[NETCONF-597] Improve robustness of Netconf over TLS setup procedure, Fluorine SR1 Created: 14/Jan/19  Updated: 13/Aug/19

Status: Confirmed
Project: netconf
Component/s: netconf
Affects Version/s: None
Fix Version/s: None

Type: Improvement Priority: Medium
Reporter: Martin Sandberg Assignee: Unassigned
Resolution: Unresolved Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Attachments: Text File karaf.log.txt    

 Description   

While a normal, succesful setup of a southbound Netconf over TLS connection works fine, there seems to be robustness issues in ODL at unsuccessful connection attempts.

ODL is observed to go into an infinite loop of connection re-attempts when certain error conditions are met in the setup sequence. In these cases, it doesn't matter what the <max-connection-attempts> parameter is set to. It doesn't even help to delete the Netconf device from the topology data store. The device has to be deleted from the data store and then ODL restarted in order for ODL to stop attempting to connect.

A specific case when this happens is for example when keys and/or certificates haven't been properly configured in ODL. If ODL can't find a private key, it will throw an exception and immediatly try to find a key again. During these attempts, ODL will also send the initial TCP packets towards the device.

The same behavior has been observed at some other error conditions.

Some improvements to the robustness of ODL in cases like these should probably be considered.

 


Generated at Wed Feb 07 20:15:25 UTC 2024 using Jira 8.20.10#820010-sha1:ace47f9899e9ee25d7157d59aa17ab06aee30d3d.