Network Configuration Protocol (NETCONF)
draft-ietf-netconf-4741bis-10
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the No Objection position for Jari Arkko |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the Yes position for Alexey Melnikov |
2012-08-22
|
10 | (System) | post-migration administrative database adjustment to the Yes position for David Harrington |
2011-04-01
|
10 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2011-03-31
|
10 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2011-03-31
|
10 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2011-03-28
|
10 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-03-28
|
10 | (System) | IANA Action state changed to In Progress |
2011-03-26
|
10 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-03-25
|
10 | Amy Vezza | IESG state changed to Approved-announcement sent |
2011-03-25
|
10 | Amy Vezza | IESG has approved the document |
2011-03-25
|
10 | Amy Vezza | Closed "Approve" ballot |
2011-03-25
|
10 | Amy Vezza | Approval announcement text regenerated |
2011-03-25
|
10 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup. |
2011-03-25
|
10 | Amy Vezza | Ballot writeup text changed |
2011-03-15
|
10 | David Harrington | [Ballot comment] I cleared |
2011-03-15
|
10 | David Harrington | [Ballot Position Update] Position for David Harrington has been changed to Yes from Discuss |
2011-03-15
|
10 | Dan Romascanu | Ballot writeup text changed |
2011-03-15
|
10 | Alexey Melnikov | [Ballot comment] I am balloting Yes, but please check a couple of remaining comments. 4.3. Element error-tag: Contains a string identifying the error condition. … [Ballot comment] I am balloting Yes, but please check a couple of remaining comments. 4.3. Element error-tag: Contains a string identifying the error condition. See Appendix A for allowed values. Is the list of error conditions extensible? If yes, where can they be found? If not, it would be better to be explicit about this, in particular the document should mention that addition of a new error tag value would require capability version increment. 7.8. Negative Response: An element is included in the if the request cannot be completed for any reason. How is this possible? What can the client do next if the operation fails? [I haven't checked if the following were addressed:] I am also agreeing with David's DISCUSS points # 1 and # 2, and I also think that Peter's Comment point # 1 is worth being DISCUSS level. |
2011-03-15
|
10 | Alexey Melnikov | [Ballot discuss] |
2011-03-15
|
10 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to Yes from Discuss |
2011-03-14
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-03-14
|
10 | (System) | New version available: draft-ietf-netconf-4741bis-10.txt |
2011-03-11
|
10 | David Harrington | [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config … [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config files or databases, should it be human-readable? ascii? utf-8? 2) should the format be predictable, so the operator can determine what the NC username will be, given a knowledge of the corresponding identifier in the secure transport protocol? |
2011-03-09
|
10 | David Harrington | The crux of my discuss for 4741bis is that the netconf username will be used by other things, such as CLIs, scripts, YANG, etc. and … The crux of my discuss for 4741bis is that the netconf username will be used by other things, such as CLIs, scripts, YANG, etc. and should be in a format compatible with expected usage. Expected usage appears to include embedding in XML documents, YANG data models, native CLI handling, and string matching (such as during lookup in a proprietary or standardized access control system). I don't care whether the format of the netconf username is compatible with section 2.2 of the XML specification, or with RFC 6020's string data type, or ascii, or some other choice of the WG (although I recommend using something standardized). The (implicit) expectation should be made explicit in documentation (and I think 4741bis makes the most sense to define the expected format of a netconf username). dbh |
2011-03-09
|
10 | Jari Arkko | [Ballot Position Update] Position for Jari Arkko has been changed to No Objection from Discuss |
2011-03-07
|
10 | David Harrington | [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config … [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config files or databases, should it be human-readable? ascii? utf-8? 2) should the format be predictable, so the operator can determine what the NC username will be, given a knowledge of the corresponding identifier in the secure transport protocol? 3) commit MUST revert at 600 secs, but timeout is configurable., what if somebody sets it to 700 seconds? MUST it still revert at 600? Can a low timeout cause a denial of service? ** resolved by an RFC Editor note ** |
2011-03-05
|
10 | Alexey Melnikov | [Ballot discuss] This is a well written document and I am planning to ballot Yes once my comments are resolved/discussed. 1). 7.3. Example: … [Ballot discuss] This is a well written document and I am planning to ballot Yes once my comments are resolved/discussed. 1). 7.3. Example: https://user@example.com:passphrase/cfg/new.txt This doesn't seem to be a valid HTTPS URI (note, you have the passphrase where the port number is). |
2011-03-05
|
10 | Alexey Melnikov | [Ballot comment] 1.3. Capabilities A NETCONF capability is a set of functionality that supplements the base NETCONF specification. The capability is identified by … [Ballot comment] 1.3. Capabilities A NETCONF capability is a set of functionality that supplements the base NETCONF specification. The capability is identified by a uniform resource identifier (URI). A normative reference ("[5]") is needed here. 3. XML Considerations All NETCONF messages MUST be well-formed XML, encoded in UTF-8. A Normative reference to UTF-8 is needed here. 4.3. Element error-tag: Contains a string identifying the error condition. See Appendix A for allowed values. Is the list of error conditions extensible? If yes, where can they be found? 7.8. Negative Response: An element is included in the if the request cannot be completed for any reason. How is this possible? What can the client do next if the operation fails? 7.9. Comment: I am missing some text here about authorization to kill other sessions. Is any NETCONF session A can kill any session B? I think this is covered by the Security Considerations, but a reader wouldn't find this information until much later in the document. 8.1. Capabilities Exchange A server receiving a element MUST close the NETCONF session. Similarly, a client that does not receive a element in the server's message MUST close the NETCONF session. Do you mean by sending ? I am also agreeing with David's DISCUSS points # 1 and # 2, and I also think that Peter's Comment point # 1 is worth being DISCUSS level. |
2011-03-05
|
10 | Alexey Melnikov | [Ballot discuss] This is a well written document and I am planning to ballot Yes once my comments are resolved/discussed. 1). 7.3. Example: … [Ballot discuss] This is a well written document and I am planning to ballot Yes once my comments are resolved/discussed. 1). 7.3. Example: https://user@example.com:passphrase/cfg/new.txt This doesn't seem to be a valid HTTPS URI (note, you have the passphrase where the port number is). What is the format of the data being retrieved from the source for HTTPS/HTTP? 2). 8.1. Capabilities Exchange urn:ietf:params:netconf:base:1.1 urn:ietf:params:netconf:capability:startup:1.0 http://example.net/router/2.3/myfeature Does this mean that leading/trailing whitespaces are insignificant in the data? If it doesn't, then the example is incorrect and need fixing, e.g.: http://example.net/router/2.3/myfeature 4 3). 8.8.5.1. The :url capability modifies the operation to accept the element as an alternative to the parameter. 8.8.5.2. The :url capability modifies the operation to accept the element as the value of the and the parameters. The file that the url refers to contains the complete datastore, encoded in XML under the element "config" in the "urn:ietf:params:xml:ns:netconf:base:1.0" namespace. 8.8.5.3. The :url capability modifies the operation to accept the element as the value of the parameters. 8.8.5.4. The :url capability modifies the operation to accept the element as the value of the parameter. How do these operations map to HTTP? |
2011-03-04
|
10 | Samuel Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Tina Tsou. |
2011-03-03
|
10 | Cindy Morgan | Removed from agenda for telechat |
2011-03-03
|
10 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-03-03
|
10 | Jari Arkko | [Ballot comment] Some comments from Ari Keränen: 4.3. Element Shouldn't the "t" namespace be defined in the error-path examples? 7.9. There is no discussion on … [Ballot comment] Some comments from Ari Keränen: 4.3. Element Shouldn't the "t" namespace be defined in the error-path examples? 7.9. There is no discussion on who is allowed to kill whose sessions. I'd assume user is allowed to kills his own sessions (i.e., sessions associated with the same NETCONF username), but how about other sessions? If this is out of scope for this document, could at least say that it "depends on local policy". 8.3.5.1. , , , and Is really *any* operation (including ones defined in future documents) allowed here, or just one of the operations mentioned in the title? The text seems to imply the latter, but the example the former. 8.4.1. Description The confirmed-commit functionality is unclear. One paragraph (before the current 2nd paragraph) really explaining how this works would be helpful. That is, when/why would one send confirmed commit and what kind of messages/parameters you need at each stage. 8.6.4.1. A validate operation can fail for any of the following reasons: Would it be OK to fail validation for some other reason? 8.8.5.3. The :url capability modifies the operation to accept the element as the value of the parameters. What should the server do if it gets URL in the delete-config? Delete the (local copy of the) config retrieved from the address pointed by the URL? Delete the file pointed by the URL? Appendix C. YANG Module for NETCONF Protocol Operations reference "RFC XXXX, section YYY"; Should add the correct section number (multiple times in the Appendix C). |
2011-03-03
|
10 | Jari Arkko | [Ballot discuss] The document does not seem to specify who is allowed kill sessions. Shouldn't that be specified? |
2011-03-03
|
10 | Jari Arkko | [Ballot Position Update] New position, Discuss, has been recorded |
2011-03-03
|
10 | Jari Arkko | [Ballot comment] 4.3. Element Shouldn't the "t" namespace be defined in the error-path examples? 7.9. There is no discussion on who is allowed to kill … [Ballot comment] 4.3. Element Shouldn't the "t" namespace be defined in the error-path examples? 7.9. There is no discussion on who is allowed to kill whose sessions. I'd assume user is allowed to kills his own sessions (i.e., sessions associated with the same NETCONF username), but how about other sessions? If this is out of scope for this document, could at least say that it "depends on local policy". 8.3.5.1. , , , and Is really *any* operation (including ones defined in future documents) allowed here, or just one of the operations mentioned in the title? The text seems to imply the latter, but the example the former. 8.4.1. Description The confirmed-commit functionality is unclear. One paragraph (before the current 2nd paragraph) really explaining how this works would be helpful. That is, when/why would one send confirmed commit and what kind of messages/parameters you need at each stage. 8.6.4.1. A validate operation can fail for any of the following reasons: Would it be OK to fail validation for some other reason? 8.8.5.3. The :url capability modifies the operation to accept the element as the value of the parameters. What should the server do if it gets URL in the delete-config? Delete the (local copy of the) config retrieved from the address pointed by the URL? Delete the file pointed by the URL? Appendix C. YANG Module for NETCONF Protocol Operations reference "RFC XXXX, section YYY"; Should add the correct section number (multiple times in the Appendix C). |
2011-03-03
|
10 | Dan Romascanu | Ballot writeup text changed |
2011-03-03
|
10 | Alexey Melnikov | [Ballot discuss] This is a placeholder DISCUSS which (by agreement with Dan) I am entering before I finish my review of the document before March … [Ballot discuss] This is a placeholder DISCUSS which (by agreement with Dan) I am entering before I finish my review of the document before March 10th. Then I will either clear or enter a proper DISCUSS. I am also agreeing with David's DISCUSS points # 1 and # 2, and I also think that Peter's Comment points # 1 and # 4 are worth being DISCUSS level. |
2011-03-03
|
10 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded |
2011-03-03
|
10 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-03
|
10 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-02
|
10 | Tim Polk | [Ballot comment] (1) 2.2. paragraph 1 - last sentence is awkward. In general connections are encrypted "in" an algorithm (e.g., AES) or "using" a protocol … [Ballot comment] (1) 2.2. paragraph 1 - last sentence is awkward. In general connections are encrypted "in" an algorithm (e.g., AES) or "using" a protocol (e.g., TLS). Suggest: s/encrypted in TLS [16] or SSH [14]/encrypted using TLS [16] or SSH [14]/ (2) 3.1. Namespace Should this text reference the namespace base:1.1 instead of base:1.0 ?? (3) The example in 6.2.2 Attribute Match Expressions references containment nodes and selection nodes, which are described in 6.2.3 and 6.2.4, respectively. It might be cleaner to reorder as 6.2.2 Containment Nodes, 6.2.3 Selection Nodes, and 6.2.4 Attribute Match Expressions so that concepts are introduced sequentially (4) Section 8.1 The following sentence implies that clients can attack other sessions by guessing session-ids: A server receiving a element MUST close the NETCONF session. I believe the intent was as follows: A server receiving a element that includes a element MUST ignore the session-id and close the NETCONF session. If that is the intent, I suggest the latter wording. (5) Section 9. Security Considerations, paragraph five states: Configuration information is by its very nature sensitive. Its transmission in the clear and without integrity checking leaves devices open to classic eavesdropping attacks. Configuration information often contains passwords, user names, service descriptions, and topological information, all of which are sensitive. Because of this, this protocol SHOULD be implemented carefully with adequate attention to all manner of attack one might expect to experience with other management interfaces. The clause "and without integrity checking" is not relevant to eavesdropping attacks. Suggest: s/classic eavesdropping attacks/classic eavesdropping and false data injection attacks/ |
2011-03-02
|
10 | Tim Polk | [Ballot comment] (1) 2.2. paragraph 1 - last sentence is awkward. In general connections are encrypted "in" an algorithm (e.g., AES) or "using" a protocol … [Ballot comment] (1) 2.2. paragraph 1 - last sentence is awkward. In general connections are encrypted "in" an algorithm (e.g., AES) or "using" a protocol (e.g., TLS). Suggest: s/encrypted in TLS [16] or SSH [14]/encrypted using TLS [16] or SSH [14]/ (2) 3.1. Namespace Should this text reference the namespace base:1.1 instead of base:1.0 ?? (3) The example in 6.2.2 Attribute Match Expressions references containment nodes and selection nodes, which are described in 6.2.3 and 6.2.4, respectively. It might be cleaner to reorder as 6.2.2 Containment Nodes, 6.2.3 Selection Nodes, and 6.2.4 Attribute Match Expressions so that concepts are introduced sequentially (4) Section 9. Security Considerations, paragraph five states: Configuration information is by its very nature sensitive. Its transmission in the clear and without integrity checking leaves devices open to classic eavesdropping attacks. Configuration information often contains passwords, user names, service descriptions, and topological information, all of which are sensitive. Because of this, this protocol SHOULD be implemented carefully with adequate attention to all manner of attack one might expect to experience with other management interfaces. The clause "and without integrity checking" is not relevant to eavesdropping attacks. Suggest: s/classic eavesdropping attacks/classic eavesdropping and false data injection attacks/ |
2011-03-02
|
10 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about … [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about comments, processing instructions, and internal or external entity references? 2. In Section 6.2.5, 'for which the element is equal to "fred"' is more precisely expressed as 'for which XML character data of the element is equal to "fred"'. (The same text occurs in Section 6.4.5.) 3. Section 6.4.3 states: In a real data model, the would not likely be returned with the list of users for a particular host or network. Why not? 4. In Section 7.5, is the server allowed to terminate a lock for reasons other than session closure? If not, it appears than an entity could maintain a lock indefinitely. 5. In Appendix B, it seems that some of the enumerated datatypes could be changed from xs:string to something more restrictive, such as xs:NMTOKEN (e.g., error types, error tags, error severity, edit operation type). |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about … [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about comments, processing instructions, and internal or external entity references? 2. In Section 6.2.5, 'for which the element is equal to "fred"' is more precisely expressed as 'for which XML character data of the element is equal to "fred"'. (The same text occurs in Section 6.4.5.) 3. Section 6.4.3 states: In a real data model, the would not likely be returned with the list of users for a particular host or network. Why not? 4. In Section 7.5, is the server allowed to terminate a lock for reasons other than session closure? If not, it appears than an entity could maintain a lock indefinitely. |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about … [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about comments, processing instructions, and internal or external entity references? 2. In Section 6.2.5, 'for which the element is equal to "fred"' is more precisely expressed as 'for which XML character data of the element is equal to "fred"'. (The same text occurs in Section 6.4.5.) 3. Section 6.4.3 states: In a real data model, the would not likely be returned with the list of users for a particular host or network. Why not? |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about … [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about comments, processing instructions, and internal or external entity references? 2. In Section 6.2.5, 'for which the element is equal to "fred"' is more precisely expressed as 'for which XML character data of the element is equal to "fred"'. |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-02
|
10 | Peter Saint-Andre | [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about … [Ballot comment] 1. DTDs are forbidden (presumably you mean internal or external DTD subsets in accordance with section 2.8 of the XML specification). What about comments, processing instructions, and internal or external entity references? 2. |
2011-03-02
|
10 | Adrian Farrel | [Ballot comment] I am entering a No Objection position on the basis of the Yes ballots fromt the Ops ADs. Appendix C seems to claim … [Ballot comment] I am entering a No Objection position on the basis of the Yes ballots fromt the Ops ADs. Appendix C seems to claim that "this value is pre-determined by RFC 4741" but since 4741 is now obsoleted (by this document) you should find some new text. |
2011-03-02
|
10 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-02
|
10 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-02
|
10 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-01
|
10 | Lars Eggert | [Ballot comment] Section 2 should have a requirement that NETCONF transport that are to be used over the Internet MUST implement congestion control, in accordance … [Ballot comment] Section 2 should have a requirement that NETCONF transport that are to be used over the Internet MUST implement congestion control, in accordance with RFC2914. It can also simply note that all NETCONF transports that use TCP (such as the SSH transport) automatically fulfill this requirement. (This really is a no-brainer. I just want to prevent a future argument when someone wants to do a "lightweight" NETCONF transport over UDP...) |
2011-03-01
|
10 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss |
2011-03-01
|
10 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-01
|
10 | David Harrington | [Ballot comment] 1) copyright in yang module needs updating. 2) appendix F doesn't mention dropping the local file requirement for URLs, 3) terminology should probably … [Ballot comment] 1) copyright in yang module needs updating. 2) appendix F doesn't mention dropping the local file requirement for URLs, 3) terminology should probably define username, not user. It is doubtful username is commonly referred, since it did not exist in 1.0. 4) I found the use of RFC2119 laniguage rather inconsistent. Some uses of "can" probbaly should have been MAY. Some uses of "are" probbaly should have been MUST, to ensure interoperability. 5) I support Lars' Discuss. There is no requirement to use a transport protocol that provides congestion control. If a transport is used that does not already provide congestion control, then the NC transport should provide congestion control. It is RECOMMENDED to use an existing transprt standard that provides congestion control. |
2011-03-01
|
10 | David Harrington | [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config … [Ballot discuss] 1) should there be constraints on the basic format of username? if it is expected to be specified by an operator in config files or databases, should it be human-readable? ascii? utf-8? 2) should the format be predictable, so the operator can determine what the NC username will be, given a knowledge of the corresponding identifier in the secure transport protocol? 3) commit MUST revert at 600 secs, but timeout is configurable., what if somebody sets it to 700 seconds? MUST it still revert at 600? Can a low timeout cause a denial of service? |
2011-03-01
|
10 | David Harrington | [Ballot Position Update] New position, Discuss, has been recorded |
2011-03-01
|
10 | Russ Housley | [Ballot comment] Please add a sentence to the Abstract that indicates that this document obsoletes RFC 4741. |
2011-03-01
|
10 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-03-01
|
10 | Ron Bonica | [Ballot comment] Rob Enns has left Juniper Networks. We need an updated affiliation for him. |
2011-03-01
|
10 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded |
2011-03-01
|
10 | Lars Eggert | [Ballot discuss] Section 2 should have a requirement that NETCONF transport that are to be used over the Internet MUST implement congestion control, in accordance … [Ballot discuss] Section 2 should have a requirement that NETCONF transport that are to be used over the Internet MUST implement congestion control, in accordance with RFC2914. It can also simply note that all NETCONF transports that use TCP (such as the SSH transport) automatically fulfill this requirement. (This really is a no-brainer. I just want to prevent a future argument when someone wants to do a "lightweight" NETCONF transport over UDP...) |
2011-03-01
|
10 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded |
2011-02-26
|
10 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Tina Tsou |
2011-02-26
|
10 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Tina Tsou |
2011-02-22
|
10 | Dan Romascanu | [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu |
2011-02-22
|
10 | Dan Romascanu | Ballot has been issued |
2011-02-22
|
10 | Dan Romascanu | Created "Approve" ballot |
2011-02-22
|
10 | Dan Romascanu | State changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup. |
2011-02-22
|
10 | Dan Romascanu | Placed on agenda for telechat - 2011-03-03 |
2011-02-16
|
10 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Tina Tsou. |
2011-02-12
|
09 | (System) | New version available: draft-ietf-netconf-4741bis-09.txt |
2011-02-11
|
10 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-02-11
|
08 | (System) | New version available: draft-ietf-netconf-4741bis-08.txt |
2011-02-09
|
10 | Dan Romascanu | State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead. |
2011-02-07
|
10 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-02-04
|
10 | Amanda Baber | IANA understands that, upon approval of this document, there are four actions that IANA needs to complete. First, in the IEFT XML namespace registry located … IANA understands that, upon approval of this document, there are four actions that IANA needs to complete. First, in the IEFT XML namespace registry located at: http://www.iana.org/assignments/xml-registry/ns.html a new namespace is to be registered as follows: ns: netconf:base:1.0 URI: urn:ietf:params:xml:ns:netconf:base:1.0 Registration template: NONE Reference: [RFC-to-be] Second, in the IANA XML schema registry located at: http://www.iana.org/assignments/xml-registry/schema.html a new schema is to be registered as follows: ID: netconf URI: urn:ietf:params:xml:schema:netconf Filename: [as provided in Appendix B of the approved document] Reference: [RFC-to-be] Third, in the YANG Module Names subregistry of the Yang parameters registry located at: http://www.iana.org/assignments/yang-parameters/yang-parameters.xhtml a new module is to be added to the registry as follows: name: ietf-netconf namespace: urn:ietf:params:xml:ns:netconf:base:1.0 prefix: nc module: [left blank] reference: [RFC-to-be] Fourth, in the Network Configuration Protocol (NETCONF) Capability URNs registry located at: http://www.iana.org/assignments/netconf-capability-urns/netconf-capability-urns.xhtml the references for the existing, registered URNs should be updated to reference [RFC-to-be]. In addition, the matrix entry for the Network Configuration Protocol (NETCONF) Capability URNs registry should be updated to reference [RFC-to-be]. IANA understand that this document adds no new registration to the the Network Configuration Protocol (NETCONF) Capability URNs registry, but simply updates the references of the existing registrations. IANA understands that these are the only actions that need to be completed upon approval of this document. |
2011-02-04
|
10 | Rolf Winter | Request for Last Call review by TSVDIR Completed. Reviewer: Rolf Winter. |
2011-01-26
|
10 | David Harrington | Request for Last Call review by TSVDIR is assigned to Rolf Winter |
2011-01-26
|
10 | David Harrington | Request for Last Call review by TSVDIR is assigned to Rolf Winter |
2011-01-25
|
10 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Tina Tsou |
2011-01-25
|
10 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Tina Tsou |
2011-01-24
|
10 | Amy Vezza | Last call sent |
2011-01-24
|
10 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Network Configuration Protocol (NETCONF)) to Proposed Standard The IESG has received a request from the Network Configuration WG (netconf) to consider the following document: - 'Network Configuration Protocol (NETCONF)' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-02-07. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-netconf-4741bis/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-netconf-4741bis/ |
2011-01-24
|
10 | Dan Romascanu | Last Call was requested |
2011-01-24
|
10 | Dan Romascanu | State changed to Last Call Requested from Publication Requested. |
2011-01-24
|
10 | Dan Romascanu | Last Call text changed |
2011-01-24
|
10 | (System) | Ballot writeup text was added |
2011-01-24
|
10 | (System) | Last call text was added |
2011-01-24
|
10 | (System) | Ballot approval text was added |
2011-01-20
|
10 | Cindy Morgan | State changed to Publication Requested from AD is watching. |
2011-01-20
|
10 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Bert Wijnen is the document shepherd. Yes, I have reviewed the document many times, including this version 7, that I believe is ready for forwarding to the AD/IESG (this is a small, mainly editorial update after the revision 06 was on HOLD in the AD Queue). (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had wide review and re-reviews of NETCONF WG members. I do not have any concerns regarding the level of review for this document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? I do not believe any extra special review (other than normal IETF Last Call) is needed. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. I do not have any specific concerns. No IPR disclosure been filed as far as we know. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The content of the document has strong WG consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No-one has threatened with an appeal or expressed extreme discontent. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Document passes ID-nits (as shown by the IETF idnits tool: http://tools.ietf.org/idnits?url=http://tools.ietf.org/id/ draft-ietf-netconf-4741bis-07.txt (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. References are split in Normative and Informative. All normative documents have been published except draft-ietf-netconf-rfc4742bis, but that is also being submitted for IESG consideration as proposed standard. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? IANA considerations are present and complete. No new namespaces are created and so no new Expert is needed. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The YANG and XSD modules have been checked by Martin Bjorklund. XSD also checked by co-chair Mehmet and I (Bert) have checked YANG. Both are found to be valid. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as Remote Procedure Calls (RPC). This revision of the document clarifies some text and fixes some minor bugs as found from implementatition experience of rfc4741. Working Group Summary The working group went over several versions of the document. The comments and reviews helped improve the document a lot and brought us to consensus on the 7th revision of the docuemnt. Document Quality There are implementations of this protocol, and in fact the rfc4741bis revision is based on implementation experience of that rfc. |
2011-01-16
|
07 | (System) | New version available: draft-ietf-netconf-4741bis-07.txt |
2010-11-25
|
10 | Dan Romascanu | State changed to AD is watching from Publication Requested. At the request of the WG chairs the AD is watching while the WG debates the … State changed to AD is watching from Publication Requested. At the request of the WG chairs the AD is watching while the WG debates the solution to the EOM problem which may lead to a revised ID. |
2010-10-27
|
10 | Dan Romascanu | Document write-up by Bert Wijnen: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document … Document write-up by Bert Wijnen: (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Bert Wijnen is the document shepherd. Yes, I have reviewed the document many times, including this version 6, that I believe is ready for forwarding to the AD/IESG. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had wide review and re-reviews of NETCONF WG members. I do not have any concerns regarding the level of review for this document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? I do not believe any extra special review (other than normal IETF Last Call) is needed. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. I do not have any specific concerns. No IPR disclosure been filed as far as we know. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The content of the document has strong WG consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No-one has threatened with an appeal or expressed extreme discontent. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Document passes ID-nits (as shown by the IETF idnits tool: http://tools.ietf.org/idnits?url=http://tools.ietf.org/id/ draft-ietf-netconf-4741bis-06.txt There are no errors, but there are a few comments and warnings. We're addressing those, but we're in ID-cutoff, so we cannot submit a fixed version immediately. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. References are split in Normative and Informative. All normative documents have been published except draft-ietf-netconf-rfc4742bis, but that is also being submitted for IESG consideration as proposed standard. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? IANA considerations are present and complete. No new namespaces are created and so no new Expert is needed. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The YANG and XSD modules have been checked by Martin Bjorklund. Both are found to be valid. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as Remote Procedure Calls (RPC). This revision of the document clarifies some text and fixes some minor bugs (including reported rfc4741 errata) as found from implementatition experience of rfc4741. Working Group Summary The working group went over several versions of the document. The comments and reviews helped improve the document a lot and brought us to consensus on the 6th revision of the docuemnt. Document Quality There are implementations of this protocol, and in fact the rfc4741bis revision is based on implementation experience. |
2010-10-26
|
10 | Cindy Morgan | [Note]: 'Bert Wijnen (bertietf@bwijnen.net) is the document shepherd.' added by Cindy Morgan |
2010-10-26
|
10 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Bert Wijnen is the document shepherd. Yes, I have reviewed the document many times, including this version 6, that I believe is ready for forwarding to the AD/IESG. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had wide review and re-reviews of NETCONF WG members. I do not have any concerns regarding the level of review for this document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? I do not believe any extra special review (other than normal IETF Last Call) is needed. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. I do not have any specific concerns. No IPR disclosure been filed as far as we know. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The content of the document has strong WG consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No-one has threatened with an appeal or expressed extreme discontent. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Document passes ID-nits (as shown by the IETF idnits tool: http://tools.ietf.org/idnits?url=http://tools.ietf.org/id/ draft-ietf-netconf-4741bis-06.txt There are no errors, but there are a few comments and warnings. We're addressing those, but we're in ID-cutoff, so we cannot submit a fixed version immediately. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. References are split in Normative and Informative. All normative documents have been published except draft-ietf-netconf-rfc4742bis, but that is also being submitted for IESG consideration as proposed standard. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? IANA considerations are present and complete. No new namespaces are created and so no new Expert is needed. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The YANG and XSD modules have been checked by Martin Bjorklund. Both are found to be valid. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as Remote Procedure Calls (RPC). This revision of the document clarifies some text and fixes some minor bugs (including reported rfc4741 errata) as found from implementatition experience of rfc4741. Working Group Summary The working group went over several versions of the document. The comments and reviews helped improve the document a lot and brought us to consensus on the 6th revision of the docuemnt. Document Quality There are implementations of this protocol, and in fact the rfc4741bis revision is based on implementation experience. |
2010-10-26
|
10 | Cindy Morgan | Draft Added by Cindy Morgan in state Publication Requested |
2010-10-25
|
06 | (System) | New version available: draft-ietf-netconf-4741bis-06.txt |
2010-10-20
|
05 | (System) | New version available: draft-ietf-netconf-4741bis-05.txt |
2010-08-23
|
04 | (System) | New version available: draft-ietf-netconf-4741bis-04.txt |
2010-07-12
|
03 | (System) | New version available: draft-ietf-netconf-4741bis-03.txt |
2010-02-04
|
02 | (System) | New version available: draft-ietf-netconf-4741bis-02.txt |
2010-01-14
|
10 | (System) | Document has expired |
2009-07-13
|
01 | (System) | New version available: draft-ietf-netconf-4741bis-01.txt |
2009-03-04
|
00 | (System) | New version available: draft-ietf-netconf-4741bis-00.txt |