WBMM> Management over WebDAV - a recent I-D

WBMM> Management over WebDAV - a recent I-D

McDonald, Ira imcdonald at sharplabs.com
Wed Feb 12 15:17:50 EST 2003


Hi,

Don's note reminded me to mention this other draft

  "Applying WebDAV (Web Distributed Authoring and Versioning)to Network
  Configuration Management Problems", Randy Presuhn, 07-JAN-03,
  <draft-presuhn-nmwebdav-01.txt>

Note that Randy Presuhn (the author) is the principal editor of the
entire SNMPv3 set of standards (RFC 3410 to RFC 3418), which are now
Internet Standard status (SNMPv1 and SNMPv2 have BOTH been retired
and moved to Historic status).

Cheers,
- Ira McDonald

-------------------------------------------------
[excerpts from <draft-presuhn-nmwebdav-01.txt>, 30 December 2002]

Abstract

   This memo examines the potential of using WWW Distributed Authoring
   and Versioning (WebDAV) technologies to address the problems of
   network configuration management.  It reviews requirements and issue
   that have been identified in IETF network configuration management
   and operator requirements discussions, matching these requirements
   and issues with various WebDAV facilities.  It concludes by
   identifying areas for further exploration.

   Comments are welcomed, both from the Operations and Management Area
   in general, and from participants in the webdav and deltav working
   groups in particular.  Please send comments to the author at
   randy_presuhn at bmc.com.

Table of Contents

   1. Introduction ................................................    3
   2. Problem Decomposition .......................................    3
   3. Proposed Solution ...........................................    4
   3.1. More Sophisticated Uses ...................................    6
   3.2. IANA Considerations .......................................    6
   4. Requirements Satisfied ......................................    6
   5. Requirements Not Addressed ..................................    6
   6. Open Issues .................................................    7
   7. Notice on Intellectual Property .............................    7
   8. Security Considerations .....................................    8
   8.1. Security of Stored Configurations .........................    8
   8.2. Security Configuration as Configuration Data ..............    8
   8.3. Security Consequences of Applying Configurations ..........    8
   8.3.1. Keys to the Kingdom .....................................    8
   8.3.2. Unwanted Reincarnation ..................................    8
   8.3.3. The Dark Side of Implicit Delegation ....................    9
   8.4. Policy Coherency ..........................................    9
   8.4.1. Referential Integrity, or the Lack Thereof ..............    9
   8.4.2. What About VACM?  .......................................    9
   9. References ..................................................   10
   9.1. Informative References ....................................   10
   9.2. Normative References ......................................   11
   10. Author's Address ...........................................   11
   11. Full Copyright Statement ...................................   11




More information about the Wims mailing list