RFC 9644: YANG Groupings for SSH Clients and SSH Servers
- K. Watsen
Abstract
This document presents three IETF-defined YANG modules and a script used to create four supporting IANA modules.¶
The three IETF modules are ietf
The four IANA modules are iana
Status of This Memo
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any
errata, and how to provide feedback on it may be obtained at
https://
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://
1. Introduction
This document presents three IETF-defined YANG modules [RFC7950] and a script used to create four supporting IANA modules.¶
The three IETF modules are ietf-ssh-common (Section 2),
ietf-ssh-client (Section 3), and ietf-ssh-server
(Section 4). The "ietf
The groupings defined in this document are expected to be used in conjunction with the groupings defined in an underlying transport-level module, such as the groupings defined in [RFC9643]. The transport-level data model enables the configuration of transport-level values, such as a remote address, a remote port, a local address, and a local port.¶
The four IANA modules are: iana
This document assumes that the four IANA modules exist and presents a script in Appendix A that IANA may use to generate those YANG modules. This document does not publish the initial versions of these four modules. IANA publishes these modules.¶
1.1. Regarding the Three IETF Modules
The three IETF modules define features and groupings to model "generic" SSH clients and SSH servers, where "generic" should be interpreted as "least common denominator" rather than "complete." Support for the basic SSH protocol [RFC4252] [RFC4253] [RFC4254] is afforded by these modules, leaving configuration of advanced features (e.g., multiple channels) to augmentations made by consuming modules.¶
It is intended that the YANG groupings will be used by applications
needing to configure SSH client and server protocol stacks.
For
instance, these groupings are used to help define the data models
in [NETCONF
The "ietf
The modules defined in this document optionally support [RFC6187], which describes enabling host keys and public keys based on X.509v3 certificates.¶
1.2. Relation to Other RFCs
This document presents three YANG modules [RFC7950] that are part of a collection of RFCs that work together to ultimately support the configuration of both the clients and servers of both the NETCONF [RFC6241] and RESTCONF [RFC8040] protocols.¶
The dependency relationship between the primary YANG groupings defined in the various RFCs is presented in the below diagram. In some cases, a document may define secondary groupings that introduce dependencies not illustrated in the diagram. The labels in the diagram are shorthand names for the defining RFCs. The citation references for shorthand names are provided below the diagram.¶
Please note that the arrows in the diagram point from referencer to referenced. For example, the "crypto-types" RFC does not have any dependencies, whilst the "keystore" RFC depends on the "crypto-types" RFC.¶
1.3. Specification Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
1.4. Adherence to the NMDA
This document is compliant with the Network Management Datastore Architecture (NMDA) [RFC8342]. For instance, as described in [RFC9641] and [RFC9642], trust anchors and keys installed during manufacturing are expected to appear in <operational> (Section 5.3 of [RFC8342]) and <system> [SYSTEM-CONFIG] if implemented.¶
1.5. Conventions
Various examples in this document use "BASE64VALUE=" as a placeholder value for binary data that has been base64 encoded (per Section 9.8 of [RFC7950]). This placeholder value is used because real base64-encoded structures are often many lines long and hence distracting to the example being presented.¶
Various examples in this document use the XML
[W3C
Various examples in this document contain long lines that may be folded, as described in [RFC8792].¶
2. The "ietf-ssh-common" Module
The SSH common model presented in this section is common to both SSH clients and SSH servers. The
"transport
2.1. Data Model Overview
This section provides an overview of the "ietf
2.1.1. Features
The following diagram lists all the "feature" statements
defined in the "ietf
The diagram above uses syntax that is similar to but not defined in [RFC8340].¶
Please refer to the YANG module for a description of each feature.¶
2.1.2. Groupings
The "ietf
This grouping is presented in the following subsection.¶
2.1.3. Protocol-Accessible Nodes
The following tree diagram [RFC8340] lists all the
protocol
Comments:¶
2.2. Example Usage
The following example illustrates the "transport
The following example illustrates operational state data indicating the SSH algorithms supported by the server.¶
The following example illustrates the "generate
REQUEST¶
RESPONSE¶
2.3. YANG Module
This YANG module has normative references to [RFC4250], [RFC4253], [RFC6187], and [FIPS_186-5].¶
3. The "ietf-ssh-client" Module
This section defines a YANG 1.1 [RFC7950] module called
"ietf
3.1. Data Model Overview
This section provides an overview of the "ietf
3.1.1. Features
The following diagram lists all the "feature" statements
defined in the "ietf
The diagram above uses syntax that is similar to but not defined in [RFC8340].¶
Please refer to the YANG module for a description of each feature.¶
3.1.2. Groupings
The "ietf
This grouping is presented in the following subsection.¶
3.1.3. Protocol-Accessible Nodes
The "ietf
3.2. Example Usage
This section presents two examples showing the "ssh
The following configuration example uses inline
The following configuration example uses central
4. The "ietf-ssh-server" Module
This section defines a YANG 1.1 module called
"ietf
4.1. Data Model Overview
This section provides an overview of the "ietf
4.1.1. Features
The following diagram lists all the "feature" statements
defined in the "ietf
The diagram above uses syntax that is similar to but not defined in [RFC8340].¶
Please refer to the YANG module for a description of each feature.¶
4.1.2. Groupings
The "ietf
This grouping is presented in the following subsection.¶
4.1.3. Protocol-Accessible Nodes
The "ietf
4.2. Example Usage
This section presents two examples showing the "ssh
The following configuration example uses inline
The following configuration example uses central
5. Security Considerations
The three IETF YANG modules in this document define groupings and will
not be deployed as standalone modules. Their security implications
may be context
5.1. Considerations for the "iana-ssh-key-exchange-algs" Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "iana
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
This YANG module defines YANG enumerations for a public IANA-maintained registry.¶
YANG enumerations are not security
This module does not define any writable nodes, RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
5.2. Considerations for the "iana-ssh-encryption-algs" Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "iana
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
This YANG module defines YANG enumerations for a public IANA-maintained registry.¶
YANG enumerations are not security
This module does not define any writable nodes, RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
5.3. Considerations for the "iana-ssh-mac-algs" Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "iana
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
This YANG module defines YANG enumerations for a public IANA-maintained registry.¶
YANG enumerations are not security
This module does not define any writable nodes, RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
5.4. Considerations for the "iana-ssh-public-key-algs" Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "iana
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
This YANG module defines YANG enumerations for a public IANA-maintained registry.¶
YANG enumerations are not security
This module does not define any writable nodes, RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
5.5. Considerations for the "ietf-ssh-common" YANG Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "ietf
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
Please be aware that this YANG module uses groupings from other YANG modules that define nodes that may be considered sensitive or vulnerable in network environments. Please review the security considerations for dependent YANG modules for information as to which nodes may be considered sensitive or vulnerable in network environments.¶
None of the readable data nodes defined in this YANG module are
considered sensitive or vulnerable in network environments.
The NACM "default
None of the writable data nodes defined in this YANG module are
considered sensitive or vulnerable in network environments.
The NACM "default
This module defines the "generate
This module does not define any actions or notifications, and thus, the security considerations for such are not provided here.¶
5.6. Considerations for the "ietf-ssh-client" YANG Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "ietf
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
Please be aware that this YANG module uses groupings from other YANG modules that define nodes that may be considered sensitive or vulnerable in network environments. Please review the security considerations for dependent YANG modules for information as to which nodes may be considered sensitive or vulnerable in network environments.¶
One readable data node defined in this YANG module may be considered sensitive or vulnerable in some network environments. This node is as follows:¶
All the writable data nodes defined by this module may be
considered sensitive or vulnerable in some network environments.
For instance, any modification to a key or reference to a key
may dramatically alter the implemented security policy. For
this reason, the NACM extension "default
This module does not define any RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
5.7. Considerations for the "ietf-ssh-server" YANG Module
This section is modeled after the template defined in Section 3.7.1 of [RFC8407].¶
The "ietf
The Network Configuration Access Control Model (NACM) [RFC8341] provides the means to restrict access for particular users to a preconfigured subset of all available protocol operations and content.¶
Please be aware that this YANG module uses groupings from other YANG modules that define nodes that may be considered sensitive or vulnerable in network environments. Please review the security considerations for dependent YANG modules for information as to which nodes may be considered sensitive or vulnerable in network environments.¶
None of the readable data nodes defined in this YANG module are
considered sensitive or vulnerable in network environments.
The NACM "default
All the writable data nodes defined by this module may be
considered sensitive or vulnerable in some network environments.
For instance, the addition or removal of references to keys,
certificates, trusted anchors, etc., or even the modification
of transport or keepalive parameters can dramatically alter
the implemented security policy. For this reason, the NACM
extension "default
This module does not define any RPCs, actions, or notifications, and thus, the security considerations for such are not provided here.¶
6. IANA Considerations
6.1. The IETF XML Registry
IANA has registered seven URIs in the "ns" registry of the "IETF XML Registry" [RFC3688] as follows.¶
- URI:
- urn
:ietf :params :xml :ns :yang :iana -ssh -key -exchange -algs ¶ - Registrant Contact:
- The IESG¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :iana -ssh -encryption -algs ¶ - Registrant Contact:
- The IESG¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :iana -ssh -mac -algs ¶ - Registrant Contact:
- The IESG¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :iana -ssh -public -key -algs ¶ - Registrant Contact:
- The IESG¶
- XML:
- N/A; the requested URI is an XML namespace.¶
- URI:
- urn
:ietf :params :xml :ns :yang :ietf -ssh -common ¶ - Registrant Contact:
- The IESG¶
- XML:
- N/A; the requested URI is an XML namespace.¶
6.2. The YANG Module Names Registry
IANA has registered seven YANG modules in the "YANG Module Names" registry [RFC6020] as follows.¶
- Name:
- iana
-ssh -key -exchange -algs ¶ - Namespace:
- urn
:ietf :params :xml :ns :yang :iana -ssh -key -exchange -algs ¶ - Prefix:
- sshkea¶
- Reference:
- RFC 9644¶
- Name:
- iana
-ssh -encryption -algs ¶ - Namespace:
- urn
:ietf :params :xml :ns :yang :iana -ssh -encryption -algs ¶ - Prefix:
- sshea¶
- Reference:
- RFC 9644¶
- Name:
- iana
-ssh -mac -algs ¶ - Namespace:
- urn
:ietf :params :xml :ns :yang :iana -ssh -mac -algs ¶ - Prefix:
- sshma¶
- Reference:
- RFC 9644¶
- Name:
- iana
-ssh -public -key -algs ¶ - Namespace:
- urn
:ietf :params :xml :ns :yang :iana -ssh -public -key -algs ¶ - Prefix:
- sshpka¶
- Reference:
- RFC 9644¶
- Name:
- ietf-ssh-common¶
- Namespace:
- urn
:ietf :params :xml :ns :yang :ietf -ssh -common ¶ - Prefix:
- sshcmn¶
- Reference:
- RFC 9644¶
6.3. Considerations for the "iana-ssh-encryption-algs" Module
This section follows the template defined in Section 4.30.3.1 of [YANG-GUIDE].¶
This document presents a script (see Appendix A) for
IANA to use to generate the IANA-maintained "iana
IANA has added the following note to the registry:¶
New values must not be directly added to the "iana-ssh -encryption -algs" YANG module. They must instead be added to the "Encryption Algorithm Names" registry of the "Secure Shell (SSH) Protocol Parameters" registry group [IANA-ENC-ALGS].¶
When a value is added to the "Encryption Algorithm Names" registry, a new "enum"
statement must be added to the "iana
- enum
- Replicates a name from the registry.¶
- value
- Contains the decimal value of the IANA-assigned value.¶
- status
- Include only if a registration has been deprecated or obsoleted. An IANA "Note" containing the word "HISTORIC" maps to YANG status "obsolete". Since the registry is unable to express a "SHOULD NOT" recommendation, there is no mapping to YANG status "deprecated".¶
- description
- Contains "Enumeration for the 'foo-bar' algorithm.", where "foo-bar" is a placeholder for the algorithm's name (e.g., "3des-cbc").¶
- reference
- Replicates the reference(s) from the registry with the title of the document(s) added.¶
Unassigned or reserved values are not present in the module.¶
When the "iana
IANA has added the following note to the "Encryption Algorithm Names" registry.¶
When this registry is modified, the YANG module "iana-ssh -encryption -algs" [IANA -YANG ] must be updated as defined in RFC 9644.¶-PARAMETERS
6.4. Considerations for the "iana-ssh-mac-algs" Module
This section follows the template defined in Section 4.30.3.1 of [YANG-GUIDE].¶
This document presents a script (see Appendix A) for
IANA to use to generate the IANA-maintained "iana
IANA has added the following note to the registry:¶
New values must not be directly added to the "iana-ssh -mac -algs" YANG module. They must instead be added to the "MAC Algorithm Names" registry of the "Secure Shell (SSH) Protocol Parameters" registry group [IANA-MAC-ALGS].¶
When a value is added to the "MAC Algorithm Names" registry, a new "enum"
statement must be added to the "iana
- enum
- Replicates a name from the registry.¶
- value
- Contains the decimal value of the IANA-assigned value.¶
- status
- Include only if a registration has been deprecated or obsoleted.¶
- description
- Contains "Enumeration for the 'foo-bar' algorithm.", where "foo-bar" is a placeholder for the algorithm's name (e.g., "3des-cbc").¶
- reference
- Replicates the reference(s) from the registry with the title of the document(s) added.¶
Unassigned or reserved values are not present in the module.¶
When the "iana
IANA has added the following note to the "MAC Algorithm Names" registry.¶
When this registry is modified, the YANG module "iana-ssh -mac -algs" [IANA -YANG ] must be updated as defined in RFC 9644.¶-PARAMETERS
6.5. Considerations for the "iana-ssh-public-key-algs" Module
This section follows the template defined in Section 4.30.3.1 of [YANG-GUIDE].¶
This document presents a script (see Appendix A) for
IANA to use to generate the IANA-maintained "iana
IANA has added the following note to the registry:¶
New values must not be directly added to the "iana-ssh -public -key -algs" YANG module. They must instead be added to the "Public Key Algorithm Names" registry of the "Secure Shell (SSH) Protocol Parameters" registry group [IANA-PUBKEY-ALGS].¶
When a value is added to the "Public Key Algorithm Names" registry, a new "enum"
statement must be added to the "iana
- enum
- Replicates a name from the registry.¶
- value
- Contains the decimal value of the IANA-assigned value.¶
- status
- Include only if a registration has been deprecated or obsoleted.¶
- description
- Contains "Enumeration for the 'foo-bar' algorithm.", where "foo-bar" is a placeholder for the algorithm's name (e.g., "3des-cbc").¶
- reference
- Replicates the reference(s) from the registry with the title of the document(s) added.¶
In the case that the algorithm name ends with "-*", the family of enumerations
must be added. The family of enum algorithm names are generated by replacing
the "*" character with these strings: "nistp256", "nistp384", "nistp521",
"1.3.132.0.1", "1
Unassigned or reserved values are not present in the module.¶
When the "iana
IANA has added the following note to the "Public Key Algorithm Names" registry.¶
When this registry is modified, the YANG module "iana-ssh -public -key -algs" [IANA -YANG ] must be updated as defined in RFC 9644.¶-PARAMETERS
6.6. Considerations for the "iana-ssh-key-exchange-algs" Module
This section follows the template defined in Section 4.30.3.1 of [YANG-GUIDE].¶
This document presents a script (see Appendix A) for
IANA to use to generate the IANA-maintained "iana
IANA has added the following note to the registry:¶
New values must not be directly added to the "iana-ssh -key -exchange -algs" YANG module. They must instead be added to the "Key Exchange Method Names" registry of the "Secure Shell (SSH) Protocol Parameters" registry group [IANA-KEYEX-ALGS].¶
When a value is added to the "Key Exchange Method Names" registry, a new
"enum" statement must be added to the "iana
- enum
- Replicates a name from the registry.¶
- value
- Contains the decimal value of the IANA-assigned value.¶
- status
- Include only if a registration has been deprecated or obsoleted. An IANA "OK to Implement" containing "SHOULD NOT" maps to YANG status "deprecated". An IANA "OK to Implement" containing "MUST NOT" maps to YANG status "obsolete".¶
- description
- Contains "Enumeration for the 'foo-bar' algorithm.", where "foo-bar" is a placeholder for the algorithm's name (e.g., "3des-cbc").¶
- reference
- Replicates the reference(s) from the registry with the title of the document(s) added.¶
In the case that the algorithm name ends with "-*", the family of enumerations
must be added. The family of enum algorithm names are generated by replacing
the "*" character with these strings: "nistp256", "nistp384", "nistp521",
"1.3.132.0.1", "1
Unassigned or reserved values are not present in the module.¶
When the "iana
IANA has added the following note to the "Key Exchange Method Names" registry.¶
When this registry is modified, the YANG module "iana-ssh -key -exchange -algs" [IANA -YANG ] must be updated as defined in RFC 9644.¶-PARAMETERS
7. References
7.1. Normative References
- [RFC2119]
-
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10
.17487 , , <https:///RFC2119 www >..rfc -editor .org /info /rfc2119 - [RFC4250]
-
Lehtinen, S. and C. Lonvick, Ed., "The Secure Shell (SSH) Protocol Assigned Numbers", RFC 4250, DOI 10
.17487 , , <https:///RFC4250 www >..rfc -editor .org /info /rfc4250 - [RFC4251]
-
Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Protocol Architecture", RFC 4251, DOI 10
.17487 , , <https:///RFC4251 www >..rfc -editor .org /info /rfc4251 - [RFC4252]
-
Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Authentication Protocol", RFC 4252, DOI 10
.17487 , , <https:///RFC4252 www >..rfc -editor .org /info /rfc4252 - [RFC4253]
-
Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Transport Layer Protocol", RFC 4253, DOI 10
.17487 , , <https:///RFC4253 www >..rfc -editor .org /info /rfc4253 - [RFC4254]
-
Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH) Connection Protocol", RFC 4254, DOI 10
.17487 , , <https:///RFC4254 www >..rfc -editor .org /info /rfc4254 - [RFC6020]
-
Bjorklund, M., Ed., "YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)", RFC 6020, DOI 10
.17487 , , <https:///RFC6020 www >..rfc -editor .org /info /rfc6020 - [RFC6187]
-
Igoe, K. and D. Stebila, "X.509v3 Certificates for Secure Shell Authentication", RFC 6187, DOI 10
.17487 , , <https:///RFC6187 www >..rfc -editor .org /info /rfc6187 - [RFC6241]
-
Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., and A. Bierman, Ed., "Network Configuration Protocol (NETCONF)", RFC 6241, DOI 10
.17487 , , <https:///RFC6241 www >..rfc -editor .org /info /rfc6241 - [RFC6242]
-
Wasserman, M., "Using the NETCONF Protocol over Secure Shell (SSH)", RFC 6242, DOI 10
.17487 , , <https:///RFC6242 www >..rfc -editor .org /info /rfc6242 - [RFC6991]
-
Schoenwaelder, J., Ed., "Common YANG Data Types", RFC 6991, DOI 10
.17487 , , <https:///RFC6991 www >..rfc -editor .org /info /rfc6991 - [RFC7317]
-
Bierman, A. and M. Bjorklund, "A YANG Data Model for System Management", RFC 7317, DOI 10
.17487 , , <https:///RFC7317 www >..rfc -editor .org /info /rfc7317 - [RFC7950]
-
Bjorklund, M., Ed., "The YANG 1.1 Data Modeling Language", RFC 7950, DOI 10
.17487 , , <https:///RFC7950 www >..rfc -editor .org /info /rfc7950 - [RFC8040]
-
Bierman, A., Bjorklund, M., and K. Watsen, "RESTCONF Protocol", RFC 8040, DOI 10
.17487 , , <https:///RFC8040 www >..rfc -editor .org /info /rfc8040 - [RFC8174]
-
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10
.17487 , , <https:///RFC8174 www >..rfc -editor .org /info /rfc8174 - [RFC8341]
-
Bierman, A. and M. Bjorklund, "Network Configuration Access Control Model", STD 91, RFC 8341, DOI 10
.17487 , , <https:///RFC8341 www >..rfc -editor .org /info /rfc8341 - [RFC8446]
-
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10
.17487 , , <https:///RFC8446 www >..rfc -editor .org /info /rfc8446 - [RFC9000]
-
Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based Multiplexed and Secure Transport", RFC 9000, DOI 10
.17487 , , <https:///RFC9000 www >..rfc -editor .org /info /rfc9000 - [RFC9640]
-
Watsen, K., "YANG Data Types and Groupings for Cryptography", RFC 9640, DOI 10
.17487 , , <https:///RFC9640 www >..rfc -editor .org /info /rfc9640 - [RFC9641]
-
Watsen, K., "A YANG Data Model for a Truststore", RFC 9641, DOI 10
.17487 , , <https:///RFC9641 www >..rfc -editor .org /info /rfc9641 - [RFC9642]
-
Watsen, K., "A YANG Data Model for a Keystore", RFC 9642, DOI 10
.17487 , , <https:///RFC9642 www >..rfc -editor .org /info /rfc9642
7.2. Informative References
- [FIPS_186-5]
-
NIST, "Digital Signature Standard (DSS)", FIPS PUB 186-5, DOI 10
.6028 , , <https:///NIST .FIPS .186 -5 csrc >..nist .gov /pubs /fips /186 -5 /final - [HTTP
-CLIENT -SERVER] -
Watsen, K., "YANG Groupings for HTTP Clients and HTTP Servers", Work in Progress, Internet-Draft, draft
-ietf , , <https://-netconf -http -client -server -23 datatracker >..ietf .org /doc /html /draft -ietf -netconf -http -client -server -23 - [IANA-ENC-ALGS]
-
IANA, "Encryption Algorithm Names", <https://
www >..iana .org /assignments /ssh -parameters / - [IANA
-KEYEX -ALGS] -
IANA, "Key Exchange Method Names", <https://
www >..iana .org /assignments /ssh -parameters - [IANA-MAC-ALGS]
-
IANA, "MAC Algorithm Names", <https://
www >..iana .org /assignments /ssh -parameters - [IANA
-PUBKEY -ALGS] -
IANA, "Public Key Algorithm Names", <https://
www >..iana .org /assignments /ssh -parameters / - [IANA
-YANG -PARAMETERS] -
IANA, "YANG Parameters", <https://
www >..iana .org /assignments /yang -parameters - [NETCONF
-CLIENT -SERVER] -
Watsen, K., "NETCONF Client and Server Models", Work in Progress, Internet-Draft, draft
-ietf , , <https://-netconf -netconf -client -server -37 datatracker >..ietf .org /doc /html /draft -ietf -netconf -netconf -client -server -37 - [RESTCONF
-CLIENT -SERVER] -
Watsen, K., "RESTCONF Client and Server Models", Work in Progress, Internet-Draft, draft
-ietf , , <https://-netconf -restconf -client -server -38 datatracker >..ietf .org /doc /html /draft -ietf -netconf -restconf -client -server -38 - [RFC3688]
-
Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, DOI 10
.17487 , , <https:///RFC3688 www >..rfc -editor .org /info /rfc3688 - [RFC8071]
-
Watsen, K., "NETCONF Call Home and RESTCONF Call Home", RFC 8071, DOI 10
.17487 , , <https:///RFC8071 www >..rfc -editor .org /info /rfc8071 - [RFC8259]
-
Bray, T., Ed., "The JavaScript Object Notation (JSON) Data Interchange Format", STD 90, RFC 8259, DOI 10
.17487 , , <https:///RFC8259 www >..rfc -editor .org /info /rfc8259 - [RFC8340]
-
Bjorklund, M. and L. Berger, Ed., "YANG Tree Diagrams", BCP 215, RFC 8340, DOI 10
.17487 , , <https:///RFC8340 www >..rfc -editor .org /info /rfc8340 - [RFC8342]
-
Bjorklund, M., Schoenwaelder, J., Shafer, P., Watsen, K., and R. Wilton, "Network Management Datastore Architecture (NMDA)", RFC 8342, DOI 10
.17487 , , <https:///RFC8342 www >..rfc -editor .org /info /rfc8342 - [RFC8407]
-
Bierman, A., "Guidelines for Authors and Reviewers of Documents Containing YANG Data Models", BCP 216, RFC 8407, DOI 10
.17487 , , <https:///RFC8407 www >..rfc -editor .org /info /rfc8407 - [RFC8792]
-
Watsen, K., Auerswald, E., Farrel, A., and Q. Wu, "Handling Long Lines in Content of Internet-Drafts and RFCs", RFC 8792, DOI 10
.17487 , , <https:///RFC8792 www >..rfc -editor .org /info /rfc8792 - [RFC9643]
-
Watsen, K. and M. Scharf, "YANG Groupings for TCP Clients and TCP Servers", RFC 9643, DOI 10
.17487 , , <https:///RFC9643 www >..rfc -editor .org /info /rfc9643 - [RFC9645]
-
Watsen, K., "YANG Groupings for TLS Clients and TLS Servers", RFC 9645, DOI 10
.17487 , , <https:///RFC9645 www >..rfc -editor .org /info /rfc9645 - [SYSTEM-CONFIG]
-
Ma, Q., Wu, Q., and C. Feng, "System-defined Configuration", Work in Progress, Internet-Draft, draft
-ietf , , <https://-netmod -system -config -09 datatracker >..ietf .org /doc /html /draft -ietf -netmod -system -config -09 - [W3C
.REC -xml -20081126] -
Bray, T., Paoli, J., Sperberg
-Mc , Maler, E., and F. Yergeau, "Extensible Markup Language (XML) 1.0 (Fifth Edition)", World Wide Web Consortium Recommendation RECQueen, C.M. -xml , , <https://-20081126 www >..w3 .org /TR /2008 /REC -xml -20081126 / - [YANG-GUIDE]
-
Bierman, A., Boucadair, M., and Q. Wu, "Guidelines for Authors and Reviewers of Documents Containing YANG Data Models", Work in Progress, Internet-Draft, draft
-ietf , , <https://-netmod -rfc8407bis -17 datatracker >..ietf .org /doc /html /draft -ietf -netmod -rfc8407bis -17
Appendix A. Script to Generate IANA-Maintained YANG Modules
This section is not normative.¶
The Python <https://
Run the script using the command "python gen
Be aware that the script does not attempt to copy the "revision" statements
from the previous
Acknowledgements
The authors would like to thank the following for lively discussions on list and in the halls (ordered by first name): Alan Luchuk, Andy Bierman, Balázs Kovács, Barry Leiba, Benoit Claise, Bert Wijnen, David Lamparter, Elwyn Davies, Gary Wu, Jürgen Schönwälder, Ladislav Lhotka, Liang Xia, Martin Björklund, Martin Thomson, Mehmet Ersue, Michal Vaško, Murray Kucherawy, Paul Wouters, Per Andersson, Phil Shafer, Qin Wun, Radek Krejci, Rob Wilton, Roman Danyliw, Russ Housley, Sean Turner, Thomas Martin, Tom Petch, and Warren Kumari.¶
Contributors
Special acknowledgement goes to Gary Wu for his work on the
"ietf