Skip to main content

Definitions of Managed Objects for High Bit-Rate DSL - 2nd generation (HDSL2) and Single-Pair High-Speed Digital Subscriber Line (SHDSL) Lines
draft-ietf-adslmib-gshdslbis-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2005-06-22
11 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-06-13
11 Amy Vezza IESG state changed to Approved-announcement sent
2005-06-13
11 Amy Vezza IESG has approved the document
2005-06-13
11 Amy Vezza Closed "Approve" ballot
2005-06-13
11 Bert Wijnen State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Bert Wijnen
2005-06-13
11 Bert Wijnen Status date has been changed to 2005-06-13 from 2005-06-08
2005-06-13
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-06-10
11 Bert Wijnen
Adding David Kessens to notification list so he can see w
hat happens while I am on vacation.

I have a request pending with Russ …
Adding David Kessens to notification list so he can see w
hat happens while I am on vacation.

I have a request pending with Russ Housley to ask if he can
clear his DISCUSS, which I think rev 11 addresses.

Once that happens, the doc has been approved.
2005-06-10
11 Bert Wijnen
2005-06-08
11 Bert Wijnen State Changes to IESG Evaluation::AD Followup from IESG Evaluation::Revised ID Needed by Bert Wijnen
2005-06-08
11 Bert Wijnen
Revision 11 came in between IESG telechat and recording by Amy that new rev was/is needed. So new rev is in. Checking with Russ if …
Revision 11 came in between IESG telechat and recording by Amy that new rev was/is needed. So new rev is in. Checking with Russ if he can clear his DISCUSS now.
2005-06-08
11 Bert Wijnen Status date has been changed to 2005-06-08 from 2005-05-16
2005-05-27
11 (System) Removed from agenda for telechat - 2005-05-26
2005-05-26
11 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2005-05-26
11 (System) New version available: draft-ietf-adslmib-gshdslbis-11.txt
2005-05-26
11 Allison Mankin [Ballot comment]
Did the WG and Last Call review have full access to ITU G.911.2 to check the material from it?
2005-05-26
11 Allison Mankin [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin
2005-05-26
11 Margaret Cullen [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman
2005-05-26
11 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-05-26
11 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Bill Fenner
2005-05-25
11 Alex Zinin [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin
2005-05-25
11 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-05-25
11 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded for Jon Peterson by Jon Peterson
2005-05-25
11 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded for Sam Hartman by Sam Hartman
2005-05-25
11 Michelle Cotton IANA Follow-up Comment:
Bert suggested leaving the reference as RFC3276 as many of the others have kept the original RFC as the reference.
2005-05-24
11 Russ Housley
[Ballot discuss]
Section 5 has several sentences that begin in similar ways:

    Unauthorized changes to ...
    Unapproved changes to ...
  …
[Ballot discuss]
Section 5 has several sentences that begin in similar ways:

    Unauthorized changes to ...
    Unapproved changes to ...
    Unofficial changes to ...
    Illegitimate changes to ...
    Unsanctioned changes to ...
    Unwarranted changes to ...
    Illegal changes to ...
    Undesired changes to ...

  Is there a subtle difference here?  Can "Unauthorized" be used in each
  case without losing any intended meaning?
2005-05-24
11 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-05-23
11 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2005-05-20
11 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-05-16
11 Scott Hollenbeck [Ballot Position Update] New position, No Objection, has been recorded for Scott Hollenbeck by Scott Hollenbeck
2005-05-16
11 Bert Wijnen State Changes to IESG Evaluation from Waiting for Writeup by Bert Wijnen
2005-05-16
11 Bert Wijnen Status date has been changed to 2005-05-16 from 2005-04-18
2005-05-16
11 Bert Wijnen Placed on agenda for telechat - 2005-05-26 by Bert Wijnen
2005-05-16
11 Bert Wijnen [Note]: 'This document is still shepherded by AD (Bert)' added by Bert Wijnen
2005-05-16
11 Bert Wijnen [Ballot Position Update] New position, Yes, has been recorded for Bert Wijnen
2005-05-16
11 Bert Wijnen Ballot has been issued by Bert Wijnen
2005-05-16
11 Bert Wijnen Created "Approve" ballot
2005-05-04
11 (System) State has been changed to Waiting for Writeup from In Last Call by system
2005-04-29
11 Michelle Cotton
IANA Last Call Comments:
We understand this document to not request any NEW IANA Action.  Should the reference for transmission number 48 for hdsl2ShdslMIB be …
IANA Last Call Comments:
We understand this document to not request any NEW IANA Action.  Should the reference for transmission number 48 for hdsl2ShdslMIB be changed to become this document or should the reference remain [RFC3276]?
2005-04-20
11 Amy Vezza Last call sent
2005-04-20
11 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2005-04-20
11 Bert Wijnen State Changes to Last Call Requested from AD Evaluation::AD Followup by Bert Wijnen
2005-04-20
11 Bert Wijnen Last Call was requested by Bert Wijnen
2005-04-20
11 (System) Ballot writeup text was added
2005-04-20
11 (System) Last call text was added
2005-04-20
11 (System) Ballot approval text was added
2005-04-18
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-04-18
10 (System) New version available: draft-ietf-adslmib-gshdslbis-10.txt
2005-04-18
11 Bert Wijnen State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Bert Wijnen
2005-04-18
11 Bert Wijnen New revision expected soon after several rounds of review by AD and another MIB Doctor (Mike Heard)
2005-04-18
11 Bert Wijnen Status date has been changed to 2005-04-18 from 2005-01-12
2005-03-24
09 (System) New version available: draft-ietf-adslmib-gshdslbis-09.txt
2005-03-08
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-03-08
08 (System) New version available: draft-ietf-adslmib-gshdslbis-08.txt
2005-01-12
11 Bert Wijnen State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Bert Wijnen
2005-01-12
11 Bert Wijnen Author agreed to do a revision first before we do IETF Last Call
2005-01-12
11 Bert Wijnen Status date has been changed to 2005-01-12 from 2005-01-10
2005-01-10
11 Bert Wijnen
MIB DOctor review:

-----Original Message-----
From: C. M. Heard [mailto:heard@pobox.com]
Sent: Sunday, January 09, 2005 05:04
To: ADSL MIB (E-mail)
Cc: Wijnen, Bert …
MIB DOctor review:

-----Original Message-----
From: C. M. Heard [mailto:heard@pobox.com]
Sent: Sunday, January 09, 2005 05:04
To: ADSL MIB (E-mail)
Cc: Wijnen, Bert (Bert)
Subject: MIB Doctor Review of draft-ietf-adslmib-gshdslbis-07.txt


Howdy,

Bert Wijnen asked me to do take a quick look at
draft-ietf-adslmib-gshdslbis-07.txt before it is sent out for IETF
last call.  I think that there are some issues with the Security
Considerations section in the draft that warrant a clean-up before
the document goes to the IESG, and I have also found a few minor
editorial ssues.  Regarding the MIB module itself, I looked only at
the changes that have been made since RFC 3276;  based on that, it
appears to be in good shape and ready to go.

Details are in the MIB Doctor check list below.  (It does not quite
match Appendix A of draft-ietf-ops-mib-review-guidelines-03.txt
because it is based on a new version of the checklist that the MIB
Doctors have been discussing on the mreview list.  You are the first
guinea pigs :)

1.) I-D Boilerplate -- OK

2.) Abstract -- OK

3.) MIB Boilerplate -- OK

4.) Security Considerations Section -- this section does not comply
with the Security Guidelines for IETF MIB Modules at
http://www.ops.ietf.org/mib-security.html.  Editorially, the
material appears in an unexpected order, which makes it hard it hard
to read.  Also, there are several redundant/obsolete paragraphs that
appear to be the result of splicing the text from the current
guidelines onto the front of the old security text.  There are also
some substantive deficiencies.  Because of this I believe that a
rewrite is needed before submission to the IESG.  Specific
suggestions follow.

(a) The opening paragraph, viz.,

  There are a number of management objects defined in this MIB module
  with a MAX-ACCESS clause of read-write and/or read-create.  Such
  objects may be considered sensitive or vulnerable in some network
  environments.  The support for SET operations in a non-secure
  environment without proper protection can have a negative effect on
  network operations.

is fine.  However, the MIB security guidelines say:

-- if you have any read-write and/or read-create objects, please
-- describe their specific sensitivity or vulnerability.

and I have interpreted that to mean that the sensitivity or
vulnerability of all read-write and read-create objects has to be
explicitly described.  That description is supposed to follow the
first paragraph.  I don't see any such descriptions.  The
read-create objects in this MIB module are:

hdsl2ShdslSpanConfNumRepeaters
hdsl2ShdslSpanConfProfile
hdsl2ShdslSpanConfAlarmProfile
hdsl2ShdslEndpointAlarmConfProfile
hdsl2ShdslMaintLoopbackConfig
hdsl2ShdslMaintPowerBackOff
hdsl2ShdslMaintSoftRestart
hdsl2ShdslMaintLoopbackTimeout
hdsl2ShdslSpanConfWireInterface
hdsl2ShdslSpanConfMinLineRate
hdsl2ShdslSpanConfMaxLineRate
hdsl2ShdslSpanConfPSD
hdsl2ShdslSpanConfTransmissionMode
hdsl2ShdslSpanConfRemoteEnabled
hdsl2ShdslSpanConfPowerFeeding
hdsl2ShdslSpanConfCurrCondTargetMarginDown
hdsl2ShdslSpanConfWorstCaseTargetMarginDown
hdsl2ShdslSpanConfCurrCondTargetMarginUp
hdsl2ShdslSpanConfWorstCaseTargetMarginUp
hdsl2ShdslSpanConfUsedTargetMargins
hdsl2ShdslSpanConfReferenceClock
hdsl2ShdslSpanConfLineProbeEnable
hdsl2ShdslSpanConfProfileRowStatus
hdsl2ShdslEndpointThreshLoopAttenuation
hdsl2ShdslEndpointThreshSNRMargin
hdsl2ShdslEndpointThreshES
hdsl2ShdslEndpointThreshSES
hdsl2ShdslEndpointThreshCRCanomalies
hdsl2ShdslEndpointThreshLOSWS
hdsl2ShdslEndpointThreshUAS
hdsl2ShdslEndpointAlarmConfProfileRowStatus

Some of these objects undoubtedly could, if misconfigured, cause
traffic disruptions. Others (such as hdsl2ShdslEndpointThreshSNRMargin
and hdsl2ShdslEndpointThreshLoopAttenuation) could possibly be
misconfigured in such a way as to allow notification floods.  Some
might cause only minor (or maybe even no) ill effects.  Whatever
is the case, this section needs to spell that out explicitly for
each writeable object.  If some considerations apply to several
objects, it is of course OK to say to list the those objects rather
than repeating the text for each;  the important thing is to make
the information available for every writeable object.

The following text (which is presently in the draft) is NOT an
acceptable substitute for the specific descriptions required by the
guidelines.  Furthermore, the first sentence is simply wrong, since
it contradicts the recommendation elsewhere in the text to use
SNMPv3 security to do just the thing that it it says is out of
scope.

  Blocking unauthorized access to the HDSL2-SHDSL MIB via the element
  management system is outside the scope of this document.  It should
  be noted that access to the MIB permits the unauthorized entity to
  modify the profiles such that both subscriber service and network
  operations can be interfered with.  Subscriber service can be altered
  by modifying any of a number of service characteristics such as rate
  partitioning and maximum transmission rates.  Network operations can
  be impacted by modification of notification thresholds such as SES
  thresholds.

(b) The text on readable objects and the remainder of the
boilerplate should be condensed and reorganized into standard form.
I suggest:

  Some of the readable objects in this MIB module ( i.e., objects with
  a MAX-ACCESS other than not-accessible) may be considered sensitive
  or vulnerable in some network environments.  In particular, certain
  objects will reveal information about which vendor's equipment is in
  use on the network, which in many enviromments may be considered
  sensitive for competitive reasons.  It is thus important to control
  even GET and/or NOTIFY access to these objects and possibly even to
  encrypt their values when sending them over the network via SNMP.

  These identifying objects in the inventory group are:

  - hdsl2ShdslInvVendorID
  - hdsl2ShdslInvVendorModelNumber
  - hdsl2ShdslInvVendorSerialNumber
  - hdsl2ShdslInvVendorEOCSoftwareVersion
  - hdsl2ShdslInvStandardVersion
  - hdsl2ShdslInvVendorListNumber
  - hdsl2ShdslInvVendorIssueNumber
  - hdsl2ShdslInvVendorSoftwareVersion
  - hdsl2ShdslInvEquipmentCode
  - hdsl2ShdslInvVendorOther
  - hdsl2ShdslInvTransmissionModeCapability

  SNMP versions prior to SNMPv3 did not include adequate security.
  Even if the network itself is secure (for example by using IPSec),
  even then, there is no control as to who on the secure network is
  allowed to access and GET/SET (read/change/create/delete) the objects
  in this MIB module.

  It is RECOMMENDED that implementers consider the security features as
  provided by the SNMPv3 framework (see [RFC3410], section 8),
  including full support for the SNMPv3 cryptographic mechanisms (for
  authentication and privacy).

  Further, deployment of SNMP versions prior to SNMPv3 is NOT
  RECOMMENDED.  Instead, it is RECOMMENDED to deploy SNMPv3 and to
  enable cryptographic security.  It is then a customer/operator
  responsibility to ensure that the SNMP entity giving access to an
  instance of this MIB module is properly configured to give access to
  the objects only to those principals (users) that have legitimate
  rights to indeed GET or SET (change/create/delete) them.

  It should be noted that interface indices in this MIB module are
  maintained persistently.  View-based Access Control Model (VACM)
  data relating to these should be stored persistently.

(c) Regarding this:

  HDSL2-SHDSL layer connectivity from the xtuR will permit the
  subscriber to manipulate both the HDSL2-SHDSL link directly and the
  HDSL2-SHDSL embedded operations channel (EOC) for their own loop.
  For example, unchecked or unfiltered fluctuations initiated by the
  subscriber could generate sufficient notifications to potentially
  overwhelm either the management interface to the network or the
  element manager.

It is not sufficient just to state that notification flooding can
occur.  It is necessary to provide a mechanism to prevent it.  Cf.
the following discussion on the mreview list from December 2002:

| On Sat, 28 Dec 2002 Bert Wijnen wrote:
| > >    2) DoS attacks (as described in some of the ADSL MIBs'
| > >      security considerations sections) based on the
| > >      conditions under which notifications are generated.
| > >
| > Mmm... I wonder... in the end it depends on
| > - having proper access control to those objects that control/limit
| >  the sending of notifications (for example access to the tables in
| >  RFC3413).
| > - ensuring that no notification flooding will take place.
| >  That I guess depends on proper mib design and the MIB doctors should
| >  be looking for such issues. I don't think it is OK to just say that
| >  DoS attacks are possible. Better to build in controls to prevent it.
|
| There is now text in 4.7 to the effect that notifications which can
| be generated by rapidly changing external conditions SHOULD have a
| rate-limiting mechanism in order to avoid overwhelming the network
| with floods of notifications.  RFC 2108/RFC 2737 are cited as examples.

The "text in 4.7" referred to above is this:

  In many cases notifications will be triggered by external events, and
  sometimes it will be possible for those external events to occur at a
  sufficiently rapid rate that sending a notification for each
  occurrence would overwhelm the network.  In such cases a mechanism
  MUST be provided for limiting the rate at which the notification can
  be generated.  A common technique is to require that the notification
  generator use throttling -- that is, to require that it generate no
  more than one notification for each event source in any given time
  interval of duration T.  The throttling period T MAY be configurable,
  in which case it is specified in a MIB object, or it MAY be fixed, in
  which case it is specified in the notification definition.  Examples
  of the fixed time interval technique can be found in the SNMP-
  REPEATER-MIB [RFC2108] and in the ENTITY-MIB [RFC2737bis].

If I correctly understood what I read in the MIB module (and it is
certainly possible that I did not), then it would appear that the
notifications that could be flooded in case of fluctuations
initiated by the subscriber are hdsl2ShdslLoopAttenCrossing and
hdsl2ShdslSNRMarginCrossing, which are controlled by the writeable
objects hdsl2ShdslEndpointThreshLoopAttenuation and
hdsl2ShdslEndpointThreshSNRMargin.  At the very least the user
should be warned that incorrect configuration of these objects could
lead to that exposure (cf. (a) above).  You may also want to
consider adding a throttling mechanism to those notifications.  As
far as I could tell, the other notifications are already
rate-controlled.

(d) Regarding this:

  It is conceivable that a management application that was designed to
  support G.SHDSL as defined in RFC 3276 [RFC3276] could be broken by a
  G.shdsl.bis agent which reports objects for additional wire pairs (as
  noted in Section 7).

  For example, if a management application blindly loaded object
  instances into an array until the object changes (during repeated
  GET-NEXT requests).  It is anticipated that the modifications to the
  management application code would be straightforward.

This is not really a security issue, it is an implementation
consideration, and it is already dealt with (very well, I might add)
in the Implementation Analysis section.  Please remove it from here.

(e) Please get rid of all redundant/obsolete stuff from previous
versions of the security boilerplate.  If you include the material I
requested in (a) and (b) above that should be enough.

5.) IANA Considerations Section -- OK

6.) References -- there are a few minor issues here.

(a) I don't think that RFC 3276 should be normative, since it is not
necessary to consult with it in order to implement the new revision
of the MIB module.  Please move it to the Informative References
section.

(b) The current version of Security Guidelines for IETF MIB Modules
at http://www.ops.ietf.org/mib-security.html no longer requires the
USM and VACM documents as references.  If as requested in (4) above
the Security Considerations section is rewritten to conform to the
guidelines, then [RFC3414] and [RFC3415] will no longer be needed
and so should be eliminated (the RFC Editor will remove them if
there is no citation in the text.)

(c) there are some typos in informative reference [RFC3410]:
OLD:
  [RFC3410]  Case, J., Mindy, R., Partain, D. and B. Stewart,
              "Introduction and Applicability Statements for Internet
              Standard Management Framework", RFC 3410, December 2002.
NEW:
  [RFC3410]  Case, J., Mundy, R., Partain, D. and B. Stewart,
              "Introduction and Applicability Statements for Internet-
              Standard Management Framework", RFC 3410, December 2002.

(d) For completeness, I verified that the documents containing MIB
modules from which definitions are imported (viz., RFCs 2578, 2579,
2863, 3593, 3411, and 2580) are included among the Normative
References and that they are cited in the text.

7.) Copyright Notices -- OK

8.) IPR Notice -- I see the following paragraph that is not actually
required by RFC 3668:

  The IETF has been notified of intellectual property rights claimed
  in regard to some or all of the specification contained in this
  document.  For more information consult the online list of claimed
  rights.

I don't think that this is a problem, however, since this text will
be reviewed and if necessary revised during the RFC publication
process.

9.) Other issues -- editorial nits, typos, and anything mentioned in
http://www.ietf.org/ID-Checklist.html that are not covered elsewhere:

(a) typo/punctuation in second paragraph of Section 3.1.2:
OLD:
  The following attributes are part of the mandatory ifGeneral group in
  RFC 2863 [RFC2863], and are not duplicated in the HDSL2/SHDSL Line
  MIB.
NEW:
  The following attributes are part of the mandatory
  ifGeneralInformationGroup in RFC 2863 [RFC2863] and are not
  duplicated in the HDSL2/SHDSL Line MIB.

(b) in Figure 1, the following was omitted:

      ifAlias                  See interfaces MIB [RFC2863].

(c) in the DESCRIPTION clause of hdsl2ShdslSpanConfUsedTargetMargins:
OLD:
        "Contains indicates whether a target SNR margin is enabled or
        disabled.  This is a bit-map of possible settings.  The
        various bit positions are:
NEW:
        "Indicates whether a target SNR margin is enabled or
        disabled.  This is a bit-map of possible settings.  The
        various bit positions are:

(d) punctuation in next-to-last paragraph of Section 7:
OLD:
  A management application intended to manage G.shdsl.bis agents,
  should be modified to accept this sequence.
NEW:
  A management application intended to manage G.shdsl.bis agents
  should be modified to accept this sequence.

10.) Technical content -- review of actual technical content for
compliance with :

(a) MIB compilation:

Running smilint identified no errors or warnings.

Running smidiff to evaluate the changes with respect to rfc3276
produced numerous messages.  The ones that warrant comment are
discussed below.

HDSL2-SHDSL-LINE-MIB.mi2:418 [3] {range-changed} range of type used
in `hdsl2ShdslStatusMaxAttainableLineRate' changed from
`(0..4112000)' to `(0..4294967295)'
HDSL2-SHDSL-LINE-MIB.mi2:432 [3] {range-changed} range of type used
in `hdsl2ShdslStatusActualLineRate' changed from
`(0..4112000)' to `(0..4294967295)'
HDSL2-SHDSL-LINE-MIB.mi2:1646 [3] {range-changed} range of type used
in `hdsl2ShdslSpanConfMinLineRate' changed from
`(0..4112000)' to `(0..4294967295)'
HDSL2-SHDSL-LINE-MIB.mi2:1664 [3] {range-changed} range of type used
in `hdsl2ShdslSpanConfMaxLineRate' changed from
`(0..4112000)' to `(0..4294967295)'

These are flagged as level 3 by smidiff because liberalization of a
range is not among the changes permitted by RFC 2578.  However, I
think that what you are doing here is correcting a bug in the
original MIB module by relaxing an arbitrarily restrictive subrange,
and I agree that it is a good thing to do.  Furthermore, I see that
SYNTAX refinements have been added to the compliance statement
requiring only the subrange (0..4112000) for these objects:

HDSL2-SHDSL-LINE-MIB.mi2:2362 [5] {refinement-added} warning:
object refinement for `hdsl2ShdslStatusMaxAttainableLineRate'
added to `hdsl2ShdslLineMibCompliance'
HDSL2-SHDSL-LINE-MIB.mi2:2370 [5] {refinement-added} warning:
object refinement for `hdsl2ShdslStatusActualLineRate' added
to `hdsl2ShdslLineMibCompliance'
HDSL2-SHDSL-LINE-MIB.mi2:2378 [5] {refinement-added} warning:
object refinement for `hdsl2ShdslSpanConfMinLineRate' added
to `hdsl2ShdslLineMibCompliance'
HDSL2-SHDSL-LINE-MIB.mi2:2386 [5] {refinement-added} warning:
object refinement for `hdsl2ShdslSpanConfMaxLineRate' added
to `hdsl2ShdslLineMibCompliance'

I see also that this issue is explicitly discussed in Section 7 of
the text, which I would not have asked for but which is a very good
idea.  So I think you are good to go on this score.

I see also that some enumerations have been added in a couple of
places.  One is in the definition of the Hdsl2ShdslWirePair TC:

HDSL2-SHDSL-LINE-MIB.mi2:221 [5] {named-number-added} warning: named
number `wirePair3' added to type `Hdsl2ShdslWirePair'
HDSL2-SHDSL-LINE-MIB.mi2:221 [5] {named-number-added} warning: named
number `wirePair4' added to type `Hdsl2ShdslWirePair'

This TC is used in the definition of hdsl2ShdslEndpointWirePair:

HDSL2-SHDSL-LINE-MIB.mi2:740 [5] {named-number-added} warning: named
number `wirePair3' added to type used in `hdsl2ShdslEndpointWirePair'
HDSL2-SHDSL-LINE-MIB.mi2:740 [5] {named-number-added} warning: named
number `wirePair4' added to type used in `hdsl2ShdslEndpointWirePair'

which is an INDEX object used only in tables that do not support
dynamic row creation.  Thus, the agent decides unilaterally for
which values a row is instantiated, hence adding these values has no
effect on the semantics of the compliance statement.  So this is OK.

Another place is in the definition of hdsl2ShdslSpanConfWireInterface:

HDSL2-SHDSL-LINE-MIB.mi2:1628 [5] {named-number-added} warning: named
number `sixWire' added to type used in `hdsl2ShdslSpanConfWireInterface'
HDSL2-SHDSL-LINE-MIB.mi2:1628 [5] {named-number-added} warning: named
number `eightWire' added to type used in `hdsl2ShdslSpanConfWireInterface'

and I see that it now has a refinement so that only the original
values twoWire(1) and fourWire(2) are required to be supported:

HDSL2-SHDSL-LINE-MIB.mi2:2350 [5] {refinement-added} warning:
object refinement for `hdsl2ShdslSpanConfWireInterface' added
to `hdsl2ShdslLineMibCompliance'

So you are good to go here, too.

I see that there are some new objects:

HDSL2-SHDSL-LINE-MIB.mi2:453 [5] {node-added} warning: column
`hdsl2ShdslStatusMaxAttainablePayloadRate' has been added
HDSL2-SHDSL-LINE-MIB.mi2:467 [5] {node-added} warning: column
`hdsl2ShdslStatusActualPayloadRate' has been added
HDSL2-SHDSL-LINE-MIB.mi2:1141 [5] {node-added} warning: column
`hdsl2ShdslEndpointCurrTipRingReversal' has been added
HDSL2-SHDSL-LINE-MIB.mi2:1155 [5] {node-added} warning: column
`hdsl2ShdslEndpointCurrActivationState' has been added

and that they are packaged into two new object groups:

HDSL2-SHDSL-LINE-MIB.mi2:2645 [5] {node-added} warning: group
`hdsl2ShdslWirePairGroup' has been added
HDSL2-SHDSL-LINE-MIB.mi2:2658 [5] {node-added} warning: group
`hdsl2ShdslPayloadRateGroup' has been added

which in turn have been added to the compliance statement as
optional groups:

DSL2-SHDSL-LINE-MIB.mi2:2338 [2] {option-added} optional group
`hdsl2ShdslWirePairGroup' added to `hdsl2ShdslLineMibCompliance'
HDSL2-SHDSL-LINE-MIB.mi2:2344 [2] {option-added} optional group
`hdsl2ShdslPayloadRateGroup' added to `hdsl2ShdslLineMibCompliance'

Again, these are flagged at level 2 since RFC 2580 does not
specifically permit adding optional groups to a compliance
statement.  However this really is OK since it does not change
the semantics.  So you are good to go here, too.

(b) I have also verified that all the changes reported by smidiff
are accounted for in the current REVISION clause change log.

This concludes the review of draft-ietf-adslmib-gshdslbis-07.txt.

Mike Heard
2005-01-10
11 Bert Wijnen Status date has been changed to 2005-01-10 from 2005-01-03
2005-01-03
11 Bert Wijnen State Changes to AD Evaluation from Publication Requested by Bert Wijnen
2005-01-03
11 Bert Wijnen
2005-01-03
11 Bert Wijnen Status date has been changed to 2005-01-03 from
2004-11-17
11 Barbara Fuller Draft Added by Barbara Fuller in state Publication Requested
2004-10-15
07 (System) New version available: draft-ietf-adslmib-gshdslbis-07.txt
2004-09-29
06 (System) New version available: draft-ietf-adslmib-gshdslbis-06.txt
2004-09-10
05 (System) New version available: draft-ietf-adslmib-gshdslbis-05.txt
2004-08-27
04 (System) New version available: draft-ietf-adslmib-gshdslbis-04.txt
2004-06-28
02 (System) New version available: draft-ietf-adslmib-gshdslbis-02.txt
2004-06-08
01 (System) New version available: draft-ietf-adslmib-gshdslbis-01.txt
2004-03-25
00 (System) New version available: draft-ietf-adslmib-gshdslbis-00.txt