[dispatch] Ops Directorate review of draft-pd-dispatch-msrp-websocket-12

"Fred Baker (fred)" <fred@cisco.com> Thu, 30 June 2016 17:57 UTC

Return-Path: <fred@cisco.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D9CE12DB2A; Thu, 30 Jun 2016 10:57:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -115.947
X-Spam-Level:
X-Spam-Status: No, score=-115.947 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.426, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hkqh_iZ6fGfr; Thu, 30 Jun 2016 10:57:17 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71A0712D91E; Thu, 30 Jun 2016 10:57:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3407; q=dns/txt; s=iport; t=1467309437; x=1468519037; h=from:to:cc:subject:date:message-id:mime-version; bh=Rj4bkLpd8LBi377qec5mfGhoYGzg0hVmPYVTp5s1aP4=; b=J1Y7GvoeBlRLrGNxgcvsOTn/KDh9Sq0YEAiTM9RxTz3twe4OKf0U1/Nx xnr5LkLk6ltd8teCQ5GQL5/Jc3A58xMdf9CDTmEpJfSC7abYaXZKXM2n/ 5yqiH413xhPgwpSbq8G+ZJzEi2UQggEFjq1LRP3cQBvmMRfXeSt3bslIZ 8=;
X-Files: signature.asc : 833
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DOBQAVXXVX/4QNJK1bgz5WgQO5R4F8hheBPjkTAQEBAQEBAWUnhE4EAWsOBQ0BgQAnBAENE4gaCMNmAQEBAQEBAQEBAQEBAQEBAQEBAQEBDg6IH4cAg0KCLwWZCwGDLYFsiSeBaogEhTyQBAEfATSDcIkwfwEBAQ
X-IronPort-AV: E=Sophos;i="5.26,553,1459814400"; d="asc'?scan'208";a="120830481"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 30 Jun 2016 17:57:16 +0000
Received: from XCH-ALN-014.cisco.com (xch-aln-014.cisco.com [173.36.7.24]) by alln-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id u5UHvGak016186 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 30 Jun 2016 17:57:16 GMT
Received: from xch-rcd-013.cisco.com (173.37.102.23) by XCH-ALN-014.cisco.com (173.36.7.24) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Thu, 30 Jun 2016 12:57:15 -0500
Received: from xch-rcd-013.cisco.com ([173.37.102.23]) by XCH-RCD-013.cisco.com ([173.37.102.23]) with mapi id 15.00.1210.000; Thu, 30 Jun 2016 12:57:15 -0500
From: "Fred Baker (fred)" <fred@cisco.com>
To: "draft-pd-dispatch-msrp-websocket.all@ietf.org" <draft-pd-dispatch-msrp-websocket.all@ietf.org>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Thread-Topic: Ops Directorate review of draft-pd-dispatch-msrp-websocket-12
Thread-Index: AQHR0vjWEmY7TvkZWUWZFVDYVLHs4A==
Date: Thu, 30 Jun 2016 17:57:15 +0000
Message-ID: <71C83619-87E7-4C92-83A0-3834A6B6931C@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3124)
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.19.64.115]
Content-Type: multipart/signed; boundary="Apple-Mail=_92F2B441-D702-41F5-B2AB-32E27654C7F3"; protocol="application/pgp-signature"; micalg="pgp-sha1"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/yID0x83a6dDuf_IRy-kGc2kt5cU>
Cc: "dispatch@ietf.org" <dispatch@ietf.org>
Subject: [dispatch] Ops Directorate review of draft-pd-dispatch-msrp-websocket-12
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jun 2016 17:57:19 -0000

I am reviewing this document as part of the Operational directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written with the intent of improving the operational aspects of the IETF drafts. Comments that are not addressed in last call may be included in AD reviews during the IESG review. Document editors and WG chairs should treat these comments just like any other last call comments.

I have a few questions regarding the document. My perception, which may or may not be correct, is that it targets down-rev protocols - http/s 1.1 and TLS 1.2, the former of which has been obsoleted and replaced and the latter is (I'm told) about to be. I'm fine with having those as options, but it seems like publishing this without references to the current technology means that it will need to be updated or replaced soon with a document that does.

Note that I am not registering these as objections; I think this is a conversation that needs to be had, but if the consensus of people more expert than myself in this technology is to stay down-rev, I'm OK with it.

> 1.  Introduction
> 
>    The WebSocket [RFC6455] protocol enables message exchange between
>    clients and servers on top of a persistent TCP connection (optionally
>    secured with TLS [RFC5246]).  The initial protocol handshake makes
>    use of HTTP [RFC7230] semantics, allowing the WebSocket protocol to
>    reuse existing HTTP infrastructure.

I understand HTTP 1.1 (which is to say "pipelined TCP"), but I was surprised to not read about RFC 7540 HTTP 2.0 (Secure TCP). Is there a reason to not allow for the latter, at least as an option?

> 3.  WebSocket Protocol Overview
> 
>    The WebSocket protocol [RFC6455] is a transport layer on top of TCP
>    (optionally secured with TLS [RFC5246]) in which both client and
>    server exchange message units in both directions.

Is this extensible to TLS 1.3, which I'm told is in the offing? That would obsolete RFC 5246.