Re: [dispatch] New version for the Alert-Info URNs draft: draft-liess-dispatch-alert-info-urns-00.txt

Adam Roach <adam@nostrum.com> Fri, 06 November 2009 14:15 UTC

Return-Path: <adam@nostrum.com>
X-Original-To: dispatch@core3.amsl.com
Delivered-To: dispatch@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2AF713A6825 for <dispatch@core3.amsl.com>; Fri, 6 Nov 2009 06:15:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.607
X-Spam-Level:
X-Spam-Status: No, score=-1.607 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, DATE_IN_PAST_12_24=0.992, HTML_MESSAGE=0.001, SPF_PASS=-0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a7SJQ8mlEB-q for <dispatch@core3.amsl.com>; Fri, 6 Nov 2009 06:15:34 -0800 (PST)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by core3.amsl.com (Postfix) with ESMTP id DD1293A6A87 for <dispatch@ietf.org>; Fri, 6 Nov 2009 06:15:33 -0800 (PST)
Received: from host-144-65.meeting.ietf.org (host-144-65.meeting.ietf.org [133.93.144.65]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id nA6EFo5d091089 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 6 Nov 2009 08:15:53 -0600 (CST) (envelope-from adam@nostrum.com)
Message-ID: <4AF36E29.8050108@nostrum.com>
Date: Fri, 06 Nov 2009 09:30:33 +0900
From: Adam Roach <adam@nostrum.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.4pre) Gecko/20090915 Thunderbird/3.0b4
MIME-Version: 1.0
To: L.Liess@telekom.de
References: <40FB0FFB97588246A1BEFB05759DC8A0038854EC@S4DE9JSAANI.ost.t-com.de>
In-Reply-To: <40FB0FFB97588246A1BEFB05759DC8A0038854EC@S4DE9JSAANI.ost.t-com.de>
Content-Type: multipart/alternative; boundary="------------080900010509080401030309"
Received-SPF: pass (nostrum.com: 133.93.144.65 is authenticated by a trusted mechanism)
Cc: anwars@avaya.com, dispatch@ietf.org, R.Jesske@telekom.de
Subject: Re: [dispatch] New version for the Alert-Info URNs draft: draft-liess-dispatch-alert-info-urns-00.txt
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dispatch>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Nov 2009 14:15:38 -0000

On 10/19/09 9:38 PM, L.Liess@telekom.de wrote:
>     - Alert-Info URNs Indications for country-specific tones
>    

While I think this is a good dimension to have, I question the wisdom of 
replicating the entire ISO 3166-1 registry in an RFC and into IANA, for 
a variety of reasons:

   1. The initial registered list -- the one in the RFC -- will rapidly
      become out of date.

   2. The IANA registry will require constant updating to match the
      changes in ISO 3166-1. This either requires the IANA to keep up
      with changes in that registry (which is a task well beyond what we
      require of them at the moment) or it requires someone to send
      notes to IANA to update the registry whenever a change is made. We
      don't really have the structure necessary to ensure that someone
      will do that.

   3. If IANA and ISO 3166-1 do become out of sync -- which would almost
      necessarily happen from time to time -- you'll end up with
      implementations selecting at random between them (which is not a
      recipe for interoperability).

   4. The selection of country codes is highly political and rife with
      land mines -- some are forseeable (e.g. tw, fk), while others
      aren't necessarily. You can try to side-step this -- like ICANN
      tries -- by claiming that we don't take codes outside of ISO
      3166-1, and that we must accept all codes in ISO 3166-1; however,
      that hasn't kept them out of occasional hot water.


I would strongly suggest simply citing ISO 3166-1, not putting any 
values in the IANA registry, and simply giving a couple of 
representative (and politically uncontroversial) examples.

/a