Re: [babel] Extension of Call for WG adoption of draft-ovsienko-babel-rfc7298bis through 2018-05-28

Denis Ovsienko <denis@ovsienko.info> Sat, 26 May 2018 19:15 UTC

Return-Path: <denis@ovsienko.info>
X-Original-To: babel@ietfa.amsl.com
Delivered-To: babel@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51D8212762F; Sat, 26 May 2018 12:15:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ovsienko.info
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aNKsTIz8fzd8; Sat, 26 May 2018 12:15:28 -0700 (PDT)
Received: from sender-of-o51.zoho.com (sender-of-o51.zoho.com [135.84.80.216]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1F4F127337; Sat, 26 May 2018 12:15:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1527362125; s=zohomail; d=ovsienko.info; i=denis@ovsienko.info; h=Date:From:To:Message-ID:In-Reply-To:References:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding; l=5579; bh=2WQUBToriTeKq9RU1AycZyL3b7ccimmZ+UO+fgw7SWE=; b=pR98SanAA7yqGOgt/WIz/orCOLhmPD6y3m0yWCRfKP2ODIc8UbwXKq2m9E1uN2ym riYl4tMNH2eFVTUkjwGIzw4kWXfrsgxKwSi+C9Rlb6ZVefN6KhVLxOT4B5k1h8tDRmO KHOkWqhX+YEUtYYaz++JPvlR/JUzrW4oZFG66Jz0=
Received: from mail.zoho.com by mx.zohomail.com with SMTP id 1527362124977118.88947248532656; Sat, 26 May 2018 12:15:24 -0700 (PDT)
Date: Sat, 26 May 2018 20:15:24 +0100
From: Denis Ovsienko <denis@ovsienko.info>
To: Babel at IETF <babel@ietf.org>, "babel-chairs@ietf.org" <babel-chairs@ietf.org>
Message-ID: <1639de07cb0.102e9f95e202547.643578535261439543@ovsienko.info>
In-Reply-To: <CAF4+nEF+u1J4FW=UQ6Tc4=P2jLWf5d7Pj94Hkw8BrdiSMPRpog@mail.gmail.com>
References: <CAF4+nEGV94Vwdoo+gG_-x-nyQcjjJtv9+JMaM_m3YuZ511_e5g@mail.gmail.com> <877eo1jf82.wl-jch@irif.fr> <2D09D61DDFA73D4C884805CC7865E6114DDC604A@GAALPA1MSGUSRBF.ITServices.sbc.com> <CAF4+nEEFfsMGTv9cp8Sbsp7=fsMKy1GejMgL+hGo3v84-tmKug@mail.gmail.com> <1638a21f72a.f115e721115322.8073557499992170629@ovsienko.info> <CAF4+nEF+u1J4FW=UQ6Tc4=P2jLWf5d7Pj94Hkw8BrdiSMPRpog@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Priority: Medium
User-Agent: Zoho Mail
X-Mailer: Zoho Mail
Archived-At: <https://mailarchive.ietf.org/arch/msg/babel/cfIjRXNW0BbpgSkAb2IEMari4dQ>
Subject: Re: [babel] Extension of Call for WG adoption of draft-ovsienko-babel-rfc7298bis through 2018-05-28
X-BeenThere: babel@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "A list for discussion of the Babel Routing Protocol." <babel.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/babel>, <mailto:babel-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/babel/>
List-Post: <mailto:babel@ietf.org>
List-Help: <mailto:babel-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/babel>, <mailto:babel-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 May 2018 19:15:31 -0000

 ---- On Thu, 24 May 2018 21:29:59 +0100 Donald Eastlake <d3e3e3@gmail.com> wrote ----   
 > Hi,  
 > Commenting at a slightly higher level, although it is obviously up to the WG whether or not to adopt this draft, the replay discussion seem good and is typical of discussions that happen on security draft that have been adopted. So, I would say that the current questions would not, by most WGs, be considered a bar to acceptance.  
 > I have attempted to review the draft. It seems clear that a lot of work went into but it is very wordy and also has a lot of justification and design background material that usually does not appear in an IETF protocol specification. The "bits-on-the-wire" and any necessary state / state-machine at the end points are usually the focus for an IETF protocol specification.     The draft seems to provide a lot of implementation options. For example, quantities that can either be implemented as per-interface or implemented per-babel-speaker -- I would have said that if there is clear need for it sometimes being per-interface, then just specify it as always being per-interface. It's an operator interface issue, which is mostly not in scope for a typical protocol specification, whether or not to provide a command to set it for all interfaces or set a default or whatever.     On cryptographic algorithms, I think it should just say what you MUST/SHOULD implement and very briefly give the necessary characteristics for the crypto algorithms. Lots of detail about algorithms considered bad by the crypto community and listing possibly good algorithms that could be used does not seem necessary. Assuming this is adopted as an IETF Proposed Standard, or whatever, any future changes will be by a document that will go through the IETF process including security review and it should just be assumed that bad algorithms won't be approved in the future. There is no need to try to give commands about future IETF actions ("MUST NOT consider hash algorithms ... meaningful attacks exist or that are commonly viewed as deprecated") since they are unnecessary and unenforceable.     I have a number of other detailed suggestions that I am sending directly to Denis.  
 >   
  
Hello Donald and all.  
  
Thank you for the thorough review. There is indeed space for improvements in this document, which I am willing to discuss. Before responding on particular points let me clarify upfront that the -00 I-D of 7298-bis was derived from the -09 (last before the RFC) 7298 I-D, and my goal was to identify and try to fix problems in the core design first. The supporting text around it right now remains mostly inherited, consequently what was good in an Experimental document in 2014 in several cases is not yet good enough in a Standards Track I-D in 2018. But it all looks workable to me.

For the points you have made above: 

* Yes, 7298-bis does not need to have all the prose from RFC 7298, which ended up in the document due to a number of reasons, some of which no longer apply. That said, from my experience on the implementation side of this fence it looks like extra reasoning/background in the right place helps to get things right in the field. It would be nice eventually to have a document that strikes the right balance, I suggest to look at this again after removing some text.

* Leaving some implementation options out may be an improvement. In particular, for the outgoing TS/PC numbers this is a necessity, other points may be considered, you are welcome to make particular suggestions.

* For Section 2.1 (MTI and optional crypto hash algorithms), if the appropriateness considerations can be left up to the IETF, that would make the job a bit easier.

For the points you have made inline in the I-D text:

* Most of the I-D front page was automatically generated by the xml2rfc tool, the user has only limited control over the output, sorry.

* I appreciate general English proof-reading, RFC 7298 I-Ds incorporated as much of it as I could get from the reviewers, and still the RFC Editor team made one more round before the publication (that round is not in the 7298-bis I-D yet).

* Section 2.4 (HMAC definition) had to appear in RFC 7298 to identify and stop a technical error that was introduced in RFC 4822 and kept propagating into other RFCs. Now that it had served its intended purpose, in 7298-bis it should be OK to have just a reference to RFC 2104.

* Section 4.1 (updates to protocol encoding -> justification) had to appear in RFC 7298 to review the options and explain the design choice. Subsequent publication of RFC 7557 (now incorporated into 6126-bis) indeed made this section less useful and this is one of the things to fix (reduce/move/remove) in 7298-bis.

* The notes on byte order conversion (sections 5.3 and 5.4 and elsewhere) can be reduced in 7298-bis without impacting the document's normative quality. They were in RFC 7298 purely because of my experience with software developers that kept getting byte order wrong. That said, it should be good enough for 7298-bis to say about byte order about as much as a typical Standards Track document.

* RFC 7298 had Table 1 because the Babel protocol registry did not exist at that time. I agree that at the current time a document like this should refer to the existing registry.

Thanks.

--   
    Denis Ovsienko