<?xml version="1.0" encoding="US-ASCII"?>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>
<rfc
    xmlns:xi="http://www.w3.org/2001/XInclude"
    category="std"
    docName="draft-ietf-tcpm-yang-tcp-08"
    ipr="trust200902"
    submissionType="IETF"
    consensus="true">
  <front>
    <title abbrev="YANG Model for TCP">A YANG Model for Transmission Control
    Protocol (TCP) Configuration and State</title>

    <author fullname="Michael Scharf" initials="M." surname="Scharf">
      <organization abbrev="Hochschule Esslingen">Hochschule Esslingen -
      University of Applied Sciences</organization>

      <address>
        <postal>
          <street>Kanalstr. 33</street>

          <code>73728</code>

          <city>Esslingen</city>

          <region/>

          <country>Germany</country>
        </postal>

        <!--<phone></phone>-->

        <email>michael.scharf@hs-esslingen.de</email>
      </address>
    </author>

    <author fullname="Mahesh Jethanandani" initials="M."
            surname="Jethanandani">
      <organization>Kloud Services</organization>

      <address>
        <email>mjethanandani@gmail.com</email>
      </address>
    </author>

    <author fullname="Vishal Murgai" initials="V." surname="Murgai">
      <organization>Samsung</organization>

      <address>
        <email>vmurgai@gmail.com</email>
      </address>
    </author>

    <date/>

    <area>Transport</area>

    <workgroup>TCPM</workgroup>

    <keyword>YANG</keyword>

    <abstract>
      <t>This document specifies a minimal YANG model for TCP on
      devices that are configured and managed by network management
      protocols. The YANG model defines a container for all TCP
      connections, and groupings of authentication
      parameters that can be imported and used in TCP implementations
      or by other models that need to configure TCP parameters. The
      model also includes basic TCP statistics. The model is compliant
      with Network Management Datastore Architecture (NMDA) (RFC
      8342).</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>The <xref target="RFC9293">Transmission Control
      Protocol (TCP)</xref> is used by many applications in the Internet,
      including control and management protocols. As such, TCP is
      implemented on network elements that can be configured and managed
      via network management protocols such as
      <xref target="RFC6241">NETCONF</xref> or <xref
      target="RFC8040">RESTCONF</xref>.</t>

      <t>This document specifies a minimal <xref target="RFC7950">YANG
      1.1</xref> model for configuring and managing TCP on network
      elements that support YANG, a TCP connection table,
      a TCP listener table containing
      information about a particular TCP listener, and an augmentation
      of the <xref target="RFC8177">YANG Data Model for Key
      Chains</xref> to support authentication. The YANG module specified
      in this document is compliant with
      <xref target="RFC8342">Network Management Datastore Architecture (NMDA)</xref>.</t>

      <t>The YANG module has a narrow scope and focuses on a subset of
      fundamental TCP functions and basic statistics. It defines a
      container for a list of TCP connections that includes definitions from
      <xref target="I-D.ietf-netconf-tcp-client-server">YANG Groupings
      for TCP Clients and TCP Servers</xref>. The model adheres to
      the recommendation in <xref target="RFC4364">BGP/MPLS IP Virtual
      Private Networks</xref>. Therefore it allows enabling of <xref
      target="RFC5925">TCP-AO</xref>, and accommodates the installed
      base that makes use of MD5. The module can be augmented or
      updated to address more advanced or implementation-specific TCP
      features in the future.</t>

      <!--
      <t>Many protocol stacks on IP hosts use other methods to configure
      TCP, such as operating system configuration or policies. Many TCP/IP
      stacks cannot be configured by network management protocols such as
      <xref target="RFC6241">NETCONF</xref> or <xref
      target="RFC8040">RESTCONF</xref>. Moreover, many existing TCP/IP stacks
      do not use YANG data models. Such TCP implementations often have other
      means to configure the parameters listed in this document. Such other
      means are outside the scope of this document.</t>
      -->

      <t>This specification does not deprecate the <xref
      target="RFC4022">Management Information Base (MIB) for the Transmission
      Control Protocol (TCP)</xref>. The basic statistics defined in this
      document follow the model of the TCP MIB. An <xref target="RFC4898">TCP
      Extended Statistics MIB</xref> is also available, but this document does
      not cover such extended statistics. The YANG module also omits some
      selected parameters included in TCP MIB, most notably Retransmission
      Timeout (RTO) configuration and a maximum connection limit. This is a
      conscious decision as these parameters hardly matter in a
      state-of-the-art TCP implementation. It would also be possible to
      translate a MIB into a YANG module, for instance using <xref
      target="RFC6643">Translation of Structure of Management Information
      Version 2 (SMIv2) MIB Modules to YANG Modules</xref>. However, this
      approach is not used in this document, because a translated model would
      not be up-to-date.</t>

      <t>There are other existing TCP-related YANG models, which are
      orthogonal to this specification. Examples are:</t>

      <t><list style="symbols">
          <t>TCP header attributes are modeled in other security-related
          models, such as <xref target="RFC8519">YANG Data Model for Network
          Access Control Lists (ACLs)</xref>, <xref target="RFC8783">Distributed
          Denial-of-Service Open Thread Signaling (DOTS) Data Channel
          Specification</xref>,
          <xref target="I-D.ietf-i2nsf-capability-data-model">I2NSF Capability
          YANG Data Model</xref>, or
          <xref target="I-D.ietf-i2nsf-nsf-facing-interface-dm">I2NSF Network 
          Security Function-Facing Interface YANG Data Model</xref>.</t>

          <t>TCP-related configuration of a NAT (e.g., NAT44, NAT64,
          Destination NAT) is defined in <xref target="RFC8512">A YANG
          Module for Network Address Translation (NAT) and Network Prefix
          Translation (NPT)</xref> and <xref target="RFC8513">A YANG Data
          Model for Dual-Stack Lite (DS-Lite)</xref>.</t>

          <t>TCP-AO and TCP MD5 configuration for Layer 3 VPNs is modeled in
          <xref target="RFC9182">A Layer 3 VPN Network YANG
          Model</xref>. This model assumes that TCP-AO specific parameters
          are preconfigured in addition to the keychain parameters.</t>
        </list></t>
    </section>

    <section title="Requirements Language">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
      "OPTIONAL" in this document are to be interpreted as described in BCP 14
      <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when,
      they appear in all capitals, as shown here.</t>

      <section title="Note to  RFC Editor">
        <t>This document uses several placeholder values throughout the
        document. Please replace them as follows and remove this note before
        publication.</t>

        <t>RFC XXXX, where XXXX is the number assigned to this document at the
        time of publication.</t>

        <t>2022-08-31 with the actual date of the publication of this
        document.</t>
      </section>
    </section>

    <section title="YANG Module Overview">
      <section title="Scope">
        <t>TCP is implemented on different system architectures. As a
        result, there are many different and often
        implementation-specific ways to configure parameters of the
        TCP engine. In addition, in many TCP/IP stacks configuration
        exists for different scopes:</t>

        <t><list style="symbols">
            <t>System-wide configuration: Many TCP implementations have
            configuration parameters that affect all TCP
            connections. Typical examples include enabling or
            disabling optional protocol features.</t>

            <t>Interface configuration: It can be useful to use
            different TCP parameters on different interfaces, e.g.,
            different device ports or IP interfaces. In that case, TCP
            parameters can be part of the interface
            configuration. Typical examples are the Maximum Segment
            Size (MSS) or configuration related to hardware
            offloading.</t>

            <t>Connection parameters: Many implementations have means
            to influence the behavior of each TCP connection, e.g., on
            the programming interface used by applications. Typical
            examples are socket options in the socket API, such as
            disabling the Nagle algorithm <xref
            target="RFC9293">Transmission Control Protocol (TCP)
            Specification</xref> by TCP_NODELAY.  If an application
            uses such an interface, it is possible that the
            configuration of the application or application protocol
            includes TCP-related parameters. An example is the <xref
            target="I-D.ietf-idr-bgp-model">BGP YANG Model for Service
            Provider Networks </xref>.</t>

            <t>Application preferences: Setting of TCP parameters
            can also be part of application preferences, templates,
            or profiles. An example would be the preferences defined
            in <xref target="I-D.ietf-taps-interface">An Abstract
            Application Layer Interface to Transport Services</xref>.</t>
          </list></t>

        <t>As a result, there is no ground truth for setting certain TCP
        parameters, and traditionally different TCP implementations have used
        different modeling approaches. For instance, one implementation may
        define a given configuration parameter globally, while another one
        uses per-interface settings, and both approaches work well for the
        corresponding use cases. Also, different systems may use different
        default values. In addition, TCP can be implemented in different ways
        and design choices by the protocol engine often affect configuration
        options.</t>

        <t>Nonetheless, a number of TCP stack parameters require configuration
        by YANG models. This document therefore defines a minimal YANG model
        with fundamental parameters. An important use case is the TCP
        configuration on network elements such as routers, which often use YANG
        data models. The model therefore specifies TCP parameters that are
        important on such TCP stacks.</t>

        <t>This in particular applies to the support of <xref
        target="RFC5925">TCP-AO</xref>. TCP Authentication Option (TCP-AO) is
        used on routers to secure routing protocols such as BGP. In that case,
        a YANG model for TCP-AO configuration is required. The model defined
        in this document includes the required parameters for TCP-AO
        configuration, such as the values of SendID and RecvID. The
        keychain for TCP-AO can be modeled by the <xref target="RFC8177">YANG
        Data Model for Key Chains</xref>. The groupings defined in this document
        can be imported and used as part of such a preconfiguration.</t>

        <t>Given an installed base, the model also allows enabling of the
        legacy <xref target="RFC2385">TCP MD5</xref> signature option.
        The TCP MD5 signature option was obsoleted by TCP-AO in 2010. If current
        implementations require TCP authentication, it is RECOMMENDED to use 
        <xref target="RFC5925">TCP-AO</xref>.</t>

        <t>Similar to the <xref target="RFC4022">TCP MIB</xref>, this document
        also specifies basic statistics, a TCP connection list, and a TCP listener
        list.</t>

        <t><list style="symbols">
            <t>Statistics: Counters for the number of active/passive opens,
            sent and received TCP segments, errors, and possibly other detailed
            debugging information</t>

            <t>TCP connection list: Access to status information for all TCP
            connections. Note, the connection table is modeled as a list 
	    that is read-writeable, even though a connection cannot be
	    created by adding entries to the table. Similarly, deletion
	    of connections from this list is implementation-specific.</t>

            <t>TCP listener list: A list containing information about
            TCP listeners, i.e., applications willing to accept connections.</t>
          </list></t>

        <t>This allows implementations of <xref target="RFC4022">TCP
        MIB</xref> to migrate to the YANG model defined in this memo.
        Note that the TCP MIB does not include means to reset statistics, which
        are defined in this document. This is not a major addition, as a reset
        can simply be implemented by storing offset values for the counters.</t>

        <t>This version of the module does not model details of
        <xref target="RFC8684">Multipath TCP</xref>. This could be addressed
        in a later version of this document.</t>
      </section>

      <section title="Model Design">
        <t>The YANG model defined in this document includes definitions from
        the <xref target="I-D.ietf-netconf-tcp-client-server">YANG Groupings
        for TCP Clients and TCP Servers</xref>. Similar to that model, this
        specification defines YANG groupings. This allows reuse of these
        groupings in different YANG data models. It is intended that these
        groupings will be used either standalone or for TCP-based protocols as
        part of a stack of protocol-specific configuration models. An example
        could be the <xref target="I-D.ietf-idr-bgp-model">BGP YANG Model for
        Service Provider Networks </xref>.</t>
      </section>

      <section title="Tree Diagram">
        <t>This section provides an abridged tree diagram for the YANG
        module defined in this document. Annotations used in the
        diagram are defined in <xref target="RFC8340">YANG Tree
        Diagrams </xref>. A complete tree diagram can be found in the
        Appendix.</t>

        <figure>
          <artwork><![CDATA[
module: ietf-tcp
  +--rw tcp!
     +--rw connections
     |     ...
     +--ro tcp-listeners* [type address port]
     |     ...
     +--ro statistics {statistics}?
           ...

  augment /key-chain:key-chains/key-chain:key-chain/key-chain:key:
    +--rw authentication {authentication}?
       +--rw keychain?    key-chain:key-chain-ref
       +--rw (authentication)?
             ...
]]></artwork>
        </figure>
      </section>
    </section>

    <section title="TCP YANG Model">
      <t>This YANG module references <xref target="RFC5925">
      The TCP Authentication Option</xref>, <xref target="RFC2385">
      Protection of BGP Sessions via the TCP MD5 Signature</xref>,
      <xref target="RFC9293">Transmission Control
      Protocol (TCP) Specification</xref>,
      and imports <xref target="RFC6991">Common YANG Data Types
      </xref>, <xref target="RFC8341">The NETCONF Access Control
      Model</xref>, and <xref target="I-D.ietf-netconf-tcp-client-server">
      YANG Groupings for TCP Clients and TCP Servers</xref>.</t>

      <t><figure>
          <artwork><![CDATA[
<CODE BEGINS> file "ietf-tcp@2022-08-31.yang"

module ietf-tcp {
  yang-version "1.1";
  namespace "urn:ietf:params:xml:ns:yang:ietf-tcp";
  prefix "tcp";

  import ietf-yang-types {
    prefix "yang";
    reference
      "RFC 6991: Common YANG Data Types.";
  }
  import ietf-tcp-common {
    prefix "tcpcmn";
    reference
      "I-D.ietf-netconf-tcp-client-server: YANG Groupings for TCP
       Clients and TCP Servers.";
  }
  import ietf-inet-types {
    prefix "inet";
    reference
      "RFC 6991: Common YANG Data Types.";
  }
  import ietf-netconf-acm {
    prefix nacm;
    reference
      "RFC 8341: Network Configuration Access Control Model";
  }
  import ietf-key-chain {
    prefix key-chain;
    reference
      "RFC 8177: YANG Key Chain.";
  }

  organization
    "IETF TCPM Working Group";

  contact
    "WG Web:   <https://datatracker.ietf.org/wg/tcpm/about>
     WG List:  <tcpm@ietf.org>

     Authors: Michael Scharf (michael.scharf at hs-esslingen dot de)
              Mahesh Jethanandani (mjethanandani at gmail dot com)
              Vishal Murgai (vmurgai at gmail dot com)";

  description
    "This module focuses on fundamental TCP functions and basic
     statistics. The model can be augmented to address more advanced
     or implementation specific TCP features.

     Copyright (c) 2022 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision "2022-08-31" {
    description
      "Initial Version";
    reference
      "RFC XXXX, A YANG Model for Transmission Control Protocol (TCP)
                 Configuration and State.";
  }

  // Typedefs
  typedef mss {
    type uint16;
    description
      "Type definition for Maximum Segment Size.";
  }

  // Features
  feature statistics {
    description
      "This implementation supports statistics reporting.";
  }

  feature authentication {
    description
      "This implementation supports authentication.";
  }

  // Identities
  identity aes-128 {
    base key-chain:crypto-algorithm;
    description
      "AES128 authentication algorithm.";
  }

  // TCP-AO Groupings

  grouping ao {
    leaf send-id {
      type uint8 {
        range "0..max";
      }
      description
        "The SendID is inserted as the KeyID of the TCP-AO option
         of outgoing segments. In a consistent configuration, the
         SendID matches the RecvID at the other endpoint.";
      reference
        "RFC 5925: The TCP Authentication Option, Section 3.1.";
    }

    leaf recv-id {
      type uint8 {
        range "0..max";
      }
      description
        "The RecvID is matched against the TCP-AO KeyID of incoming
         segments. In a consistent configuration, the RecvID matches
         the SendID at the other endpoint.";
      reference
        "RFC 5925: The TCP Authentication Option, Section 3.1.";
    }

    leaf include-tcp-options {
      type boolean;
      default true;
      description
        "When set to true, TCP options are included in MAC
         calculation.";
      reference
        "RFC 5925: The TCP Authentication Option, Section 3.1.";
    }

    leaf accept-key-mismatch {
      type boolean;
      description
        "Accept, when set to true, TCP segments with a Master Key
         Tuple (MKT) that is not configured.";
      reference
        "RFC 5925: The TCP Authentication Option, Section 7.3.";
    }

    leaf r-next-key-id {
      type uint8;
      config false;
      description
        "A field indicating the Master Key Tuple (MKT) that is ready
         at the sender to be used to authenticate received segments,
         i.e., the desired 'receive next' key ID.";
      reference
        "RFC 5925: The TCP Authentication Option.";
    }

    description
      "Authentication Option (AO) for TCP.";
    reference
      "RFC 5925: The TCP Authentication Option.";
  }

  // TCP configuration

  container tcp {
    presence "The container for TCP configuration.";

    description
      "TCP container.";

    container connections {
      list connection {
        key "local-address remote-address local-port remote-port";

        leaf local-address {
          type inet:ip-address;
          description
            "Identifies the address that is used by the local
             endpoint for the connection, and is one of the four
             elements that form the connection identifier.";
        }

        leaf remote-address {
          type inet:ip-address;
          description
            "Identifies the address that is used by the remote
             endpoint for the connection, and is one of the four
             elements that form the connection identifier.";
        }

        leaf local-port {
          type inet:port-number;
          description
            "Identifies the local TCP port used for the connection,
             and is one of the four elements that form the
             connection identifier.";
        }

        leaf remote-port {
          type inet:port-number;
          description
            "Identifies the remote TCP port used for the connection,
             and is one of the four elements that form the
             connection identifier.";
        }

        leaf mss {
          type mss;
          description
            "Maximum Segment Size (MSS) desired on this connection.
             Note, the 'effective send MSS' can be smaller than
             what is configured here.";
          reference
            "RFC 9293: Transmission Control Protocol (TCP)
                       Specification.";
        }

        leaf pmtud {
          type boolean;
          default false;
          description
            "Turns Path Maximum Transmission Unit Discovery (PMTUD)
             on (true) or off (false).";
          reference
            "RFC 9293: Transmission Control Protocol (TCP)
                       Specification.";
        }

        uses tcpcmn:tcp-common-grouping;

        leaf state {
          type enumeration {
            enum closed {
              value 1;
              description
                "Connection is closed. Connections in this state
                 may not appear in this list.";
            }
            enum listen {
              value 2;
              description
                "Represents waiting for a connection request from any
                 remote TCP peer and port.";
            }
            enum syn-sent {
              value 3;
              description
                "Represents waiting for a matching connection request
                 after having sent a connection request.";
            }
            enum syn-received {
              value 4;
              description
                "Represents waiting for a confirming connection
                 request acknowledgment after having both received
                 and sent a connection request.";
            }
            enum established {
              value 5;
              description
                "Represents an open connection, data received can be
                 delivered to the user. The normal state for the data
                 transfer phase of the connection.";
            }
            enum fin-wait-1 {
              value 6;
              description
                "Represents waiting for a connection termination
                 request from the remote TCP peer, or an
                 acknowledgment of the connection termination request
                 previously sent.";
            }
            enum fin-wait-2 {
              value 7;
              description
                "Represents waiting for a connection termination
                 request from the remote TCP peer.";
            }
            enum close-wait {
              value 8;
              description
                "Represents waiting for a connection termination
                 request from the local user.";
            }
            enum last-ack {
              value 9;
              description
                "Represents waiting for an acknowledgment of the
                 connection termination request previously sent to
                 the remote TCP peer (this termination request sent
                 to the remote TCP peer already included an
                 acknowledgment of the termination request sent from
                 the remote TCP peer)";
            }
            enum closing {
              value 10;
              description
                "Represents waiting for a connection termination
                 request acknowledgment from the remote TCP peer.";
            }
            enum time-wait {
              value 11;
              description
                "Represents waiting for enough time to pass to be
                 sure the remote TCP peer received the acknowledgment
                 of its connection termination request, and to avoid
                 new connections being impacted by delayed segments
                 from previous connections.";
            }
          }
          config false;
          description
            "The state of this TCP connection.";
        }
        description
          "List of TCP connections with their parameters.

           The list is modeled as writeable even though only some of
           the nodes are writeable, e.g. keepalive. Connections
           that are created and match this list SHOULD apply the
           writeable parameters. At the same time, implementations
           may not allow creation of new TCP connections simply by
           adding entries to the list. Furthermore, the behavior
           upon removal is implementation-specific. Implementations
           may not support closing or resetting a TCP connection
           upon an operation that removes the entry from the list.

           The operational state of this list SHOULD reflect
           connections that have configured, but not created, and
           connections that have been created. Connections in
           CLOSED state are not reflected on this list.";
      }
      description
        "A container of all TCP connections.";
    }

    list tcp-listeners {
      key "type address port";
      config false;

      description
        "A table containing information about a particular
         TCP listener.";

      leaf type {
        type inet:ip-version;
        description
          "The address type of address.  The value
           should be unspecified (0) if connection initiations
           to all local IP addresses are accepted.";
      }

      leaf address {
        type union {
          type inet:ip-address;
          type string;
        }
        description
          "The local IP address for this TCP connection.

           The value of this node can be represented in three
           possible ways, depending on the characteristics of the
           listening application:

           1. For an application willing to accept both IPv4 and
              IPv6 datagrams, the value of this node must be
              ''h (a zero-length octet-string), with the value
              of the corresponding 'type' object being
              unspecified (0).

           2. For an application willing to accept only IPv4 or
              IPv6 datagrams, the value of this node must be
              '0.0.0.0' or '::' respectively, with
              'type' representing the appropriate address type.

           3. For an application which is listening for data
              destined only to a specific IP address, the value
              of this node is the specific local address, with
              'type' representing the appropriate address type.";
      }

      leaf port {
        type inet:port-number;
        description
          "The local port number for this TCP connection.";
      }
    }

    container statistics {
      if-feature statistics;
      config false;

      leaf active-opens {
        type yang:counter64;
        description
          "The number of times that TCP connections have made a
           direct transition to the SYN-SENT state from the CLOSED
           state.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf passive-opens {
        type yang:counter64;
        description
          "The number of times TCP connections have made a direct
           transition to the SYN-RCVD state from the LISTEN state.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf attempt-fails {
        type yang:counter64;
        description
          "The number of times that TCP connections have made a
           direct transition to the CLOSED state from either the
           SYN-SENT state or the SYN-RCVD state, plus the number of
           times that TCP connections have made a direct transition
           to the LISTEN state from the SYN-RCVD state.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf establish-resets {
        type yang:counter64;
        description
          "The number of times that TCP connections have made a
           direct transition to the CLOSED state from either the
           ESTABLISHED state or the CLOSE-WAIT state.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf currently-established {
        type yang:gauge32;
        description
          "The number of TCP connections for which the current state
           is either ESTABLISHED or CLOSE-WAIT.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf in-segments {
        type yang:counter64;
        description
          "The total number of TCP segments received, including those
           received in error. This count includes TCP segments
           received on currently established connections.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf out-segments {
        type yang:counter64;
        description
          "The total number of TCP segments sent, including those on
           current connections but excluding those containing only
           retransmitted octets.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf retransmitted-segments {
        type yang:counter64;
        description
          "The total number of TCP segments retransmitted; that is,
           the number of TCP segments transmitted containing one or
           more previously transmitted octets.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf in-errors {
        type yang:counter64;
        description
          "The total number of TCP segments received in error
           (e.g., bad TCP checksums).";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf out-resets {
        type yang:counter64;
        description
          "The number of TCP segments sent containing the RST flag.";
        reference
          "RFC 9293: Transmission Control Protocol (TCP)
                     Specification.";
      }

      leaf auth-failures {
        if-feature authentication;
        type yang:counter64;
        description
          "The number of times that authentication has failed either
           with TCP-AO or MD5.";
      }

      action reset {
        nacm:default-deny-all;
        description
          "Reset statistics action command.";
        input {
          leaf reset-at {
            type yang:date-and-time;
            description
              "Time when the reset action needs to be
               executed.";
          }
        }
        output {
          leaf reset-finished-at {
            type yang:date-and-time;
            description
              "Time when the reset action command completed.";
          }
        }
      }
      description
        "Statistics across all connections.";
    }
  }

  augment "/key-chain:key-chains/key-chain:key-chain/key-chain:key" {
    description
      "Augmentation of the key-chain model to add TCP-AO and TCP-MD5
       authentication.";

    container authentication {
      if-feature authentication;
      leaf keychain {
        type key-chain:key-chain-ref;
        description
          "Reference to the key chain that will be used by
           this model. Applicable for TCP-AO and TCP-MD5
           only";
        reference
          "RFC 8177: YANG Key Chain.";
      }

      choice authentication {
        container ao {
          presence "Presence container for all TCP-AO related" +
                   " configuration";
          uses ao;
          description
            "Use TCP-AO to secure the connection.";
        }

        container md5 {
          presence "Presence container for all MD5 related" +
                   " configuration";
          description
            "Use TCP-MD5 to secure the connection. As the TCP MD5
             signature option is obsoleted by TCP-AO, it is
             RECOMMENDED to use TCP-AO instead.";
          reference
            "RFC 2385: Protection of BGP Sessions via the TCP MD5
                       Signature.";
        }
        description
          "Choice of TCP authentication.";
      }
      description
        "Authentication definitions for TCP configuration.
         This includes parameters such as how to secure the
         connection, that can be part of either the client
         or server.";
    }
  }
}

<CODE ENDS>]]></artwork>
        </figure></t>
    </section>

    <section anchor="IANA" title="IANA Considerations">
      <section title="The IETF XML Registry">
        <t>This document registers an URI in the "ns" subregistry of the
        <xref target="RFC3688">IETF XML Registry </xref>. Following the format
        in <xref target="RFC3688">IETF XML Registry </xref>, the following
        registration is requested:</t>

        <t><figure>
            <artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-tcp
   Registrant Contact: The IESG.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork>
          </figure></t>
      </section>

      <section title="The YANG Module Names Registry">
        <t>The following entry is requested to be added to the
        "YANG Module Names" registry created by
        <xref target="RFC6020">YANG - A Data Modeling Language for
        the Network Configuration Protocol (NETCONF)</xref>:</t>

        <t><figure>
            <artwork><![CDATA[
   name:         ietf-tcp
   namespace:    urn:ietf:params:xml:ns:yang:ietf-tcp
   prefix:       tcp
   reference:    RFC XXXX (this document)
]]></artwork>
          </figure></t>
        <t>The registration is not maintained by IANA.</t>
      </section>
    </section>

    <section anchor="Security" title="Security Considerations">
      <t>The YANG module specified in this document defines a schema for data
      that is designed to be accessed via network management protocols such as
      <xref target="RFC6241">NETCONF</xref> or <xref target="RFC8040">RESTCONF
      </xref>. The lowest NETCONF layer is the secure transport layer, and the
      mandatory-to-implement secure transport is Secure Shell (SSH) described
      in <xref target="RFC6242">Using the NETCONF protocol over SSH </xref>.
      The lowest RESTCONF layer is HTTPS, and the mandatory-to-implement
      secure transport is <xref target="RFC8446">TLS </xref>.</t>

      <t>The <xref target="RFC8341">Network Configuration Access Control Model
      (NACM) </xref> provides the means to restrict access for particular
      NETCONF or RESTCONF users to a preconfigured subset of all available
      NETCONF or RESTCONF protocol operations and content.</t>

      <t>There are a number of data nodes defined in this YANG module that are
      writable/creatable/deletable (i.e., "config true", which is the
      default). These data nodes may be considered sensitive or vulnerable in
      some network environments. Write operations (e.g., edit-config) to these
      data nodes without proper protection can have a negative effect on
      network operations. These are the subtrees and data nodes and their
      sensitivity/vulnerability:</t>

      <t><list style="symbols">
        <t>Common configuration included from
        <xref target="I-D.ietf-netconf-tcp-client-server">NETCONF Client
	and Server Models </xref>. Unrestricted
        access to all the nodes, e.g., keepalive idle-timer,
        can cause connections to fail or to timeout prematurely.</t>

        <t>Authentication configuration. Unrestricted access to the nodes under
        authentication configuration can prevent the use of authenticated
        communication and cause connection setups to fail. This can result
        in massive security vulnerabilities and service disruption for the
        traffic requiring authentication.</t>
      </list></t>

      <t>Some of the readable data nodes in this YANG module may be considered
      sensitive or vulnerable in some network environments. It is thus
      important to control read access (e.g., via get, get-config, or
      notification) to these data nodes. These are the subtrees and data nodes
      and their sensitivity/vulnerability:</t>

      <t><list style="symbols">
          <t>Unrestricted access to connection information of the client or
          server can be used by a malicious user to launch an attack.</t>

          <t>Similarly, unrestricted access to statistics of the client or
          server can be used by a malicious user to exploit any
          vulnerabilities of the system.</t>
        </list></t>

      <t>Some of the RPC operations in this YANG module may be considered
      sensitive or vulnerable in some network environments. It is thus
      important to control access to these operations. These are the
      operations and their sensitivity/vulnerability:</t>

      <t><list style="symbols">
          <t>The YANG module allows for the statistics to be cleared by
          executing the reset action. This action should be restricted to
          users with the right permission.</t>
        </list></t>

      <t>The module specified in this document supports MD5 to basically
      accommodate the installed BGP base.  MD5 suffers from the security
      weaknesses discussed in Section 2 of <xref target="RFC6151">RFC 6151</xref>
      or Section 2.1 of <xref target="RFC6952">RFC 6952</xref>.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include='reference.RFC.2119.xml'?>

      <?rfc include='reference.RFC.2385.xml'?>

      <?rfc include='reference.RFC.3688.xml'?>

      <?rfc include='reference.RFC.5925.xml'?>

      <?rfc include='reference.RFC.6020.xml'?>

      <?rfc include='reference.RFC.6241.xml'?>

      <?rfc include='reference.RFC.6242.xml'?>

      <?rfc include='reference.RFC.6991.xml'?>

      <?rfc include='reference.RFC.7950.xml'?>

      <?rfc include='reference.RFC.8040.xml'?>

      <?rfc include='reference.RFC.8174.xml'?>

      <?rfc include='reference.RFC.8177.xml'?>

      <?rfc include='reference.RFC.8340.xml'?>

      <?rfc include='reference.RFC.8341.xml'?>

      <?rfc include='reference.RFC.8342.xml'?>

      <?rfc include='reference.RFC.8446.xml'?>

      <xi:include href="https://www.rfc-editor.org/refs/bibxml/reference.RFC.9293.xml"/>

      <?rfc include='reference.I-D.ietf-netconf-tcp-client-server.xml'?>
    </references>

    <references title="Informative References">
      <?rfc include='reference.RFC.4022.xml'?>

      <?rfc include='reference.RFC.4364.xml'?>

      <?rfc include='reference.RFC.4898.xml'?>

      <?rfc include='reference.RFC.6151.xml'?>

      <?rfc include='reference.RFC.6643.xml'?>

      <?rfc include='reference.RFC.6952.xml'?>

      <?rfc include='reference.RFC.8512.xml'?>

      <?rfc include='reference.RFC.8513.xml'?>

      <?rfc include='reference.RFC.8519.xml'?>

      <?rfc include='reference.RFC.8684.xml'?>

      <?rfc include='reference.RFC.8783.xml'?>

      <?rfc include='reference.RFC.9182.xml'?>

      <?rfc include='reference.RFC.9235.xml'?>

      <?rfc include='reference.I-D.ietf-idr-bgp-model.xml'?>

      <?rfc include='reference.I-D.ietf-taps-interface.xml'?>

      <?rfc include='reference.I-D.ietf-i2nsf-capability-data-model.xml'?>

      <?rfc include='reference.I-D.ietf-i2nsf-nsf-facing-interface-dm.xml'?>
    </references>

    <section anchor="app_ack" title="Acknowledgements">
      <t>Michael Scharf was supported by the StandICT.eu project, which is
      funded by the European Commission under the Horizon 2020 Programme.</t>

      <t>The following persons have contributed to this document by
      reviews (in alphabetical order): Mohamed Boucadair, Gorry Fairhurst,
      Jeffrey Haas, and Tom Petch.</t>
    </section>

    <section title="Examples">
      <section title="Keepalive Configuration">
        <t>This particular example demonstrates how both a particular
        connection can be configured for keepalives.</t>

        <t><figure>
            <artwork><![CDATA[
NOTE: '\' line wrapping per RFC 8792

<?xml version="1.0" encoding="UTF-8"?>
<!--
This example shows how TCP keepalive, MSS and PMTU can be configured \

for a given connection. An idle connection is dropped after
idle-time + (max-probes * probe-interval).
-->
<tcp
    xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp">
  <connections>
    <connection>
      <local-address>192.0.2.1</local-address>
      <remote-address>192.0.2.2</remote-address>
      <local-port>1025</local-port>
      <remote-port>22</remote-port>
      <mss>1400</mss>
      <pmtud>true</pmtud>
      <keepalives>
	<idle-time>5</idle-time>
	<max-probes>5</max-probes>
	<probe-interval>10</probe-interval>
      </keepalives>
    </connection>
  </connections>
</tcp>

]]></artwork>
          </figure></t>
      </section>

      <section title="TCP-AO Configuration">
        <t>The following example demonstrates how to model a <xref
        target="RFC5925">TCP-AO</xref> configuration for the example in <xref
        target="RFC9235">TCP-AO Test Vectors</xref>. The
        IP addresses and other parameters are taken from the test vectors.</t>

        <t><figure>
            <artwork><![CDATA[
NOTE: '\' line wrapping per RFC 8792

<?xml version="1.0" encoding="UTF-8"?>
<!--
This example sets TCP-AO configuration parameters as
demonstrated by examples in draft-ietf-tcpm-ao-test-vectors.
-->

<key-chains
    xmlns="urn:ietf:params:xml:ns:yang:ietf-key-chain">
  <key-chain>
    <name>ao-config</name>
    <description>"An example for TCP-AO configuration."</description>\

    <key>
      <key-id>55</key-id>
      <lifetime>
        <send-lifetime>
          <start-date-time>2017-01-01T00:00:00Z</start-date-time>
          <end-date-time>2017-02-01T00:00:00Z</end-date-time>
        </send-lifetime>
        <accept-lifetime>
          <start-date-time>2016-12-31T23:59:55Z</start-date-time>
          <end-date-time>2017-02-01T00:00:05Z</end-date-time>
        </accept-lifetime>
      </lifetime>
      <crypto-algorithm
	  xmlns:tcp=
	  "urn:ietf:params:xml:ns:yang:ietf-tcp">tcp:aes-128</crypto-algorit\
hm>
      <key-string>
	<keystring>testvector</keystring>
      </key-string>
      <authentication
	  xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp">
	<keychain>ao-config</keychain>
	<ao>
	  <send-id>65</send-id>
	  <recv-id>87</recv-id>
	</ao>
      </authentication>
    </key>
    <key>
      <key-id>56</key-id>
      <lifetime>
        <send-lifetime>
          <start-date-time>2017-01-01T00:00:00Z</start-date-time>
          <end-date-time>2017-02-01T00:00:00Z</end-date-time>
        </send-lifetime>
        <accept-lifetime>
          <start-date-time>2016-12-31T23:59:55Z</start-date-time>
          <end-date-time>2017-02-01T00:00:05Z</end-date-time>
        </accept-lifetime>
      </lifetime>
      <crypto-algorithm
	  xmlns:tcp=
	  "urn:ietf:params:xml:ns:yang:ietf-tcp">tcp:aes-128</crypto-algorit\
hm>
      <key-string>
	<keystring>testvector</keystring>
      </key-string>
      <authentication
	  xmlns="urn:ietf:params:xml:ns:yang:ietf-tcp">
	<keychain>ao-config</keychain>
	<ao>
	  <send-id>65</send-id>
	  <recv-id>87</recv-id>
	</ao>
      </authentication>
    </key>
  </key-chain>
</key-chains>

]]></artwork>
          </figure></t>
      </section>
    </section>

    <section title="Complete Tree Diagram">
      <t>Here is the complete tree diagram for the TCP YANG model.</t>

      <figure>
        <artwork><![CDATA[
module: ietf-tcp
  +--rw tcp!
     +--rw connections
     |  +--rw connection*
     |          [local-address remote-address local-port remote-port]
     |     +--rw local-address     inet:ip-address
     |     +--rw remote-address    inet:ip-address
     |     +--rw local-port        inet:port-number
     |     +--rw remote-port       inet:port-number
     |     +--rw mss?              mss
     |     +--rw pmtud?            boolean
     |     +--rw keepalives! {keepalives-supported}?
     |     |  +--rw idle-time         uint16
     |     |  +--rw max-probes        uint16
     |     |  +--rw probe-interval    uint16
     |     +--ro state?            enumeration
     +--ro tcp-listeners* [type address port]
     |  +--ro type       inet:ip-version
     |  +--ro address    union
     |  +--ro port       inet:port-number
     +--ro statistics {statistics}?
        +--ro active-opens?             yang:counter64
        +--ro passive-opens?            yang:counter64
        +--ro attempt-fails?            yang:counter64
        +--ro establish-resets?         yang:counter64
        +--ro currently-established?    yang:gauge32
        +--ro in-segments?              yang:counter64
        +--ro out-segments?             yang:counter64
        +--ro retransmitted-segments?   yang:counter64
        +--ro in-errors?                yang:counter64
        +--ro out-resets?               yang:counter64
        +--ro auth-failures?            yang:counter64
        |       {authentication}?
        +---x reset
           +---w input
           |  +---w reset-at?   yang:date-and-time
           +--ro output
              +--ro reset-finished-at?   yang:date-and-time

  augment /key-chain:key-chains/key-chain:key-chain/key-chain:key:
    +--rw authentication {authentication}?
       +--rw keychain?    key-chain:key-chain-ref
       +--rw (authentication)?
          +--:(ao)
          |  +--rw ao!
          |     +--rw send-id?               uint8
          |     +--rw recv-id?               uint8
          |     +--rw include-tcp-options?   boolean
          |     +--rw accept-key-mismatch?   boolean
          |     +--ro r-next-key-id?         uint8
          +--:(md5)
             +--rw md5!

]]></artwork>
      </figure>
    </section>
  </back>
</rfc>
