Hi,
Don's note reminded me to mention this other draft
"Applying WebDAV (Web Distributed Authoring and Versioning)to Network
Configuration Management Problems", Randy Presuhn, 07-JAN-03,
<draft-presuhn-nmwebdav-01.txt>
Note that Randy Presuhn (the author) is the principal editor of the
entire SNMPv3 set of standards (RFC 3410 to RFC 3418), which are now
Internet Standard status (SNMPv1 and SNMPv2 have BOTH been retired
and moved to Historic status).
Cheers,
- Ira McDonald
-------------------------------------------------
[excerpts from <draft-presuhn-nmwebdav-01.txt>, 30 December 2002]
Abstract
This memo examines the potential of using WWW Distributed Authoring
and Versioning (WebDAV) technologies to address the problems of
network configuration management. It reviews requirements and issue
that have been identified in IETF network configuration management
and operator requirements discussions, matching these requirements
and issues with various WebDAV facilities. It concludes by
identifying areas for further exploration.
Comments are welcomed, both from the Operations and Management Area
in general, and from participants in the webdav and deltav working
groups in particular. Please send comments to the author at
randy_presuhn at bmc.com.
Table of Contents
1. Introduction ................................................ 3
2. Problem Decomposition ....................................... 3
3. Proposed Solution ........................................... 4
3.1. More Sophisticated Uses ................................... 6
3.2. IANA Considerations ....................................... 6
4. Requirements Satisfied ...................................... 6
5. Requirements Not Addressed .................................. 6
6. Open Issues ................................................. 7
7. Notice on Intellectual Property ............................. 7
8. Security Considerations ..................................... 8
8.1. Security of Stored Configurations ......................... 8
8.2. Security Configuration as Configuration Data .............. 8
8.3. Security Consequences of Applying Configurations .......... 8
8.3.1. Keys to the Kingdom ..................................... 8
8.3.2. Unwanted Reincarnation .................................. 8
8.3.3. The Dark Side of Implicit Delegation .................... 9
8.4. Policy Coherency .......................................... 9
8.4.1. Referential Integrity, or the Lack Thereof .............. 9
8.4.2. What About VACM? ....................................... 9
9. References .................................................. 10
9.1. Informative References .................................... 10
9.2. Normative References ...................................... 11
10. Author's Address ........................................... 11
11. Full Copyright Statement ................................... 11