draft-ietf-netconf-restconf-client-server-16.txt   draft-ietf-netconf-restconf-client-server-17.txt 
NETCONF Working Group K. Watsen NETCONF Working Group K. Watsen
Internet-Draft Watsen Networks Internet-Draft Watsen Networks
Intended status: Standards Track November 1, 2019 Intended status: Standards Track November 20, 2019
Expires: May 4, 2020 Expires: May 23, 2020
RESTCONF Client and Server Models RESTCONF Client and Server Models
draft-ietf-netconf-restconf-client-server-16 draft-ietf-netconf-restconf-client-server-17
Abstract Abstract
This document defines two YANG modules, one module to configure a This document defines two YANG modules, one module to configure a
RESTCONF client and the other module to configure a RESTCONF server. RESTCONF client and the other module to configure a RESTCONF server.
Both modules support the TLS transport protocol with both standard Both modules support the TLS transport protocol with both standard
RESTCONF and RESTCONF Call Home connections. RESTCONF and RESTCONF Call Home connections.
Editorial Note (To be removed by RFC Editor) Editorial Note (To be removed by RFC Editor)
skipping to change at page 2, line 11 skipping to change at page 2, line 11
o "BBBB" --> the assigned RFC value for I-D.ietf-netconf-tls-client- o "BBBB" --> the assigned RFC value for I-D.ietf-netconf-tls-client-
server server
o "CCCC" --> the assigned RFC value for I-D.ietf-netconf-http- o "CCCC" --> the assigned RFC value for I-D.ietf-netconf-http-
client-server client-server
Artwork in this document contains placeholder values for the date of Artwork in this document contains placeholder values for the date of
publication of this draft. Please apply the following replacement: publication of this draft. Please apply the following replacement:
o "2019-11-02" --> the publication date of this draft o "2019-11-20" --> the publication date of this draft
The following Appendix section is to be removed prior to publication: The following Appendix section is to be removed prior to publication:
o Appendix B. Change Log o Appendix B. Change Log
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on May 4, 2020. This Internet-Draft will expire on May 23, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 3, line 15 skipping to change at page 3, line 15
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
2. The RESTCONF Client Model . . . . . . . . . . . . . . . . . . 4 2. The RESTCONF Client Model . . . . . . . . . . . . . . . . . . 4
2.1. Tree Diagram . . . . . . . . . . . . . . . . . . . . . . 4 2.1. Tree Diagram . . . . . . . . . . . . . . . . . . . . . . 4
2.2. Example Usage . . . . . . . . . . . . . . . . . . . . . . 5 2.2. Example Usage . . . . . . . . . . . . . . . . . . . . . . 5
2.3. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 9 2.3. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 9
3. The RESTCONF Server Model . . . . . . . . . . . . . . . . . . 19 3. The RESTCONF Server Model . . . . . . . . . . . . . . . . . . 19
3.1. Tree Diagram . . . . . . . . . . . . . . . . . . . . . . 19 3.1. Tree Diagram . . . . . . . . . . . . . . . . . . . . . . 19
3.2. Example Usage . . . . . . . . . . . . . . . . . . . . . . 20 3.2. Example Usage . . . . . . . . . . . . . . . . . . . . . . 21
3.3. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 25 3.3. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 25
4. Security Considerations . . . . . . . . . . . . . . . . . . . 37 4. Security Considerations . . . . . . . . . . . . . . . . . . . 37
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 38 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 38
5.1. The IETF XML Registry . . . . . . . . . . . . . . . . . . 38 5.1. The IETF XML Registry . . . . . . . . . . . . . . . . . . 38
5.2. The YANG Module Names Registry . . . . . . . . . . . . . 38 5.2. The YANG Module Names Registry . . . . . . . . . . . . . 38
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 38 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 39
6.1. Normative References . . . . . . . . . . . . . . . . . . 38 6.1. Normative References . . . . . . . . . . . . . . . . . . 39
6.2. Informative References . . . . . . . . . . . . . . . . . 40 6.2. Informative References . . . . . . . . . . . . . . . . . 40
Appendix A. Expanded Tree Diagrams . . . . . . . . . . . . . . . 41 Appendix A. Expanded Tree Diagrams . . . . . . . . . . . . . . . 41
A.1. Expanded Tree Diagram for 'ietf-restconf-client' . . . . 41 A.1. Expanded Tree Diagram for 'ietf-restconf-client' . . . . 41
A.2. Expanded Tree Diagram for 'ietf-restconf-server' . . . . 53 A.2. Expanded Tree Diagram for 'ietf-restconf-server' . . . . 66
Appendix B. Change Log . . . . . . . . . . . . . . . . . . . . . 63 Appendix B. Change Log . . . . . . . . . . . . . . . . . . . . . 80
B.1. 00 to 01 . . . . . . . . . . . . . . . . . . . . . . . . 63 B.1. 00 to 01 . . . . . . . . . . . . . . . . . . . . . . . . 80
B.2. 01 to 02 . . . . . . . . . . . . . . . . . . . . . . . . 63 B.2. 01 to 02 . . . . . . . . . . . . . . . . . . . . . . . . 80
B.3. 02 to 03 . . . . . . . . . . . . . . . . . . . . . . . . 63 B.3. 02 to 03 . . . . . . . . . . . . . . . . . . . . . . . . 80
B.4. 03 to 04 . . . . . . . . . . . . . . . . . . . . . . . . 63 B.4. 03 to 04 . . . . . . . . . . . . . . . . . . . . . . . . 81
B.5. 04 to 05 . . . . . . . . . . . . . . . . . . . . . . . . 63 B.5. 04 to 05 . . . . . . . . . . . . . . . . . . . . . . . . 81
B.6. 05 to 06 . . . . . . . . . . . . . . . . . . . . . . . . 64 B.6. 05 to 06 . . . . . . . . . . . . . . . . . . . . . . . . 81
B.7. 06 to 07 . . . . . . . . . . . . . . . . . . . . . . . . 64 B.7. 06 to 07 . . . . . . . . . . . . . . . . . . . . . . . . 81
B.8. 07 to 08 . . . . . . . . . . . . . . . . . . . . . . . . 64 B.8. 07 to 08 . . . . . . . . . . . . . . . . . . . . . . . . 82
B.9. 08 to 09 . . . . . . . . . . . . . . . . . . . . . . . . 64 B.9. 08 to 09 . . . . . . . . . . . . . . . . . . . . . . . . 82
B.10. 09 to 10 . . . . . . . . . . . . . . . . . . . . . . . . 64 B.10. 09 to 10 . . . . . . . . . . . . . . . . . . . . . . . . 82
B.11. 10 to 11 . . . . . . . . . . . . . . . . . . . . . . . . 65 B.11. 10 to 11 . . . . . . . . . . . . . . . . . . . . . . . . 82
B.12. 11 to 12 . . . . . . . . . . . . . . . . . . . . . . . . 65 B.12. 11 to 12 . . . . . . . . . . . . . . . . . . . . . . . . 82
B.13. 12 to 13 . . . . . . . . . . . . . . . . . . . . . . . . 65 B.13. 12 to 13 . . . . . . . . . . . . . . . . . . . . . . . . 83
B.14. 13 to 14 . . . . . . . . . . . . . . . . . . . . . . . . 66 B.14. 13 to 14 . . . . . . . . . . . . . . . . . . . . . . . . 83
B.15. 14 to 15 . . . . . . . . . . . . . . . . . . . . . . . . 66 B.15. 14 to 15 . . . . . . . . . . . . . . . . . . . . . . . . 83
B.16. 15 to 16 . . . . . . . . . . . . . . . . . . . . . . . . 66 B.16. 15 to 16 . . . . . . . . . . . . . . . . . . . . . . . . 84
Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 66 B.17. 16 to 17 . . . . . . . . . . . . . . . . . . . . . . . . 84
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 67 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . 84
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 84
1. Introduction 1. Introduction
This document defines two YANG [RFC7950] modules, one module to This document defines two YANG [RFC7950] modules, one module to
configure a RESTCONF client and the other module to configure a configure a RESTCONF client and the other module to configure a
RESTCONF server [RFC8040]. Both modules support the TLS [RFC8446] RESTCONF server [RFC8040]. Both modules support the TLS [RFC8446]
transport protocol with both standard RESTCONF and RESTCONF Call Home transport protocol with both standard RESTCONF and RESTCONF Call Home
connections [RFC8071]. connections [RFC8071].
1.1. Terminology 1.1. Terminology
skipping to change at page 6, line 8 skipping to change at page 6, line 8
The following example illustrates configuring a RESTCONF client to The following example illustrates configuring a RESTCONF client to
initiate connections, as well as listening for call-home connections. initiate connections, as well as listening for call-home connections.
This example is consistent with the examples presented in Section 2 This example is consistent with the examples presented in Section 2
of [I-D.ietf-netconf-trust-anchors] and Section 3.2 of of [I-D.ietf-netconf-trust-anchors] and Section 3.2 of
[I-D.ietf-netconf-keystore]. [I-D.ietf-netconf-keystore].
========== NOTE: '\' line wrapping per BCP XXX (RFC XXXX) =========== ========== NOTE: '\' line wrapping per BCP XXX (RFC XXXX) ===========
<restconf-client <restconf-client
xmlns="urn:ietf:params:xml:ns:yang:ietf-restconf-client"> xmlns="urn:ietf:params:xml:ns:yang:ietf-restconf-client"
xmlns:ct="urn:ietf:params:xml:ns:yang:ietf-crypto-types">
<!-- RESTCONF servers to initiate connections to --> <!-- RESTCONF servers to initiate connections to -->
<initiate> <initiate>
<restconf-server> <restconf-server>
<name>corp-fw1</name> <name>corp-fw1</name>
<endpoints> <endpoints>
<endpoint> <endpoint>
<name>corp-fw1.example.com</name> <name>corp-fw1.example.com</name>
<https> <https>
<tcp-client-parameters> <tcp-client-parameters>
<remote-address>corp-fw1.example.com</remote-address> <remote-address>corp-fw1.example.com</remote-address>
<keepalives> <keepalives>
<idle-time>15</idle-time> <idle-time>15</idle-time>
<max-probes>3</max-probes> <max-probes>3</max-probes>
<probe-interval>30</probe-interval> <probe-interval>30</probe-interval>
</keepalives> </keepalives>
</tcp-client-parameters> </tcp-client-parameters>
<tls-client-parameters> <tls-client-parameters>
<client-identity> <client-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-fo\
<cert>base64encodedvalue==</cert> rmat</public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</p\
rivate-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</client-identity> </client-identity>
<server-authentication> <server-authentication>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-server-ca\ <truststore-reference>explicitly-trusted-server-ca\
-certs</truststore-reference> -certs</truststore-reference>
</ca-certs> </ca-certs>
<server-certs> <server-certs>
<truststore-reference>explicitly-trusted-server-ce\ <truststore-reference>explicitly-trusted-server-ce\
rts</truststore-reference> rts</truststore-reference>
</server-certs> </server-certs>
skipping to change at page 7, line 24 skipping to change at page 7, line 31
<tcp-client-parameters> <tcp-client-parameters>
<remote-address>corp-fw2.example.com</remote-address> <remote-address>corp-fw2.example.com</remote-address>
<keepalives> <keepalives>
<idle-time>15</idle-time> <idle-time>15</idle-time>
<max-probes>3</max-probes> <max-probes>3</max-probes>
<probe-interval>30</probe-interval> <probe-interval>30</probe-interval>
</keepalives> </keepalives>
</tcp-client-parameters> </tcp-client-parameters>
<tls-client-parameters> <tls-client-parameters>
<client-identity> <client-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-fo\
<cert>base64encodedvalue==</cert> rmat</public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</p\
rivate-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</client-identity> </client-identity>
<server-authentication> <server-authentication>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-server-ca\ <truststore-reference>explicitly-trusted-server-ca\
-certs</truststore-reference> -certs</truststore-reference>
</ca-certs> </ca-certs>
<server-certs> <server-certs>
<truststore-reference>explicitly-trusted-server-ce\ <truststore-reference>explicitly-trusted-server-ce\
rts</truststore-reference> rts</truststore-reference>
</server-certs> </server-certs>
skipping to change at page 8, line 26 skipping to change at page 8, line 38
<!-- endpoints to listen for RESTCONF Call Home connections on --> <!-- endpoints to listen for RESTCONF Call Home connections on -->
<listen> <listen>
<endpoint> <endpoint>
<name>Intranet-facing listener</name> <name>Intranet-facing listener</name>
<https> <https>
<tcp-server-parameters> <tcp-server-parameters>
<local-address>11.22.33.44</local-address> <local-address>11.22.33.44</local-address>
</tcp-server-parameters> </tcp-server-parameters>
<tls-client-parameters> <tls-client-parameters>
<client-identity> <client-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-format\
<cert>base64encodedvalue==</cert> </public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</priva\
te-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</client-identity> </client-identity>
<server-authentication> <server-authentication>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-server-ca-cer\ <truststore-reference>explicitly-trusted-server-ca-cer\
ts</truststore-reference> ts</truststore-reference>
</ca-certs> </ca-certs>
<server-certs> <server-certs>
<truststore-reference>explicitly-trusted-server-certs<\ <truststore-reference>explicitly-trusted-server-certs<\
/truststore-reference> /truststore-reference>
</server-certs> </server-certs>
skipping to change at page 9, line 16 skipping to change at page 9, line 34
</listen> </listen>
</restconf-client> </restconf-client>
2.3. YANG Module 2.3. YANG Module
This YANG module has normative references to [RFC6991], [RFC8040], This YANG module has normative references to [RFC6991], [RFC8040],
and [RFC8071], [I-D.kwatsen-netconf-tcp-client-server], and [RFC8071], [I-D.kwatsen-netconf-tcp-client-server],
[I-D.ietf-netconf-tls-client-server], and [I-D.ietf-netconf-tls-client-server], and
[I-D.kwatsen-netconf-http-client-server]. [I-D.kwatsen-netconf-http-client-server].
<CODE BEGINS> file "ietf-restconf-client@2019-11-02.yang" <CODE BEGINS> file "ietf-restconf-client@2019-11-20.yang"
module ietf-restconf-client { module ietf-restconf-client {
yang-version 1.1; yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-restconf-client"; namespace "urn:ietf:params:xml:ns:yang:ietf-restconf-client";
prefix rcc; prefix rcc;
import ietf-yang-types { import ietf-yang-types {
prefix yang; prefix yang;
reference reference
"RFC 6991: Common YANG Data Types"; "RFC 6991: Common YANG Data Types";
skipping to change at page 10, line 29 skipping to change at page 10, line 47
Redistribution and use in source and binary forms, with Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info). (https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.; itself for full legal notices.
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119) are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all (RFC 8174) when, and only when, they appear in all
capitals, as shown here."; capitals, as shown here.";
revision 2019-11-02 { revision 2019-11-20 {
description description
"Initial version"; "Initial version";
reference reference
"RFC XXXX: RESTCONF Client and Server Models"; "RFC XXXX: RESTCONF Client and Server Models";
} }
// Features // Features
feature https-initiate { feature https-initiate {
description description
skipping to change at page 12, line 25 skipping to change at page 12, line 43
default "443"; default "443";
description description
"The RESTCONF client will attempt to "The RESTCONF client will attempt to
connect to the IANA-assigned well-known connect to the IANA-assigned well-known
port value for 'https' (443) if no value port value for 'https' (443) if no value
is specified."; is specified.";
} }
} }
} }
container tls-client-parameters { container tls-client-parameters {
must "client-identity" { must 'client-identity' {
description description
"NETCONF/TLS clients MUST pass some "NETCONF/TLS clients MUST pass some
authentication credentials."; authentication credentials.";
} }
description description
"A wrapper around the TLS client parameters "A wrapper around the TLS client parameters
to avoid name collisions."; to avoid name collisions.";
uses tlsc:tls-client-grouping; uses tlsc:tls-client-grouping;
} }
container http-client-parameters { container http-client-parameters {
description description
"A wrapper around the HTTP client parameters "A wrapper around the HTTP client parameters
to avoid name collisions."; to avoid name collisions.";
uses httpc:http-client-grouping; uses httpc:http-client-grouping;
} }
container restconf-client-parameters { container restconf-client-parameters {
description description
"A wrapper around the HTTP client parameters "A wrapper around the HTTP client parameters
skipping to change at page 13, line 17 skipping to change at page 13, line 36
'listen' protocol stack for a single connection."; 'listen' protocol stack for a single connection.";
choice transport { choice transport {
mandatory true; mandatory true;
description description
"Selects between available transports. This is a "Selects between available transports. This is a
'choice' statement so as to support additional 'choice' statement so as to support additional
transport options to be augmented in."; transport options to be augmented in.";
case http { case http {
if-feature "http-listen"; if-feature "http-listen";
container FIXME { container FIXME {
description "FIXME"; description
"FIXME";
} }
} }
case https { case https {
if-feature "https-listen"; if-feature "https-listen";
container https { container https {
description description
"HTTPS-specific listening configuration for inbound "HTTPS-specific listening configuration for inbound
connections."; connections.";
container tcp-server-parameters { container tcp-server-parameters {
description description
skipping to change at page 13, line 41 skipping to change at page 14, line 12
refine "local-port" { refine "local-port" {
default "4336"; default "4336";
description description
"The RESTCONF client will listen on the IANA- "The RESTCONF client will listen on the IANA-
assigned well-known port for 'restconf-ch-tls' assigned well-known port for 'restconf-ch-tls'
(4336) if no value is specified."; (4336) if no value is specified.";
} }
} }
} }
container tls-client-parameters { container tls-client-parameters {
must "client-identity" { must 'client-identity' {
description description
"NETCONF/TLS clients MUST pass some "NETCONF/TLS clients MUST pass some
authentication credentials."; authentication credentials.";
} }
description description
"A wrapper around the TLS client parameters "A wrapper around the TLS client parameters
to avoid name collisions."; to avoid name collisions.";
uses tlsc:tls-client-grouping; uses tlsc:tls-client-grouping;
} }
container http-client-parameters { container http-client-parameters {
skipping to change at page 19, line 32 skipping to change at page 19, line 48
module. module.
Please see Appendix A.2 for a tree diagram that illustrates what the Please see Appendix A.2 for a tree diagram that illustrates what the
module looks like with all the "grouping" statements expanded. module looks like with all the "grouping" statements expanded.
module: ietf-restconf-server module: ietf-restconf-server
+--rw restconf-server +--rw restconf-server
+---u restconf-server-app-grouping +---u restconf-server-app-grouping
grouping restconf-server-grouping grouping restconf-server-grouping
+-- client-identification +-- client-identity-mappings
+-- cert-maps +---u x509c2n:cert-to-name
+---u x509c2n:cert-to-name
grouping restconf-server-listen-stack-grouping grouping restconf-server-listen-stack-grouping
+-- (transport) +-- (transport)
+--:(http) {http-listen}? +--:(http) {http-listen}?
| +-- http | +-- http
| +-- external-endpoint! | +-- external-endpoint!
| | +-- address inet:ip-address | | +-- address inet:ip-address
| | +-- port? inet:port-number | | +-- port? inet:port-number
| +-- tcp-server-parameters | +-- tcp-server-parameters
| | +---u tcps:tcp-server-grouping | | +---u tcps:tcp-server-grouping
| +-- http-server-parameters | +-- http-server-parameters
skipping to change at page 21, line 13 skipping to change at page 21, line 28
home to one RESTCONF client. home to one RESTCONF client.
This example is consistent with the examples presented in Section 2 This example is consistent with the examples presented in Section 2
of [I-D.ietf-netconf-trust-anchors] and Section 3.2 of of [I-D.ietf-netconf-trust-anchors] and Section 3.2 of
[I-D.ietf-netconf-keystore]. [I-D.ietf-netconf-keystore].
========== NOTE: '\' line wrapping per BCP XXX (RFC XXXX) =========== ========== NOTE: '\' line wrapping per BCP XXX (RFC XXXX) ===========
<restconf-server <restconf-server
xmlns="urn:ietf:params:xml:ns:yang:ietf-restconf-server" xmlns="urn:ietf:params:xml:ns:yang:ietf-restconf-server"
xmlns:ct="urn:ietf:params:xml:ns:yang:ietf-crypto-types"
xmlns:x509c2n="urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name"> xmlns:x509c2n="urn:ietf:params:xml:ns:yang:ietf-x509-cert-to-name">
<!-- endpoints to listen for RESTCONF connections on --> <!-- endpoints to listen for RESTCONF connections on -->
<listen> <listen>
<endpoint> <endpoint>
<name>netconf/tls</name> <name>netconf/tls</name>
<https> <https>
<tcp-server-parameters> <tcp-server-parameters>
<local-address>11.22.33.44</local-address> <local-address>11.22.33.44</local-address>
</tcp-server-parameters> </tcp-server-parameters>
<tls-server-parameters> <tls-server-parameters>
<server-identity> <server-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-format\
<cert>base64encodedvalue==</cert> </public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</priva\
te-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</server-identity> </server-identity>
<client-authentication> <client-authentication>
<required/>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-client-ca-cer\ <truststore-reference>explicitly-trusted-client-ca-cer\
ts</truststore-reference> ts</truststore-reference>
</ca-certs> </ca-certs>
<client-certs> <client-certs>
<truststore-reference>explicitly-trusted-client-certs<\ <truststore-reference>explicitly-trusted-client-certs<\
/truststore-reference> /truststore-reference>
</client-certs> </client-certs>
</client-authentication> </client-authentication>
</tls-server-parameters> </tls-server-parameters>
<http-server-parameters> <http-server-parameters>
<server-name>foo.example.com</server-name> <server-name>foo.example.com</server-name>
<protocol-versions> <protocol-versions>
<protocol-version>HTTP/1.1</protocol-version> <protocol-version>HTTP/1.1</protocol-version>
<protocol-version>HTTP/2.0</protocol-version> <protocol-version>HTTP/2.0</protocol-version>
</protocol-versions> </protocol-versions>
</http-server-parameters> </http-server-parameters>
<restconf-server-parameters> <restconf-server-parameters>
<client-identification> <client-identity-mappings>
<cert-maps> <cert-to-name>
<cert-to-name> <id>1</id>
<id>1</id> <fingerprint>11:0A:05:11:00</fingerprint>
<fingerprint>11:0A:05:11:00</fingerprint> <map-type>x509c2n:specified</map-type>
<map-type>x509c2n:specified</map-type> <name>scooby-doo</name>
<name>scooby-doo</name> </cert-to-name>
</cert-to-name>
<cert-to-name> <cert-to-name>
<id>2</id> <id>2</id>
<map-type>x509c2n:san-any</map-type> <map-type>x509c2n:san-any</map-type>
</cert-to-name> </cert-to-name>
</cert-maps> </client-identity-mappings>
</client-identification>
</restconf-server-parameters> </restconf-server-parameters>
</https> </https>
</endpoint> </endpoint>
</listen> </listen>
<!-- call home to a RESTCONF client with two endpoints --> <!-- call home to a RESTCONF client with two endpoints -->
<call-home> <call-home>
<restconf-client> <restconf-client>
<name>config-manager</name> <name>config-manager</name>
<endpoints> <endpoints>
skipping to change at page 22, line 32 skipping to change at page 23, line 4
<!-- call home to a RESTCONF client with two endpoints --> <!-- call home to a RESTCONF client with two endpoints -->
<call-home> <call-home>
<restconf-client> <restconf-client>
<name>config-manager</name> <name>config-manager</name>
<endpoints> <endpoints>
<endpoint> <endpoint>
<name>east-data-center</name> <name>east-data-center</name>
<https> <https>
<tcp-client-parameters> <tcp-client-parameters>
<remote-address>east.example.com</remote-address> <remote-address>east.example.com</remote-address>
</tcp-client-parameters> </tcp-client-parameters>
<tls-server-parameters> <tls-server-parameters>
<server-identity> <server-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-fo\
<cert>base64encodedvalue==</cert> rmat</public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</p\
rivate-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</server-identity> </server-identity>
<client-authentication> <client-authentication>
<required/>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-client-ca\ <truststore-reference>explicitly-trusted-client-ca\
-certs</truststore-reference> -certs</truststore-reference>
</ca-certs> </ca-certs>
<client-certs> <client-certs>
<truststore-reference>explicitly-trusted-client-ce\ <truststore-reference>explicitly-trusted-client-ce\
rts</truststore-reference> rts</truststore-reference>
</client-certs> </client-certs>
</client-authentication> </client-authentication>
</tls-server-parameters> </tls-server-parameters>
<http-server-parameters> <http-server-parameters>
<server-name>foo.example.com</server-name> <server-name>foo.example.com</server-name>
<protocol-versions> <protocol-versions>
<protocol-version>HTTP/1.1</protocol-version> <protocol-version>HTTP/1.1</protocol-version>
<protocol-version>HTTP/2.0</protocol-version> <protocol-version>HTTP/2.0</protocol-version>
</protocol-versions> </protocol-versions>
</http-server-parameters> </http-server-parameters>
<restconf-server-parameters> <restconf-server-parameters>
skipping to change at page 23, line 15 skipping to change at page 23, line 40
</client-authentication> </client-authentication>
</tls-server-parameters> </tls-server-parameters>
<http-server-parameters> <http-server-parameters>
<server-name>foo.example.com</server-name> <server-name>foo.example.com</server-name>
<protocol-versions> <protocol-versions>
<protocol-version>HTTP/1.1</protocol-version> <protocol-version>HTTP/1.1</protocol-version>
<protocol-version>HTTP/2.0</protocol-version> <protocol-version>HTTP/2.0</protocol-version>
</protocol-versions> </protocol-versions>
</http-server-parameters> </http-server-parameters>
<restconf-server-parameters> <restconf-server-parameters>
<client-identification> <client-identity-mappings>
<cert-maps> <cert-to-name>
<cert-to-name> <id>1</id>
<id>1</id> <fingerprint>11:0A:05:11:00</fingerprint>
<fingerprint>11:0A:05:11:00</fingerprint> <map-type>x509c2n:specified</map-type>
<map-type>x509c2n:specified</map-type> <name>scooby-doo</name>
<name>scooby-doo</name> </cert-to-name>
</cert-to-name> <cert-to-name>
<cert-to-name> <id>2</id>
<id>2</id> <map-type>x509c2n:san-any</map-type>
<map-type>x509c2n:san-any</map-type> </cert-to-name>
</cert-to-name> </client-identity-mappings>
</cert-maps>
</client-identification>
</restconf-server-parameters> </restconf-server-parameters>
</https> </https>
</endpoint> </endpoint>
<endpoint> <endpoint>
<name>west-data-center</name> <name>west-data-center</name>
<https> <https>
<tcp-client-parameters> <tcp-client-parameters>
<remote-address>west.example.com</remote-address> <remote-address>west.example.com</remote-address>
</tcp-client-parameters> </tcp-client-parameters>
<tls-server-parameters> <tls-server-parameters>
<server-identity> <server-identity>
skipping to change at page 23, line 40 skipping to change at page 24, line 15
</https> </https>
</endpoint> </endpoint>
<endpoint> <endpoint>
<name>west-data-center</name> <name>west-data-center</name>
<https> <https>
<tcp-client-parameters> <tcp-client-parameters>
<remote-address>west.example.com</remote-address> <remote-address>west.example.com</remote-address>
</tcp-client-parameters> </tcp-client-parameters>
<tls-server-parameters> <tls-server-parameters>
<server-identity> <server-identity>
<local-definition> <certificate>
<algorithm>rsa2048</algorithm> <local-definition>
<private-key>base64encodedvalue==</private-key> <algorithm>rsa2048</algorithm>
<public-key>base64encodedvalue==</public-key> <public-key-format>ct:subject-public-key-info-fo\
<cert>base64encodedvalue==</cert> rmat</public-key-format>
</local-definition> <public-key>base64encodedvalue==</public-key>
<private-key-format>ct:rsa-private-key-format</p\
rivate-key-format>
<private-key>base64encodedvalue==</private-key>
<cert>base64encodedvalue==</cert>
</local-definition>
</certificate>
</server-identity> </server-identity>
<client-authentication> <client-authentication>
<required/>
<ca-certs> <ca-certs>
<truststore-reference>explicitly-trusted-client-ca\ <truststore-reference>explicitly-trusted-client-ca\
-certs</truststore-reference> -certs</truststore-reference>
</ca-certs> </ca-certs>
<client-certs> <client-certs>
<truststore-reference>explicitly-trusted-client-ce\ <truststore-reference>explicitly-trusted-client-ce\
rts</truststore-reference> rts</truststore-reference>
</client-certs> </client-certs>
</client-authentication> </client-authentication>
</tls-server-parameters> </tls-server-parameters>
<http-server-parameters> <http-server-parameters>
<server-name>foo.example.com</server-name> <server-name>foo.example.com</server-name>
<protocol-versions> <protocol-versions>
<protocol-version>HTTP/1.1</protocol-version> <protocol-version>HTTP/1.1</protocol-version>
<protocol-version>HTTP/2.0</protocol-version> <protocol-version>HTTP/2.0</protocol-version>
</protocol-versions> </protocol-versions>
</http-server-parameters> </http-server-parameters>
<restconf-server-parameters> <restconf-server-parameters>
<client-identification> <client-identity-mappings>
<cert-maps> <cert-to-name>
<cert-to-name> <id>1</id>
<id>1</id> <fingerprint>11:0A:05:11:00</fingerprint>
<fingerprint>11:0A:05:11:00</fingerprint> <map-type>x509c2n:specified</map-type>
<map-type>x509c2n:specified</map-type> <name>scooby-doo</name>
<name>scooby-doo</name>
</cert-to-name> </cert-to-name>
<cert-to-name> <cert-to-name>
<id>2</id> <id>2</id>
<map-type>x509c2n:san-any</map-type> <map-type>x509c2n:san-any</map-type>
</cert-to-name> </cert-to-name>
</cert-maps> </client-identity-mappings>
</client-identification>
</restconf-server-parameters> </restconf-server-parameters>
</https> </https>
</endpoint> </endpoint>
</endpoints> </endpoints>
<connection-type> <connection-type>
<periodic> <periodic>
<idle-timeout>300</idle-timeout> <idle-timeout>300</idle-timeout>
<period>60</period> <period>60</period>
</periodic> </periodic>
</connection-type> </connection-type>
skipping to change at page 25, line 12 skipping to change at page 25, line 36
</call-home> </call-home>
</restconf-server> </restconf-server>
3.3. YANG Module 3.3. YANG Module
This YANG module has normative references to [RFC6991], [RFC7407], This YANG module has normative references to [RFC6991], [RFC7407],
[RFC8040], [RFC8071], [I-D.kwatsen-netconf-tcp-client-server], [RFC8040], [RFC8071], [I-D.kwatsen-netconf-tcp-client-server],
[I-D.ietf-netconf-tls-client-server], and [I-D.ietf-netconf-tls-client-server], and
[I-D.kwatsen-netconf-http-client-server]. [I-D.kwatsen-netconf-http-client-server].
<CODE BEGINS> file "ietf-restconf-server@2019-11-02.yang" <CODE BEGINS> file "ietf-restconf-server@2019-11-20.yang"
module ietf-restconf-server { module ietf-restconf-server {
yang-version 1.1; yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-restconf-server"; namespace "urn:ietf:params:xml:ns:yang:ietf-restconf-server";
prefix rcs; prefix rcs;
import ietf-yang-types { import ietf-yang-types {
prefix yang; prefix yang;
reference reference
"RFC 6991: Common YANG Data Types"; "RFC 6991: Common YANG Data Types";
skipping to change at page 26, line 40 skipping to change at page 27, line 15
Redistribution and use in source and binary forms, with Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Simplified subject to the license terms contained in, the Simplified
BSD License set forth in Section 4.c of the IETF Trust's BSD License set forth in Section 4.c of the IETF Trust's
Legal Provisions Relating to IETF Documents Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info). (https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.; itself for full legal notices.
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
are to be interpreted as described in BCP 14 (RFC 2119) are to be interpreted as described in BCP 14 (RFC 2119)
(RFC 8174) when, and only when, they appear in all (RFC 8174) when, and only when, they appear in all
capitals, as shown here."; capitals, as shown here.";
revision 2019-11-02 { revision 2019-11-20 {
description description
"Initial version"; "Initial version";
reference reference
"RFC XXXX: RESTCONF Client and Server Models"; "RFC XXXX: RESTCONF Client and Server Models";
} }
// Features // Features
feature http-listen { feature http-listen {
description description
skipping to change at page 28, line 7 skipping to change at page 28, line 29
Note that this grouping uses a fairly typical descendent Note that this grouping uses a fairly typical descendent
node name such that a stack of 'uses' statements will node name such that a stack of 'uses' statements will
have name conflicts. It is intended that the consuming have name conflicts. It is intended that the consuming
data model will resolve the issue by wrapping the 'uses' data model will resolve the issue by wrapping the 'uses'
statement in a container called, e.g., statement in a container called, e.g.,
'restconf-server-parameters'. This model purposely does 'restconf-server-parameters'. This model purposely does
not do this itself so as to provide maximum flexibility not do this itself so as to provide maximum flexibility
to consuming models."; to consuming models.";
container client-identification { // FIXME: if-feature? container client-identity-mappings {
//if-feature "client-certificates-supported"; // FIXME: yes?
description description
"Specifies a mapping through which clients MAY be identified "Specifies mappings through which RESTCONF client X.509
(i.e., the RESTCONF username) from a supplied certificate. certificates are used to determine a RESTCONF username.
Note that a client MAY alternatively be identified via an If no matching and valid cert-to-name list entry can be
alternate authentication scheme (e.g., HTTP-level found, then the RESTCONF server MUST close the connection,
authentication)."; and MUST NOT accept RESTCONF messages over it.";
container cert-maps { reference
uses x509c2n:cert-to-name { "RFC 7407: A YANG Data Model for SNMP Configuration.";
refine "cert-to-name/fingerprint" { uses x509c2n:cert-to-name {
mandatory false; refine "cert-to-name/fingerprint" {
description mandatory false;
"A 'fingerprint' value does not need to be specified description
when the 'cert-to-name' mapping is independent of "A 'fingerprint' value does not need to be specified
fingerprint matching. A 'cert-to-name' having no when the 'cert-to-name' mapping is independent of
fingerprint value will match any client certificate fingerprint matching. A 'cert-to-name' having no
and therefore should only be present at the end of fingerprint value will match any client certificate
the user-ordered 'cert-to-name' list."; and therefore should only be present at the end of
} the user-ordered 'cert-to-name' list.";
} }
description
"The cert-maps container is used by TLS-based RESTCONF
servers (even if the TLS sessions are terminated
externally) to map the RESTCONF client's presented
X.509 certificate to a RESTCONF username. If no
matching and valid cert-to-name list entry can be
found, then the RESTCONF server MUST close the
connection, and MUST NOT accept RESTCONF messages
over it.";
reference
"RFC 7407: A YANG Data Model for SNMP Configuration.";
} }
} }
} }
grouping restconf-server-listen-stack-grouping { grouping restconf-server-listen-stack-grouping {
description description
"A reusable grouping for configuring a RESTCONF server "A reusable grouping for configuring a RESTCONF server
'listen' protocol stack for a single connection."; 'listen' protocol stack for a single connection.";
choice transport { choice transport {
mandatory true; mandatory true;
description description
skipping to change at page 38, line 51 skipping to change at page 39, line 21
namespace: urn:ietf:params:xml:ns:yang:ietf-restconf-server namespace: urn:ietf:params:xml:ns:yang:ietf-restconf-server
prefix: ncs prefix: ncs
reference: RFC XXXX reference: RFC XXXX
6. References 6. References
6.1. Normative References 6.1. Normative References
[I-D.ietf-netconf-keystore] [I-D.ietf-netconf-keystore]
Watsen, K., "A YANG Data Model for a Keystore", draft- Watsen, K., "A YANG Data Model for a Keystore", draft-
ietf-netconf-keystore-13 (work in progress), October 2019. ietf-netconf-keystore-14 (work in progress), November
2019.
[I-D.ietf-netconf-tls-client-server] [I-D.ietf-netconf-tls-client-server]
Watsen, K., Wu, G., and L. Xia, "YANG Groupings for TLS Watsen, K., Wu, G., and L. Xia, "YANG Groupings for TLS
Clients and TLS Servers", draft-ietf-netconf-tls-client- Clients and TLS Servers", draft-ietf-netconf-tls-client-
server-15 (work in progress), October 2019. server-16 (work in progress), November 2019.
[I-D.kwatsen-netconf-http-client-server] [I-D.kwatsen-netconf-http-client-server]
Watsen, K., "YANG Groupings for HTTP Clients and HTTP Watsen, K., "YANG Groupings for HTTP Clients and HTTP
Servers", draft-kwatsen-netconf-http-client-server-04 Servers", draft-kwatsen-netconf-http-client-server-05
(work in progress), October 2019. (work in progress), November 2019.
[I-D.kwatsen-netconf-tcp-client-server] [I-D.kwatsen-netconf-tcp-client-server]
Watsen, K. and M. Scharf, "YANG Groupings for TCP Clients Watsen, K. and M. Scharf, "YANG Groupings for TCP Clients
and TCP Servers", draft-kwatsen-netconf-tcp-client- and TCP Servers", draft-kwatsen-netconf-tcp-client-
server-02 (work in progress), April 2019. server-02 (work in progress), April 2019.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997, DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>. <https://www.rfc-editor.org/info/rfc2119>.
skipping to change at page 40, line 8 skipping to change at page 40, line 28
RFC 8071, DOI 10.17487/RFC8071, February 2017, RFC 8071, DOI 10.17487/RFC8071, February 2017,
<https://www.rfc-editor.org/info/rfc8071>. <https://www.rfc-editor.org/info/rfc8071>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>. May 2017, <https://www.rfc-editor.org/info/rfc8174>.
6.2. Informative References 6.2. Informative References
[I-D.ietf-netconf-trust-anchors] [I-D.ietf-netconf-trust-anchors]
Watsen, K., "A YANG Data Model for a Truststore", draft- Watsen, K. and H. Birkholz, "A YANG Data Model for a
ietf-netconf-trust-anchors-06 (work in progress), October Truststore", draft-ietf-netconf-trust-anchors-07 (work in
2019. progress), November 2019.
[RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
DOI 10.17487/RFC3688, January 2004, DOI 10.17487/RFC3688, January 2004,
<https://www.rfc-editor.org/info/rfc3688>. <https://www.rfc-editor.org/info/rfc3688>.
[RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed., [RFC6241] Enns, R., Ed., Bjorklund, M., Ed., Schoenwaelder, J., Ed.,
and A. Bierman, Ed., "Network Configuration Protocol and A. Bierman, Ed., "Network Configuration Protocol
(NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011, (NETCONF)", RFC 6241, DOI 10.17487/RFC6241, June 2011,
<https://www.rfc-editor.org/info/rfc6241>. <https://www.rfc-editor.org/info/rfc6241>.
skipping to change at page 41, line 45 skipping to change at page 41, line 45
| | | | {local-binding-supported}? | | | | {local-binding-supported}?
| | | +--rw local-port? inet:port-number | | | +--rw local-port? inet:port-number
| | | | {local-binding-supported}? | | | | {local-binding-supported}?
| | | +--rw keepalives! | | | +--rw keepalives!
| | | {keepalives-supported}? | | | {keepalives-supported}?
| | | +--rw idle-time uint16 | | | +--rw idle-time uint16
| | | +--rw max-probes uint16 | | | +--rw max-probes uint16
| | | +--rw probe-interval uint16 | | | +--rw probe-interval uint16
| | +--rw tls-client-parameters | | +--rw tls-client-parameters
| | | +--rw client-identity | | | +--rw client-identity
| | | | +--rw (local-or-keystore) | | | | +--rw (auth-type)
| | | | +--:(local) | | | | +--:(certificate)
| | | | | {local-definitions-suppo\ | | | | | +--rw certificate
\rted}? | | | | | {x509-certificate-auth\
| | | | | +--rw local-definition \}?
| | | | | +--rw algorithm | | | | | +--rw (local-or-keystore)
| | | | | | iasa:asymmetric-alg\ | | | | | +--:(local)
\orithm-type | | | | | | {local-definiti\
| | | | | +--rw public-key-format?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-format?
| | | | | | identityref
| | | | | +--rw (private-key-type)
| | | | | | +--:(private-key)
| | | | | | | +--rw private-key?
| | | | | | | binary
| | | | | | +--:(hidden-private-key)
| | | | | | | +--rw hidden-private-\
\key?
| | | | | | | empty
| | | | | | +--:(encrypted-private-k\
\ey)
| | | | | | +--rw encrypted-priva\
\te-key
| | | | | | +--rw (key-type)
| | | | | | | +--:(symmetric-\
\key-ref)
| | | | | | | | +--rw symmet\
\ric-key-ref? leafref
| | | | | | | | {key\
\store-supported}?
| | | | | | | +--:(asymmetric\
\-key-ref)
| | | | | | | +--rw asymme\
\tric-key-ref? leafref
| | | | | | | {key\
\store-supported}?
| | | | | | +--rw value?
| | | | | | binary
| | | | | +--rw cert?
| | | | | | end-entity-cert-cms
| | | | | +---n certificate-expiration
| | | | | | +-- expiration-date
| | | | | | yang:date-and-ti\
\me
| | | | | +---x generate-certificate-\
\signing-request
| | | | | +---w input
| | | | | | +---w subject
| | | | | | | binary
| | | | | | +---w attributes?
| | | | | | binary
| | | | | +--ro output
| | | | | +--ro certificate-sig\
\ning-request \ons-supported}?
| | | | | binary | | | | | | +--rw local-definition
| | | | +--:(keystore) | | | | | | +--rw algorithm
| | | | {keystore-supported}? | | | | | | | iasa:asymm\
| | | | +--rw keystore-reference \etric-algorithm-type
| | | | +--rw asymmetric-key? | | | | | | +--rw public-key-f\
| | | | | ks:asymmetric-key-r\ \ormat?
\ef | | | | | | | identityref
| | | | +--rw certificate? lea\ | | | | | | +--rw public-key
\fref | | | | | | | binary
| | | | | | +--rw private-key-\
\format?
| | | | | | | identityref
| | | | | | +--rw (private-key\
\-type)
| | | | | | | +--:(private-ke\
\y)
| | | | | | | | +--rw privat\
\e-key?
| | | | | | | | bina\
\ry
| | | | | | | +--:(hidden-pri\
\vate-key)
| | | | | | | | +--rw hidden\
\-private-key?
| | | | | | | | empty
| | | | | | | +--:(encrypted-\
\private-key)
| | | | | | | +--rw encryp\
\ted-private-key
| | | | | | | +--rw (ke\
\y-type)
| | | | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | | | \
\ {keystore-supported}?
| | | | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--rw val\
\ue?
| | | | | | | b\
\inary
| | | | | | +--rw cert?
| | | | | | | end-entity\
\-cert-cms
| | | | | | +---n certificate-\
\expiration
| | | | | | | +-- expiration-\
\date
| | | | | | | yang:da\
\te-and-time
| | | | | | +---x generate-cer\
\tificate-signing-request
| | | | | | +---w input
| | | | | | | +---w subject
| | | | | | | | bina\
\ry
| | | | | | | +---w attrib\
\utes?
| | | | | | | bina\
\ry
| | | | | | +--ro output
| | | | | | +--ro certif\
\icate-signing-request
| | | | | | bina\
\ry
| | | | | +--:(keystore)
| | | | | {keystore-suppo\
\rted}?
| | | | | +--rw keystore-refere\
\nce
| | | | | +--rw asymmetric-k\
\ey?
| | | | | | ks:asymmet\
\ric-key-ref
| | | | | +--rw certificate?\
\ leafref
| | | | +--:(raw-public-key)
| | | | | +--rw raw-public-key
| | | | | {raw-public-key-auth}?
| | | | | +--rw (local-or-keystore)
| | | | | +--:(local)
| | | | | | {local-definiti\
\ons-supported}?
| | | | | | +--rw local-definition
| | | | | | +--rw algorithm
| | | | | | | iasa:asymm\
\etric-algorithm-type
| | | | | | +--rw public-key-f\
\ormat?
| | | | | | | identityref
| | | | | | +--rw public-key
| | | | | | | binary
| | | | | | +--rw private-key-\
\format?
| | | | | | | identityref
| | | | | | +--rw (private-key\
\-type)
| | | | | | +--:(private-ke\
\y)
| | | | | | | +--rw privat\
\e-key?
| | | | | | | bina\
\ry
| | | | | | +--:(hidden-pri\
\vate-key)
| | | | | | | +--rw hidden\
\-private-key?
| | | | | | | empty
| | | | | | +--:(encrypted-\
\private-key)
| | | | | | +--rw encryp\
\ted-private-key
| | | | | | +--rw (ke\
\y-type)
| | | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--rw val\
\ue?
| | | | | | b\
\inary
| | | | | +--:(keystore)
| | | | | {keystore-suppo\
\rted}?
| | | | | +--rw keystore-refere\
\nce?
| | | | | ks:asymmetric\
\-key-ref
| | | | +--:(psk)
| | | | +--rw psk {psk-auth}?
| | | | +--rw (local-or-keystore)
| | | | +--:(local)
| | | | | {local-definiti\
\ons-supported}?
| | | | | +--rw local-definition
| | | | | +--rw algorithm
| | | | | | isa:symmet\
\ric-algorithm-type
| | | | | +--rw key-format?
| | | | | | identityref
| | | | | +--rw (key-type)
| | | | | +--:(key)
| | | | | | +--rw key?
| | | | | | bina\
\ry
| | | | | +--:(hidden-key)
| | | | | | +--rw hidden\
\-key?
| | | | | | empty
| | | | | +--:(encrypted-\
\key)
| | | | | +--rw encryp\
\ted-key
| | | | | +--rw (ke\
\y-type)
| | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | \
\ {keystore-supported}?
| | | | | +--rw val\
\ue?
| | | | | b\
\inary
| | | | +--:(keystore)
| | | | {keystore-suppo\
\rted}?
| | | | +--rw keystore-refere\
\nce?
| | | | ks:symmetric-\
\key-ref
| | | +--rw server-authentication | | | +--rw server-authentication
| | | | +--rw ca-certs! | | | | +--rw ca-certs!
| | | | | {x509-certificate-auth}?
| | | | | +--rw (local-or-truststore) | | | | | +--rw (local-or-truststore)
| | | | | +--:(local) | | | | | +--:(local)
| | | | | | {local-definitions-su\ | | | | | | {local-definitions-su\
\pported}? \pported}?
| | | | | | +--rw local-definition | | | | | | +--rw local-definition
| | | | | | +--rw cert* | | | | | | +--rw cert*
| | | | | | | trust-anchor-cer\ | | | | | | | trust-anchor-cer\
\t-cms \t-cms
| | | | | | +---n certificate-expira\ | | | | | | +---n certificate-expira\
\tion \tion
| | | | | | +-- expiration-date | | | | | | +-- expiration-date
| | | | | | yang:date-and\ | | | | | | yang:date-and\
\-time \-time
| | | | | +--:(truststore) | | | | | +--:(truststore)
| | | | | {truststore-supported\ | | | | | {truststore-supported\
\,x509-certificates}? \,x509-certificates}?
| | | | | +--rw truststore-reference? | | | | | +--rw truststore-reference?
| | | | | ts:certificates-ref | | | | | ts:certificates-ref
| | | | +--rw server-certs! | | | | +--rw server-certs!
| | | | +--rw (local-or-truststore) | | | | | {x509-certificate-auth}?
| | | | +--:(local) | | | | | +--rw (local-or-truststore)
| | | | | {local-definitions-su\ | | | | | +--:(local)
| | | | | | {local-definitions-su\
\pported}? \pported}?
| | | | | +--rw local-definition | | | | | | +--rw local-definition
| | | | | +--rw cert* | | | | | | +--rw cert*
| | | | | | trust-anchor-cer\ | | | | | | | trust-anchor-cer\
\t-cms \t-cms
| | | | | +---n certificate-expira\ | | | | | | +---n certificate-expira\
\tion \tion
| | | | | +-- expiration-date | | | | | | +-- expiration-date
| | | | | yang:date-and\ | | | | | | yang:date-and\
\-time \-time
| | | | +--:(truststore) | | | | | +--:(truststore)
| | | | {truststore-supported\ | | | | | {truststore-supported\
\,x509-certificates}? \,x509-certificates}?
| | | | +--rw truststore-reference? | | | | | +--rw truststore-reference?
| | | | ts:certificates-ref | | | | | ts:certificates-ref
| | | | +--rw raw-public-keys!
| | | | | {raw-public-key-auth}?
| | | | | +--rw (local-or-truststore)
| | | | | +--:(local)
| | | | | | {local-definitions-su\
\pported}?
| | | | | | +--rw local-definition
| | | | | | +--rw raw-public-key*
| | | | | | [name]
| | | | | | +--rw name
| | | | | | | string
| | | | | | +--rw algorithm
| | | | | | | iasa:asymmetr\
\ic-algorithm-type
| | | | | | +--rw public-key-form\
\at?
| | | | | | | identityref
| | | | | | +--rw public-key
| | | | | | binary
| | | | | +--:(truststore)
| | | | | {truststore-supported\
\,raw-public-keys}?
| | | | | +--rw truststore-reference?
| | | | | ts:raw-public-keys-\
\ref
| | | | +--rw psks! {psk-auth}?
| | | +--rw hello-params | | | +--rw hello-params
| | | | {tls-client-hello-params-config\ | | | | {tls-client-hello-params-config\
\}? \}?
| | | | +--rw tls-versions | | | | +--rw tls-versions
| | | | | +--rw tls-version* identityref | | | | | +--rw tls-version* identityref
| | | | +--rw cipher-suites | | | | +--rw cipher-suites
| | | | +--rw cipher-suite* identityref | | | | +--rw cipher-suite* identityref
| | | +--rw keepalives! | | | +--rw keepalives!
| | | {tls-client-keepalives}? | | | {tls-client-keepalives}?
| | | +--rw max-wait? uint16 | | | +--rw max-wait? uint16
skipping to change at page 44, line 41 skipping to change at page 48, line 13
| | | | +--rw local-port? | | | | +--rw local-port?
| | | | | inet:port-number | | | | | inet:port-number
| | | | | {local-binding-supported}? | | | | | {local-binding-supported}?
| | | | +--rw keepalives! | | | | +--rw keepalives!
| | | | {keepalives-supported}? | | | | {keepalives-supported}?
| | | | +--rw idle-time uint16 | | | | +--rw idle-time uint16
| | | | +--rw max-probes uint16 | | | | +--rw max-probes uint16
| | | | +--rw probe-interval uint16 | | | | +--rw probe-interval uint16
| | | +--rw tls-client-parameters | | | +--rw tls-client-parameters
| | | | +--rw client-identity | | | | +--rw client-identity
| | | | | +--rw (local-or-keystore) | | | | | +--rw (auth-type)
| | | | | +--:(local) | | | | | +--:(certificate)
| | | | | | {local-definitions\ | | | | | | +--rw certificate
| | | | | | {x509-certificat\
\e-auth}?
| | | | | | +--rw (local-or-keyst\
\ore)
| | | | | | +--:(local)
| | | | | | | {local-de\
\finitions-supported}?
| | | | | | | +--rw local-def\
\inition
| | | | | | | +--rw algori\
\thm
| | | | | | | | iasa\
\:asymmetric-algorithm-type
| | | | | | | +--rw public\
\-key-format?
| | | | | | | | iden\
\tityref
| | | | | | | +--rw public\
\-key
| | | | | | | | bina\
\ry
| | | | | | | +--rw privat\
\e-key-format?
| | | | | | | | iden\
\tityref
| | | | | | | +--rw (priva\
\te-key-type)
| | | | | | | | +--:(priv\
\ate-key)
| | | | | | | | | +--rw \
\private-key?
| | | | | | | | | \
\ binary
| | | | | | | | +--:(hidd\
\en-private-key)
| | | | | | | | | +--rw \
\hidden-private-key?
| | | | | | | | | \
\ empty
| | | | | | | | +--:(encr\
\ypted-private-key)
| | | | | | | | +--rw \
\encrypted-private-key
| | | | | | | | +--\
\rw (key-type)
| | | | | | | | | \
\+--:(symmetric-key-ref)
| | | | | | | | | \
\| +--rw symmetric-key-ref? leafref
| | | | | | | | | \
\| {keystore-supported}?
| | | | | | | | | \
\+--:(asymmetric-key-ref)
| | | | | | | | | \
\ +--rw asymmetric-key-ref? leafref
| | | | | | | | | \
\ {keystore-supported}?
| | | | | | | | +--\
\rw value?
| | | | | | | | \
\ binary
| | | | | | | +--rw cert?
| | | | | | | | end-\
\entity-cert-cms
| | | | | | | +---n certif\
\icate-expiration
| | | | | | | | +-- expir\
\ation-date
| | | | | | | | y\
\ang:date-and-time
| | | | | | | +---x genera\
\te-certificate-signing-request
| | | | | | | +---w inp\
\ut
| | | | | | | | +---w \
\subject
| | | | | | | | | \
\ binary
| | | | | | | | +---w \
\attributes?
| | | | | | | | \
\ binary
| | | | | | | +--ro out\
\put
| | | | | | | +--ro \
\certificate-signing-request
| | | | | | | \
\ binary
| | | | | | +--:(keystore)
| | | | | | {keystore\
\-supported}? \-supported}?
| | | | | | +--rw local-definition | | | | | | +--rw keystore-\
| | | | | | +--rw algorithm \reference
| | | | | | | iasa:asymmetr\ | | | | | | +--rw asymme\
\ic-algorithm-type \tric-key?
| | | | | | +--rw public-key-form\ | | | | | | | ks:a\
\at? \symmetric-key-ref
| | | | | | | identityref | | | | | | +--rw certif\
| | | | | | +--rw public-key \icate? leafref
| | | | | | | binary | | | | | +--:(raw-public-key)
| | | | | | +--rw private-key-for\ | | | | | | +--rw raw-public-key
\mat? | | | | | | {raw-public-key-\
| | | | | | | identityref \auth}?
| | | | | | +--rw (private-key-ty\ | | | | | | +--rw (local-or-keyst\
\pe) \ore)
| | | | | | | +--:(private-key) | | | | | | +--:(local)
| | | | | | | | +--rw private-k\ | | | | | | | {local-de\
\ey? \finitions-supported}?
| | | | | | | | binary | | | | | | | +--rw local-def\
| | | | | | | +--:(hidden-privat\ \inition
\e-key) | | | | | | | +--rw algori\
| | | | | | | | +--rw hidden-pr\ \thm
\ivate-key? | | | | | | | | iasa\
| | | | | | | | empty \:asymmetric-algorithm-type
| | | | | | | +--:(encrypted-pri\ | | | | | | | +--rw public\
\vate-key) \-key-format?
| | | | | | | +--rw encrypted\ | | | | | | | | iden\
\-private-key \tityref
| | | | | | | +--rw (key-t\ | | | | | | | +--rw public\
\ype) \-key
| | | | | | | | +--:(symm\ | | | | | | | | bina\
\etric-key-ref)
| | | | | | | | | +--rw \
\symmetric-key-ref? leafref
| | | | | | | | | \
\ {keystore-supported}?
| | | | | | | | +--:(asym\
\metric-key-ref)
| | | | | | | | +--rw \
\asymmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--rw value?
| | | | | | | bina\
\ry \ry
| | | | | | +--rw cert? | | | | | | | +--rw privat\
| | | | | | | end-entity-ce\ \e-key-format?
\rt-cms | | | | | | | | iden\
| | | | | | +---n certificate-exp\ \tityref
\iration | | | | | | | +--rw (priva\
| | | | | | | +-- expiration-date \te-key-type)
| | | | | | | yang:date-\ | | | | | | | +--:(priv\
\and-time \ate-key)
| | | | | | +---x generate-certif\ | | | | | | | | +--rw \
\icate-signing-request \private-key?
| | | | | | +---w input | | | | | | | | \
| | | | | | | +---w subject \ binary
| | | | | | | | binary | | | | | | | +--:(hidd\
| | | | | | | +---w attribute\ \en-private-key)
\s? | | | | | | | | +--rw \
| | | | | | | binary \hidden-private-key?
| | | | | | +--ro output | | | | | | | | \
| | | | | | +--ro certifica\ \ empty
\te-signing-request | | | | | | | +--:(encr\
| | | | | | binary \ypted-private-key)
| | | | | +--:(keystore) | | | | | | | +--rw \
| | | | | {keystore-supporte\ \encrypted-private-key
\d}? | | | | | | | +--\
| | | | | +--rw keystore-reference \rw (key-type)
| | | | | +--rw asymmetric-key? | | | | | | | | \
| | | | | | ks:asymmetric\ \+--:(symmetric-key-ref)
\-key-ref | | | | | | | | \
| | | | | +--rw certificate? \ \| +--rw symmetric-key-ref? leafref
\ leafref | | | | | | | | \
\| {keystore-supported}?
| | | | | | | | \
\+--:(asymmetric-key-ref)
| | | | | | | | \
\ +--rw asymmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--\
\rw value?
| | | | | | | \
\ binary
| | | | | | +--:(keystore)
| | | | | | {keystore\
\-supported}?
| | | | | | +--rw keystore-\
\reference?
| | | | | | ks:asym\
\metric-key-ref
| | | | | +--:(psk)
| | | | | +--rw psk {psk-auth}?
| | | | | +--rw (local-or-keyst\
\ore)
| | | | | +--:(local)
| | | | | | {local-de\
\finitions-supported}?
| | | | | | +--rw local-def\
\inition
| | | | | | +--rw algori\
\thm
| | | | | | | isa:\
\symmetric-algorithm-type
| | | | | | +--rw key-fo\
\rmat?
| | | | | | | iden\
\tityref
| | | | | | +--rw (key-t\
\ype)
| | | | | | +--:(key)
| | | | | | | +--rw \
\key?
| | | | | | | \
\ binary
| | | | | | +--:(hidd\
\en-key)
| | | | | | | +--rw \
\hidden-key?
| | | | | | | \
\ empty
| | | | | | +--:(encr\
\ypted-key)
| | | | | | +--rw \
\encrypted-key
| | | | | | +--\
\rw (key-type)
| | | | | | | \
\+--:(symmetric-key-ref)
| | | | | | | \
\| +--rw symmetric-key-ref? leafref
| | | | | | | \
\| {keystore-supported}?
| | | | | | | \
\+--:(asymmetric-key-ref)
| | | | | | | \
\ +--rw asymmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--\
\rw value?
| | | | | | \
\ binary
| | | | | +--:(keystore)
| | | | | {keystore\
\-supported}?
| | | | | +--rw keystore-\
\reference?
| | | | | ks:symm\
\etric-key-ref
| | | | +--rw server-authentication | | | | +--rw server-authentication
| | | | | +--rw ca-certs! | | | | | +--rw ca-certs!
| | | | | | {x509-certificate-auth\
\}?
| | | | | | +--rw (local-or-truststore) | | | | | | +--rw (local-or-truststore)
| | | | | | +--:(local) | | | | | | +--:(local)
| | | | | | | {local-definiti\ | | | | | | | {local-definiti\
\ons-supported}? \ons-supported}?
| | | | | | | +--rw local-definition | | | | | | | +--rw local-definition
| | | | | | | +--rw cert* | | | | | | | +--rw cert*
| | | | | | | | trust-anch\ | | | | | | | | trust-anch\
\or-cert-cms \or-cert-cms
| | | | | | | +---n certificate-\ | | | | | | | +---n certificate-\
\expiration \expiration
skipping to change at page 46, line 46 skipping to change at page 53, line 30
| | | | | | | yang:da\ | | | | | | | yang:da\
\te-and-time \te-and-time
| | | | | | +--:(truststore) | | | | | | +--:(truststore)
| | | | | | {truststore-sup\ | | | | | | {truststore-sup\
\ported,x509-certificates}? \ported,x509-certificates}?
| | | | | | +--rw truststore-refe\ | | | | | | +--rw truststore-refe\
\rence? \rence?
| | | | | | ts:certificat\ | | | | | | ts:certificat\
\es-ref \es-ref
| | | | | +--rw server-certs! | | | | | +--rw server-certs!
| | | | | +--rw (local-or-truststore) | | | | | | {x509-certificate-auth\
| | | | | +--:(local) \}?
| | | | | | {local-definiti\ | | | | | | +--rw (local-or-truststore)
| | | | | | +--:(local)
| | | | | | | {local-definiti\
\ons-supported}? \ons-supported}?
| | | | | | +--rw local-definition | | | | | | | +--rw local-definition
| | | | | | +--rw cert* | | | | | | | +--rw cert*
| | | | | | | trust-anch\ | | | | | | | | trust-anch\
\or-cert-cms \or-cert-cms
| | | | | | +---n certificate-\ | | | | | | | +---n certificate-\
\expiration \expiration
| | | | | | +-- expiration-\ | | | | | | | +-- expiration-\
\date \date
| | | | | | yang:da\ | | | | | | | yang:da\
\te-and-time \te-and-time
| | | | | +--:(truststore) | | | | | | +--:(truststore)
| | | | | {truststore-sup\ | | | | | | {truststore-sup\
\ported,x509-certificates}? \ported,x509-certificates}?
| | | | | +--rw truststore-refe\ | | | | | | +--rw truststore-refe\
\rence? \rence?
| | | | | ts:certificat\ | | | | | | ts:certificat\
\es-ref \es-ref
| | | | | +--rw raw-public-keys!
| | | | | | {raw-public-key-auth}?
| | | | | | +--rw (local-or-truststore)
| | | | | | +--:(local)
| | | | | | | {local-definiti\
\ons-supported}?
| | | | | | | +--rw local-definition
| | | | | | | +--rw raw-public-k\
\ey*
| | | | | | | [name]
| | | | | | | +--rw name
| | | | | | | | string
| | | | | | | +--rw algorithm
| | | | | | | | iasa:as\
\ymmetric-algorithm-type
| | | | | | | +--rw public-ke\
\y-format?
| | | | | | | | identit\
\yref
| | | | | | | +--rw public-key
| | | | | | | binary
| | | | | | +--:(truststore)
| | | | | | {truststore-sup\
\ported,raw-public-keys}?
| | | | | | +--rw truststore-refe\
\rence?
| | | | | | ts:raw-public\
\-keys-ref
| | | | | +--rw psks! {psk-auth}?
| | | | +--rw hello-params | | | | +--rw hello-params
| | | | | {tls-client-hello-params-\ | | | | | {tls-client-hello-params-\
\config}? \config}?
| | | | | +--rw tls-versions | | | | | +--rw tls-versions
| | | | | | +--rw tls-version* | | | | | | +--rw tls-version*
| | | | | | identityref | | | | | | identityref
| | | | | +--rw cipher-suites | | | | | +--rw cipher-suites
| | | | | +--rw cipher-suite* | | | | | +--rw cipher-suite*
| | | | | identityref | | | | | identityref
| | | | +--rw keepalives! | | | | +--rw keepalives!
skipping to change at page 48, line 21 skipping to change at page 55, line 36
+--rw https +--rw https
+--rw tcp-server-parameters +--rw tcp-server-parameters
| +--rw local-address inet:ip-address | +--rw local-address inet:ip-address
| +--rw local-port? inet:port-number | +--rw local-port? inet:port-number
| +--rw keepalives! {keepalives-supported}? | +--rw keepalives! {keepalives-supported}?
| +--rw idle-time uint16 | +--rw idle-time uint16
| +--rw max-probes uint16 | +--rw max-probes uint16
| +--rw probe-interval uint16 | +--rw probe-interval uint16
+--rw tls-client-parameters +--rw tls-client-parameters
| +--rw client-identity | +--rw client-identity
| | +--rw (local-or-keystore) | | +--rw (auth-type)
| | +--:(local) | | +--:(certificate)
| | | {local-definitions-supported}? | | | +--rw certificate
| | | +--rw local-definition | | | {x509-certificate-auth}?
| | | +--rw algorithm | | | +--rw (local-or-keystore)
| | | | iasa:asymmetric-algorithm\ | | | +--:(local)
\-type | | | | {local-definitions-su\
| | | +--rw public-key-format? \pported}?
| | | | identityref | | | | +--rw local-definition
| | | +--rw public-key | | | | +--rw algorithm
| | | | binary | | | | | iasa:asymmetric-\
| | | +--rw private-key-format? \algorithm-type
| | | | identityref | | | | +--rw public-key-format?
| | | +--rw (private-key-type) | | | | | identityref
| | | | +--:(private-key) | | | | +--rw public-key
| | | | | +--rw private-key? | | | | | binary
| | | | | binary | | | | +--rw private-key-format?
| | | | +--:(hidden-private-key) | | | | | identityref
| | | | | +--rw hidden-private-key? | | | | +--rw (private-key-type)
| | | | | empty | | | | | +--:(private-key)
| | | | +--:(encrypted-private-key) | | | | | | +--rw private-key?
| | | | +--rw encrypted-private-key | | | | | | binary
| | | | +--rw (key-type) | | | | | +--:(hidden-private-k\
| | | | | +--:(symmetric-key-re\ \ey)
\f) | | | | | | +--rw hidden-priva\
| | | | | | +--rw symmetric-ke\ \te-key?
\y-ref? leafref | | | | | | empty
| | | | | | {keystore-\ | | | | | +--:(encrypted-privat\
\supported}? \e-key)
| | | | | +--:(asymmetric-key-r\ | | | | | +--rw encrypted-pr\
\ef) \ivate-key
| | | | | +--rw asymmetric-k\ | | | | | +--rw (key-type)
\ey-ref? leafref | | | | | | +--:(symmetr\
| | | | | {keystore-\ \ic-key-ref)
\supported}? | | | | | | | +--rw sym\
| | | | +--rw value? \metric-key-ref? leafref
| | | | binary | | | | | | | {\
| | | +--rw cert? \keystore-supported}?
| | | | end-entity-cert-cms | | | | | | +--:(asymmet\
| | | +---n certificate-expiration \ric-key-ref)
| | | | +-- expiration-date | | | | | | +--rw asy\
| | | | yang:date-and-time \mmetric-key-ref? leafref
| | | +---x generate-certificate-signin\ | | | | | | {\
\g-request \keystore-supported}?
| | | +---w input | | | | | +--rw value?
| | | | +---w subject binary | | | | | binary
| | | | +---w attributes? binary | | | | +--rw cert?
| | | +--ro output | | | | | end-entity-cert-\
| | | +--ro certificate-signing-r\ \cms
\equest | | | | +---n certificate-expira\
| | | binary \tion
| | +--:(keystore) {keystore-supported}? | | | | | +-- expiration-date
| | +--rw keystore-reference | | | | | yang:date-and\
| | +--rw asymmetric-key? \-time
| | | ks:asymmetric-key-ref | | | | +---x generate-certifica\
| | +--rw certificate? leafref \te-signing-request
| | | | +---w input
| | | | | +---w subject
| | | | | | binary
| | | | | +---w attributes?
| | | | | binary
| | | | +--ro output
| | | | +--ro certificate-\
\signing-request
| | | | binary
| | | +--:(keystore)
| | | {keystore-supported}?
| | | +--rw keystore-reference
| | | +--rw asymmetric-key?
| | | | ks:asymmetric-ke\
\y-ref
| | | +--rw certificate? \
\leafref
| | +--:(raw-public-key)
| | | +--rw raw-public-key
| | | {raw-public-key-auth}?
| | | +--rw (local-or-keystore)
| | | +--:(local)
| | | | {local-definitions-su\
\pported}?
| | | | +--rw local-definition
| | | | +--rw algorithm
| | | | | iasa:asymmetric-\
\algorithm-type
| | | | +--rw public-key-format?
| | | | | identityref
| | | | +--rw public-key
| | | | | binary
| | | | +--rw private-key-format?
| | | | | identityref
| | | | +--rw (private-key-type)
| | | | +--:(private-key)
| | | | | +--rw private-key?
| | | | | binary
| | | | +--:(hidden-private-k\
\ey)
| | | | | +--rw hidden-priva\
\te-key?
| | | | | empty
| | | | +--:(encrypted-privat\
\e-key)
| | | | +--rw encrypted-pr\
\ivate-key
| | | | +--rw (key-type)
| | | | | +--:(symmetr\
\ic-key-ref)
| | | | | | +--rw sym\
\metric-key-ref? leafref
| | | | | | {\
\keystore-supported}?
| | | | | +--:(asymmet\
\ric-key-ref)
| | | | | +--rw asy\
\mmetric-key-ref? leafref
| | | | | {\
\keystore-supported}?
| | | | +--rw value?
| | | | binary
| | | +--:(keystore)
| | | {keystore-supported}?
| | | +--rw keystore-reference?
| | | ks:asymmetric-key-r\
\ef
| | +--:(psk)
| | +--rw psk {psk-auth}?
| | +--rw (local-or-keystore)
| | +--:(local)
| | | {local-definitions-su\
\pported}?
| | | +--rw local-definition
| | | +--rw algorithm
| | | | isa:symmetric-al\
\gorithm-type
| | | +--rw key-format?
| | | | identityref
| | | +--rw (key-type)
| | | +--:(key)
| | | | +--rw key?
| | | | binary
| | | +--:(hidden-key)
| | | | +--rw hidden-key?
| | | | empty
| | | +--:(encrypted-key)
| | | +--rw encrypted-key
| | | +--rw (key-type)
| | | | +--:(symmetr\
\ic-key-ref)
| | | | | +--rw sym\
\metric-key-ref? leafref
| | | | | {\
\keystore-supported}?
| | | | +--:(asymmet\
\ric-key-ref)
| | | | +--rw asy\
\mmetric-key-ref? leafref
| | | | {\
\keystore-supported}?
| | | +--rw value?
| | | binary
| | +--:(keystore)
| | {keystore-supported}?
| | +--rw keystore-reference?
| | ks:symmetric-key-ref
| +--rw server-authentication | +--rw server-authentication
| | +--rw ca-certs! | | +--rw ca-certs! {x509-certificate-auth}?
| | | +--rw (local-or-truststore) | | | +--rw (local-or-truststore)
| | | +--:(local) | | | +--:(local)
| | | | {local-definitions-supporte\ | | | | {local-definitions-supporte\
\d}? \d}?
| | | | +--rw local-definition | | | | +--rw local-definition
| | | | +--rw cert* | | | | +--rw cert*
| | | | | trust-anchor-cert-cms | | | | | trust-anchor-cert-cms
| | | | +---n certificate-expiration | | | | +---n certificate-expiration
| | | | +-- expiration-date | | | | +-- expiration-date
| | | | yang:date-and-time | | | | yang:date-and-time
| | | +--:(truststore) | | | +--:(truststore)
| | | {truststore-supported,x509-\ | | | {truststore-supported,x509-\
\certificates}? \certificates}?
| | | +--rw truststore-reference? | | | +--rw truststore-reference?
| | | ts:certificates-ref | | | ts:certificates-ref
| | +--rw server-certs! | | +--rw server-certs!
| | +--rw (local-or-truststore) | | | {x509-certificate-auth}?
| | +--:(local) | | | +--rw (local-or-truststore)
| | | {local-definitions-supporte\ | | | +--:(local)
| | | | {local-definitions-supporte\
\d}? \d}?
| | | +--rw local-definition | | | | +--rw local-definition
| | | +--rw cert* | | | | +--rw cert*
| | | | trust-anchor-cert-cms | | | | | trust-anchor-cert-cms
| | | +---n certificate-expiration | | | | +---n certificate-expiration
| | | +-- expiration-date | | | | +-- expiration-date
| | | yang:date-and-time | | | | yang:date-and-time
| | +--:(truststore) | | | +--:(truststore)
| | {truststore-supported,x509-\ | | | {truststore-supported,x509-\
\certificates}? \certificates}?
| | +--rw truststore-reference? | | | +--rw truststore-reference?
| | ts:certificates-ref | | | ts:certificates-ref
| | +--rw raw-public-keys!
| | | {raw-public-key-auth}?
| | | +--rw (local-or-truststore)
| | | +--:(local)
| | | | {local-definitions-supporte\
\d}?
| | | | +--rw local-definition
| | | | +--rw raw-public-key* [name]
| | | | +--rw name
| | | | | string
| | | | +--rw algorithm
| | | | | iasa:asymmetric-alg\
\orithm-type
| | | | +--rw public-key-format?
| | | | | identityref
| | | | +--rw public-key
| | | | binary
| | | +--:(truststore)
| | | {truststore-supported,raw-p\
\ublic-keys}?
| | | +--rw truststore-reference?
| | | ts:raw-public-keys-ref
| | +--rw psks! {psk-auth}?
| +--rw hello-params | +--rw hello-params
| | {tls-client-hello-params-config}? | | {tls-client-hello-params-config}?
| | +--rw tls-versions | | +--rw tls-versions
| | | +--rw tls-version* identityref | | | +--rw tls-version* identityref
| | +--rw cipher-suites | | +--rw cipher-suites
| | +--rw cipher-suite* identityref | | +--rw cipher-suite* identityref
| +--rw keepalives! {tls-client-keepalives}? | +--rw keepalives! {tls-client-keepalives}?
| +--rw max-wait? uint16 | +--rw max-wait? uint16
| +--rw max-attempts? uint8 | +--rw max-attempts? uint8
+--rw http-client-parameters +--rw http-client-parameters
skipping to change at page 50, line 45 skipping to change at page 60, line 47
| | | {local-binding-supported}? | | | {local-binding-supported}?
| | +--rw local-port? inet:port-number | | +--rw local-port? inet:port-number
| | | {local-binding-supported}? | | | {local-binding-supported}?
| | +--rw keepalives! | | +--rw keepalives!
| | {keepalives-supported}? | | {keepalives-supported}?
| | +--rw idle-time uint16 | | +--rw idle-time uint16
| | +--rw max-probes uint16 | | +--rw max-probes uint16
| | +--rw probe-interval uint16 | | +--rw probe-interval uint16
| +--rw tls-client-parameters | +--rw tls-client-parameters
| | +--rw client-identity | | +--rw client-identity
| | | +--rw (local-or-keystore) | | | +--rw (auth-type)
| | | +--:(local) | | | +--:(certificate)
| | | | {local-definitions-suppo\ | | | | +--rw certificate
| | | | {x509-certificate-auth\
\}?
| | | | +--rw (local-or-keystore)
| | | | +--:(local)
| | | | | {local-definiti\
\ons-supported}?
| | | | | +--rw local-definition
| | | | | +--rw algorithm
| | | | | | iasa:asymm\
\etric-algorithm-type
| | | | | +--rw public-key-f\
\ormat?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-\
\format?
| | | | | | identityref
| | | | | +--rw (private-key\
\-type)
| | | | | | +--:(private-ke\
\y)
| | | | | | | +--rw privat\
\e-key?
| | | | | | | bina\
\ry
| | | | | | +--:(hidden-pri\
\vate-key)
| | | | | | | +--rw hidden\
\-private-key?
| | | | | | | empty
| | | | | | +--:(encrypted-\
\private-key)
| | | | | | +--rw encryp\
\ted-private-key
| | | | | | +--rw (ke\
\y-type)
| | | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--rw val\
\ue?
| | | | | | b\
\inary
| | | | | +--rw cert?
| | | | | | end-entity\
\-cert-cms
| | | | | +---n certificate-\
\expiration
| | | | | | +-- expiration-\
\date
| | | | | | yang:da\
\te-and-time
| | | | | +---x generate-cer\
\tificate-signing-request
| | | | | +---w input
| | | | | | +---w subject
| | | | | | | bina\
\ry
| | | | | | +---w attrib\
\utes?
| | | | | | bina\
\ry
| | | | | +--ro output
| | | | | +--ro certif\
\icate-signing-request
| | | | | bina\
\ry
| | | | +--:(keystore)
| | | | {keystore-suppo\
\rted}? \rted}?
| | | | +--rw local-definition | | | | +--rw keystore-refere\
| | | | +--rw algorithm \nce
| | | | | iasa:asymmetric-alg\ | | | | +--rw asymmetric-k\
\ey?
| | | | | ks:asymmet\
\ric-key-ref
| | | | +--rw certificate?\
\ leafref
| | | +--:(raw-public-key)
| | | | +--rw raw-public-key
| | | | {raw-public-key-auth}?
| | | | +--rw (local-or-keystore)
| | | | +--:(local)
| | | | | {local-definiti\
\ons-supported}?
| | | | | +--rw local-definition
| | | | | +--rw algorithm
| | | | | | iasa:asymm\
\orithm-type \etric-algorithm-type
| | | | +--rw public-key-format? | | | | | +--rw public-key-f\
| | | | | identityref \ormat?
| | | | +--rw public-key | | | | | | identityref
| | | | | binary | | | | | +--rw public-key
| | | | +--rw private-key-format? | | | | | | binary
| | | | | identityref | | | | | +--rw private-key-\
| | | | +--rw (private-key-type) \format?
| | | | | +--:(private-key) | | | | | | identityref
| | | | | | +--rw private-key? | | | | | +--rw (private-key\
| | | | | | binary \-type)
| | | | | +--:(hidden-private-key) | | | | | +--:(private-ke\
| | | | | | +--rw hidden-private-\ \y)
\key? | | | | | | +--rw privat\
| | | | | | empty \e-key?
| | | | | +--:(encrypted-private-k\ | | | | | | bina\
\ey) \ry
| | | | | +--rw encrypted-priva\ | | | | | +--:(hidden-pri\
\te-key \vate-key)
| | | | | +--rw (key-type) | | | | | | +--rw hidden\
| | | | | | +--:(symmetric-\ \-private-key?
\key-ref) | | | | | | empty
| | | | | | | +--rw symmet\ | | | | | +--:(encrypted-\
\ric-key-ref? leafref \private-key)
| | | | | | | {key\ | | | | | +--rw encryp\
\store-supported}? \ted-private-key
| | | | | | +--:(asymmetric\ | | | | | +--rw (ke\
\-key-ref) \y-type)
| | | | | | +--rw asymme\ | | | | | | +--:(s\
\tric-key-ref? leafref \ymmetric-key-ref)
| | | | | | {key\ | | | | | | | +--\
\store-supported}? \rw symmetric-key-ref? leafref
| | | | | +--rw value? | | | | | | | \
| | | | | binary \ {keystore-supported}?
| | | | +--rw cert? | | | | | | +--:(a\
| | | | | end-entity-cert-cms \symmetric-key-ref)
| | | | +---n certificate-expiration | | | | | | +--\
| | | | | +-- expiration-date \rw asymmetric-key-ref? leafref
| | | | | yang:date-and-ti\ | | | | | | \
\me \ {keystore-supported}?
| | | | +---x generate-certificate-\ | | | | | +--rw val\
\signing-request \ue?
| | | | +---w input | | | | | b\
| | | | | +---w subject \inary
| | | | | | binary | | | | +--:(keystore)
| | | | | +---w attributes? | | | | {keystore-suppo\
| | | | | binary \rted}?
| | | | +--ro output | | | | +--rw keystore-refere\
| | | | +--ro certificate-sig\
\ning-request \nce?
| | | | binary | | | | ks:asymmetric\
| | | +--:(keystore) \-key-ref
| | | {keystore-supported}? | | | +--:(psk)
| | | +--rw keystore-reference | | | +--rw psk {psk-auth}?
| | | +--rw asymmetric-key? | | | +--rw (local-or-keystore)
| | | | ks:asymmetric-key-r\ | | | +--:(local)
\ef | | | | {local-definiti\
| | | +--rw certificate? lea\ \ons-supported}?
\fref | | | | +--rw local-definition
| | | | +--rw algorithm
| | | | | isa:symmet\
\ric-algorithm-type
| | | | +--rw key-format?
| | | | | identityref
| | | | +--rw (key-type)
| | | | +--:(key)
| | | | | +--rw key?
| | | | | bina\
\ry
| | | | +--:(hidden-key)
| | | | | +--rw hidden\
\-key?
| | | | | empty
| | | | +--:(encrypted-\
\key)
| | | | +--rw encryp\
\ted-key
| | | | +--rw (ke\
\y-type)
| | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | \
\ {keystore-supported}?
| | | | | +--:(a\
\symmetric-key-ref)
| | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | \
\ {keystore-supported}?
| | | | +--rw val\
\ue?
| | | | b\
\inary
| | | +--:(keystore)
| | | {keystore-suppo\
\rted}?
| | | +--rw keystore-refere\
\nce?
| | | ks:symmetric-\
\key-ref
| | +--rw server-authentication | | +--rw server-authentication
| | | +--rw ca-certs! | | | +--rw ca-certs!
| | | | {x509-certificate-auth}?
| | | | +--rw (local-or-truststore) | | | | +--rw (local-or-truststore)
| | | | +--:(local) | | | | +--:(local)
| | | | | {local-definitions-su\ | | | | | {local-definitions-su\
\pported}? \pported}?
| | | | | +--rw local-definition | | | | | +--rw local-definition
| | | | | +--rw cert* | | | | | +--rw cert*
| | | | | | trust-anchor-cer\ | | | | | | trust-anchor-cer\
\t-cms \t-cms
| | | | | +---n certificate-expira\ | | | | | +---n certificate-expira\
\tion \tion
| | | | | +-- expiration-date | | | | | +-- expiration-date
| | | | | yang:date-and\ | | | | | yang:date-and\
\-time \-time
| | | | +--:(truststore) | | | | +--:(truststore)
| | | | {truststore-supported\ | | | | {truststore-supported\
\,x509-certificates}? \,x509-certificates}?
| | | | +--rw truststore-reference? | | | | +--rw truststore-reference?
| | | | ts:certificates-ref | | | | ts:certificates-ref
| | | +--rw server-certs! | | | +--rw server-certs!
| | | +--rw (local-or-truststore) | | | | {x509-certificate-auth}?
| | | +--:(local) | | | | +--rw (local-or-truststore)
| | | | {local-definitions-su\ | | | | +--:(local)
| | | | | {local-definitions-su\
\pported}? \pported}?
| | | | +--rw local-definition | | | | | +--rw local-definition
| | | | +--rw cert* | | | | | +--rw cert*
| | | | | trust-anchor-cer\ | | | | | | trust-anchor-cer\
\t-cms \t-cms
| | | | +---n certificate-expira\ | | | | | +---n certificate-expira\
\tion \tion
| | | | +-- expiration-date | | | | | +-- expiration-date
| | | | yang:date-and\ | | | | | yang:date-and\
\-time \-time
| | | +--:(truststore) | | | | +--:(truststore)
| | | {truststore-supported\ | | | | {truststore-supported\
\,x509-certificates}? \,x509-certificates}?
| | | +--rw truststore-reference? | | | | +--rw truststore-reference?
| | | ts:certificates-ref | | | | ts:certificates-ref
| | | +--rw raw-public-keys!
| | | | {raw-public-key-auth}?
| | | | +--rw (local-or-truststore)
| | | | +--:(local)
| | | | | {local-definitions-su\
\pported}?
| | | | | +--rw local-definition
| | | | | +--rw raw-public-key*
| | | | | [name]
| | | | | +--rw name
| | | | | | string
| | | | | +--rw algorithm
| | | | | | iasa:asymmetr\
\ic-algorithm-type
| | | | | +--rw public-key-form\
\at?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | binary
| | | | +--:(truststore)
| | | | {truststore-supported\
\,raw-public-keys}?
| | | | +--rw truststore-reference?
| | | | ts:raw-public-keys-\
\ref
| | | +--rw psks! {psk-auth}?
| | +--rw hello-params | | +--rw hello-params
| | | {tls-client-hello-params-config\ | | | {tls-client-hello-params-config\
\}? \}?
| | | +--rw tls-versions | | | +--rw tls-versions
| | | | +--rw tls-version* identityref | | | | +--rw tls-version* identityref
| | | +--rw cipher-suites | | | +--rw cipher-suites
| | | +--rw cipher-suite* identityref | | | +--rw cipher-suite* identityref
| | +--rw keepalives! | | +--rw keepalives!
| | {tls-client-keepalives}? | | {tls-client-keepalives}?
| | +--rw max-wait? uint16 | | +--rw max-wait? uint16
skipping to change at page 53, line 36 skipping to change at page 67, line 11
The following tree diagram [RFC8340] provides an overview of the data The following tree diagram [RFC8340] provides an overview of the data
model for the "ietf-restconf-server" module. model for the "ietf-restconf-server" module.
This tree diagram shows all the nodes defined in this module, This tree diagram shows all the nodes defined in this module,
including those defined by "grouping" statements used by this module. including those defined by "grouping" statements used by this module.
Please see Section 3.1 for a tree diagram that illustrates what the Please see Section 3.1 for a tree diagram that illustrates what the
module looks like without all the "grouping" statements expanded. module looks like without all the "grouping" statements expanded.
========== NOTE: '\' line wrapping per BCP XXX (RFC XXXX) =========== ========== NOTE: '\\' line wrapping per BCP XXX (RFC XXXX) ==========
module: ietf-restconf-server module: ietf-restconf-server
+--rw restconf-server +--rw restconf-server
+--rw listen! {http-listen or https-listen}? +--rw listen! {http-listen or https-listen}?
| +--rw endpoint* [name] | +--rw endpoint* [name]
| +--rw name string | +--rw name string
| +--rw (transport) | +--rw (transport)
| +--:(http) {http-listen}? | +--:(http) {http-listen}?
| | +--rw http | | +--rw http
| | +--rw external-endpoint! | | +--rw external-endpoint!
skipping to change at page 54, line 13 skipping to change at page 67, line 36
| | | +--rw local-port? inet:port-number | | | +--rw local-port? inet:port-number
| | | +--rw keepalives! {keepalives-supported}? | | | +--rw keepalives! {keepalives-supported}?
| | | +--rw idle-time uint16 | | | +--rw idle-time uint16
| | | +--rw max-probes uint16 | | | +--rw max-probes uint16
| | | +--rw probe-interval uint16 | | | +--rw probe-interval uint16
| | +--rw http-server-parameters | | +--rw http-server-parameters
| | | +--rw server-name? string | | | +--rw server-name? string
| | | +--rw protocol-versions | | | +--rw protocol-versions
| | | | +--rw protocol-version* enumeration | | | | +--rw protocol-version* enumeration
| | | +--rw client-authentication! | | | +--rw client-authentication!
| | | +--rw (required-or-optional) | | | {client-auth-config-supported}?
| | | | +--:(required) | | | +--rw users
| | | | | +--rw required? | | | +--rw user* [user-id]
| | | | | empty | | | +--rw user-id string
| | | | +--:(optional) | | | +--rw (auth-type)?
| | | | +--rw optional? | | | +--:(basic)
| | | | empty | | | +--rw basic {basic-auth}?
| | | +--rw (local-or-external) | | | +--rw user-id? string
| | | +--:(local) | | | +--rw password?
| | | | {local-client-auth-supported}? | | | ianach:crypt-hash
| | | | +--rw users
| | | | +--rw user* [user-id]
| | | | +--rw user-id string
| | | | +--rw (auth-type)?
| | | | +--:(basic)
| | | | +--rw basic {basic-auth}?
| | | | +--rw user-id?
| | | | | string
| | | | +--rw password?
| | | | ianach:crypt-\
hash
| | | +--:(external)
| | | {external-client-auth-supporte\
d}?
| | | +--rw client-auth-defined-elsewhere?
| | | empty
| | +--rw restconf-server-parameters | | +--rw restconf-server-parameters
| | +--rw client-identification | | +--rw client-identity-mappings
| | +--rw cert-maps | | +--rw cert-to-name* [id]
| | +--rw cert-to-name* [id] | | +--rw id uint32
| | +--rw id uint32 | | +--rw fingerprint?
| | +--rw fingerprint? | | | x509c2n:tls-fingerprint
| | | x509c2n:tls-fingerprint | | +--rw map-type identityref
| | +--rw map-type identityref | | +--rw name string
| | +--rw name string
| +--:(https) {https-listen}? | +--:(https) {https-listen}?
| +--rw https | +--rw https
| +--rw tcp-server-parameters | +--rw tcp-server-parameters
| | +--rw local-address inet:ip-address | | +--rw local-address inet:ip-address
| | +--rw local-port? inet:port-number | | +--rw local-port? inet:port-number
| | +--rw keepalives! {keepalives-supported}? | | +--rw keepalives! {keepalives-supported}?
| | +--rw idle-time uint16 | | +--rw idle-time uint16
| | +--rw max-probes uint16 | | +--rw max-probes uint16
| | +--rw probe-interval uint16 | | +--rw probe-interval uint16
| +--rw tls-server-parameters | +--rw tls-server-parameters
| | +--rw server-identity | | +--rw server-identity
| | | +--rw (local-or-keystore) | | | +--rw (auth-type)
| | | +--:(local) | | | +--:(certificate)
| | | | {local-definitions-supported}? | | | | +--rw certificate
| | | | +--rw local-definition | | | | {x509-certificate-auth}?
| | | | +--rw algorithm | | | | +--rw (local-or-keystore)
| | | | | iasa:asymmetric-algorithm\
-type
| | | | +--rw public-key-format?
| | | | | identityref
| | | | +--rw public-key
| | | | | binary
| | | | +--rw private-key-format?
| | | | | identityref
| | | | +--rw (private-key-type)
| | | | | +--:(private-key)
| | | | | | +--rw private-key?
| | | | | | binary
| | | | | +--:(hidden-private-key)
| | | | | | +--rw hidden-private-key?
| | | | | | empty
| | | | | +--:(encrypted-private-key)
| | | | | +--rw encrypted-private-key
| | | | | +--rw (key-type)
| | | | | | +--:(symmetric-key-re\
f)
| | | | | | | +--rw symmetric-ke\
y-ref? leafref
| | | | | | | {keystore-\
supported}?
| | | | | | +--:(asymmetric-key-r\
ef)
| | | | | | +--rw asymmetric-k\
ey-ref? leafref
| | | | | | {keystore-\
supported}?
| | | | | +--rw value?
| | | | | binary
| | | | +--rw cert?
| | | | | end-entity-cert-cms
| | | | +---n certificate-expiration
| | | | | +-- expiration-date
| | | | | yang:date-and-time
| | | | +---x generate-certificate-signin\
g-request
| | | | +---w input
| | | | | +---w subject binary
| | | | | +---w attributes? binary
| | | | +--ro output
| | | | +--ro certificate-signing-r\
equest
| | | | binary
| | | +--:(keystore) {keystore-supported}?
| | | +--rw keystore-reference
| | | +--rw asymmetric-key?
| | | | ks:asymmetric-key-ref
| | | +--rw certificate? leafref
| | +--rw client-authentication!
| | | +--rw (required-or-optional)
| | | | +--:(required)
| | | | | +--rw required?
| | | | | empty
| | | | +--:(optional)
| | | | +--rw optional?
| | | | empty
| | | +--rw (local-or-external)
| | | +--:(local)
| | | | {local-client-auth-supported}?
| | | | +--rw ca-certs!
| | | | | +--rw (local-or-truststore)
| | | | | +--:(local)
| | | | | | {local-definitions-su\
pported}?
| | | | | | +--rw local-definition
| | | | | | +--rw cert*
| | | | | | | trust-anchor-cer\
t-cms
| | | | | | +---n certificate-expira\
tion
| | | | | | +-- expiration-date
| | | | | | yang:date-and\
-time
| | | | | +--:(truststore)
| | | | | {truststore-supported\
,x509-certificates}?
| | | | | +--rw truststore-reference?
| | | | | ts:certificates-ref
| | | | +--rw client-certs!
| | | | +--rw (local-or-truststore)
| | | | +--:(local) | | | | +--:(local)
| | | | | {local-definitions-su\ | | | | | {local-definitions-su\
pported}? \pported}?
| | | | | +--rw local-definition | | | | | +--rw local-definition
| | | | | +--rw cert* | | | | | +--rw algorithm
| | | | | | trust-anchor-cer\ | | | | | | iasa:asymmetric-\
t-cms \algorithm-type
| | | | | +--rw public-key-format?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-format?
| | | | | | identityref
| | | | | +--rw (private-key-type)
| | | | | | +--:(private-key)
| | | | | | | +--rw private-key?
| | | | | | | binary
| | | | | | +--:(hidden-private-k\
\ey)
| | | | | | | +--rw hidden-priva\
\te-key?
| | | | | | | empty
| | | | | | +--:(encrypted-privat\
\e-key)
| | | | | | +--rw encrypted-pr\
\ivate-key
| | | | | | +--rw (key-type)
| | | | | | | +--:(symmetr\
\ic-key-ref)
| | | | | | | | +--rw sym\
\metric-key-ref? leafref
| | | | | | | | {\
\keystore-supported}?
| | | | | | | +--:(asymmet\
\ric-key-ref)
| | | | | | | +--rw asy\
\mmetric-key-ref? leafref
| | | | | | | {\
\keystore-supported}?
| | | | | | +--rw value?
| | | | | | binary
| | | | | +--rw cert?
| | | | | | end-entity-cert-\
\cms
| | | | | +---n certificate-expira\ | | | | | +---n certificate-expira\
tion \tion
| | | | | +-- expiration-date | | | | | | +-- expiration-date
| | | | | yang:date-and\ | | | | | | yang:date-and\
-time \-time
| | | | +--:(truststore) | | | | | +---x generate-certifica\
| | | | {truststore-supported\ \te-signing-request
,x509-certificates}? | | | | | +---w input
| | | | +--rw truststore-reference? | | | | | | +---w subject
| | | | ts:certificates-ref | | | | | | | binary
| | | +--:(external) | | | | | | +---w attributes?
| | | {external-client-auth-supporte\ | | | | | | binary
d}? | | | | | +--ro output
| | | +--rw client-auth-defined-elsewhere? | | | | | +--ro certificate-\
| | | empty \signing-request
| | | | | binary
| | | | +--:(keystore)
| | | | {keystore-supported}?
| | | | +--rw keystore-reference
| | | | +--rw asymmetric-key?
| | | | | ks:asymmetric-ke\
\y-ref
| | | | +--rw certificate? \
\leafref
| | | +--:(raw-private-key)
| | | | +--rw raw-private-key
| | | | {raw-public-key-auth}?
| | | | +--rw (local-or-keystore)
| | | | +--:(local)
| | | | | {local-definitions-su\
\pported}?
| | | | | +--rw local-definition
| | | | | +--rw algorithm
| | | | | | iasa:asymmetric-\
\algorithm-type
| | | | | +--rw public-key-format?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-format?
| | | | | | identityref
| | | | | +--rw (private-key-type)
| | | | | +--:(private-key)
| | | | | | +--rw private-key?
| | | | | | binary
| | | | | +--:(hidden-private-k\
\ey)
| | | | | | +--rw hidden-priva\
\te-key?
| | | | | | empty
| | | | | +--:(encrypted-privat\
\e-key)
| | | | | +--rw encrypted-pr\
\ivate-key
| | | | | +--rw (key-type)
| | | | | | +--:(symmetr\
\ic-key-ref)
| | | | | | | +--rw sym\
\metric-key-ref? leafref
| | | | | | | {\
\keystore-supported}?
| | | | | | +--:(asymmet\
\ric-key-ref)
| | | | | | +--rw asy\
\mmetric-key-ref? leafref
| | | | | | {\
\keystore-supported}?
| | | | | +--rw value?
| | | | | binary
| | | | +--:(keystore)
| | | | {keystore-supported}?
| | | | +--rw keystore-reference?
| | | | ks:asymmetric-key-r\
\ef
| | | +--:(psk)
| | | +--rw psk {psk-auth}?
| | | +--rw (local-or-keystore)
| | | +--:(local)
| | | | {local-definitions-su\
\pported}?
| | | | +--rw local-definition
| | | | +--rw algorithm
| | | | | isa:symmetric-al\
\gorithm-type
| | | | +--rw key-format?
| | | | | identityref
| | | | +--rw (key-type)
| | | | +--:(key)
| | | | | +--rw key?
| | | | | binary
| | | | +--:(hidden-key)
| | | | | +--rw hidden-key?
| | | | | empty
| | | | +--:(encrypted-key)
| | | | +--rw encrypted-key
| | | | +--rw (key-type)
| | | | | +--:(symmetr\
\ic-key-ref)
| | | | | | +--rw sym\
\metric-key-ref? leafref
| | | | | | {\
\keystore-supported}?
| | | | | +--:(asymmet\
\ric-key-ref)
| | | | | +--rw asy\
\mmetric-key-ref? leafref
| | | | | {\
\keystore-supported}?
| | | | +--rw value?
| | | | binary
| | | +--:(keystore)
| | | {keystore-supported}?
| | | +--rw keystore-reference?
| | | ks:symmetric-key-ref
| | +--rw client-authentication!
| | | {client-auth-config-supported}?
| | | +--rw ca-certs! {x509-certificate-auth}?
| | | | +--rw (local-or-truststore)
| | | | +--:(local)
| | | | | {local-definitions-supporte\
\d}?
| | | | | +--rw local-definition
| | | | | +--rw cert*
| | | | | | trust-anchor-cert-cms
| | | | | +---n certificate-expiration
| | | | | +-- expiration-date
| | | | | yang:date-and-time
| | | | +--:(truststore)
| | | | {truststore-supported,x509-\
\certificates}?
| | | | +--rw truststore-reference?
| | | | ts:certificates-ref
| | | +--rw client-certs!
| | | | {x509-certificate-auth}?
| | | | +--rw (local-or-truststore)
| | | | +--:(local)
| | | | | {local-definitions-supporte\
\d}?
| | | | | +--rw local-definition
| | | | | +--rw cert*
| | | | | | trust-anchor-cert-cms
| | | | | +---n certificate-expiration
| | | | | +-- expiration-date
| | | | | yang:date-and-time
| | | | +--:(truststore)
| | | | {truststore-supported,x509-\
\certificates}?
| | | | +--rw truststore-reference?
| | | | ts:certificates-ref
| | | +--rw raw-public-keys!
| | | {raw-public-key-auth}?
| | | +--rw (local-or-truststore)
| | | +--:(local)
| | | | {local-definitions-supporte\
\d}?
| | | | +--rw local-definition
| | | | +--rw raw-public-key* [name]
| | | | +--rw name
| | | | | string
| | | | +--rw algorithm
| | | | | iasa:asymmetric-alg\
\orithm-type
| | | | +--rw public-key-format?
| | | | | identityref
| | | | +--rw public-key
| | | | binary
| | | +--:(truststore)
| | | {truststore-supported,raw-p\
\ublic-keys}?
| | | +--rw truststore-reference?
| | | ts:raw-public-keys-ref
| | +--rw hello-params | | +--rw hello-params
| | | {tls-server-hello-params-config}? | | | {tls-server-hello-params-config}?
| | | +--rw tls-versions | | | +--rw tls-versions
| | | | +--rw tls-version* identityref | | | | +--rw tls-version* identityref
| | | +--rw cipher-suites | | | +--rw cipher-suites
| | | +--rw cipher-suite* identityref | | | +--rw cipher-suite* identityref
| | +--rw keepalives! {tls-server-keepalives}? | | +--rw keepalives! {tls-server-keepalives}?
| | +--rw max-wait? uint16 | | +--rw max-wait? uint16
| | +--rw max-attempts? uint8 | | +--rw max-attempts? uint8
| +--rw http-server-parameters | +--rw http-server-parameters
| | +--rw server-name? string | | +--rw server-name? string
| | +--rw protocol-versions | | +--rw protocol-versions
| | | +--rw protocol-version* enumeration | | | +--rw protocol-version* enumeration
| | +--rw client-authentication! | | +--rw client-authentication!
| | +--rw (required-or-optional) | | {client-auth-config-supported}?
| | | +--:(required) | | +--rw users
| | | | +--rw required? | | +--rw user* [user-id]
| | | | empty | | +--rw user-id string
| | | +--:(optional) | | +--rw (auth-type)?
| | | +--rw optional? | | +--:(basic)
| | | empty | | +--rw basic {basic-auth}?
| | +--rw (local-or-external) | | +--rw user-id? string
| | +--:(local) | | +--rw password?
| | | {local-client-auth-supported}? | | ianach:crypt-hash
| | | +--rw users
| | | +--rw user* [user-id]
| | | +--rw user-id string
| | | +--rw (auth-type)?
| | | +--:(basic)
| | | +--rw basic {basic-auth}?
| | | +--rw user-id?
| | | | string
| | | +--rw password?
| | | ianach:crypt-\
hash
| | +--:(external)
| | {external-client-auth-supporte\
d}?
| | +--rw client-auth-defined-elsewhere?
| | empty
| +--rw restconf-server-parameters | +--rw restconf-server-parameters
| +--rw client-identification | +--rw client-identity-mappings
| +--rw cert-maps | +--rw cert-to-name* [id]
| +--rw cert-to-name* [id] | +--rw id uint32
| +--rw id uint32 | +--rw fingerprint?
| +--rw fingerprint? | | x509c2n:tls-fingerprint
| | x509c2n:tls-fingerprint | +--rw map-type identityref
| +--rw map-type identityref | +--rw name string
| +--rw name string
+--rw call-home! {https-call-home}? +--rw call-home! {https-call-home}?
+--rw restconf-client* [name] +--rw restconf-client* [name]
+--rw name string +--rw name string
+--rw endpoints +--rw endpoints
| +--rw endpoint* [name] | +--rw endpoint* [name]
| +--rw name string | +--rw name string
| +--rw (transport) | +--rw (transport)
| +--:(https) {https-listen}? | +--:(https) {https-listen}?
| +--rw https | +--rw https
| +--rw tcp-client-parameters | +--rw tcp-client-parameters
skipping to change at page 58, line 49 skipping to change at page 73, line 51
| | | {local-binding-supported}? | | | {local-binding-supported}?
| | +--rw local-port? inet:port-number | | +--rw local-port? inet:port-number
| | | {local-binding-supported}? | | | {local-binding-supported}?
| | +--rw keepalives! | | +--rw keepalives!
| | {keepalives-supported}? | | {keepalives-supported}?
| | +--rw idle-time uint16 | | +--rw idle-time uint16
| | +--rw max-probes uint16 | | +--rw max-probes uint16
| | +--rw probe-interval uint16 | | +--rw probe-interval uint16
| +--rw tls-server-parameters | +--rw tls-server-parameters
| | +--rw server-identity | | +--rw server-identity
| | | +--rw (local-or-keystore) | | | +--rw (auth-type)
| | | +--:(local) | | | +--:(certificate)
| | | | {local-definitions-suppo\ | | | | +--rw certificate
| | | | {x509-certificate-auth\
rted}? \}?
| | | | +--rw local-definition | | | | +--rw (local-or-keystore)
| | | | +--rw algorithm
| | | | | iasa:asymmetric-alg\
orithm-type
| | | | +--rw public-key-format?
| | | | | identityref
| | | | +--rw public-key
| | | | | binary
| | | | +--rw private-key-format?
| | | | | identityref
| | | | +--rw (private-key-type)
| | | | | +--:(private-key)
| | | | | | +--rw private-key?
| | | | | | binary
| | | | | +--:(hidden-private-key)
| | | | | | +--rw hidden-private-\
key?
| | | | | | empty
| | | | | +--:(encrypted-private-k\
ey)
| | | | | +--rw encrypted-priva\
te-key
| | | | | +--rw (key-type)
| | | | | | +--:(symmetric-\
key-ref)
| | | | | | | +--rw symmet\
ric-key-ref? leafref
| | | | | | | {key\
store-supported}?
| | | | | | +--:(asymmetric\
-key-ref)
| | | | | | +--rw asymme\
tric-key-ref? leafref
| | | | | | {key\
store-supported}?
| | | | | +--rw value?
| | | | | binary
| | | | +--rw cert?
| | | | | end-entity-cert-cms
| | | | +---n certificate-expiration
| | | | | +-- expiration-date
| | | | | yang:date-and-ti\
me
| | | | +---x generate-certificate-\
signing-request
| | | | +---w input
| | | | | +---w subject
| | | | | | binary
| | | | | +---w attributes?
| | | | | binary
| | | | +--ro output
| | | | +--ro certificate-sig\
ning-request
| | | | binary
| | | +--:(keystore)
| | | {keystore-supported}?
| | | +--rw keystore-reference
| | | +--rw asymmetric-key?
| | | | ks:asymmetric-key-r\
ef
| | | +--rw certificate? lea\
fref
| | +--rw client-authentication!
| | | +--rw (required-or-optional)
| | | | +--:(required)
| | | | | +--rw required?
| | | | | empty
| | | | +--:(optional)
| | | | +--rw optional?
| | | | empty
| | | +--rw (local-or-external)
| | | +--:(local)
| | | | {local-client-auth-suppo\
rted}?
| | | | +--rw ca-certs!
| | | | | +--rw (local-or-truststore)
| | | | | +--:(local)
| | | | | | {local-definiti\
ons-supported}?
| | | | | | +--rw local-definition
| | | | | | +--rw cert*
| | | | | | | trust-anch\
or-cert-cms
| | | | | | +---n certificate-\
expiration
| | | | | | +-- expiration-\
date
| | | | | | yang:da\
te-and-time
| | | | | +--:(truststore)
| | | | | {truststore-sup\
ported,x509-certificates}?
| | | | | +--rw truststore-refe\
rence?
| | | | | ts:certificat\
es-ref
| | | | +--rw client-certs!
| | | | +--rw (local-or-truststore)
| | | | +--:(local) | | | | +--:(local)
| | | | | {local-definiti\ | | | | | {local-definiti\
ons-supported}? \ons-supported}?
| | | | | +--rw local-definition | | | | | +--rw local-definition
| | | | | +--rw cert* | | | | | +--rw algorithm
| | | | | | trust-anch\ | | | | | | iasa:asymm\
or-cert-cms \etric-algorithm-type
| | | | | +--rw public-key-f\
\ormat?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-\
\format?
| | | | | | identityref
| | | | | +--rw (private-key\
\-type)
| | | | | | +--:(private-ke\
\y)
| | | | | | | +--rw privat\
\e-key?
| | | | | | | bina\
\ry
| | | | | | +--:(hidden-pri\
\vate-key)
| | | | | | | +--rw hidden\
\-private-key?
| | | | | | | empty
| | | | | | +--:(encrypted-\
\private-key)
| | | | | | +--rw encryp\
\ted-private-key
| | | | | | +--rw (ke\
\y-type)
| | | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | | \
\ {keystore-supported}?
| | | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--rw val\
\ue?
| | | | | | b\
\inary
| | | | | +--rw cert?
| | | | | | end-entity\
\-cert-cms
| | | | | +---n certificate-\ | | | | | +---n certificate-\
expiration \expiration
| | | | | +-- expiration-\ | | | | | | +-- expiration-\
date \date
| | | | | yang:da\ | | | | | | yang:da\
te-and-time \te-and-time
| | | | +--:(truststore) | | | | | +---x generate-cer\
| | | | {truststore-sup\ \tificate-signing-request
ported,x509-certificates}? | | | | | +---w input
| | | | +--rw truststore-refe\ | | | | | | +---w subject
rence? | | | | | | | bina\
| | | | ts:certificat\ \ry
es-ref | | | | | | +---w attrib\
| | | +--:(external) \utes?
| | | {external-client-auth-su\ | | | | | | bina\
pported}? \ry
| | | +--rw client-auth-defined-else\ | | | | | +--ro output
where? | | | | | +--ro certif\
| | | empty \icate-signing-request
| | | | | bina\
\ry
| | | | +--:(keystore)
| | | | {keystore-suppo\
\rted}?
| | | | +--rw keystore-refere\
\nce
| | | | +--rw asymmetric-k\
\ey?
| | | | | ks:asymmet\
\ric-key-ref
| | | | +--rw certificate?\
\ leafref
| | | +--:(raw-private-key)
| | | | +--rw raw-private-key
| | | | {raw-public-key-auth}?
| | | | +--rw (local-or-keystore)
| | | | +--:(local)
| | | | | {local-definiti\
\ons-supported}?
| | | | | +--rw local-definition
| | | | | +--rw algorithm
| | | | | | iasa:asymm\
\etric-algorithm-type
| | | | | +--rw public-key-f\
\ormat?
| | | | | | identityref
| | | | | +--rw public-key
| | | | | | binary
| | | | | +--rw private-key-\
\format?
| | | | | | identityref
| | | | | +--rw (private-key\
\-type)
| | | | | +--:(private-ke\
\y)
| | | | | | +--rw privat\
\e-key?
| | | | | | bina\
\ry
| | | | | +--:(hidden-pri\
\vate-key)
| | | | | | +--rw hidden\
\-private-key?
| | | | | | empty
| | | | | +--:(encrypted-\
\private-key)
| | | | | +--rw encryp\
\ted-private-key
| | | | | +--rw (ke\
\y-type)
| | | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | | \
\ {keystore-supported}?
| | | | | | +--:(a\
\symmetric-key-ref)
| | | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | | \
\ {keystore-supported}?
| | | | | +--rw val\
\ue?
| | | | | b\
\inary
| | | | +--:(keystore)
| | | | {keystore-suppo\
\rted}?
| | | | +--rw keystore-refere\
\nce?
| | | | ks:asymmetric\
\-key-ref
| | | +--:(psk)
| | | +--rw psk {psk-auth}?
| | | +--rw (local-or-keystore)
| | | +--:(local)
| | | | {local-definiti\
\ons-supported}?
| | | | +--rw local-definition
| | | | +--rw algorithm
| | | | | isa:symmet\
\ric-algorithm-type
| | | | +--rw key-format?
| | | | | identityref
| | | | +--rw (key-type)
| | | | +--:(key)
| | | | | +--rw key?
| | | | | bina\
\ry
| | | | +--:(hidden-key)
| | | | | +--rw hidden\
\-key?
| | | | | empty
| | | | +--:(encrypted-\
\key)
| | | | +--rw encryp\
\ted-key
| | | | +--rw (ke\
\y-type)
| | | | | +--:(s\
\ymmetric-key-ref)
| | | | | | +--\
\rw symmetric-key-ref? leafref
| | | | | | \
\ {keystore-supported}?
| | | | | +--:(a\
\symmetric-key-ref)
| | | | | +--\
\rw asymmetric-key-ref? leafref
| | | | | \
\ {keystore-supported}?
| | | | +--rw val\
\ue?
| | | | b\
\inary
| | | +--:(keystore)
| | | {keystore-suppo\
\rted}?
| | | +--rw keystore-refere\
\nce?
| | | ks:symmetric-\
\key-ref
| | +--rw client-authentication!
| | | {client-auth-config-supported}?
| | | +--rw ca-certs!
| | | | {x509-certificate-auth}?
| | | | +--rw (local-or-truststore)
| | | | +--:(local)
| | | | | {local-definitions-su\
\pported}?
| | | | | +--rw local-definition
| | | | | +--rw cert*
| | | | | | trust-anchor-cer\
\t-cms
| | | | | +---n certificate-expira\
\tion
| | | | | +-- expiration-date
| | | | | yang:date-and\
\-time
| | | | +--:(truststore)
| | | | {truststore-supported\
\,x509-certificates}?
| | | | +--rw truststore-reference?
| | | | ts:certificates-ref
| | | +--rw client-certs!
| | | | {x509-certificate-auth}?
| | | | +--rw (local-or-truststore)
| | | | +--:(local)
| | | | | {local-definitions-su\
\pported}?
| | | | | +--rw local-definition
| | | | | +--rw cert*
| | | | | | trust-anchor-cer\
\t-cms
| | | | | +---n certificate-expira\
\tion
| | | | | +-- expiration-date
| | | | | yang:date-and\
\-time
| | | | +--:(truststore)
| | | | {truststore-supported\
\,x509-certificates}?
| | | | +--rw truststore-reference?
| | | | ts:certificates-ref
| | | +--rw raw-public-keys!
| | | {raw-public-key-auth}?
| | | +--rw (local-or-truststore)
| | | +--:(local)
| | | | {local-definitions-su\
\pported}?
| | | | +--rw local-definition
| | | | +--rw raw-public-key*
| | | | [name]
| | | | +--rw name
| | | | | string
| | | | +--rw algorithm
| | | | | iasa:asymmetr\
\ic-algorithm-type
| | | | +--rw public-key-form\
\at?
| | | | | identityref
| | | | +--rw public-key
| | | | binary
| | | +--:(truststore)
| | | {truststore-supported\
\,raw-public-keys}?
| | | +--rw truststore-reference?
| | | ts:raw-public-keys-\
\ref
| | +--rw hello-params | | +--rw hello-params
| | | {tls-server-hello-params-config\ | | | {tls-server-hello-params-config\
}? \}?
| | | +--rw tls-versions | | | +--rw tls-versions
| | | | +--rw tls-version* identityref | | | | +--rw tls-version* identityref
| | | +--rw cipher-suites | | | +--rw cipher-suites
| | | +--rw cipher-suite* identityref | | | +--rw cipher-suite* identityref
| | +--rw keepalives! | | +--rw keepalives!
| | {tls-server-keepalives}? | | {tls-server-keepalives}?
| | +--rw max-wait? uint16 | | +--rw max-wait? uint16
| | +--rw max-attempts? uint8 | | +--rw max-attempts? uint8
| +--rw http-server-parameters | +--rw http-server-parameters
| | +--rw server-name? string | | +--rw server-name? string
| | +--rw protocol-versions | | +--rw protocol-versions
| | | +--rw protocol-version* enumeration | | | +--rw protocol-version* enumeration
| | +--rw client-authentication! | | +--rw client-authentication!
| | +--rw (required-or-optional) | | {client-auth-config-supported}?
| | | +--:(required) | | +--rw users
| | | | +--rw required? | | +--rw user* [user-id]
| | | | empty | | +--rw user-id string
| | | +--:(optional) | | +--rw (auth-type)?
| | | +--rw optional? | | +--:(basic)
| | | empty | | +--rw basic {basic-auth}?
| | +--rw (local-or-external) | | +--rw user-id?
| | +--:(local) | | | string
| | | {local-client-auth-suppo\ | | +--rw password?
rted}? | | ianach:crypt-\
| | | +--rw users \hash
| | | +--rw user* [user-id]
| | | +--rw user-id
| | | | string
| | | +--rw (auth-type)?
| | | +--:(basic)
| | | +--rw basic
| | | {basic-aut\
h}?
| | | +--rw user-id?
| | | | string
| | | +--rw password?
| | | ianach:\
crypt-hash
| | +--:(external)
| | {external-client-auth-su\
pported}?
| | +--rw client-auth-defined-else\
where?
| | empty
| +--rw restconf-server-parameters | +--rw restconf-server-parameters
| +--rw client-identification | +--rw client-identity-mappings
| +--rw cert-maps | +--rw cert-to-name* [id]
| +--rw cert-to-name* [id] | +--rw id uint32
| +--rw id uint32 | +--rw fingerprint?
| +--rw fingerprint? | | x509c2n:tls-fingerprint
| | x509c2n:tls-fingerprint | +--rw map-type identityref
| +--rw map-type | +--rw name string
| | identityref
| +--rw name string
+--rw connection-type +--rw connection-type
| +--rw (connection-type) | +--rw (connection-type)
| +--:(persistent-connection) | +--:(persistent-connection)
| | +--rw persistent! | | +--rw persistent!
| +--:(periodic-connection) | +--:(periodic-connection)
| +--rw periodic! | +--rw periodic!
| +--rw period? uint16 | +--rw period? uint16
| +--rw anchor-time? yang:date-and-time | +--rw anchor-time? yang:date-and-time
| +--rw idle-timeout? uint16 | +--rw idle-timeout? uint16
+--rw reconnect-strategy +--rw reconnect-strategy
skipping to change at page 66, line 43 skipping to change at page 84, line 16
o Added refinement to make "cert-to-name/fingerprint" be mandatory o Added refinement to make "cert-to-name/fingerprint" be mandatory
false. false.
o Commented out refinement to "tls-server-grouping/client- o Commented out refinement to "tls-server-grouping/client-
authentication" until a better "must" expression is defined. authentication" until a better "must" expression is defined.
o Updated restconf-client example to reflect that http-client- o Updated restconf-client example to reflect that http-client-
grouping no longer has a "protocol-version" leaf. grouping no longer has a "protocol-version" leaf.
B.17. 16 to 17
o Updated examples to include the "*-key-format" nodes.
o Updated examples to remove the "required" nodes.
Acknowledgements Acknowledgements
The authors would like to thank for following for lively discussions The authors would like to thank for following for lively discussions
on list and in the halls (ordered by first name): Alan Luchuk, Andy on list and in the halls (ordered by first name): Alan Luchuk, Andy
Bierman, Balazs Kovacs, Benoit Claise, Bert Wijnen David Lamparter, Bierman, Balazs Kovacs, Benoit Claise, Bert Wijnen David Lamparter,
Juergen Schoenwaelder, Ladislav Lhotka, Martin Bjorklund, Mehmet Juergen Schoenwaelder, Ladislav Lhotka, Martin Bjorklund, Mehmet
Ersue, Phil Shafer, Radek Krejci, Ramkumar Dhanapal, Sean Turner, and Ersue, Phil Shafer, Radek Krejci, Ramkumar Dhanapal, Sean Turner, and
Tom Petch. Tom Petch.
Author's Address Author's Address
 End of changes. 98 change blocks. 
815 lines changed or deleted 1697 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/