

  To avoid dependencies between the address allocation and other

  state information between the RADIUS server and the DHCP server,

  the DHCP relay agent SHOULD include only the attributes in the

  IANA-maintained sub-registry entitled "RADIUS Attributes Permitted

   in RADIUS Attributes Sub-option" in the "Dynamic Host Configuration

   Protocol (DHCP) and Bootstrap Protocol (BOOTP) Parameters" registry 
[BOOTP]

  IANA-maintained registry in an instance of the

  RADIUS Attributes suboption.

But perhaps this is not a concern others have?

- Bernie (from iPad)


On Nov 11, 2022, at 3:13 AM, Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>> 
wrote:

I am closing this WG LC.  While I am glad that this work received a number of 
reviews both in opsawg and from other WGs, I would have still like to see more 
comments around the incorporation of the 4014 changes.

We will now look to find a shepherd for this doc.  Authors, if you know of 
someone that may want to act in that role, let us know.

Joe

From: Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Wednesday, October 19, 2022 at 10:11
To: Joe Clarke (jclarke) mailto:jcla...@cisco.com>>, 
opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Cc: dh...@ietf.org 
mailto:dh...@ietf.org>>, a...@ietf.org 
mailto:a...@ietf.org>>
Subject: Re:  WG LC: RADIUS Extensions for Encrypted DNS [EXTENDED]
After discussion with dhcwg, this document has taken on work from another 
document that updates RFC 4014.  I want to make sure that opsawg has had a 
chance to review the extended scope and text.

The WG LC is extended to end on November 3, 2022.  To those in the WG that have 
already commented, please review revision -05 or later and share your thoughts 
on list.

Joe

From: OPSAWG mailto:opsawg-boun...@ietf.org>> on 
behalf of Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Wednesday, October 12, 2022 at 12:43
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS
Hello, WG.  While this work was recently adopted, there was a considerable 
amount of discussion and work put in to address issues and stabilize the spec.  
The authors feel it has reached a steady state and is ready for WG LC.  Based 
on my read of the discussion threads, it does appear the major issues have been 
addressed.

Therefore, this serves as the start of a two week WG LC for  
https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-dns/.  Please 
provide your comments and/or support for the current spec on-list prior to 
October 27.

Thanks.

Joe
___
dhcwg mailing list
dh...@ietf.org
https://www.ietf.org/mailman/listinfo/dhcwg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be 

Re: [OPSAWG] MINUTES: IETF 115 OPSAWG/Ops Area meeting

2022-11-17 Thread mohamed.boucadair
Hi Anthony,

A request was made since 2022-10-12; no review received so far. Please see 
https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-dns/reviewrequest/16465/.

Cheers,
Med

De : OPSAWG  De la part de Anthony Somerset
Envoyé : jeudi 17 novembre 2022 07:14
À : Joe Clarke (jclarke) ; opsawg@ietf.org
Objet : Re: [OPSAWG] MINUTES: IETF 115 OPSAWG/Ops Area meeting

Hi All

Can I recommend that WG LC on RADIUS secure DNS gets requested for DNS 
Directorate review asap also

Thanks

From: OPSAWG mailto:opsawg-boun...@ietf.org>> on 
behalf of Joe Clarke (jclarke) 
mailto:jclarke=40cisco@dmarc.ietf.org>>
Date: Tuesday, 15 November 2022 at 21:06
To: opsawg@ietf.org 
mailto:opsawg@ietf.org>>
Subject: [OPSAWG] MINUTES: IETF 115 OPSAWG/Ops Area meeting
Hello, WG.  The first revision of the opsawg/Ops Area 115 minutes have been 
posted to 
https://datatracker.ietf.org/meeting/115/materials/minutes-115-opsawg-00.  
These take into account Michael's missing MUD slides and talk (those slides are 
now in Data Tracker).

In terms of AIs, we are working through them.  The WG LC on RADIUS secure DNS 
has been concluded, and a shepherd is being sought.  Expect more LCs and CfAs 
on other work shortly.

Let us know if you find errors or omissions in the minutes.

Thanks.

Joe
This email disclaimer applies to the original email, all attachments and any 
subsequent emails sent by Liquid Telecom. This email contains valuable business 
information that is privileged, confidential and/or otherwise protected from 
disclosure, intended only for the named person or entity to which it is 
addressed. If you are not the intended recipient of this email and you received 
this e-mail in error, any review, use, dissemination, distribution, printing or 
copying of this e-mail is strictly prohibited and may be unlawful and/or an 
infringement of copyright. Please notify us immediately of the error and 
permanently delete the email from your system, retaining no copies in any 
media. No employee or agent is authorized to conclude any binding agreement on 
behalf of Liquid Telecom with another party or give any warranty by email 
without the express written confirmation by an authorized representative or a 
director of Liquid Telecom. Nothing in this email shall be construed as a 
legally binding agreement or warranty or an offer to contract. Liquid Telecom 
will not be responsible for any damages suffered by the recipient as a result 
of the recipient not taking cognizance of this principle. Liquid Telecom 
accepts no liability of whatever nature for any loss, liability, damage or 
expense resulting directly or indirectly from the access of any files which are 
attached to this message. Any email addressed to Liquid Telecom shall only be 
deemed to have been received once receipt is confirmed by Liquid Telecom orally 
or in writing. An automated acknowledgment of receipt will not suffice as proof 
of receipt by the Liquid Telecom. This email disclaimer shall be governed by 
the laws of South Africa.

Internal All Employees

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] AD review of draft-ietf-opsawg-sap-09

2022-11-09 Thread mohamed.boucadair
Hi Rob, 

Thanks for the follow-up. 

Made some changes to hopefully fix the pending points: 
https://tinyurl.com/sap-latest. Also, added a NEW para to exemplify how 
controllers of each AS are using the model to provision inter-as VPN option A. 
This is to address a comment we received from an implementer.  

Please see inline for more context.

Will wait for your ACK before submitting the new version. 

Cheers,
Med

> -Message d'origine-
> De : Rob Wilton (rwilton) 
> Envoyé : dimanche 6 novembre 2022 16:50
> À : BOUCADAIR Mohamed INNOV/NET ; draft-
> ietf-opsawg-sap@ietf.org; opsawg@ietf.org
> Objet : RE: AD review of draft-ietf-opsawg-sap-09
> 
> Hi Med,
> 
> Apologies for the delay.  The behaviour is still not entirely clear to
> me.  Please see inline ...
> 
> > -Original Message-
> > From: mohamed.boucad...@orange.com
> > 
> > Sent: 29 September 2022 15:18
> > To: Rob Wilton (rwilton) ; draft-ietf-opsawg-
> > sap@ietf.org; opsawg@ietf.org
> > Subject: RE: AD review of draft-ietf-opsawg-sap-09
> >
> > Hi Rob,
> >
> > Thanks for the follow-up.
> >
> > Please see inline.
> >
> > Cheers,
> > Med
> >
> > > -Message d'origine-
> > > De : Rob Wilton (rwilton)  Envoyé : jeudi 29
> > > septembre 2022 15:24 À : BOUCADAIR Mohamed INNOV/NET
> > ;
> > > draft-ietf-opsawg-sap@ietf.org; opsawg@ietf.org Objet : RE: AD
> > > review of draft-ietf-opsawg-sap-09
> > >
> > > Hi Med,
> > >
> > > Comments inline below ...
> > >
> > > I've snipped out anything that we have already reached agreement
> on.
> > >
> > >
> > > > -Original Message-
> > > > From: mohamed.boucad...@orange.com
> > > > 
> > > > Sent: 23 September 2022 14:04
> > > > To: Rob Wilton (rwilton) ; draft-ietf-opsawg-
> > > > sap@ietf.org; opsawg@ietf.org
> > > > Subject: RE: AD review of draft-ietf-opsawg-sap-09
> > > >
> > > > Hi Rob,
> > > >
> > > > Thank you for the review. The changes can be tracked at:
> > > > https://tinyurl.com/sap-latest
> > > >
> > > > Please note that I made a change to better allow for reuse of
> > > the SAP
> > > > information in other modules (this can be tracked here:
> > > > https://github.com/IETF-OPSAWG-
> > > > WG/lxnm/commit/e8b406d7fad5225dd84ad7ff03f6da446eae6736).
> > >
> > > Okay.
> > >
> > >
> > > >
> > > > Please see inline for more context.
> > > >
> > > > Cheers,
> > > > Med
> > > >
> > > > > -Message d'origine-
> > > > > De : Rob Wilton (rwilton)  Envoyé :
> > > vendredi 23
> > > > > septembre 2022 14:01 À : draft-ietf-opsawg-sap@ietf.org;
> > > > > opsawg@ietf.org Objet : AD review of draft-ietf-opsawg-sap-09
> > > > >
> > > > > Hi authors, WG,
> > > > >
> > > > > Thank you for this document.  I also think that this document
> > > is
> > > > > well written and in good shape, and I mostly found the
> > > explanations
> > > > > and examples clear.  There were two specific points that I
> > > found
> > > > > slightly confusing related to differentiating between SAPs in
> > > use,
> > > > > and those that are not, and also parent interfaces also be
> > > listed as
> > > > > SAPs, details below.
> > > >
> > > > [Med] Thanks
> > > >
> > > > >
> > > > > Moderate level comments:
> > > > >
> > > > > (1) p 10, sec 5.  SAP Module Tree Structure
> > > > >
> > > > >   SAPs that are associated with the interfaces that are
> > > directly
> > > > >   hosting services, interfaces that are ready to host per-
> > > > > service
> > > > >   sub-interfaces (but not yet activated), or service that
> > > are
> > > > >   already instantiated on sub-interfaces are listed as
> > > SAPs.
> > > > >
> > > > > >From the model, is isn't clear to me how different
> > > differentiates
> > > > > between a SAP that has been pre-provisioned to potentially be
> > > used
> > > > > for a service in future, v.s., one is that is actively
> > > provisioned.
> > > >
> > > > [Med] This is inferred from the service-status=down for these
> > > SAPs.
> > >
> > > So, thinking of this at device level configuration there is
> > > effectively 3 levels of configuration/activation (at least for
> > > L2VPNs):
> > >
> > > (1) A sub-interface is configured, but without any IP address or
> > > VRF (for L3VPN), or without being attached to an L2VPN or Bridge
> > > Domain (for L2VPNs).  I.e., the sub-interface isn't connected
> > > anyway.
> > > (2) The sub-interface is configured and connected into a bridge
> > > domain or P2P L2VPN but that service is down (e.g., perhaps
> > > because the AC at the remote end of the L2VPN is physically down).
> > > (3) The sub-interface is configured and connected into a bridge
> > > domain or P2P L2VPN and that service is up.
> > >
> > > I think that you are saying that you regard that both (1) and (2)
> > > would be indicated by service-status=down?  Would it be worth
> > > expanding the description at all to make this more explicit?
> >
> > [Med] The implicit model has some limitations, indeed. Glad to see
> that we
> > reached the same conclusion. Please 

Re: [OPSAWG] RFC 4014: Request to grant the BCP78 rights to the IETF Trust

2022-11-04 Thread mohamed.boucadair
Hi Ralph,

Thank you for your positive answer. Much appreciated.

Cheers,
Med

De : Ralph Droms 
Envoyé : jeudi 3 novembre 2022 18:28
À : BOUCADAIR Mohamed INNOV/NET 
Cc : jschn...@cisco.com; opsawg@ietf.org; dh...@ietf.org
Objet : Re: RFC 4014: Request to grant the BCP78 rights to the IETF Trust

I grant BCP78 rights for RFC4014 to the IETF Trust.  I agree to the 
representations and warranties in section 5.6 of BCP78.

- Ralph


On Oct 19, 2022, at 9:30 AM, 
mohamed.boucad...@orange.com wrote:

Hi Ralph, John,


https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-dns/ updates 
some material that was published in RFC4014. As RFC4014 was published before 10 
November 2008, we may need to include a disclaimer for pre-RFC5378 work 
(https://trustee.ietf.org/documents/trust-legal-provisions/tlp-5/) unless we 
obtain your approval to grant the BCP78 rights to the IETF Trust. I’m sending 
this message to ask for your approval.


Thank you.

Cheers,
Med

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Murray Kucherawy's No Objection on draft-ietf-opsawg-yang-vpn-service-pm-13: (with COMMENT)

2022-10-20 Thread mohamed.boucadair
Hi Murray,

Thanks for the comment. 

I suggest we go for these changes: 

(1) Section 3

OLD:
   Before using the model, the controller needs to establish topology
   visibility of the network and VPN.  For example, the controller can
   use network information from [RFC8345], [I-D.ietf-opsawg-sap] or VPN
   information from [RFC9182], [RFC9291].

NEW:
   Before using the model, the controller needs to establish topology
   visibility of the network and VPN.  For example, the controller can
   use network information from [RFC8345], [I-D.ietf-opsawg-sap], or VPN
   information from the L3VPN Network Model (L3NM) [RFC9182] and 
   the L2VPN Network Model (L2NM) [RFC9291].

(2) Section 4

OLD:
   VPN network access ("vpn-network-access"):  Lists counters of the VPN
  network access defined in [RFC9182] or [RFC9291].

NEW:
   VPN network access ("vpn-network-access"):  Lists counters of the VPN
  network access defined in the L3NM [RFC9182] or the L2NM [RFC9291].


Cheers,
Med

> -Message d'origine-
> De : Murray Kucherawy via Datatracker 
> Envoyé : jeudi 20 octobre 2022 09:05
> À : The IESG 
> Cc : draft-ietf-opsawg-yang-vpn-service...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; adr...@olddog.co.uk
> Objet : Murray Kucherawy's No Objection on draft-ietf-opsawg-yang-
> vpn-service-pm-13: (with COMMENT)
> 
> Murray Kucherawy has entered the following ballot position for
> draft-ietf-opsawg-yang-vpn-service-pm-13: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-yang-vpn-
> service-pm/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> The terms L2NM and L3NM are provided in the glossary, but never
> used in the document.
> 
> 


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-05.txt

2022-10-19 Thread mohamed.boucadair
Hi Bernie,

Thanks. 

A way to ease tracking the document by the dhw WG is that dhwg alias be added 
to "Send notices to" of this draft. Joe, can you please make that change into 
the tracker? Thank you.

Cheers,
Med

> -Message d'origine-
> De : Bernie Volz 
> Envoyé : mercredi 19 octobre 2022 15:27
> À : BOUCADAIR Mohamed INNOV/NET 
> Cc : opsawg@ietf.org; dh...@ietf.org
> Objet : Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-
> dns-05.txt
> 
> Yes, I prefer this version as it will be simpler process as only 1
> document rather than 2 that are bound together. It will only be
> important to assure dhc WG monitors it in case of changes related
> to 4014 updates (though I suspect unlikely to be significant), and
> other dhcp specific changes.
> 
> Thanks!
> 
> - Bernie Volz
> 
> > On Oct 19, 2022, at 9:12 AM, mohamed.boucad...@orange.com wrote:
> >
> > Hi all,
> >
> > This version merges the content that used to be in draft-
> boucadair-dhcwg-rfc4014-update. Bernie suggested offline that it
> is better to proceed with one single draft rather than two.
> >
> > Cheers,
> > Med
> >
> >> -Message d'origine-
> >> De : OPSAWG  De la part de internet-
> >> dra...@ietf.org Envoyé : mercredi 19 octobre 2022 15:06 À :
> >> i-d-annou...@ietf.org Cc : opsawg@ietf.org Objet : [OPSAWG] I-D
> >> Action: draft-ietf-opsawg-add-encrypted-dns-
> >> 05.txt
> >>
> >>
> >> A New Internet-Draft is available from the on-line Internet-
> Drafts
> >> directories.
> >> This draft is a work item of the Operations and Management Area
> >> Working Group WG of the IETF.
> >>
> >>Title   : RADIUS Extensions for DHCP Configured
> >> Services
> >>Authors : Mohamed Boucadair
> >>  Tirumaleswar Reddy
> >>  Filename: draft-ietf-opsawg-add-encrypted-dns-05.txt
> >>  Pages   : 17
> >>  Date: 2022-10-19
> >>
> >> Abstract:
> >>   This document specifies two new Remote Authentication Dial-In
> User
> >>   Service (RADIUS) attributes that carry DHCP options.  Even if
> the
> >>   specification was initially motivated by the configuration of
> >>   encrypted DNS resolvers, the specification is generic and can
> be
> >>   applicable to any service that relies upon DHCP.  Both DHCPv4
> and
> >>   DHCPv6 configured services are covered.
> >>
> >>   Also, this document updates RFC 4014 by relaxing a constraint
> on
> >>   permitted RADIUS Attributes in the RADIUS Attributes DHCP
> >> suboption.
> >>
> >>
> >> The IETF datatracker status page for this draft is:
> >> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-
> encrypted-
> >> dns/
> >>
> >> There is also an htmlized version available at:
> >> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-add-
> >> encrypted-dns-05
> >>
> >> A diff from the previous version is available at:
> >> https://www.ietf.org/rfcdiff?url2=draft-ietf-opsawg-add-
> encrypted-
> >> dns-05
> >>
> >>
> >> Internet-Drafts are also available by rsync at
> >> rsync.ietf.org::internet-drafts
> >>
> >>
> >> ___
> >> OPSAWG mailing list
> >> OPSAWG@ietf.org
> >> https://www.ietf.org/mailman/listinfo/opsawg
> >

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


[OPSAWG] RFC 4014: Request to grant the BCP78 rights to the IETF Trust

2022-10-19 Thread mohamed.boucadair
Hi Ralph, John,


https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-dns/ updates 
some material that was published in RFC4014. As RFC4014 was published before 10 
November 2008, we may need to include a disclaimer for pre-RFC5378 work 
(https://trustee.ietf.org/documents/trust-legal-provisions/tlp-5/) unless we 
obtain your approval to grant the BCP78 rights to the IETF Trust. I'm sending 
this message to ask for your approval.


Thank you.

Cheers,
Med

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-05.txt

2022-10-19 Thread mohamed.boucadair
Hi all, 

This version merges the content that used to be in 
draft-boucadair-dhcwg-rfc4014-update. Bernie suggested offline that it is 
better to proceed with one single draft rather than two. 

Cheers,
Med

> -Message d'origine-
> De : OPSAWG  De la part de internet-
> dra...@ietf.org
> Envoyé : mercredi 19 octobre 2022 15:06
> À : i-d-annou...@ietf.org
> Cc : opsawg@ietf.org
> Objet : [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-
> 05.txt
> 
> 
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Operations and Management Area
> Working Group WG of the IETF.
> 
> Title   : RADIUS Extensions for DHCP Configured
> Services
> Authors : Mohamed Boucadair
>   Tirumaleswar Reddy
>   Filename: draft-ietf-opsawg-add-encrypted-dns-05.txt
>   Pages   : 17
>   Date: 2022-10-19
> 
> Abstract:
>This document specifies two new Remote Authentication Dial-In
> User
>Service (RADIUS) attributes that carry DHCP options.  Even if
> the
>specification was initially motivated by the configuration of
>encrypted DNS resolvers, the specification is generic and can
> be
>applicable to any service that relies upon DHCP.  Both DHCPv4
> and
>DHCPv6 configured services are covered.
> 
>Also, this document updates RFC 4014 by relaxing a constraint
> on
>permitted RADIUS Attributes in the RADIUS Attributes DHCP
> suboption.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-add-encrypted-
> dns/
> 
> There is also an htmlized version available at:
> https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-add-
> encrypted-dns-05
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-opsawg-add-encrypted-
> dns-05
> 
> 
> Internet-Drafts are also available by rsync at
> rsync.ietf.org::internet-drafts
> 
> 
> ___
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg

_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] Éric Vyncke's No Objection on draft-ietf-opsawg-yang-vpn-service-pm-13: (with COMMENT)

2022-10-18 Thread mohamed.boucadair
Hi Éric, 

Thank you for the comments. 

Please see inline.

I let my co-authors further comment as appropriate. 

Cheers,
Med

> -Message d'origine-
> De : Éric Vyncke via Datatracker 
> Envoyé : mardi 18 octobre 2022 08:03
> À : The IESG 
> Cc : draft-ietf-opsawg-yang-vpn-service...@ietf.org; opsawg-
> cha...@ietf.org; opsawg@ietf.org; adr...@olddog.co.uk;
> adr...@olddog.co.uk
> Objet : Éric Vyncke's No Objection on draft-ietf-opsawg-yang-vpn-
> service-pm-13: (with COMMENT)
> 
> Éric Vyncke has entered the following ballot position for
> draft-ietf-opsawg-yang-vpn-service-pm-13: No Objection
> 
> When responding, please keep the subject line intact and reply to
> all email addresses included in the To and CC lines. (Feel free to
> cut this introductory paragraph, however.)
> 
> 
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-
> positions/
> for more information about how to handle DISCUSS and COMMENT
> positions.
> 
> 
> The document, along with other ballot positions, can be found
> here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-yang-vpn-
> service-pm/
> 
> 
> 
> --
> 
> COMMENT:
> --
> 
> 
> 
> # Éric Vyncke, INT AD, comments for draft-ietf-opsawg-yang-vpn-
> service-pm-13
> CC @evyncke
> 
> Thank you for the work put into this document.
> 
> Please find below some non-blocking COMMENT points (but replies
> would be
> appreciated even if only for my own education), and some nits.
> 
> Special thanks to Adrian Farrel for the shepherd's detailed write-
> up including
> the WG consensus *and* the justification of the intended status.
> 
> I hope that this review helps to improve the document,
> 
> Regards,
> 
> -éric
> 
> ## COMMENTS
> 
> ### Relationship with other OPSAWG documents
> 
> Just curious: it this work somehow related to
> draft-ietf-opsawg-service-assurance-architecture ? I.e., should
> this document
> add some reference to the service assurance I-Ds ?

[Med] Both drafts refer to RFC8969 which provides the overall framework. The 
assurance draft defines an architecture that can consume the data exposed by 
means of I-D.ietf-opsawg-yang-vpn-service-pm. 
I-D.ietf-opsawg-yang-vpn-service-pm does not assume nor preclude that SAIN is 
in place. 

If I have to make a change, I would make it in 
draft-ietf-opsawg-service-assurance-architecture, e.g., 

OLD: 
   Service orchestrators use Network service YANG modules that will
   infer network-wide configuration and, therefore the invocation of the
   appropriate device modules (Section 3 of [RFC8969]).  Knowing that a
   configuration is applied doesn't imply that the service is up and
   running as expected.  For instance, the service might be degraded
   because of a failure in the network, the experience quality is
   distorted, or a service function may be reachable at the IP level but
   does not provide its intended function.  Thus, the network operator
   must monitor the service operational data at the same time as the
   configuration (Section 3.3 of [RFC8969]).  To feed that task, the
   industry has been standardizing on telemetry to push network element
   performance information.

NEW:
   Service orchestrators use Network service YANG modules that will
   infer network-wide configuration and, therefore the invocation of the
   appropriate device modules (Section 3 of [RFC8969]).  Knowing that a
   configuration is applied doesn't imply that the service is up and
   running as expected.  For instance, the service might be degraded
   because of a failure in the network, the experience quality is
   distorted, or a service function may be reachable at the IP level but
   does not provide its intended function.  Thus, the network operator
   must monitor the service operational data at the same time as the
   configuration (Section 3.3 of [RFC8969]).  To feed that task, the
   industry has been standardizing on telemetry to push network element
   performance information (e.g., [I-D.ietf-opsawg-yang-vpn-service-pm]).

> 
> ### Section 2.1
> 
> As 'PE' is defined, I was also expecting to see 'CE' (notably used
> in section
> 4.1) and 'P' (notably used in section 4.3).
> 

[Med] OK

> ### Section 3
> 
> Suggest to explain why in `Models are key for automating network
> management
> operations.`.

[Med] RFC8969 provides a detailed discussion about this. I suggest to make this 
change: 

OLD:
   Models are key for automating network management operations.
   According to [RFC8969], together with service and network models,
   performance measurement telemetry models are needed to monitor
   network performance to meet specific service requirements (typically
   captured in an SLA).

NEW:
   Models are key for automating network management operations (Section 3 of 
[RFC8969]).
   Particularly, together with service and network models,
   performance 

Re: [OPSAWG] [dhcwg] [Add]  WG LC: RADIUS Extensions for Encrypted DNS

2022-10-17 Thread mohamed.boucadair
Re-,

Thanks for the feedback. 

I submitted a new version which takes into account the comments received so 
far: 
https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-add-encrypted-dns-04. 

Please let me know if I missed any of the comments. Thanks.

Cheers,
Med

> -Message d'origine-
> De : Alan DeKok 
> Envoyé : lundi 17 octobre 2022 14:51
> À : Bernie Volz 
> Cc : BOUCADAIR Mohamed INNOV/NET ;
> dh...@ietf.org; Joe Clarke (jclarke) ; opsawg
> ; ADD Mailing list ;
> rad...@ietf.org
> Objet : Re: [dhcwg] [Add] [OPSAWG]  WG LC: RADIUS Extensions for
> Encrypted DNS
> 
> On Oct 17, 2022, at 7:41 AM, Bernie Volz  wrote:
> > I was thinking more to put this restriction on the dhcp server,
> when it makes use of the Radius attribute to respond to a client.
> I have no issue with it being limited at configuration too, but
> the dhcp server should also make sure only a limited set of
> options are sent to client.
> >
> > Leaving this wide open causes issues as it may be miss used to
> inject things that really shouldn’t be.
> 
>   I agree.  There should be a limited set of options which are
> allowed, perhaps via a registry.
> 
> > Looking at it again, it is also unclear how a dhcp server is to
> use information. For example, does the server use options from
> this information before its own configuration or only if it has no
> configuration (I suspect the former, as this is more
> client/request specific).
> 
>   That should be made explicit in the draft.  I don't have
> opinions either way, but your point makes sense.
> 
> > And from RFC7037, there is
> >
> > 169DNS-Server-IPv6-Address [RFC6911]
> >
> > Does this mean someone could now place the DNS server option
> into your new Radius attribute instead of using this attribute to
> have the server map it to the DHCP option?
> 
>   If it's allowed by the registry, presumably, yes.  RFFC 6911
> says that those RADIUS attributes can appear multiple times.  So
> presumably it doesn't matter much if the DNS server information
> appears once in a RADIUS attribute, and separately in a DHCPv6-
> Options attribute.  They can all be added to the packets.
> 
>   i.e. if the administrator of the system configures something
> weird, the systems should just do what's asked.
> 
>   Anything past basic filtering is complex to define, and complex
> to implement.  And arguably doesn't have a lot of extra value.
> 
>   Alan DeKok.


_

Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

___
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg


Re: [OPSAWG] [Add]  WG LC: RADIUS Extensions for Encrypted DNS

2022-10-17 Thread mohamed.boucadair
Re-,

Point taken for the registry.

For 4014bis, the issue is that there is no IANA registry for this and that 4014 
have only a frozen list of options with SHOULD and like. That text should be 
fixed, hence 
https://datatracker.ietf.org/doc/draft-boucadair-dhcwg-rfc4014-update/.

Cheers,
Med

De : Add  De la part de Bernie Volz
Envoyé : lundi 17 octobre 2022 14:49
À : BOUCADAIR Mohamed INNOV/NET 
Cc : dh...@ietf.org; Joe Clarke (jclarke) ; opsawg 
; ADD Mailing list ; rad...@ietf.org
Objet : Re: [Add] [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS

I do think it would be best to set up a registry and policy at the server as to 
which it uses.

—-

I saw your 4014 bis, though technically you could have just requested IANA to 
add your new radius attribute to the existing registry rather than doing the 
bis document.

In this bis document, the new table entry is a bit odd:


245.TBA1  | DHCPv4-Options   | This-Document |


As “this document” doesn’t define that new attribute, and not even TBA1 (that 
is only reference).

It may be better to just add an update to the Allowed Radius attributrs table 
to the document that defines the new Radius attributes, rather than 2 documents?

- Bernie Volz


On Oct 17, 2022, at 8:08 AM, 
mohamed.boucad...@orange.com wrote:

Re-,

Please see inline.

Cheers,
Med

De : Add mailto:add-boun...@ietf.org>> De la part de 
Bernie Volz
Envoyé : lundi 17 octobre 2022 13:42
À : BOUCADAIR Mohamed INNOV/NET 
mailto:mohamed.boucad...@orange.com>>
Cc : dh...@ietf.org; Joe Clarke (jclarke) 
mailto:jcla...@cisco.com>>; opsawg 
mailto:opsawg@ietf.org>>; ADD Mailing list 
mailto:a...@ietf.org>>; rad...@ietf.org
Objet : Re: [Add] [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS

I was thinking more to put this restriction on the dhcp server, when it makes 
use of the Radius attribute to respond to a client.
[Med] I think that this is similar to any guards used for consuming 
conventional radius attributes. What differs in the proposed attribute is just 
the encoding, not how this feeds the DHCP server logic, but …

I have no issue with it being limited at configuration too, but the dhcp server 
should also make sure only a limited set of options are sent to client.
[Med] … it is OK to add an explicit statement about a policy to control this at 
the DHCP server side.


Leaving this wide open causes issues as it may be miss used to inject things 
that really shouldn’t be.
[Med] OK.


Looking at it again, it is also unclear how a dhcp server is to use 
information. For example, does the server use options from this information 
before its own configuration or only if it has no configuration (I suspect the 
former, as this is more client/request specific).
[Med] The logic at the server side is the same as how “conventional” RADIUS 
attributes are consumed by DHCP server.

And from RFC7037, there is



169DNS-Server-IPv6-Address [RFC6911]

Does this mean someone could now place the DNS server option into your new 
Radius attribute instead of using this attribute to have the server map it to 
the DHCP option?
[Med] The expectation is that this will be used to mimic future DHCPv6 options, 
not those already governed by dedicated RADIUS attributes.


It seems to me that the reason for doing this is to handle the OPTION_V6_DNR 
only, so maybe best to restrict just to this for now? Future documents could 
add more to registry for options allowed.
[Med] I don’t have an objection to define a registry if you think this is 
“safer”. Please advise.



- Bernie (from iPad)



On Oct 17, 2022, at 2:15 AM, 
mohamed.boucad...@orange.com wrote:

Hi Bernie,

Thank you for the feedback.

I have considered a registry to declare the options that can be echoed in the 
RADIUS attribute, but I then give it up because that list will be restricted 
anyway by policy:

   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.

Cheers,
Med

De : Add mailto:add-boun...@ietf.org>> De la part de 
Bernie Volz
Envoyé : vendredi 14 octobre 2022 17:48
À : BOUCADAIR Mohamed INNOV/NET 
mailto:mohamed.boucad...@orange.com>>
Cc : dh...@ietf.org; Joe Clarke (jclarke) 
mailto:jcla...@cisco.com>>; opsawg 
mailto:opsawg@ietf.org>>; ADD Mailing list 
mailto:a...@ietf.org>>; rad...@ietf.org
Objet : Re: [Add] [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS

Hi:

Your github document is -03 and published is -03, so likely you want to make it 
-04?

As no dhcp options are being defined and they are just being encapsulated in 
Radius attributes, not exactly sure how much the DHC wg can (or needs to) 
comment?

This basically changes things so you no longer have unique Radius attributes 
that are mapped to DHCP options, but you just use the DHCP 

Re: [OPSAWG] [Add]  WG LC: RADIUS Extensions for Encrypted DNS

2022-10-17 Thread mohamed.boucadair
Re-,

Please see inline.

Cheers,
Med

De : Add  De la part de Bernie Volz
Envoyé : lundi 17 octobre 2022 13:42
À : BOUCADAIR Mohamed INNOV/NET 
Cc : dh...@ietf.org; Joe Clarke (jclarke) ; opsawg 
; ADD Mailing list ; rad...@ietf.org
Objet : Re: [Add] [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS

I was thinking more to put this restriction on the dhcp server, when it makes 
use of the Radius attribute to respond to a client.
[Med] I think that this is similar to any guards used for consuming 
conventional radius attributes. What differs in the proposed attribute is just 
the encoding, not how this feeds the DHCP server logic, but …

I have no issue with it being limited at configuration too, but the dhcp server 
should also make sure only a limited set of options are sent to client.
[Med] … it is OK to add an explicit statement about a policy to control this at 
the DHCP server side.


Leaving this wide open causes issues as it may be miss used to inject things 
that really shouldn’t be.
[Med] OK.


Looking at it again, it is also unclear how a dhcp server is to use 
information. For example, does the server use options from this information 
before its own configuration or only if it has no configuration (I suspect the 
former, as this is more client/request specific).
[Med] The logic at the server side is the same as how “conventional” RADIUS 
attributes are consumed by DHCP server.

And from RFC7037, there is



169DNS-Server-IPv6-Address [RFC6911]

Does this mean someone could now place the DNS server option into your new 
Radius attribute instead of using this attribute to have the server map it to 
the DHCP option?
[Med] The expectation is that this will be used to mimic future DHCPv6 options, 
not those already governed by dedicated RADIUS attributes.


It seems to me that the reason for doing this is to handle the OPTION_V6_DNR 
only, so maybe best to restrict just to this for now? Future documents could 
add more to registry for options allowed.
[Med] I don’t have an objection to define a registry if you think this is 
“safer”. Please advise.



- Bernie (from iPad)


On Oct 17, 2022, at 2:15 AM, 
mohamed.boucad...@orange.com wrote:

Hi Bernie,

Thank you for the feedback.

I have considered a registry to declare the options that can be echoed in the 
RADIUS attribute, but I then give it up because that list will be restricted 
anyway by policy:

   RADIUS implementations may support a configuration parameter to
   control the DHCP options that can be included in a DHCP*-Options
   RADIUS attribute.

Cheers,
Med

De : Add mailto:add-boun...@ietf.org>> De la part de 
Bernie Volz
Envoyé : vendredi 14 octobre 2022 17:48
À : BOUCADAIR Mohamed INNOV/NET 
mailto:mohamed.boucad...@orange.com>>
Cc : dh...@ietf.org; Joe Clarke (jclarke) 
mailto:jcla...@cisco.com>>; opsawg 
mailto:opsawg@ietf.org>>; ADD Mailing list 
mailto:a...@ietf.org>>; rad...@ietf.org
Objet : Re: [Add] [OPSAWG]  WG LC: RADIUS Extensions for Encrypted DNS

Hi:

Your github document is -03 and published is -03, so likely you want to make it 
-04?

As no dhcp options are being defined and they are just being encapsulated in 
Radius attributes, not exactly sure how much the DHC wg can (or needs to) 
comment?

This basically changes things so you no longer have unique Radius attributes 
that are mapped to DHCP options, but you just use the DHCP options directly. 
This seems fine. (It does complicate the Radius configuration to handle DHCP 
option configuration if you don’t want them to be hand encoded as octet data, 
and many of the encoding/validation rules are not as consistent as we would 
like, especially for older options.)

The one concern for DHC wg may be to restrict the options that a DHCP server 
can send out if these options are intended to be delivered to the client via 
the dhcp server … for example, one would not want address or prefix delegation 
options to be allowed. This might be something similar to 
https://datatracker.ietf.org/doc/rfc6422/ which created a new registry for the 
allowed DHCPv6 options that can be provided by a relay agent (in this case 
encoded in the attributes).
- Bernie Volz



On Oct 14, 2022, at 10:45 AM, 
mohamed.boucad...@orange.com wrote:
Hi Bernie, dhcwg,

We received a comment during the WGLC of this draft that might lead us to 
revisit the design you have reviewed recently. This alternative design mirrors 
what we have done in 7037 (dhcwg) but with DHCP options included in RADIUS. The 
candidate text is available at:

https://github.com/boucadair/draft-ietf-opsawg-add-encrypted-dns/blob/main/draft-ietf-opsawg-add-encrypted-dns-encap.txt

I'd appreciate if you can review this proposal and share any comments/issues 
you may have.

Thank you.

Cheers,
Med



-Message d'origine-
De : BOUCADAIR Mohamed INNOV/NET
Envoyé : vendredi 14 octobre 2022 

  1   2   3   4   5   >