Re: [Dime] Proposed REQ 35 Text

Ben Campbell <ben@nostrum.com> Wed, 27 March 2013 15:28 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F84F21F84E3 for <dime@ietfa.amsl.com>; Wed, 27 Mar 2013 08:28:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.6
X-Spam-Level:
X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QAF92umcESaM for <dime@ietfa.amsl.com>; Wed, 27 Mar 2013 08:28:23 -0700 (PDT)
Received: from shaman.nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id B218221F84E0 for <dime@ietf.org>; Wed, 27 Mar 2013 08:28:22 -0700 (PDT)
Received: from [10.119.75.158] (69.147.243.203.rdns.ubiquityservers.com [69.147.243.203] (may be forged)) (authenticated bits=0) by shaman.nostrum.com (8.14.3/8.14.3) with ESMTP id r2RFSKnV073212 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Wed, 27 Mar 2013 10:28:21 -0500 (CDT) (envelope-from ben@nostrum.com)
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Ben Campbell <ben@nostrum.com>
In-Reply-To: <15534_1364396113_51530851_15534_5884_1_6B7134B31289DC4FAF731D844122B36E18562C@PEXCVZYM13.corporate.adroot.infra.ftgroup>
Date: Wed, 27 Mar 2013 10:28:11 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <636561F1-0BED-4AB2-B359-FFE0633714D3@nostrum.com>
References: <E11F7859-5062-4FF4-A731-4E5B6E2826C9@nostrum.com> <15534_1364396113_51530851_15534_5884_1_6B7134B31289DC4FAF731D844122B36E18562C@PEXCVZYM13.corporate.adroot.infra.ftgroup>
To: lionel.morand@orange.com
X-Mailer: Apple Mail (2.1503)
Received-SPF: pass (shaman.nostrum.com: 69.147.243.203 is authenticated by a trusted mechanism)
Cc: "dime@ietf.org" <dime@ietf.org>
Subject: Re: [Dime] Proposed REQ 35 Text
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dime>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Mar 2013 15:28:26 -0000

Hi Lionel,

On Mar 27, 2013, at 9:55 AM, lionel.morand@orange.com wrote:

> Hi,
>  
> Following the discussion in the meeting, here is my interpretation.
> I said during the meeting that a new application will only be able to go through existing relay and redirect agent and not through "legacy" proxies i.e. proxies not supporting/advertising the new application.
>  
> So the question is simple: in the requirement elaboration phase, are we sure that any solution based on a new App-id will be rejected?
>  
> If not: the "SHOULD" is meaningful in REQ35.
> If yes: this is a strong requirement and this must be stated somewhere in the draft.

For the record, the piggy-backed solution currently proposed also does not meet REQ35.

We don't necessarily try to prove feasibility in advance for all requirements. I'm not sure what the work group approach would be in handling a MUST level requirement that turns out to be infeasible. I suspect it would be to merely notate that we couldn't come up with a reasonable way to meet the requirement and move on. Making it a MUST means we need to try hard, though, and look for alternatives if none of our proposals meet it.

I'm also not convinced a MUST here automatically disallows an application-based approach. Other applications have to deal with relays that return just the relay app ID in the capabilities exchange. We also mentioned the possibility of a separate mechanism to handle the non-adjacent case.