Re: [calsify] AD review of draft-ietf-calext-ical-relations-05

Michael Douglass <mikeadouglass@gmail.com> Tue, 15 December 2020 19:14 UTC

Return-Path: <mikeadouglass@gmail.com>
X-Original-To: calsify@ietfa.amsl.com
Delivered-To: calsify@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAC2B3A107B; Tue, 15 Dec 2020 11:14:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7UrDiKEzavZp; Tue, 15 Dec 2020 11:14:35 -0800 (PST)
Received: from mail-qk1-x72b.google.com (mail-qk1-x72b.google.com [IPv6:2607:f8b0:4864:20::72b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E8863A11D4; Tue, 15 Dec 2020 11:14:34 -0800 (PST)
Received: by mail-qk1-x72b.google.com with SMTP id b64so16252821qkc.12; Tue, 15 Dec 2020 11:14:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=KJ5VkEBC9y2qXR7bhH8nnO4P+jqJt4ncXCqXtbr3eqM=; b=f59V3+xonJflf1QWhqzwvyNvLs0Kc92zosvdrHkAWmVuw1yabevWHirnK0NwhuG8O7 W1iYHVlUYV+4+mMaUNYNjc2DDHn0VFT+9bwXiymlN/x/nv+jRLNkEZnOMB+hZ9UontBV ek72P/w+DEl3cmI9FFDYSdajVbjDdOzw93ZfE9DKbNENUd2mhUCmv4RTKd3NhjxVnFMJ evcxW0HLZZ/yAyHY3h60K3kQoDJrdLyVCF8xGUx6a6TtvEbdgIHZ9/qWCdVhfXZdLDst o/et4keTG0/OATabj/Fv94Ne0FgoNHIDGQUaGtt6xA1YFw006+b23QbkepCYA6KCABJw 7Vqw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=KJ5VkEBC9y2qXR7bhH8nnO4P+jqJt4ncXCqXtbr3eqM=; b=Lq7DDX6G4yshybB50HWiGhUn749+NxqoUVwBWeOYLo2R5NkYmlTQrEibV9iTJDlYbq 3/1cSHGprMCQEdn4/K+yFGoRqDAx39UKLHIS5uvaWqNTK0ZTQscVWxPYOSblaciAs0Pj ICXL1LggAKFFJVmizm27VOFMaf00+KyOYh7jbLG8DXybwNkt6cO2DNwmpXBnOEFUAgtI cAz6t0UlgS6k5jsOp6cRbWkpP4y8DGLaH8K40bgysok2xeM03AGX3/XywOsj8qZQpGx7 2VgfDp+XIjGhlskPnNK+B8i1OKqk94qDsvXTiXaK6fsaTumHtdXkj9tLshLI4OBVUE1V ZVdw==
X-Gm-Message-State: AOAM530/+L5EsoH6Ev69TGQxKSjgyqPQaec4YVW7tgBJtcX0VwFzkx4k UJU9FJ/aexeIQ8orj/aHBtvBfAK/nyAo/Q==
X-Google-Smtp-Source: ABdhPJy4ty1ay1bfl+QPgqdtoigtTNXsLCexSjY7AuICViNCJkiR48AIyQOS+JQFTec04ZT1ThJ8KA==
X-Received: by 2002:a37:aec2:: with SMTP id x185mr40535952qke.64.1608059673571; Tue, 15 Dec 2020 11:14:33 -0800 (PST)
Received: from MacBook-Pro-2019.local (cpe-74-70-70-237.nycap.res.rr.com. [74.70.70.237]) by smtp.googlemail.com with ESMTPSA id d9sm16679143qtm.66.2020.12.15.11.14.32 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 15 Dec 2020 11:14:32 -0800 (PST)
To: Barry Leiba <barryleiba@computer.org>
Cc: draft-ietf-calext-ical-relations.all@ietf.org, calsify@ietf.org
References: <CALaySJKAMbY8ggUCCiG4hDL7wzD9RpW8Zx3z719VhTypX6cKjg@mail.gmail.com> <7d01160e-de34-17d2-ebc9-5f8904db9f62@gmail.com> <CALaySJKbcMJTPZzc_X1Jj7sCFcbxv=hUn2Z+5+XYH9s170=amg@mail.gmail.com>
From: Michael Douglass <mikeadouglass@gmail.com>
Message-ID: <0c4d0766-d521-f20f-402d-2af84add4d3a@gmail.com>
Date: Tue, 15 Dec 2020 14:14:33 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.16; rv:78.0) Gecko/20100101 Thunderbird/78.5.1
MIME-Version: 1.0
In-Reply-To: <CALaySJKbcMJTPZzc_X1Jj7sCFcbxv=hUn2Z+5+XYH9s170=amg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/calsify/srxhTdypuWZTraXFP0MLt8P_3fc>
Subject: Re: [calsify] AD review of draft-ietf-calext-ical-relations-05
X-BeenThere: calsify@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <calsify.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/calsify>, <mailto:calsify-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/calsify/>
List-Post: <mailto:calsify@ietf.org>
List-Help: <mailto:calsify-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/calsify>, <mailto:calsify-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Dec 2020 19:14:37 -0000

I should perhaps point out that many of these issues are really due to 
the practice of requiring full replacement of an entity rather than 
having an update mechanism.

SOAP for example, explicitly requires that an unrecognized (by the 
schema) element be dropped so it's a requirement to have an update 
mechanism that doesn't require a full copy of the data. The 
specification only defines what's valid.

I've been advocating for some time (while recognising the work involved) 
that we should have a data model specification that is independent of 
the representation. Other specs defining representations would then 
effectively be mappings onto the model.

OASIS - I believe - does this with their pim - a platform independent 
model. The psm is the platform specific model which defines that mapping.

They do in fact have a pim for a large subset of the calendaring model.

https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ws-calendar#technical


On 12/15/20 13:03, Barry Leiba wrote:
> I agree that it's not up to this document to deprecate x- for
> iCalendar in general, I agree that we should probably consider a
> 5545bis, and that we might at least consider a separate doc to
> deprecate x-.  Still, I see no reason that we shouldn't *now*
> eliminate "x-" from new extensions/additions that we publish.
>
> That said, I'm not going to hold out on this point, and if the working
> group thinks it's best to leave "x-" in for now, I will still move the
> document forward.  But I'd like to hear *why* the working group think
> that (and not just "because it's still in a lot of other places as
> well").
>
> Barry
>
> On Tue, Dec 15, 2020 at 12:26 PM Michael Douglass
> <mikeadouglass@gmail.com> wrote:
>> I'm hoping to get through all your message today but I thought I'd deal with at least one point separately:
>>
>> On 11/19/20 14:08, Barry Leiba wrote:
>>
>> This is probably a good time to pay attention to BCP 178 (RFC 6648) by
>> removing the x-name construction from the ABNF (also in Section 5.1).
>>
>>
>> I agree with your point - however 6648 says
>>
>>     5.  Does not override existing specifications that legislate the use
>>         of "X-" for particular application protocols (e.g., the "x-name"
>>         token in [RFC5545]); this is a matter for the designers of those
>>         protocols.
>>
>> So 5545 in section 3.1 defines x-name
>>
>> and goes on to say:
>>
>>     Applications MUST ignore x-param and iana-param values they don't
>>     recognize.
>>
>> There are about 50 references to "x-".
>>
>> In section 3.6 I found
>>
>> Applications MUST ignore
>>     x-comp and iana-comp values they don't recognize.  Applications that
>>     support importing iCalendar objects SHOULD support all of the
>>     component types defined in this document, and SHOULD NOT silently
>>     drop any components as that can lead to user data loss.
>>
>> On a side note in section 3.6.6 I found this:
>>
>>           Note: Implementations should carefully consider whether they
>>           accept alarm components from untrusted sources, e.g., when
>>           importing calendar objects from external sources.  One
>>           reasonable policy is to always ignore alarm components that the
>>           calendar user has not set herself, or at least ask for
>>           confirmation in such a case.
>>
>>
>> and 3.8.6.1
>>
>>   Applications MUST ignore alarms with x-name
>>        and iana-token values they don't recognize.
>>
>> 3.8.8.1 and 3.8.8.2 deals with iana and x-properties
>>
>> I think what I'm working round to saying is that it's probably time to consider a replacement for 5545. In my opinion 5545+ should state up front what MUST be processed and what CAN or SHOULD be ignored (though that may differ with the protocol used)
>>
>> In the shorter term we probably at least ought to have an update which explicitly deprecates x- for 5545
>>
>>
>>
>>