Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18

神明達哉 <jinmei@wide.ad.jp> Mon, 02 June 2014 16:53 UTC

Return-Path: <jinmei.tatuya@gmail.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DEA61A0360 for <dhcwg@ietfa.amsl.com>; Mon, 2 Jun 2014 09:53:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.978
X-Spam-Level:
X-Spam-Status: No, score=-0.978 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 87SG0niCrrB0 for <dhcwg@ietfa.amsl.com>; Mon, 2 Jun 2014 09:53:14 -0700 (PDT)
Received: from mail-we0-x22e.google.com (mail-we0-x22e.google.com [IPv6:2a00:1450:400c:c03::22e]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B104E1A0241 for <dhcwg@ietf.org>; Mon, 2 Jun 2014 09:53:13 -0700 (PDT)
Received: by mail-we0-f174.google.com with SMTP id k48so5461203wev.19 for <dhcwg@ietf.org>; Mon, 02 Jun 2014 09:53:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=XCe1BUA7hM8e6WUkxE0WY2g3XPTLRSczl+3NzCDVQFI=; b=uah0Id/zTHo4P0wwCOYpur86TDe5xV5+MRsItDX9fY56InMgFDHnZEvGf3fkHWPxON LEtu3HNV/Nbrg37TaDOhgklhspB1OVmPEG3Jjcyn8VWvar+ZiuCSWwIWspw8BQay/t6k BZXi+gy2wi4ON0xXVs0P+bwOKyi9bla+PvH9uapMYGFMYyXfhg/+XYVQ68kjLmB1rd/K mWUyBjtNPma+IwM0LW6TLEA5c3ae/LUCR0FU8em8EQGmlvblw28tvmu/OBC7+Do5zzZs 9ny3b0AmJqezqrISXgtmgPPJy84/nbzkOHmiuj8HViZ/JWLu0CNLQBvra3YLJ2ypZBX3 oAlw==
MIME-Version: 1.0
X-Received: by 10.194.57.225 with SMTP id l1mr51907406wjq.25.1401727986612; Mon, 02 Jun 2014 09:53:06 -0700 (PDT)
Sender: jinmei.tatuya@gmail.com
Received: by 10.194.222.7 with HTTP; Mon, 2 Jun 2014 09:53:06 -0700 (PDT)
In-Reply-To: <78B235AF-D94C-40F1-9C76-4159B3A0A043@nominum.com>
References: <535FEDAD.5010103@gmail.com> <5388F901.1000709@gmail.com> <78B235AF-D94C-40F1-9C76-4159B3A0A043@nominum.com>
Date: Mon, 02 Jun 2014 09:53:06 -0700
X-Google-Sender-Auth: Lxxlk9D3fRtvjBGDaaBLm5VGZog
Message-ID: <CAJE_bqf4UZeFifHMhM=Vo2X66+ab7cnhb19K-XD_+_pr7-VS1A@mail.gmail.com>
From: 神明達哉 <jinmei@wide.ad.jp>
To: Ted Lemon <ted.lemon@nominum.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/dhcwg/w2QTAzlj2kK8ZNUuMb_hRrNBe7A
Cc: dhcwg <dhcwg@ietf.org>
Subject: Re: [dhcwg] WGLC for draft-ietf-dhc-sedhcpv6-02 - Respond by May 18
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Jun 2014 16:53:15 -0000

At Fri, 30 May 2014 20:47:12 -0400,
Ted Lemon <ted.lemon@nominum.com> wrote:

> > I think it is important to add a section that enumerates those and
> > similar use cases. Otherwise you risk that this work will be stalled
> > and you'd be asked to write a separate problem statement document.
>
> A use case can't be theoretical.   You should have an actual use for it.

I fully agree, but then I'd wonder if all we can come up with
is theoretical use cases how we can define an effective solution to
them.

> So I think documenting use cases like a "high security network" is pointless.   The point of this mechanism is to authenticate DHCP transactions in both directions using public keys.   Why do we need a list of use cases for this?   This is something we've been asked for for over a decade.   Does someone seriously think there's a different way to do this that's more appropriate?   If so, please explain!   Does someone think that the actual uses documented in the draft won't work?   If so, please say why.

I didn't know if this (= "authenticating DHCP transactions in both
directions using public keys", correct?) is something people have
asked for over a decade, but if so, I'd like to know why they've been
asking for it, since, once I read this particular draft carefully I
realize that's not clear to me at all.  Defining a mechanism simply
because someone(s) asked for it without clear understanding of "why"
doesn't make sense to me.

One possibility is that I'm too dumb and can't just understand
something so obvious to others, in which case I'll simply shut up.

But, the fact that at least two others wanted to have use cases seems
to suggest that at least it's not only me who can't fully understand
why we need it.  And, if at least three people have difficulty in
understanding it, that probably means there are potentially may more.
So, I think this has to be documented somewhere explicitly.  Whether
it should be in the protocol document is a different question, though,
so...

> I certainly think that if people want to suggest ways of clarifying the document, that would be beneficial, but let's not get carried away throwing the kitchen sink into the document for no good reason.   That makes it slower to review and is as likely to generate controversy as quell it.

...this is fine, but in that case I'd like to see the separate
discussion and documentation first, as I already said in an earlier
message of mine:
http://www.ietf.org/mail-archive/web/dhcwg/current/msg15520.html
It doesn't make sense to me to defer the clarification of "why"
because it slows to review the "solution".

But you don't seem to like this idea either, presumably due to the
processing delay.  My understanding is, hence a brief summary of use
cases in this draft as a kind of compromise.  If the use cases are so
obvious to some people, this can be pretty simple and avoid making the
document a kitchen sink.  I actually showed one possible outline of
this addition: http://www.ietf.org/mail-archive/web/dhcwg/current/msg15526.html
We can then answer the question that many future readers of this
document (i.e., why we need this?) would have at the time of its
publication.  And, we can still minimize the processing delay by
avoiding to require a completely separate document to explain the use
cases as a prerequisite of the protocol document.

I thought it was a reasonable and pragmatic suggestion.  But if the
majority of the wg still doesn't think it worth doing, we should
probably just agree to disagree, and in which case I'll stop at that
point; I don't have a strong motivation to prevent its publication.

--
JINMEI, Tatuya