[RTG-DIR] Routing Directorate QA review of draft-ietf-i2rs-rib-data-model-05

John G.Scudder <jgs@juniper.net> Fri, 03 June 2016 22:13 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5354E12D871; Fri, 3 Jun 2016 15:13:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Level:
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=junipernetworks.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pmvU3zKfjg04; Fri, 3 Jun 2016 15:13:05 -0700 (PDT)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0144.outbound.protection.outlook.com [207.46.100.144]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 211B012D9B5; Fri, 3 Jun 2016 15:13:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=junipernetworks.onmicrosoft.com; s=selector1-juniper-net; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=ryybbwTVkPPT9Ok7v0HdB5I1U8v2yQXlAbXu1GO7dYc=; b=PI81GVYBJupI1F9FA0oW46vYRT0ZEwdSuy21qIzmoWMOrQEd51szclogaGMbd93zdF2ih6e+MyYwyVpKb/FldqhQ0uRcOd9qYuoS6QMp0vIXlls8UGrKLst848oKqVAhcxBzJ47NztgUNIOkmJRoqiHuvlkjoRAt0eUd5XGTq6w=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=juniper.net;
Received: from rcaceres-sslvpn-nc.jnpr.net (66.129.241.11) by CY1PR05MB2730.namprd05.prod.outlook.com (10.167.18.12) with Microsoft SMTP Server (TLS) id 15.1.511.8; Fri, 3 Jun 2016 22:13:00 +0000
From: "John G.Scudder" <jgs@juniper.net>
Content-Type: multipart/mixed; boundary="Apple-Mail=_AFF5F2DF-B671-42BD-885B-3FAB9441256F"
Date: Fri, 03 Jun 2016 18:12:51 -0400
Message-ID: <F9C09DAA-6540-4E0D-8A7C-63FB58B54B73@juniper.net>
To: i2rs-chairs@ietf.org, draft-ietf-i2rs-rib-data-model@ietf.org
MIME-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
X-Mailer: Apple Mail (2.3124)
X-Originating-IP: [66.129.241.11]
X-ClientProxiedBy: BY2PR02CA0116.namprd02.prod.outlook.com (10.163.44.170) To CY1PR05MB2730.namprd05.prod.outlook.com (10.167.18.12)
X-MS-Office365-Filtering-Correlation-Id: cfa4823b-929a-4c32-0e42-08d38bfc3b16
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 2:fiPHeqKFFrXk9fky7zp0YSgfjAcwlvWIeaR734Q2wT6Iglk4FV2LUtz/DjWL7vb0nGwB0QjVWqjnjrqKm3uxZRS7oqFM+a/LQX+ysLyGwMjjXQildNqWTH9eG3A3rS5Noqo41J6U2wOnfMrmFE4hR0O/iKm19eejOv8Pu3CqSS7RVqbcQpcgReN9usmUNKOv; 3:M5+D92xUo/8JwJZnaUKSkm0hC5OXSBmNQ5vJRe63ia/iWMWkkEOzYQ2t2JaCYeDF9wJ2TH9kIxj1gtn/9JYHMxbigKB9WjfCaLvzfRaFEM5+OPVqNRZDsnIeZFw10idF
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR05MB2730;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 25: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
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 20: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
X-Microsoft-Antispam-PRVS: <CY1PR05MB2730DADEB3BDE06CE8E8A499AA590@CY1PR05MB2730.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(788757137089);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(102415321)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026); SRVR:CY1PR05MB2730; BCL:0; PCL:0; RULEID:; SRVR:CY1PR05MB2730;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 4:gtvA1x1RMRNf4pzgNEno25eOZclZDr8uPf13Wr1E5RcKdLuubGaoUeDOLKq7fNqmYDtO4FNYV1EZ68ZeMtKSnltd+AjKxwyomSnFi5NLoyxEDnZB2F5cjNEUiHukjZefzgvCHM0JLkgSzZEiCrO3qrxstHywHpOyzzvHxZdZybgYh01yH3RnqdCO+Wf3vJqDYBgLi5MDKy1IhqVTTR0n28CzU/gQ/1WVXZRY5kt29Za9iY1xNvG5rU4JODqt3+95rI8Bwrw3TkJ39ldE0/WKv5LnqnYJ59yJ8kwc0IOtaR7KZehN00zea8/DJJ24atbDvfa1Vr0ZW8ERfK9w5DCuNV8O1RfjDz1UouSZI+FpisUOm3ro7JgCAETp6I0autjjiV0aTYmOy9rqtRbSQry+0EWziS3QE+T05VJ+WTqAXEnFB1e5ZEX3gtG0O5fNo6uIU8U/lQvTcqIDjYJn2Twb8kmgw0z75KqgiRDg1QolMdw=
X-Forefront-PRVS: 0962D394D2
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6009001)(50986999)(450100001)(8676002)(5001770100001)(57306001)(4326007)(2906002)(5890100001)(5008740100001)(36756003)(21490400002)(15975445007)(230783001)(50226002)(77096005)(66066001)(86362001)(189998001)(42186005)(512874002)(84326002)(6116002)(21480400002)(586003)(4610100001)(82746002)(2476003)(92566002)(270700001)(3846002)(568964002)(229853001)(5004730100002)(53416004)(83716003)(81166006)(33656002)(4810100001)(19580395003)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR05MB2730; H:rcaceres-sslvpn-nc.jnpr.net; FPR:; SPF:None; MLV:sfv; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 23:C0CalBz86rc66jU7Xi+DNuapZCBo4n48sVJcUYxXdZI72wiPnfQAQDUyeb8SFKOVh6onGpBXoCpnBtar068YdW4KgsL57tHWoP+iuHs1d0G9LZ/j3RUD2ZkLzF6YX4YYJP0zhIz10fDGRukKqckSd7V0u/cvqoTakLSifyAFWWLZ9M0QJhEqzK6IIxw5uAF3D+8ds92mb7L7rfT+oVwAwjgSKgup7tE5frwoGiF9yYNifw1jFl+BNWRJo9y3q7SW/3pAYbHBSTYgsnBWak/uaifaUbmIGvx9V1Lfj+ZEOBopJhneCfg81HScL27/F80ZWm4nBQjPIqGQknGgCzGimL3SdVZeCbI9hbYTliALIatebUCMEzgSSRAD61ELz4ofraCqgIzzeuwAbb4QwSp+06DU2x24ZluRERsAbaPQxBicxLRUZyZgQz2Vc1RS5DkMQzW6zOZkyruJvpanRyrkWwnXGadwHZjEs9icqTa1l9CNK00mO5b1o4pR/+VqXa6fNC7GzfNYzTUc6iqWrMNNdbxoiFcAK1s/Q8Oz/Bk4HTVapQu8/8kkSp6eeI50dfXTnZXOGOXDnWwuULcwtOLC3cOzCAttU9tWCxP3FS961WJJaoUC82olnBJiTQ4dTajctw7O93AfGZHtzjCcIWY9Kn9TvGDmWy8iubtare0XhHyOB6uCj4thAtMHlKGrxqGH7GYknd9yxVHseEFHi6JGKzuvaTDGFsdVjTUqkrkfxe73nXOB051XD3v2mnJCrfBqhsoAo14XIVb8CCss+JQVBBVOsts4EGxTnsxzexACDdxTaOpj48BIPKBK7YoVE7AQx0Fdxrz0Pfib1dLUNKMOJHyIqkkC882VRJ4a6FvtHYa0x7Szwkz/lU+e8BrhGfuNyTVeMXQxPZalPemtbb+tHeeXpkEvmNhtC31LCUxq26TmFAW9n6sMDpj8SSKSAk9NlyZg+0ijy3cSghBMLNZEsIt7xM7jO5heD5G5LiZuORwkNfFVuNS1BsBnKtHW6u+WuF+r+ZSIiO0LuhammsfVjIzKbgh7MHQUbM6Kdb7GsMrCJurIeaRtS1rptr7FAXsfW1S3p7AeRIouIUXEOJYCLoyJdgsxKJZyudI6EXaK++/FxNqH7u0okSsUQV/7sc1J
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2730; 5:/mqeXbcBFDGS6zMixWFtpZulRKNzFI3mExrqINdhYrJ7RP1yDpmL6Pd4e7AFg3FxgOWWGKMcg7Hjbog6Xs7/lI+YNDsJo50r0Z9l8O1xZF7WSTR7/AS++wrMmwktDppVjm/Djs0QQA0c4tS6U8yJYQ==; 24:TrBkPYBLyQ7eDW/ZRTHAtbbB2dp/Z728fU9ICwxBoSzobdZNT8dVhi9XKYCPg/H9Fes8lqmmQiUUs/AgCICPoweFoVGsb8OwTmjs1N2BwYw=; 7:hnnTdgTRG+M5fMFZzE4S99Qwkh2yakArf8xXsVVjmLY85VsFyCrm6kxxsJuHVuzXBKJHwmKNE3SfEwL0pJHsUezzT3kOOTjyFghb7i3PK2ZWi9AIlCWDoBbuX2oo73KUGGdhuRhbUDSXM4xF6kCnv1lvCCg8RdOAlyz0eDUhjmtg2/4U1WAUEuO21xUI3GKjFXuGIbSXROUXLKOALt5cvDF6ZnGN8AD4Cz9bsGIIBgw=
SpamDiagnosticOutput: 1:23
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Jun 2016 22:13:00.5098 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR05MB2730
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtg-dir/POUR0HmFPs60OgWfDQCu34bhudY>
Cc: rtg-dir@ietf.org, i2rs@ietf.org
Subject: [RTG-DIR] Routing Directorate QA review of draft-ietf-i2rs-rib-data-model-05
X-BeenThere: rtg-dir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir/>
List-Post: <mailto:rtg-dir@ietf.org>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-dir>, <mailto:rtg-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jun 2016 22:13:11 -0000

Hello,

I have been selected as the Routing Directorate QA reviewer for this draft. My review is below.

Regards,

--John


Document: draft-ietf-i2rs-rib-data-model-05 
Reviewer: John Scudder 
Review Date: June 3, 2016 


Summary: 

The document is reasonably understandable, although I did find myself with a fair number of questions, which I've written below. As noted below, many of these questions may only have arisen because I am not skilled in the subject area. I did find one major issue, with the Security Considerations section, which will certainly need to be resolved somehow before the document is progressed.


Comments:

In preparing my review, I reviewed the draft itself, but did not carefully read all the references. As a result, it's possible some of my observations might be in the rough, when taken in context of the full body of work. It's also the case that I am not an experienced Yang practitioner, so some practices and idioms that may be well known could easily have escaped me, and a similar disclaimer applies.

Finally, I did not review Section 3, YANG Modules, in detail, although I made a few suggestions.


Major Issues:

1. There are two problems with the Security Considerations section. The first is that the section isn't good (sorry). More on this below. The second is that it references the i2rs-architecture document normatively, but that document is listed under Informative References. The second problem is easily fixed, of course, by simply moving the architecture document to Normative References.

 The security section, in its entirety, is:

   This document introduces no extra new security threat and SHOULD
   follow the security requirements as stated in
   [I-D.ietf-i2rs-architecture].

However, if I go look at the architecture document to see what "the security requirements" are that I am supposed to follow, I find a fairly long Security Considerations section which states nothing that formally appears to be a requirement. It also says that instantiations of i2rs will provide more detailed analysis of security properties. Since this document doesn't do that, there must be some other i2rs document that does, right? And this document should reference that one?

It seems perfectly reasonable to state that this document doesn't introduce any security considerations of its own, and to reference some foundational document. However, the current security section doesn't do that effectively, doesn't reference the correct document, and I wouldn't expect it to survive a Security Directorate review. Suggesting a rewrite is beyond the scope of this QA review, sorry, but one is needed. I don't think it necessarily needs to be very long, but it does need to correct these issues.


Minor Issues:

1. The author list of six people exceeds the current RFC Editor guidance of five or fewer named authors. See RFC 7322:

  The total number of authors or editors on the first page is generally
  limited to five individuals and their affiliations.  If there is a
  request for more than five authors, the stream-approving body needs
  to consider if one or two editors should have primary responsibility
  for this document, with the other individuals listed in the
  Contributors or Acknowledgements section.  

2. A number of symbols are not defined in Section 1.2, Tree Diagrams. I noticed the following as needing to be defined: { } x w n.

3. Possibly this is covered in a companion document or is well-known to those better versed in Yang than me, but I found myself wondering what the default values for optional items were. In particular, every writable boolean is optional. Many have no default value, for example sharing-flag has none. But return-failure-detail does have a default of false. Is it okay that some of these optional items have no default values? Is the expected behavior implementation-specific in that case?

4. "route-statistic" should probably be "route-statistics" (plural). Then again, looking at the content of "route-statistic", it's not what I would refer to as statistics at all. The content is state (active or inactive), installation state (installed, or not) and reason (I guess this indicates the reason the route entered its current state, see also comment 11 below). None of this seems like statistical data to me. Maybe "status"?

5.  The model doesn't seem to capture any restrictions on how nexthops can be chained. Presumably there are some restrictions, for example it wouldn't seem to make a whole lot of sense to chain egress-interface and egress-interface-ipv4-nexthop together, the more so since the respective outgoing-interfaces might conflict. Possibly capturing this is outside the scope of this document.

6. In various parts of the model, it appears to be possible to reference an object either by an opaque identifier or by value. Maybe this is a common idiom, but it wasn't obvious to me why this should be, it seems redundant. For example, every route has a route-index, but when I want to operate on a route with route-update or route-delete, I have to identify it by rib name and prefix. The utility of the index, then, is not clear to me. Another example is in Section 2.5:

   o  nh-delete: Delete a nexthop from a rib.  A name
      of a rib and a nexthop or nexthop identifier are passed as the
      input parameters.

Again, it's unclear to me why it's desirable to be able to delete the NH by either reference or value.

7. It was unclear to me why a reason is required for a route change notification, but not for a next hop change notification.

8. This construct appears three times:

       leaf rib-family {
         type rib-family-def;
         mandatory true;
         description
           "A reference to address family of a rib.";
       }

However, in two locations the description is "The address family of a rib."  and in the third, the "reference to" language is used. Probably this is just a cut and paste error, but because a reference is different from the thing itself (presumably a value), maybe the choice of language really does indicate some subtle difference? Because I haven't exhaustively reviewed Section 3, I think it is likely more such inconsistencies exist, and I think it would be good to check for them.

9. "To download N
          nexthops to the FIB, the N nexthops with the lowest
          value are selected."

What if more than N nexthops are tied for having the lowest value? As written, this is underspecified.

10.          "Nhop-lb-weight is a number between 1 and 99.";

First, this doesn't use the correct name of the value it is describing. Second, it's not an adequate description. (It tells the reader nothing helpful.)

11.              "Indicate the route reason."

Again, this doesn't tell the reader anything helpful. Reason for what?



Nits:

I found a number of editorial nits. Rather than enumerating them here, I edited my suggested changes into a copy of https://www.ietf.org/id/draft-ietf-i2rs-rib-data-model-05.txt.  I have provided both that copy, and a diff against the original, in attachments. Please review my changes and don't just accept them blindly, while I intended that all my changes were strictly editorial there's always the chance I altered the meaning unintentionally.

In addition, I noticed some other issues where I'm not sure how they should be resolved:

1. The term "RIB" is used inconsistently throughout the document. In some places it's capitalized, as "RIB". In others, it's lowercase, as "rib", or even mixed-case, "Rib". I didn't change this in my marked up copy, for two reasons. First, global search and replace would not be straightforward, because the string also occurs where lowercase is clearly appropriate, for example "ietf-i2rs-rib" (there are 331 occurrences of RIB in any combination of upper and lowercase by my count). Second, I didn't completely discount the possibility of the authors are deliberately using the lowercase term sometimes. I recommend either the term should be uppercase ("RIB") throughout, or if a distinction between "RIB" and "rib" is intended, that should be explained in the Definitions and Acronyms section.

2. "there should be a limitation on how many levels of lookup can be practically performed." I suspect what the authors mean here is "there might be a limitation", meaning a practical limitation might exist (indeed, probably does exist) in the hardware implementing forwarding. I've suggested that change in my marked up copy. However, may be the authors really do mean that there needs to be a configurable limitation to allow restriction to something less than what the hardware implements. The fact that lookup-limit is a rw value  seems to support this – I don't see why that would be a configurable value if it represents an expression of what the hardware is capable of. On the other hand, the document is silent about what an implementation is supposed to do with that value once configured. (Maybe one of the companion documents explains?)

3. The rib-list under routing-instance is indexed by a field called "name". Under the notification hierarchy the corresponding field is called "rib-name".  it works as written, of course, but it caused a little dissonance for me. (See #4 below as well.)

4. The name "rib-family" wasn't self-explanatory for me. "rib-address-family" would have been. For that matter, why prefix "rib-" onto it since you haven't prefixed "rib-" onto the other variables (see #3 above as well).

5. Shouldn't there be an ellipsis right below rw-route-vendor-attributes in Figure 1?

6. In Section 2.1, capability negotiation is referred to twice, once in the first paragraph and once in the last. I think you probably mean capability advertisement. The distinction is that in advertisement, an entity (the router) is telling another entity what it's capabilities are. There is nothing to negotiate about per se, if the other entity doesn't like the router's capabilities, it can't very well convince the router to change them. I have changed "negotiation" to "advertisement" in my marked up copy accordingly, if that's not right you should revert it but also clarify.

7. "nexthop-lbs" is a strange choice of name for load-balancing. I would suggest either dropping the S and just making it "nexthop-lb", or spelling it out in full, "nexthop-load-balance". But something the casual reader is likely to see as "next hop pounds" ("lbs" is the common abbreviation for the English system unit of weight pounds, of course) seems problematic.

8. I couldn't understand this sentence at all: 

      *  failure-detail: shows the specific failed routes that failure
         reason.

    Since I didn't understand it, I can't suggest a rewrite, sorry. (The text recurs three times in section 2.5.)

9. nh-add in Section 2.5 talks about "the network node" doing something:

   o  nh-add: Add a nexthop to a rib.  A name of the
      rib and a nexthop are passed as the input parameters.  The network
      node is required to allocate a nexthop identifier to the nexthop.
      The outputs include the result of the nexthop add operation.

   As far as I can tell, the entire rest of the document talks about "the i2rs agent" doing something. Should "network node" the rewritten accordingly?

10. Similar to #9, "A RIB data-model MUST support sending 2 kind of asynchronous notifications"  Doesn't seem right. Surely the data model per se doesn't support sending anything at all, it's the i2rs agent that supports it? I've tentatively replaced the text with "An implementation of this RIB data model" (cribbed from lower down in the doc).