YANG Module for NETCONF Monitoring
draft-ietf-netconf-monitoring-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2010-07-08
|
15 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2010-07-08
|
15 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2010-07-08
|
15 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-07-07
|
15 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-07-02
|
15 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2010-07-01
|
15 | (System) | IANA Action state changed to In Progress |
2010-07-01
|
15 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2010-07-01
|
15 | Cindy Morgan | IESG has approved the document |
2010-07-01
|
15 | Cindy Morgan | Closed "Approve" ballot |
2010-06-27
|
15 | David Harrington | [Ballot comment] |
2010-06-27
|
15 | David Harrington | [Ballot discuss] |
2010-06-27
|
15 | David Harrington | [Ballot Position Update] Position for David Harrington has been changed to No Objection from Discuss by David Harrington |
2010-06-23
|
15 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel |
2010-06-21
|
15 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-06-21
|
15 | (System) | New version available: draft-ietf-netconf-monitoring-15.txt |
2010-06-18
|
15 | (System) | Removed from agenda for telechat - 2010-06-17 |
2010-06-17
|
15 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2010-06-17
|
15 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2010-06-17
|
15 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
2010-06-17
|
15 | Adrian Farrel | [Ballot comment] Section 3.1 Are there no other negative responses to get-schema? What about policy failures? --- Please think about whether the Reference clauses that … [Ballot comment] Section 3.1 Are there no other negative responses to get-schema? What about policy failures? --- Please think about whether the Reference clauses that cite RFC4741 should actually point to 4741bis. |
2010-06-17
|
15 | Adrian Farrel | [Ballot discuss] I think [4741bis] is used normatively. Please makeit a normative reference. --- Aren't the RFCs cited from Reference clauses really normative references? (As … [Ballot discuss] I think [4741bis] is used normatively. Please makeit a normative reference. --- Aren't the RFCs cited from Reference clauses really normative references? (As Dave says, to avoid citation issues, you should include some text such as... "This module makes use of references to [1], [2], ..." ) |
2010-06-17
|
15 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2010-06-17
|
15 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2010-06-16
|
15 | David Harrington | [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically … [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically say that section 2 is a "non-normative overview", so that if there are errata that lead to conflicts between 2 and 5, there is no question that section 2 is non-normative, and section 5 is normative. 2) login-time. since clocks on the server and client can differ, this should say the "Time at the server at which the session was established." 3) source-host: this is the netconf client? (which could be different than, say, the SSH client or the TLS client, etc.) 4) leaf source-host s/is likely to be implementation-specific /is implementation-specific |
2010-06-16
|
15 | David Harrington | [Ballot discuss] Hmmm, my DISCUSS comments were not included in the datatracker. Saving and emailing again. Good job. I am glad to see this work … [Ballot discuss] Hmmm, my DISCUSS comments were not included in the datatracker. Saving and emailing again. Good job. I am glad to see this work and the YANG work progressing. I have a few thinsg i think should be addressed before this is approved as a standard. 1) username - in ISMS we had a lot of trouble determining when and if the user-name from SSH was actually available, and the SSH username can be blank (IIRC). In other transport authentication schemes, a username may not be available. But this information might be critical for use in access control decisions, which currently are implementation-specific. Security considerations does not discuss this potential problem. In ISMS, SSHTM permitted transformations from the "username" used by the transport to a management-system specific identifier. In USM, this is also done via a user table assignment. You should be careful about locking yourself in. 2) existing security infrastructures, such as SSH, may offer features that would make doing a direct mapping between user-name and the nsm username. Because naming policies might differ between administrative domains, many SSH client software packages support a user@hostname:port addressing syntax that operators can use to align non-equivalent account names. The SnmpSSHAddress Textual Convention echos this common SSH notation. Again, you might want to avoid a direct mapping requirement. I recommend removing the statement about how username is set from SSH, and simply state that the identity is established by the Netconf transport protocol. Let the Netconf-ssh decide how to establish a username. 3) the algorithm to derive the username is implementation-specific. The security considerations should discuss that different implementations might derive the same username for different users, so the value might not be comparable across implementatons. In ISMS, we addressed the issue that an SSH transport model might come up wth a name, and then a TLS transport model come up with the same name, even within the same management system. Given that the username might be used to identify who made an undesirable change, and to discipline that person, this is a pretty big "well, maybe this means this user, and maybe it means that user." 4) Your use of "RFC XXXX" is ambiguous. "identity YANG" and "identity yin" call for a reference to RFC XXXX (the YANG RFC), as does the "module" and "revision" statements (the monitoring RFC). These are different XXXX's. 5) container sessions has an exclusion statement that can be interpreted different ways: "Any session not managed by the NETCONF server ... MUST be excluded" versus "(Any session ... with session identifier 0) MUST be excluded" versus "(Any session not managed ... with session identifier 0) MUST be excluded" (which would exclude all non-zero sessions) Can you tighten this? 6) To avoid unused reference warnings from idnits, in MIB modules we specify outside the module itself what normative references exist in the module and provide citations. |
2010-06-16
|
15 | David Harrington | [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically … [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically say that section 2 is a "non-normative overview", so that if there are errata that lead to conflicts between 2 and 5, there is no question that section 2 is non-normative, and section 5 is normative. 2) login-time. since clocks on the server and client can differ, this should say the "Time at the server at which the session was established." 3) source-host: this is the netconf client? (which could be different than, say, the SSH client or the TLS client, etc.) 4) leaf source-host s/is likely to be implementation-specific /is implementation-specific |
2010-06-16
|
15 | David Harrington | [Ballot discuss] Good job. I ma glad to see this work and the YANG work progressing. I have a few thinsg i think should be … [Ballot discuss] Good job. I ma glad to see this work and the YANG work progressing. I have a few thinsg i think should be addressed before this is approved as a standard. 1) username - in ISMS we had a lot of trouble determining when and if the user-name from SSH was actually available, and the SSH username can be blank (IIRC). In other transport authentication schemes, a username may not be available. But this information might be critical for use in access control decisions, which currently are implementation-specific. Security considerations does not discuss this potential problem. In ISMS, SSHTM permitted transformations from the "username" used by the transport to a management-system specific identifier. In USM, this is also done via a user table assignment. You should be careful about locking yourself in. 2) existing security infrastructures, such as SSH, may offer features that would make doing a direct mapping between user-name and the nsm username. Because naming policies might differ between administrative domains, many SSH client software packages support a user@hostname:port addressing syntax that operators can use to align non-equivalent account names. The SnmpSSHAddress Textual Convention echos this common SSH notation. Again, you might want to avoid a direct mapping requirement. I recommend removing the statement about how username is set from SSH, and simply state that the identity is established by the Netconf transport protocol. Let the Netconf-ssh decide how to establish a username. 3) the algorithm to derive the username is implementation-specific. The security considerations should discuss that different implementations might derive the same username for different users, so the value might not be comparable across implementatons. In ISMS, we addressed the issue that an SSH transport model might come up wth a name, and then a TLS transport model come up with the same name, even within the same management system. Given that the username might be used to identify who made an undesirable change, and to discipline that person, this is a pretty big "well, maybe this means this user, and maybe it means that user." 4) Your use of "RFC XXXX" is ambiguous. "identity YANG" and "identity yin" call for a reference to RFC XXXX (the YANG RFC), as does the "module" and "revision" statements (the monitoring RFC). These are different XXXX's. 5) container sessions has an exclusion statement that can be interpreted different ways: "Any session not managed by the NETCONF server ... MUST be excluded" versus "(Any session ... with session identifier 0) MUST be excluded" versus "(Any session not managed ... with session identifier 0) MUST be excluded" (which would exclude all non-zero sessions) Can you tighten this? 6) To avoid unused reference warnings from idnits, in MIB modules we specify outside the module itself what normative references exist in the module and provide citations. |
2010-06-16
|
15 | David Harrington | [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically … [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically say that section 2 is a "non-normative overview", so that if there are errata that lead to conflicts between 2 and 5, there is no question that section 2 is non-normative, and section 5 is normative. 2) login-time. since clocks on the server and client can differ, this should say the "Time at the server at which the session was established." 3) source-host: this is the netconf client? (which could be different than, say, the SSH client or the TLS client, etc.) 4) leaf source-host s/is likely to be implementation-specific /is implementation-specific |
2010-06-16
|
15 | David Harrington | [Ballot discuss] Good job. I ma glad to see this work and the YANG work progressing. I have a few thinsg i think should be … [Ballot discuss] Good job. I ma glad to see this work and the YANG work progressing. I have a few thinsg i think should be addressed before this is approved as a standard. 1) username - in ISMS we had a lot of trouble determining when and if the user-name from SSH was actually available, and the SSH username can be blank (IIRC). In other transport authentication schemes, a username may not be available. But this information might be critical for use in access control decisions, which currently are implementation-specific. Security considerations does not discuss this potential problem. In ISMS, SSHTM permitted transformations from the "username" used by the transport to a management-system specific identifier. In USM, this is also done via a user table assignment. You should be careful about locking yourself in. 2) existing security infrastructures, such as SSH, may offer features that would make doing a direct mapping between user-name and the nsm username. Because naming policies might differ between administrative domains, many SSH client software packages support a user@hostname:port addressing syntax that operators can use to align non-equivalent account names. The SnmpSSHAddress Textual Convention echos this common SSH notation. Again, you might want to avoid a direct mapping requirement. I recommend removing the statement about how username is set from SSH, and simply state that the identity is established by the Netconf transport protocol. Let the Netconf-ssh decide how to establish a username. 3) the algorithm to derive the username is implementation-specific. The security considerations should discuss that different implementations might derive the same username for different users, so the value might not be comparable across implementatons. In ISMS, we addressed the issue that an SSH transport model might come up wth a name, and then a TLS transport model come up with the same name, even within the same management system. Given that the username might be used to identify who made an undesirable change, and to discipline that person, this is a pretty big "well, maybe this means this user, and maybe it means that user." 4) Your use of "RFC XXXX" is ambiguous. "identity YANG" and "identity yin" call for a reference to RFC XXXX (the YANG RFC), as does the "module" and "revision" statements (the monitoring RFC). These are different XXXX's. 5) container sessions has an exclusion statement that can be interpreted different ways: "Any session not managed by the NETCONF server ... MUST be excluded" versus "(Any session ... with session identifier 0) MUST be excluded" versus "(Any session not managed ... with session identifier 0) MUST be excluded" (which would exclude all non-zero sessions) Can you tighten this? 6) To avoid unused reference warnings from idnits, in MIB modules we specify outside the module itself what normative references exist in the module and provide citations. |
2010-06-16
|
15 | David Harrington | [Ballot Position Update] Position for David Harrington has been changed to Discuss from No Objection by David Harrington |
2010-06-16
|
15 | David Harrington | [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically … [Ballot comment] 1) section provides an overview of data "which MUST be present". "MUST" is usually used to specify normative behavior. I suggest you specifically make section 2 a "non-normative overview", so that if there are errata that lead to conflicts between 2 and 5, there is no question that section 2 is non-normative, and section 5 is normative. 2) login-time. since clocks on the server and client can differ, this should say the "Time at the server at which the session was established." 3) source-host: this is the netconf client? (which could be different than, say, the SSH client or the TLS client, etc.) 4) username - in ISMS we had a lot of trouble determining when and if the user-name from SSH was actually available, and the SSH username can be blank (IIRC). |
2010-06-16
|
15 | David Harrington | [Ballot Position Update] New position, No Objection, has been recorded by David Harrington |
2010-06-16
|
15 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2010-06-16
|
15 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2010-06-16
|
15 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
2010-06-16
|
15 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot discuss] |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss by Peter Saint-Andre |
2010-06-15
|
15 | Sean Turner | [Ballot comment] I support Tim's DISCUSS position. |
2010-06-15
|
15 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded by Sean Turner |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot comment] |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot discuss] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is … [Ballot discuss] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is supported in version "0.1" and "0.2"... a. Two entries: (i) /identifier="foobar" + /version="0.1" (ii) /identifier="foobar" + /version="0.2" b. One entry with a structured version string (e.g., comma-separated values): /identifier="foobar" + version="0.1,0.2" Which is it? Please specify. (I realize there is an example in Section 4.1, but that's not enough.) 2. The format attribute defines "the data modeling language the schema is written in (currently xsd, yang, yin, rng or rnc)." But these strings are not data modeling languages -- at best they are acronyms or file endings or media types. I realize that developers "know" what these strings stand for, but they are unspecified. It might also be helpful to establish a registry of these values. 3. For the /netconf-state/sessions subtree, the list of allowable transports is unspecified, and even the listed transports (e.g., "netconf-soap") are not referenced in any way. This needs to be specified more clearly. It might also be helpful to establish a registry of these values. |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded by Peter Saint-Andre |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot comment] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is … [Ballot comment] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is supported in version "0.1" and "0.2"... a. Two entries: (i) /identifier="foobar" + /version="0.1" (ii) /identifier="foobar" + /version="0.2" b. One entry with a structured version string (e.g., comma-separated values): /identifier="foobar" + version="0.1,0.2" Which is it? 2. The format attribute defines "the data modeling language the schema is written in (currently xsd, yang, yin, rng or rnc)." But these strings are not data modeling languages -- at best they are acronyms or file endings or media types. I realize that developers "know" what these strings stand for, but they are unspecified. |
2010-06-15
|
15 | Tim Polk | [Ballot discuss] This discuss is a placeholder for already agreed updates to the security considerations section. I will clear when the new draft appears or … [Ballot discuss] This discuss is a placeholder for already agreed updates to the security considerations section. I will clear when the new draft appears or for an RFC Editor note inserting the following at the beginning of the security considerations: The YANG module defined in this memo is designed to be accessed via the NETCONF protocol [RFC4741]. The lowest NETCONF layer is the secure transport layer and the mandatory to implement secure transport is SSH [RFC4742]. |
2010-06-15
|
15 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2010-06-15
|
15 | Peter Saint-Andre | [Ballot comment] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is … [Ballot comment] 1. For the /netconf-state/schemas subtree, how are multiple versions of a given schema represented? I see two options if the schema "foobar" is supported in version "0.1" and "0.2"... a. Two entries: (i) /identifier="foobar" + /version="0.1" (ii) /identifier="foobar" + /version="0.2" b. One entry with a structured version string (e.g., comma-separated values): /identifier="foobar" + version="0.1,0.2" Which is it? |
2010-06-15
|
15 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded by Ron Bonica |
2010-06-15
|
15 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov |
2010-06-15
|
15 | Alexey Melnikov | [Ballot comment] 2.1.3. The /netconf-state/schemas Subtree version (string) Version of the schema supported. Multiple versions MAY be supported simultaneously by … [Ballot comment] 2.1.3. The /netconf-state/schemas Subtree version (string) Version of the schema supported. Multiple versions MAY be supported simultaneously by a NETCONF server. Is this related to YANG revision? 2.1.4. The /netconf-state/sessions Subtree transport (identityref, transport) Identifies transport for each session, e.g. "netconf-ssh", "netconf-soap", etc. Are you planning to have a registry for these? 3.1. The Operation format (identityref, schema-format): The data modeling language of the schema. Default value is 'yang' when not specified. Optional parameter. Are you planning to have a registry for these? 4.1. Retrieving Schema List via Operation The response data can be used to determine the available schema and their versions. The schema itself (i.e., schema content) is not returned in the response. The optional element contains a URI, which can be used to retrieve the schema by another protocol such as ftp or http(s), or the special value 'NETCONF', which means Informative references to documents defining HTTP and FTP are needed here. that the schema can be retrieved from the device via the operation. |
2010-06-14
|
15 | Lars Eggert | [Ballot comment] Contains several unused references. |
2010-06-14
|
15 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2010-06-11
|
15 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Alan DeKok. |
2010-06-07
|
15 | Dan Romascanu | [Ballot Position Update] New position, Yes, has been recorded for Dan Romascanu |
2010-06-07
|
15 | Dan Romascanu | Ballot has been issued by Dan Romascanu |
2010-06-07
|
15 | Dan Romascanu | Created "Approve" ballot |
2010-06-07
|
15 | Dan Romascanu | Placed on agenda for telechat - 2010-06-17 by Dan Romascanu |
2010-06-07
|
15 | Dan Romascanu | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Dan Romascanu |
2010-06-01
|
14 | (System) | New version available: draft-ietf-netconf-monitoring-14.txt |
2010-05-26
|
13 | (System) | New version available: draft-ietf-netconf-monitoring-13.txt |
2010-05-13
|
15 | Amanda Baber | IANA comments: NOTE: We make assignments upon approval, but we won't have an RFC number until publication. Unless the RFC Editor provides the number earlier, … IANA comments: NOTE: We make assignments upon approval, but we won't have an RFC number until publication. Unless the RFC Editor provides the number earlier, we'll have to use "RFC-ietf-netconf-monitoring-12" as a temporary placeholder in the second assignment's ID and URI string. Upon approval of this document, IANA will make the following assignments in the XML NS registry at http://www.iana.org/assignments/xml-registry/ns.html ID: ietf-netconf-monitoring URI: urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring Registration template: (per section 8) Reference: [RFC-ietf-netconf-monitoring-12] ID: ietf-netconf-monitoring:RFC-ietf-netconf-monitoring-12 URI: urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring:RFC-ietf-netconf-monitoring-12 Registration template: (per section 8) Reference: [RFC-ietf-netconf-monitoring-12] |
2010-05-12
|
15 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2010-05-03
|
15 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Alan DeKok |
2010-05-03
|
15 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Alan DeKok |
2010-04-28
|
15 | Amy Vezza | Last call sent |
2010-04-28
|
15 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2010-04-28
|
15 | Dan Romascanu | Last Call was requested by Dan Romascanu |
2010-04-28
|
15 | (System) | Ballot writeup text was added |
2010-04-28
|
15 | (System) | Last call text was added |
2010-04-28
|
15 | (System) | Ballot approval text was added |
2010-04-28
|
15 | Dan Romascanu | State Changes to Last Call Requested from AD Evaluation by Dan Romascanu |
2010-04-26
|
15 | Dan Romascanu | State Changes to AD Evaluation from Publication Requested by Dan Romascanu |
2010-03-01
|
15 | Amy Vezza | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? I, Mehmet Ersue, am the Document Shepard for this document. I have personally reviewed this version of the document and I believe it is ready for publication. Adequate review has occurred from WG members, and it has been reviewed especially by Bert Wijnen, Andy Bierman, Juergen Schoenwaelder, Phil Shafer, Balazs Lengyel and Dan Romascanu. The issues raised in these reviews have been discussed on the mailing list and fixed in the last versions. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has had adequate review from working group and non-working group members, mostly from NETCONF and NETMOD WGs. I do not have concerns about the depth or breadth of review. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. There are no concerns about the technical merit of the document. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is strong consensus to publish this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. There are no issues. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The document has split references into normative and informative. NETCONF Monitoring draft uses the NETCONF modeling language YANG, which is going to be published in parallel in NETMOD WG. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document IANA section is complete and consistent with RFC 3688. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Yes. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary This document defines a NETCONF data model to be used to monitor the NETCONF protocol. The monitoring data model includes information about NETCONF datastores, sessions, locks and statistics. This data facilitates the management of a NETCONF server. This document also defines methods for NETCONF clients to discover data models supported by a NETCONF server and defines a new NETCONF operation to retrieve them. Working Group Summary This document has been longly discussed in the Working Group, including several WG Last Calls. The comments and reviews helped to improve the document a lot and the current version reflects the consensus of the Working Group. After a long debate the WG decided to use the YANG modeling language to model the NETCONF Monitoring Data Model. This makes this document dependent on the YANG modeling language. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? YANG experts from NETMOD WG reviewed the YANG data module and validated with available YANG validation tools. |
2010-03-01
|
15 | Amy Vezza | Draft Added by Amy Vezza in state Publication Requested |
2010-03-01
|
15 | Amy Vezza | [Note]: 'Mehmet Ersue (mehmet.ersue@nsn.com) is the Document Shepard for this document.' added by Amy Vezza |
2010-02-23
|
12 | (System) | New version available: draft-ietf-netconf-monitoring-12.txt |
2010-02-02
|
11 | (System) | New version available: draft-ietf-netconf-monitoring-11.txt |
2009-11-30
|
10 | (System) | New version available: draft-ietf-netconf-monitoring-10.txt |
2009-10-14
|
09 | (System) | New version available: draft-ietf-netconf-monitoring-09.txt |
2009-09-28
|
08 | (System) | New version available: draft-ietf-netconf-monitoring-08.txt |
2009-07-13
|
07 | (System) | New version available: draft-ietf-netconf-monitoring-07.txt |
2009-07-13
|
06 | (System) | New version available: draft-ietf-netconf-monitoring-06.txt |
2009-06-25
|
05 | (System) | New version available: draft-ietf-netconf-monitoring-05.txt |
2009-03-09
|
04 | (System) | New version available: draft-ietf-netconf-monitoring-04.txt |
2008-11-03
|
03 | (System) | New version available: draft-ietf-netconf-monitoring-03.txt |
2008-06-25
|
02 | (System) | New version available: draft-ietf-netconf-monitoring-02.txt |
2008-02-26
|
01 | (System) | New version available: draft-ietf-netconf-monitoring-01.txt |
2008-01-15
|
00 | (System) | New version available: draft-ietf-netconf-monitoring-00.txt |