[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: proto-04 concerns
Wes,
9: Implementators SHOULD also provide a well thought out authorization
scheme with NETCONF. => MUST
As we discussed, a MUST would go against RFC 2119 Section 6. Unless you
can explain how it impacts interoperability, even a SHOULD here in caps
is iffy at best, and may not get through the IESG.
9: you need to discuss that global operations MUST disallow the
changing of information that an individual does not have authorization
to perform. EG, if a user U is not allowed to configure an IP address
on an interface but someone else has configured an IP address for an
interface within the <candidate>, then the user U must not be allowed
to perform a copy-config or commit from <candidate> to <running>.
That would be part and parcel of an authorization model?
9: Similarly, you need to discuss what happens if you don't use a
lock. Specifically, if user U1 modifies the candidate config in a way
that user U2 is not allowed to, and since U1 MUST NOT be able to
commit those changes then not using a lock could leave a system in a
state where neither U1 nor U2 can commit their changes to running.
We say:
In addition, operations on configurations may have unintended
consequences if those operations are also not guarded by the global
lock on the files or objects being operated upon.
That should cover it.
--
to unsubscribe send a message to netconf-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/netconf/>