home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1997 December
/
Internet_Info_CD-ROM_Walnut_Creek_December_1997.iso
/
ietf
/
snmpv2
/
snmpv2-minutes-92oct.txt
< prev
next >
Wrap
Text File
|
1993-02-17
|
41KB
|
1,032 lines
Editor's Note: Minutes received 12/9/92
INTERIM_MEETING_REPORT_
Reported by James Davin/Bellcore
Minutes of the SNMP Version 2 Working Group (SNMPV2)
The SNMPV2 Working Group met October 5-6, 1992 in Knoxville, TN. The
Chair, Bob Stewart, called the meeting to order at 9:05 AM and
circulated the attendance roster.
Agenda
o Introductions and Housekeeping
o Goals and Process
- Credo
- Organization
- Stepwise Refinement to SNMP
o Easy Questions
o Proposals
o Summary
Introductions and Housekeeping
All present introduced themselves. The schedule for lunch and breaks
was established. Changes to the Agenda were entertained. Local
arrangements for reading email were explained.
Goals and Process
Bob presented some slides outlining his vision of where the Group was
going and how it would get there. Under the rubric ``Goals and
Process,'' Bob introduced three topics:
1. Credo: As a ``credo'' for our collective work, Bob quoted a recent
email statement by Dave Perkins as an illustration of the spirit he
hoped everyone would bring to the discussion:
``to assist with creating a positive and long lasting
solution for the community. This goal comes before any
personal or company goals which I set aside when I
communicate via EMAIL and attend IETF functions.''
2. Organization: Bob noted that the Working Group was a chartered
IETF Working Group. James ``Chuck'' Davin was appointed to take
Minutes for this meeting. Bob stated that the Working Group would
make decisions by discussion and consensus, both in meetings and
1
via email. Marshall Rose was appointed editor of the Working Group documents.
Bob noted that the Group would rely on Marshall to make appropriate
changes without detailed instructions, except in those cases where
``le mot juste'' was required to capture the consensus properly.
It was agreed that Marshall would clearly indicate all changes to
the Working Group documents by change bars. A question was raised
about whether the change bars should indicate differences from the
originally posted documents or the most recent document versions.
This question was deferred, because, at the moment, the latest
version is the original posting.
It was noted that the Working Group Minutes would be available
on-line in the usual IETF repositories.
3. Stepwise Refinement to SNMP: Bob explained what he meant by
``Stepwise Refinement of SNMP'' by presenting a slide with the
following points:
o Assume that SNMP is basically sound.
o Widespread implementation.
o Current level of technology, cooperation, understanding.
o Choose improvements.
o Maintain first principles.
o High benefit-to-cost ratio.
Bob identified the SMP proposal as the baseline documents from
which the Working Group would proceed. He noted that there were 8
documents, and 4 implementations; these latter are to be regarded
as supporting the Working Group and building confidence in its
baseline; the implementations will not in any way constrain the
decisions or directions of the Group.
At this point, Marshall said that all four of the SMP proponents
look forward to making implementation changes based on the work of
the Group.
Bob next noted the need to coordinate with the SNMP Security
Working Group. He noted the pledge of timely cooperation by the
relevant Area Directors at the Cambridge IETF meeting. He noted
that the liaison function is neatly realized insofar as Keith
McCloghrie is both one of the SMP proponents and the co-Chair of
the SNMP Security Working Group. Bob concluded by saying that,
although the Group would not delve deeply into security issues, it
could not and would not ignore them completely.
Bob identified the ``deliverables'' of the Group as a set of
Internet-Drafts, revised according to the judgement of the Group,
together with a recommendation to the IESG that these documents
(possibly together with revised documents produced by the SNMP
Security Working Group) define the next generation SNMP framework.
Bob said that, assuming our ultimate agreement, the recommendation
of the Group would be for Proposed Standard status for these
2
documents. Bob said that the schedule goal of the Group would be to finish
up and, consistent with its Charter, to ``drop dead'' in the Spring of
1993 (shortly following the IETF plenary meeting, March 28 - April
2, 1993, in Columbus). A discussion of the schedule goal ensued:
Marshall and Jeff Case emphasized the need for quick progress; Dave
emphasized that haste should in no way compromise the openness of
the process; Chuck emphasized that haste should not compromise the
quality or thoroughness of the solution, because it is unlikely
that revision of the standard framework will be undertaken again
soon. The Group agreed that its schedule and pace must be governed
by all of these considerations. Recognizing considerable consensus,
currentt and from the Cambridge BOF, that the work should be completed in
December, the Group deferred accepting that as possible for the end of
the secong day.
Easy Questions
The focus of the Group turned to what Bob had identified as ``Easy
Questions.'' In this part of the meeting, Bob encouraged people to
raise what they regarded as ``easy issues'' about the proposed
framework. Those that could be quickly resolved, would be dispatched in
real time. Those that proved more complicated would be noted for later
consideration by the Group.
Tracy Cox raised the question of whether or not the row-set-and-create
mechanisms currently specified would be mandatory. Jeff suggested that
it should be mandatory for new MIBs. Tracy sketched some scenarios in
which the specified mechanism was undesirable owing to time delays
between the processing of a SET request and the actual effecting of the
requested alteration. The Group agreed that this point was not simple
and warranted further discussion. Tracy accepted an action item to
present more detail and analysis of the relevant scenarios and propose a
solution.
Satish Joshi asked whether or not the SMUX should be part of the
standard framework. Marshall said that the SMUX is not part of the
framework, but elements in the current proposal (the ``or'' table in the
SMP MIB) permit the use of SMUX or SMUX-like mechanisms.
Chuck expressed a general concern about uncertain conformance
requirements and raised the particular question of whether or not use of
the AGENT-CAPABILITIES macro would be required of conformant
implementations. Chuck proposed that the specification language be
clarified to either make the macro a requirement or to omit it from the
standard framework (as is now the case). Keith says that use of the
CAPABILITIES macro would be required because of its relationship to the
``or'' table in the proposed MIB. Marshall argued that use of the macro
should not be required because it was not relevant to all of the
constituencies of the proposal: it includes vendor tools, user tools,
and Working Group tools. Chuck said that the different requirements in
each of these three contexts should be written down unequivocally. Jon
3
Saperia said that he favored requiring the AGENT-CAPABILITIES macro
mandatory. After some discussion, it was proposed that the word
``should'' be applied to this issue. Chuck said that he found the use
of ``should'' acceptable only if no other parts of the framework
depended for their function or their unambiguous definition on the
presence or use of this macro. The Working Group agreed to using
``should'' provided that this condition was met.
Dave suggested that a list of ``required reading'' be prepared to help
give everyone a common context for discussion. The Group agreed, and
Dave accepted an action item to produce this list for inclusion in these
Minutes (see attached).
Dave also proposed that the new standards documents include a glossary
of key terms. It was suggested that Marshall undertake this task and
include the glossary in the introductory document. The Group agreed
that Marshall would consider the effort involved and report back after
lunch.
Dave suggested that the Group prepare a detailed analysis of how well
the baseline proposals addressed the concerns raised at the Atlanta IETF
session on perceived deficiencies in SNMP. Jeff said that the basis of
the current proposals was a list of problems he had maintained since
1988 that included the IETF session, a previous INTEROP BOF, and some
additional items as well. Marshall said that preparing such an analysis
would be too much effort. Jeff elaborated, saying that each item on the
list was evaluated according to several criteria (e.g., compatibility
with installed base, performance, impact in existing MIB object access
methods).
Peter Wilson raised the question of party proliferation. After brief
discussion, this was identified as an issue for the SNMP Security
Working Group, and further discussion of this topic was deferred for
later in this meeting.
Dave suggested that the Group consider a revision of the MIB-2
interfaces table. The consensus of the Group was that this was not in
the scope of its Charter as it could be handled in the normal course of
IETF business. The Group agreed to a recommendation that this work be
pursued soon after the SNMP evolution work is completed.
Dave raised a question about the definition of sysObjectId. It is
ambiguous, but is also used by SNMP 2. Steve Waldbusser said that
sysObjectId should identify the combination of software and hardware
that makes up the managed system. Jeff agreed with Steve, and described
various strategies used by OEM software vendors to address this
question. Marshall said that the actual definition of sysObjectId is
not ambiguous, but that the example text that follows it is bad.
SMP assumes that sysObjectId names a protocol/MIB implementation but
(not necessarily) the type of box (e.g., a bridge, router, etc.). Are
we comfortable with this assumption? Do we want to legislate rules for
assigning sysObjectId?
4
Proposal: either fix the ``or'' table so that it doesn't refer to the
(arguably ambiguous) sysObjectId or else define a new MIB table that
tells what MIB objects are supported. Action (Dave): prepare a
proposal if needed. If the Group agrees that the interpretation of
sysObjectId that is implicit in the baseline proposals is correct, then
this consensus must be documented in the standard.
After lunch, Bob suggested that the Group change its discussion mode to
focus on brief discussions that would either result in quick resolution
of topics or place those topics on a ``deferred issues list'' (see
attached) for later discussion.
There was a discussion of how Working Group consensus should be
achieved, whether email or face-to-face meetings would dominate. Bob
explained that neither would dominate. He would attempt to assure
progress by posing straw conclusions and calls for consensus by
requesting strong objections, but ultimately the Group would be governed
by the soft principles that have been traditional in the IETF.
Proposals
The remainder of the day was spent in considering various proposals for
amendment of the baseline documents.
Bob presented the list of pending proposals collected from the mailing
list:
o Reliable Traps - Chuck Wegrzyn
o Party Proliferation - Pete Wilson
o Remove Counter64 Time Limit - Pete Wilson
o NAME Clause - Pete Wilson
o OID Optimization - Ilan Raab
o Redefinition of ``Manager'' - Bob Stewart
o Date and Time Textual Convention - Jon Saperia
He asked the Group for others and added:
o Miscellaneous changes from Jeff Case.
o Miscellaneous changes from Chuck Davin.
o Miscellaneous SMI changes from Dave Perkins.
o Ideas on Get Bulk OID compression from Satish Joshi.
o Two ideas from Robert Snyder.
- Identifying MIB objects with constant values.
- Contents of Set Responses.
o Get Bulk OID Compression: Satish spoke about his ideas on Bulk
Retrieval. He suggested compressing the OIDs in the varbind list
of responses to Bulk Retrieval requests. He observed that the OIDs
5
in the 2nd and subsequent repetitions in a response could be
abbreviated. Compression could occur in the context of the
original request or in the context of the preceding varbind.
Satish noted that this scheme presents no compatibility problem
because existing agents don't implement the new Get Bulk operation.
General question: is it worth it? Marshall said that there are
easier ways to save OID bytes.
Jeff observed that we hate the byte-skimping of the ASN BER, and
asked why we would want to repeat that mistake. He also noted that
a growing number of MIB tables are indexed by OID values, and so
the savings in those cases would be minimal.
Satish said that retrieval of very large tables (e.g., an RMON
traffic table with 10000 entries, a bridge table with 8000 entries,
or a Token Ring table with 4000 entries) would benefit
significantly from this strategy, even if the savings for smaller
tables were somewhat less.
The Group agreed that Satish and others should perform some real
measurements that include the CPU costs (as well as the bandwidth
savings) of this approach.
It was noted that compressed OIDs could not really be encoded with
ASN.1 OID Tags and would have to be transmitted using an additional
ASN.1 type.
o NAME Clause: Peter Wilson led a discussion for about 30 minutes on
the addition of a NAME clause to the OBJECT TYPE macro. Cheryl
agreed with the proposal, but thought that the length of any such
field should be less than 15 bytes. Bob suggested that it be
called a LABEL clause, not NAME clause, to better reflect its true
nature. Ken Key raised the issue of what language the LABEL
information should be in. Dave P. suggested that information that
is primarily an aid for management stations should be in separate
documents. Chuck echoed Dave's suggestion, recalling his earlier
suggestions to cleave the framework in this way.
The Group concluded that the NAME clause should not be introduced
because one could get the same effect by well-chosen object
descriptors. However, it was also agreed that this sort of
information might be included in macros exclusively for management
stations. Dave Perkins accepted an action item to explore the
feasibility of such a notation.
Peter Wilson then offered a proposal that the time limit associated
with the use of the 64-bit counter type be excised from the
baseline documents.
A router implementor argued against the proposal, arguing that
critical code paths can't afford lots of double precision math.
Cheryl found the time limit desirable, given MS polling
requirements.
Jeff spoke of hardware barriers (e.g., need to lock the bus) that
6
make broad implementation of 64-bit counters difficult.
Peter argued a broad need for big counters in hierarchical
management systems (bigger numbers at higher levels in the
hierarchy).
Marshall noted that aggregation counts at the higher levels are
semantically different from the raw ``leaf'' counts on which they
are based.
Keith followed this by saying that we need appropriate MIBs to do
effective hierarchical management and limit the proliferation of
64-bit counters.
Steve Waldbusser noted that effective MS support for 64-bit
counters may be a long time coming.
Wilson noted that constraining the use of big counters might limit
the effective lifetime of the new framework.
Dave noted the role of big counters in the work of IEEE.
The consensus of the Group was to leave the restriction as it is.
o New Textual Convention: the Group took up Jon Saperia's proposal
for a new Textual Convention for expressing dates. The Group spent
some time tweaking the details of this proposal.
Bob asked whether display hints imply leading zeros. Keith said
no, but there might be an ambiguity in the definition of display
hints that needs to be fixed.
Issue: where is byte ordering on the network defined? (i.e., are
Textual Conventions that imply a byte ordering part of the
mgr-agent contract or just a mgr aid?)
In part to avoid the question of leading zeros, the Group agreed
that tenths of seconds was adequate resolution for this proposal
and abandoned microsecond resolution.
Mike Davison suggested augmenting the display hint notation to
provide for real field precision.
Jon accepted an action item to post the agreed, amended proposal to
the mailing list.
o New MIB Object Clause: Robert Snyder proposed a new MIB object
clause that identifies an object as having a constant value: a
manager need only retrieve it once. Marshall asked what macro it
should go in. Chuck suggested that this information was really
more of a manager aid than an essential property of a MIB object.
Robert Snyder accepted an action item to go examine some MIBs and
report back on these questions and on the number of cases in which
this idea would yield actual benefits.
The remainder of the day was spent reviewing a list of proposed changes
introduced by Jeff Case (see attached). Unless otherwise noted, the
7
Group accepted all of the changes on that list.
Item 1 on the list proposed that the term ``SMP'' be purged from the
documents. The Group agreed, stipulating that the terms ``SNMP-1'' and
``SNMP-2'' be used as appropriate, instead.
Items 4 and 5 could not be quickly resolved and were deferred.
Item 11 was tentatively approved. Davin took an action to investigate
the use of readOnly in deployed implementations.
Item 14 was agreed, but the Group stipulated that the additional
information would somehow be part of the appropriate macro(s).
Item 21 was not quickly resolved and was deferred.
Item 22 was agreed but the curly braces removed from the replacement
text.
Item 24 was tentatively agreed, but there was some reluctance to accept
so significant a change without more deliberation.
Item 26 was agreed. Davin took an action to investigate the use of
readOnly in deployed implementations.
The first day of the meeting concluded at 17:26.
DAY 2
The Group continued its discussion beginning at 9:00 AM.
Robert Snyder raised the question of the meaning of a negative value
with type TimeInterval. The Group agreed that a range should be added
to the definition of that type.
Bob Stewart offered a proposal that would clarify the definition of
``manager'' and ``agent'' in the framework:
A ``manager'' is any active network management component that observes
or controls one or more network devices, whether locally through
implementation-specific interfaces or remotely via SNMP, with or without
a human interface. Such a manager may use any subset of the SNMP
manager functions. Definition of ``agent'' is unchanged.
Jon Saperia objected to this text, arguing that we don't want to have a
``roll-your-own'' definition of a manager. E.g., does a compliant
``manager'' need to support Sets?
Discussion of conformance issues and the question of whether a manager
requires a user interface ensued.
Two possible problems were identified with definitions of a manager:
1) Too restrictive, excludes useful products 2) Doesn't contribute much
8
to collective understanding so that we have a common basis for
addressing issues (like confirmed traps in ``agents'').
E.g.:
Manager Agent master slave responsible not responsible
Bob accepted an action item to propose appropriate text, but the current
text will stand until new text is produced and agreed. Chuck accepted
an action item to attempt a glossary.
Robert Snyder withdrew his proposal about different values in the
response to a Set request.
Bob Stewart proposed to remove varbinds from responses to Sets
altogether, citing the bandwidth savings. Chuck seconded this idea,
citing the improved security that would result: configuration errors
would be less likely to expose private data.
Peter Wilson and Robert Snyder opposed this change because they
preferred the option of using the varbinds in a response to a Set to
carry other information.
Marshall said (incorrectly) that the security benefits of this change
would require configuration of an additional party.
The Group agreed that responses to Set requests should remain as
currently specified in the baseline documents.
At this point (10:22 AM), the Group took a brief break.
When the Group resumed at 10:40, Dave Perkins led a discussion on a list
of proposed changes to the SMI that he prepared.
Dave actually submitted two separate lists of issues/suggested changes.
One list covered the textual conventions SMP document. It had 10
numbered points. The other list covered the SMI SMP document. It had
50 numbered points. In the 2 days at Knoxville, Dave was allocated
approximately 2-3 hrs to go over the lists. Only 8 items from the SMI
list were covered. Those items are included in the minutes. The
meeting attendees were given a paper copy of the lists. An electronic
copy is available from the archive at thumper.bellcore.com. Dave plans
to update the lists and submit them for consideration at a future
meeting of the WG.
9) All items should include a required DESCRIPTION clause, an optional
REFERENCE clause, and a required STATUS clause.
In response to this item, Jeff asked how a COMPLIANCE or CAPABILITIES
macro could have a ``STATUS.'' Dave responded that the function of this
clause was to mark OIDs as eternally assigned but no longer
``important.'' It is a way of signaling management stations that it is
OK to forget a particular OID assignment. The Group agreed to this
change.
9
11) The SMI needs to specify conventions on things like uniqueness of
names, max length of names, allowed characters in names.
There was an extended discussion of the uniqueness and form of object
descriptors. Dave modified his proposal to be that all the rules
governing the form of object descriptors be gathered into one place in
the document.
Dave proposed that the SMI explicitly require counter names to be plural
(not simply to end in ``s''). The Group agreed.
Dave proposed that object descriptors have a maximum length. The Group
agreed to the value 64. Bob Stewart took an action to poll the mailing
list to determine if any object descriptor in any extant MIB is longer.
Dave proposed the object descriptors in standard MIBs should be unique
across all standard MIBs; that vendor MIBs should be encouraged to
preserve uniqueness of object descriptors.
Bob Stewart objects to the exception for vendors, arguing that, since a
management station must cope with all MIBs including vendor MIBs, it
cannot take advantage of the uniqueness property. So, why make the
restriction at all?
Robert Snyder said that vendors could not in practice avoid name
collisions with all standard MIBs, past or future, or all MIBs from
other vendors. Mark Kepke echoed this sentiment and pointed out that,
in large companies, vendors may not even be able to avoid collisions
across the MIBs of a single enterprise.
The Group agreed that the baseline text should require that object
descriptors be unique across all standard MIBs and that vendor MIBs
should not be addressed.
The Group agreed that the editor will propose text that encourages
vendor MIBs to conform to the same rules that constrain standard MIBs.
As a result of this discussion, the Group seemed to agree that object
descriptors are not an essential part of a MIB object definition and may
be altered from time to time for convenience without deprecating the
associated MIB object. Bob Stewart took an action item to poll the
mailing list for opinions on this, changing names in enumerations, and
adding to enumerations.
At this point, it was noon, and the Group broke for lunch.
When the Group resumed at 13:30, Dave Perkins continued his presentation
of proposed changes to the baseline SMI document.
1) The OBJECT-TYPE macro needs to be replaced by two macros. The first
is to be used only for ``leaf objects'' or ``management information
objects''. The second is to be used to define the two grouping objects
which have been called ``tables'' and ``rows''.
10
2) The following is the suggested replacement for the ``OBJECT-TYPE''
macro to define management information objects: actual MACRO was here
3) The following is the suggested replacement for the ``OBJECT-TYPE''
macro to define table and row objects: actual MACRO was here
Dave presented Items (1)-(3) in the Specific Comments section of his
list. The thrust of these changes was to use a new macro for the
definition of conceptual rows in the MIB and to remove some of the more
``tabular'' aspects of the current OBJECT macro as they would be replace
by this new notation.
Peter Wilson objected to these changes because the cost of rewriting
parsers is not acceptable when the benefits of the new notation are not
clear.
Dave said that the benefit of this approach is that it precludes
mistakes in MIB writing that he has observed in his compiler work (e.g.,
mismatches between the types in a SEQUENCE grouping and the the types in
the corresponding object definition).
Peter and Marshall argued that the Group should reject this change:
because of our need for widespread MIB objects, we should want to
minimize (a) the cost of upgrading MIB compilers from V1 to V2 and (b)
the cost of upgrading V1 MIBs to V2 (although it had been stated earlier
in the day that upgrading of MIBs was neither necessary nor desirable if
done independently of other factors in the MIB lifecycle).
The Group agreed that the proposed changes were not necessary.
Dave Perkin proposed a change to the handling of DEFVALs described at
the end of Item (2) in the Specific Comments section of his list of
proposals. This change would permit a more readable way of expressing
DEFVAL values whose type is defined by a Textual Convention.
Bob Stewart asked if the Group considered itself restricted to the
expressiveness of ASN.1 to satisfy its needs?
The Group provisionally agreed to this proposal, provided that Dave can
find a legal ASN.1 notation for accomplishing it.
28) The replacement for the OBJECT-TYPE macro has a replacement for the
allowed values in the DEFVAL clause. The change is to accomplish the
following: * OIDs should be restricted to a name. The curly bracket
syntax (ie ```` ... ''') should not be allowed. This would restrict
the values to the names of defined OIDs. * The replacement (if valid
ASN.1) solves the problem of constant values like IP addresses that
can't be expressed in ASN.1.
The Group agreed to Item 28 on Dave's list.
Dave proposed that the MaxPart and AvailPart of the macro defined in
Item 3 on his list be added to the OBJECT macro in the baseline
11
documents. The intended usage of these clauses is to identify related
MIB objects whose value indicates the location of available ``slots'' in
a MIB table whose implementation may be a memory array.
After some discussion, it was suggested that, instead of using multiple
objects to indicate the ``available entry,'' a single object with OID
syntax should be used.
Steve Waldbusser commented that the ``RMON polka'' is not an expensive
'' strategy and solves a superset of the problem solved by this
mechanism. He elaborated on the relevance of the available entry
problem to small tables that must be packed (owing to implementation as
memory arrays).
Bob proposed that the max entry, available entry, and num entry clauses
are essentially aids for management stations and should be dealt with in
that context (i.e., not in this Working Group). The G roup agreed with
this suggestion and the aforementioned clauses will not be included in
the documents.
At this point, the chair began the identification of residual issues and
discussion of future schedule and meetings.
Bob said that, in order to encourage people to air proposals early, he
would promise on the mailing list that proposals posted by Monday, 9
November would be assured time for discussion at the November meeting,
while others might only be considered schedule permitting. The Group
generally approved of this plan.
Bob emphasized the need for doing ``homework'' before the next meeting.
An interim meeting date was set for 14 December in Atlanta. This date
will only be used if the Group needs it.
Marshall said that new Internet Draft documents reflecting the
discussions at this meeting would be posted by Thursday.
The Group agreed that its work should be completed in December. If work
can not be completed at the Washington IETF, the Group will hold a
meeting at Georgia Tech in Atlanta. The suggested date for this meeting
was 14 December.
Bob proposed that the deferred discussion on party proliferation be
referred entirely to the SNMP Security Working Group. Keith accepted
and the Group did not object.
The meeting closed with a brief review of the DISPLAY-HINT discussion in
particular and the more general question of whether the Group should
focus on technology that is primarily an aid to managers or leave that
for future work. Chuck raised the question of whether display hint
should be broken into two parts: (1) representation on the wire and (2)
display format hint for a user interface. The consensus was that the
current text would stand for now pending any future proposals on this
question.
12
The meeting adjourned at 4:00 PM.
#####
Deferred Issues List
1) Should Textual Conventions be part of the SMI?
2) Is the Textual Conventions macro consistent with ASN.1 subtyping?
3) Further work on the DISPLAY-HINT clause is needed.
4) Conformance issues need further definition, esp. with respect to
interactions between SNMP V1 and SNMP V2.
5) Restart Domain and Entity Domain require further discussion.
6) Ommision of readOnly(4). Action item (Chuck): post an email query
to the relevant mailing lists asking for information about the use of
readOnly in deployed implementations.
7) Can MIB objects be in zero compliance groups? I.e., can there be
``dangling objects''? Action (Bob): report on this issue.
8) Are the row manipulation mechanisms adequate to address scenarios in
which there may be significant time delay between an SNMP row
manipulation and the alteration of the underlying management state? Is
operation in such scenarios a requirement? Action (Tracy): propose an
answer to these questions.
#####
Proposed Changes to SNMP Version 2 Documents: October 5-6, 1992
A Contribution to the IETF SNMP2 Working Group Jeff Case, Keith
McCloghrie, Marshall Rose, Steve Waldbusser
1. All documents: throughout
Lose the term SMP
2. Transport Mappings: throughout
Document should use consistent naming of domains,
e.g., smpUDPdomain, smpOSIclnsDomain, smpDDPDomain
all should be changed to Domain
3. Transport Mappings: page 5
In comment prior to SmpOSIAddress, change ``string or (up to'' to
``string of (up to''.
4. Transport Mappings: page 12
Add new sentence at end of Section 8.1:
13
Because the address associated with this transport mapping is internal
to the agent, an SMP entity acting in a manager role cannot directly
communicate with a party using this transport mapping. As such,
communications are accomplished using the partyProxyFor object of a
party which uses a transport mapping with an externally accessible address.
5. Transport Mappings: page 13
Add new sentence at end of Section 9.1:
Because the address associated with this transport mapping is internal
to the agent, an SMP entity acting in a manager role cannot directly
communicate with a party using this transport mapping. As such,
communications are accomplished using the partyProxyFor object of a
party which uses a transport mapping with an externally accessible address.
6. Transport Mappings: page 15
< These restrictions apply to all aspects of ASN.1 encoding,
< both for the protocol data units and the data objects they
< contain.
> These restrictions apply to all aspects of ASN.1 encoding,
> including the message wrappers, protocol data units, and the
> data objects they contain.
7. Transport Mappings: page 15
< (2) When encoding the value field, the primitive form is used
< whenever possible.
> (2) When encoding the value field, the primitive form shall be
> used for all simple types, i.e., INTEGER, BIT STRING, OCTET
> STRING, and OBJECT IDENTIFIER (either IMPLICIT or explicit).
> The constructed form of encoding shall be used only for
> structured types, i.e., a SEQUENCE or an implicit SEQUENCE.
8. Transport Mappings: page 16
Example needs to include a length field which is not expressed in the
minimum number of bytes.
9. Transport Mappings: page 16
Remove extraneous comma in mapping example: ``NULL } },`` to ``NULL } }''
10. PROTO: page 6
Start a new paragraph after the first sentence in (2). (The paragraph
starts with ``The former is...''
11. PROTO: page 10
Remove readOnly(4).
12. PROTO: page 21
Delete the clarifying ``implementation strategies'' paragraph from the
description of the awesome getBulk operator ... it only caused confusion.
13. PROTO: page 24
Add at the end of third paragraph in Section 5.2.4:
A compliant SMP entity acting in the manager role must be able to
14
properly receive and handle a Response-PDU with an error-status field equal
to noSuchName(2) or badValue(3). (See Section 4.1.2 of [coex].)
14. SMI: (distributed)
Every MIB document (including trap documents), every compliance document,
and every capabilities document must have a required preamble title block
which describes the version number, last revision date, originating
organization, and contact information.
15. SMI: pages 6 and 23
Clarify the meaning of mandatory in the STATUS clause, perhaps by changing
it to a word which parallels ``obsolete'' and ``deprecated'' and which ref*
*lects
the role shift of the STATUS clause. Candidates include ``current'',
and ``effacious''.
16. SMI: page 23
Add the following parenthetical clarification:
If any columnar object in a conceptual row has ``read-create''
as its maximal level of access, then no other columnar object
of the same conceptual row may have a maximal access of
``read-write''. (Note that ``read-create'' is a superset of
``read-write'').
17. SMI: page 25
accessible''. However, a conceptual row must contain at least
one columnar object which is not an auxiliary object (i.e.,
the value of the MAX-ACCESS clause for such an object is
something other than ``not-accessible'').
The last line should be ``read-only'' or ``read-create'', i.e., it can't be
``read-write''.
18. SMI: page 27
Add new paragraph before last paragraph at end of Section 4.8:
For example, a MIB designer might wish to define additional columns in an
enterprise MIB which logically extend a conceptual row defined in a
standard MIB. The standard MIB definition of the conceptual row would
include the INDEX clause and the enterprise MIB would contain the
definition of a conceptual row using the AUGMENTS clause.
19. SMI: page 27
< The value of an instance of the named object is the (exact or
< approximate) number of conceptual rows.
> The value of the one and only instance of the named object is the
> (exact or approximate) number of conceptual rows.
20. SMI: page 27
< The DEFVAL clause, which need not be present, defines an
< acceptable default value which may be used when an object
< instance is created at the discretion of the SMP entity acting
< in an agent role.
15
> The DEFVAL clause, which need not be present, defines an
> acceptable default value which may be used at the discretion
> of an SMP entity acting in an agent role when an object instance
> is created.
21. SMI: page 32
Add new sentence end of Section 5.1
An object may be named in zero, one, or many groups.
22. SMI: page 49
< SYNTAX INTEGER { maxttl(255) }
> SYNTAX INTEGER { (255..255) }
23. MIB document page 20
DESCRIPTION
``The number of traps which have been sent to a
particular SMP party, since the last
initialization of the SMP protocol entity, or the
creation of the SMP party, which ever occurred
most recently.''
::= { smpTrapEntry 1 }
which ever --> whichever
24. MIB 2 and MIB.
Deprecate the SNMP subtree. Delete the entire smpInOut group. Replace
them with the following new variables in two groups as follows (all are
similar to other variables previously defined):
Group 1: (mandatory for all entities)
snmpInASNParseErrors
snmpEnableAuthenTraps
snmpInUnknownSrcParties
snmpInUnknownDstParties
snmpInBadAuths
snmpInNotInLifetimes
snmpInWrongDigestValues
snmpInBadOperations
snmpInSilentDrops
Group 2: (optional, only for entities which support SNMP Version 1)
snmpInBadVersions
snmpInBadCommunityNames
snmpInBadCommunityUses
25. M2M:
Page 7: Remove ObjectName from IMPORTS clause
Page 7: Add InstancePointer to IMPORTS clause for SMP-TC
Page 10: (2x) Change ObjectName --> InstancePointer
26. Coex: page 9
< `badValue', or `readOnly', the proxy agent must not
16
> or `badValue', the proxy agent must not
27. Textual Conventions: page 8 in enumerations and associated text
< underCreation(1)
< underDestruction(2)
< underModification(3)
< active(4)
> active(1)
> underConstruction(2)
> underModification(3)
> underDestruction(4)
#####
Attendees
Steve Alexander stevea@i88.isc.com
Uri Blumenthal uri@watson.ibm.com
Jeff Case case@cs.utk.edu
Tracy Cox tacox@sabre.bellcore.com
James Davin davin@bellcore.com
Michael Davison davison@fibercom.com
Taso Devetzis devetzis@bellcore.com
Gary Haney hny@ornl.gov
Matthew Hecht mhecht@cs.utk.edu
Susan Hicks hny@ornl.gov
Satish Joshi sjoshi@synoptics.com
Mark Kepke mak@cnd.hp.com
Kenneth Key key@cs.utk.edu
Michael Kornegay mlk@bir.com
Deirdre Kostick dck2@sabre.bellcore.com
Cheryl Krupczak cheryl@cc.gatech.edu
Robert Lushbaugh lus@ornl.gov
Keith McCloghrie kzm@hls.com
David Minnich dwm@fibercom.com
David Perkins dperkins@synoptics.com
Shawn Routhier sar@epilogue.com
Marshall Rose mrose@dbc.mtview.ca.us
Jon Saperia saperia@tcpjon.ogo.dec.com
Robert Snyder snyder@cisco.com
Bob Stewart rlstewart@eng.xyplex.com
Maurice Turcotte dnmrt@interlan.com
Steven Waldbusser waldbusser@andrew.cmu.edu
Bert Wijnen wijnen@vnet.ibm.com
Peter Will will@isi.edu
Steven Wong wong@took.enet.dec.com
Chris Young cyoung@ctron.com
Kiho Yum kxy@nsd.3com.com
17