Re: [aqm] [Gen-art] Gen-ART LC review of draft-ietf-grow-route-leak-problem-definition-04

Jari Arkko <jari.arkko@piuha.net> Thu, 05 May 2016 10:16 UTC

Return-Path: <jari.arkko@piuha.net>
X-Original-To: aqm@ietfa.amsl.com
Delivered-To: aqm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2EB4812B02C; Thu, 5 May 2016 03:16:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level:
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tbKEo40xZhU4; Thu, 5 May 2016 03:16:57 -0700 (PDT)
Received: from p130.piuha.net (p130.piuha.net [IPv6:2a00:1d50:2::130]) by ietfa.amsl.com (Postfix) with ESMTP id DB3CE12D0F1; Thu, 5 May 2016 03:16:56 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by p130.piuha.net (Postfix) with ESMTP id 2A8912CC6F; Thu, 5 May 2016 13:16:56 +0300 (EEST) (envelope-from jari.arkko@piuha.net)
X-Virus-Scanned: amavisd-new at piuha.net
Received: from p130.piuha.net ([127.0.0.1]) by localhost (p130.piuha.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yT1u-7HpUPfg; Thu, 5 May 2016 13:16:55 +0300 (EEST)
Received: from [127.0.0.1] (p130.piuha.net [IPv6:2a00:1d50:2::130]) by p130.piuha.net (Postfix) with ESMTP id 6E7EE2CC64; Thu, 5 May 2016 13:16:54 +0300 (EEST) (envelope-from jari.arkko@piuha.net)
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: multipart/signed; boundary="Apple-Mail=_1A23FAA7-ADFB-4045-8C33-C3EC39078763"; protocol="application/pgp-signature"; micalg="pgp-sha512"
X-Pgp-Agent: GPGMail 2.5.2
From: Jari Arkko <jari.arkko@piuha.net>
In-Reply-To: <BL2PR09MB11235603102909B6FD6ECBE084660@BL2PR09MB1123.namprd09.prod.outlook.com>
Date: Thu, 05 May 2016 06:16:55 -0400
Message-Id: <D827603D-D272-4CFE-BFA2-4C4311CBE3F5@piuha.net>
References: <41136C0E-1BA9-4855-B084-618DED1B9257@qti.qualcomm.com> <BL2PR09MB11235603102909B6FD6ECBE084660@BL2PR09MB1123.namprd09.prod.outlook.com>
To: "Sriram, Kotikalapudi (Fed)" <kotikalapudi.sriram@nist.gov>
X-Mailer: Apple Mail (2.1878.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/aqm/JYNSFuUJXfSu6Q9g2dCREIj8_Ho>
Cc: Pete Resnick <presnick@qti.qualcomm.com>, "draft-ietf-grow-route-leak-problem-definition.all@ietf.org" <draft-ietf-grow-route-leak-problem-definition.all@ietf.org>, General Area Review Team <gen-art@ietf.org>, "aqm@ietf.org" <aqm@ietf.org>
Subject: Re: [aqm] [Gen-art] Gen-ART LC review of draft-ietf-grow-route-leak-problem-definition-04
X-BeenThere: aqm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Discussion list for active queue management and flow isolation." <aqm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/aqm>, <mailto:aqm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/aqm/>
List-Post: <mailto:aqm@ietf.org>
List-Help: <mailto:aqm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/aqm>, <mailto:aqm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 May 2016 10:16:59 -0000

Many thanks for the review and changes, Sriram and Pete!

Jari

On 29 Apr 2016, at 13:02, Sriram, Kotikalapudi (Fed) <kotikalapudi.sriram@nist.gov> wrote:

> Pete,
> 
> Thank you very much for your careful reading and the detailed comments/suggestions.
> I found them all very helpful, and the new version (-05) that I just uploaded incorporates
> the changes you’ve recommended. Please take a look and let me know if I missed anything important.
> 
> https://tools.ietf.org/html/draft-ietf-grow-route-leak-problem-definition-05   (new version)
> https://www.ietf.org/rfcdiff?url2=draft-ietf-grow-route-leak-problem-definition-05   (diff)
> 
> Sriram
> 
> 
> From: Pete Resnick [mailto:presnick@qti.qualcomm.com]
> Sent: Monday, March 21, 2016 12:28 PM
> To: General Area Review Team <gen-art@ietf.org>; aqm@ietf.org; draft-ietf-grow-route-leak-problem-definition.all@ietf.org; IETF discussion list <ietf@ietf.org>
> Subject: Gen-ART LC review of draft-ietf-grow-route-leak-problem-definition-04
> 
> I am the assigned Gen-ART reviewer for this draft. The General Area
> Review Team (Gen-ART) reviews all IETF documents being processed
> by the IESG for the IETF Chair. Please treat these comments just
> like any other last call comments.
> 
> For more information, please see the FAQ at
> 
> http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq.
> 
> Document: draft-ietf-grow-route-leak-problem-definition-04
> Reviewer: Pete Resnick
> Review Date: 2016-03-21
> IETF LC End Date: 2016-03-28
> 
> Summary: This draft is on the right track but has open issues, described in this review.
> 
> Major issues:
> 
> None.
> 
> Minor issues:
> 
> ·       Figure 1, along with the discussion of it in section 3, was confusing to me. First of all, am I correct that the example displays two leaks? That is, there's the leak from AS3 to ISP2, and then there are the propagated leaks from ISP2 to the rest of the world. Also, "(P)" seems to be used as both a leaked prefix (from ISP1 through AS3 to ISP2 and then propagated from there) as well as what looks to be a normal prefix update between ISP1 and ISP2. Are all of the occurrences of "(P)" in Figure 1 identical? Or is the prefix update between ISP1 and ISP2 also a leak? What leaks is Figure 1 intended to show?
> 
> ·       In 3.1: "The leak often succeeds because...". Do you really means "succeeds" and not "occurs"? If so, what does "succeeds" mean in this context?
> 
> ·       The description in section 3.5, starting from "However", really needs a complete rewrite. It's ungrammatical to the point that I'm not really sure I understand what it is trying to say.
> 
> Nits/editorial comments:
> 
> ·       I've mentioned before that I find the "academic research paper" style a bit jarring in IETF documents. I particularly don't like the use of "we" and "us", since it's not clear whether "we" is the authors (which is how it's used in academic papers, but is inappropriate for an IETF document), the WG, the IETF, etc. Instead, I would replace all instances of "we" with "this document", or simply re-word into the passive, since a subject is rarely needed for these sentences. For example, the abstract could be rewritten as such:
> 
> A systemic vulnerability of the Border Gateway Protocol routing
> system, known as 'route leaks', has received significant attention in
> recent years. Frequent incidents that result in significant
> disruptions to Internet routing are labeled "route leaks", but to
> date a common definition of the term has been lacking. This document
> provides a working definition of route leaks, keeping in mind the
> real occurrences that have received significant attention. Further,
> this document attempts to enumerate (though not exhaustively)
> different types of route leaks based on observed events on the
> Internet. The aim is to provide a taxonomy that covers several forms
> of route leaks that have been observed and are of concern to Internet
> user community as well as the network operator community.
> 
> Please do similar edits throughout.
> 
> Similarly, the referencing of authors by name seems like bad form for an IETF document.
> 
> OLD
> This document builds on and extends earlier work in the IETF by
> Dickson [draft-dickson-sidr-route-leak-def][draft-dickson-sidr-route-
> leak-reqts].
> NEW
> This document builds on and extends earlier work in the IETF
> [draft-dickson-sidr-route-leak-def][draft-dickson-sidr-route-leak-
> reqts].
> END
> 
> OLD
> Mauch [Mauch] observes that these are
> anomalies and potentially route leaks because very large ISPs such
> as ATT, Sprint, Verizon, and Globalcrossing do not in general buy
> transit services from each other. However, he also notes that
> there are exceptions when one very large ISP does indeed buy
> transit from another very large ISP, and accordingly exceptions
> are made in his detection algorithm for known cases.
> NEW
> [Mauch] observes that these are anomalies
> and potentially route leaks because very large ISPs such as ATT,
> Sprint, Verizon, and Globalcrossing do not in general buy transit
> services from each other. However, it also notes that there are
> exceptions when one very large ISP does indeed buy transit from
> another very large ISP, and accordingly exceptions are made in its
> detection algorithm for known cases.
> END
> 
> ·       Last paragraph in section 2: I'm left wondering what sorts of things that other folks might consider leaks aren't covered by the definition. Perhaps you want to mention that?
> 
> ·       In 3.6, when you say "more specifics", are you using that as a noun to mean "more specific prefixes"? It's very hard to read in its current form.
> 
> ·       Section 5 is superfluous. I'd delete it.
> 
> ·       On a side note, I must say that the writing style of the "Example incidents" caused me quite a bit of giggling. "Examples include symmetrical book stacking, just like the Philadelphia mass turbulence of 1947, and the biggest interdimensional crossrip since the Tunguska blast of 1909 [GhostBusters1984]." Reading them aloud helps. :-) (No need for a change; they're fine as is. They just sound funny to a person not in the field.)
> 
> pr
> --
> Pete Resnick http://www.qualcomm.com/~presnick/
> Qualcomm Technologies, Inc. - +1 (858)651-4478
> 
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art