Re: [dtn] Genart last call review of draft-ietf-dtn-ipn-update-09

Rick Taylor <rick@tropicalstormsoftware.com> Wed, 07 February 2024 13:31 UTC

Return-Path: <rick@tropicalstormsoftware.com>
X-Original-To: dtn@ietfa.amsl.com
Delivered-To: dtn@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59C46C14F5FE for <dtn@ietfa.amsl.com>; Wed, 7 Feb 2024 05:31:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KTFbwYUrwuua for <dtn@ietfa.amsl.com>; Wed, 7 Feb 2024 05:31:39 -0800 (PST)
Received: from mail.tropicalstormsoftware.com (mail.tropicalstormsoftware.com [188.94.42.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E560EC14F5F6 for <dtn@ietf.org>; Wed, 7 Feb 2024 05:31:38 -0800 (PST)
Received: from tss-server1.home.tropicalstormsoftware.com ([fe80::753b:fa82:5c0:af0d]) by tss-server1.home.tropicalstormsoftware.com ([fe80::753b:fa82:5c0:af0d%10]) with mapi id 14.03.0513.000; Wed, 7 Feb 2024 13:31:33 +0000
From: Rick Taylor <rick@tropicalstormsoftware.com>
To: Felix Flentge <Felix.Flentge@esa.int>, "scott@solarnetone.org" <scott@solarnetone.org>
CC: "dtn@ietf.org" <dtn@ietf.org>
Thread-Topic: [dtn] Genart last call review of draft-ietf-dtn-ipn-update-09
Thread-Index: AQHaVVyVAdJmg16w+E63nBdSxFPhvrD3PwyAgAVWT4CAAjZngIAADh0AgAAPRAA=
Date: Wed, 07 Feb 2024 13:31:28 +0000
Message-ID: <70750018-cc0b-4005-9b7b-ff2a23139a89@tropicalstormsoftware.com>
References: <170682590663.11138.2099663199307035145@ietfa.amsl.com> <d427e715-7bf7-4e5b-9b7e-e24a8fa9261c@tropicalstormsoftware.com> <d8b8b2b3-8fa9-bda6-52b9-76a0df1e6f6b@solarnetone.org> <029e29c0-f40d-4eda-8830-a62dae68957f@tropicalstormsoftware.com> <DB7PR05MB55253A6815BEC4F2B0194DD5F7452@DB7PR05MB5525.eurprd05.prod.outlook.com>
In-Reply-To: <DB7PR05MB55253A6815BEC4F2B0194DD5F7452@DB7PR05MB5525.eurprd05.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla Thunderbird
x-originating-ip: [2a02:1648:4000:120::5]
Content-Type: text/plain; charset="utf-8"
Content-ID: <AE4EA74405E19549AD1DD468403E8AFA@home.tropicalstormsoftware.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dtn/kiOtI9r0zwMgP_WzQWVEljN1ENY>
Subject: Re: [dtn] Genart last call review of draft-ietf-dtn-ipn-update-09
X-BeenThere: dtn@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Delay Tolerant Networking \(DTN\) discussion list at the IETF." <dtn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtn>, <mailto:dtn-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtn/>
List-Post: <mailto:dtn@ietf.org>
List-Help: <mailto:dtn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtn>, <mailto:dtn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2024 13:31:43 -0000

For clarification, (and removing non DTN WG from the list)

RFC 2026 defines two processes for adjusting the status of Internet 
Standards:  Revision (section 6.3) and Retiring (section 6.4).

The ipn-update draft intends to Revise a part of RFC 7116 (the name and 
usage of the CBHE registries), and not Retire anything.

However, RFC7116 is only an informational document (and in retrospect 
should have been a Standards Track, but as an IRTF document it couldn't 
have been, and this in turn lead to the IETF DTN WG being formed), so 
RFC 2026 doesn't officially apply.

All that being said, the feedback from the IESG is that none of this is 
a problem.  "Updates RFC7116" is absolutely fine, and matches the 
intention of the WG.

Normative references (in non-IETF Standards Track documents*) to the 
non-CBHE registry sections of RFC 7116 will remain perfectly valid.

Confusing, I know... but no action required.

Rick

(*Because 7116 is an Informational RFC, IETF Standards Track RFCs may 
not normatively reference it, them's the rules)


On 07/02/2024 12:36, Felix Flentge wrote:
> FYI,
>
> CCSDS is in the process of re-confirming CCSDS 734.1-B-1 (LTP for CCSDS) as part of the 5-years review cycle. There are no updates to the normative part of the document planned; just  couple of comments and recommendations will be added. As 734.1-B-1 includes normative references to 7116 I would prefer a solution which would avoid obsoleting 7116.
>
> Regards,
> Felix
>
> -----Original Message-----
> From: dtn <dtn-bounces@ietf.org> On Behalf Of Rick Taylor
> Sent: Wednesday, February 7, 2024 12:46 PM
> To: scott@solarnetone.org
> Cc: Russ Housley <housley@vigilsec.com>; gen-art@ietf.org; draft-ietf-dtn-ipn-update.all@ietf.org; dtn@ietf.org; last-call@ietf.org
> Subject: Re: [dtn] Genart last call review of draft-ietf-dtn-ipn-update-09
>
> Hi Scott,
>
> One of the purposes of wanting to "update" RFC7116 was to absolutely clarify the situation as regards applicability with different bundle protocol versions, as you are correct that there is no IRTF/IETF guidance.
>
> The main point of discussion here is about IETF process: obsoleting IRTF documents by the IETF is considered unusual. Finding a simple way around this, such as not obsoleting 7116 is an approach we could consider, it's just a matter of determining a valid reason why the ipn update doesn't obsolete 7116.
>
> My assertion is that ipn-update could avoid obsoleting 7116 (if absolutely necessary) because 7116 could be seen as a BPv6-only document, and the ipn-update is a BPv7-only document, and hence no change of status of 7116 need be required.  This assertion was based on the following:
>
> 1. IETF BPv7 did not exist at the time of publication of IRTF RFC 7116, and 7116 explicitly mentions RFC 5050 (IRTF BPv6)
>
> 2. The part of ipn-update that impacts RFC 7116 are the "CBHE"
> registries, and Compressed Bundle Header Encoding (CBHE) is not used in BPv7.
>
>
> No matter the outcome, the WG and IESG are clear that existing IPN
> registrations in the registry created in 7116 will be remain in any
> new/renamed registry and therefore continue to be valid for
> interoperable use with BPv7.
>
> I would prefer not to "fork" the CBHE registry, and therefore prefer to
> find an alternate way through the process.  But, however undesirable
> having two possibly diverging registries may be, given the lack of
> interoperability between BPv6 and BPv7, there would be no technical
> issue with forking.
>
> It should also be noted the Russ's concern was that ipn-update only
> obsoletes some of RFC7116, and therefore an informational companion
> document perhaps should exist to cover any other affected parts of
> RFC7116, rather than the act of obsoleting 7116 per-se.
>
> I believe CCSDS are currently updating LTP, and hence those sections of
> RFC7116 may become out of date in some way.  Perhaps a CCSDS/LTP
> contributor might step forwards to help update the rest of 7116?
>
> Meanwhile, Zahed is taking the topic to the IESG to see if there is some
> pragmatic way forwards.
>
> Hope that helps?
>
> Rick
>
>
> On 06/02/2024 01:58, scott@solarnetone.org wrote:
>> Hi Rick,
>>
>> On Fri, 2 Feb 2024, Rick Taylor wrote:
>>
>>> Major Concerns:
>>>
>>> RFC 7116 is an Informational RFC, and this document, if approved, will
>>> be published an an RFC on the standards track.  It is very unusual for
>>> a standards-track RFC to update an Informational RFC.  I suggest that
>>> this document and a companion document ought to obsolete RFC 7116, where
>>> the companion document separately handles all of the non-ipn topics in
>>> RFC 7116.  The companion document can be an informational RFC.
>>>
>>> Yes, I can see your point.  We have had this problem before in the
>>> IETF WG
>>> where we have updated IRTF documents that are almost always
>>> Informational.
>>>
>>> Given RFC7116 only describes behaviours and registries for BPv6,
>> Could you provide the basis for this assertation, as there are
>> presently BP networks which are using CBHE Node Numbers for BPv7
>> operation, absent any other official guidance on the matter.  I
>> understand that RFC7116 was produced circa the period when BPv6 was
>> the most recent version, but I have been able to find no relevant
>> document delineating 7116 as BPv6 only, nor in 7116 itself.
>>
>> Thanks,
>> Scott
>>
>>> and this
>>> draft only discusses BPv7, we may be able to introduce "new" registries
>>> (with exactly the same content as the CBHE registries) for BPv7, without
>>> updating the CBHE registries, therefore not officially "obsoleting" or
>>> "updating" RFC7116. This seems a lot like the tail wagging the dog,
>>> but I
>>> can see it solving a process issue. I'll discuss with Zahed for advice.
>>>
>>>
>>> Minor Concerns:
>>>
>>> Section 3.4.3: Since these "private use" node numbers all have zero
>>> assigned
>>> the Allocator Identifier, not one can tell where the administrative
>>> domain
>>> boundaries are located.  This needs to be discussed in the Security
>>> Considerations, and this section should point to that new text. That
>>> said,
>>> the discussion in Section 5.5 is probably fine.  A node that is at
>>> the edge
>>> of an administrative domain needs to be configured to not let
>>> "private use"
>>> node numbers exit the domain.
>>>
>>> Good point.  I will review the text and add something to the security
>>> considerations, and definitely cross reference better.
>>>
>>>
>>> Section 9.1: I envision the example range being used in a manner similar
>>> to the use of Autonomous System (AS) Numbers 64496 through 64511, which
>>> are reserved for use in documentation and sample code.  Please expand
>>> the explanation to include sample code.  Likewise for the example range
>>> in Section 9.3.
>>>
>>> +1.  I think I took the same wording from one of the IANA
>>> recommendations
>>> RFCs, but valid point re Sample code.
>>>
>>>
>>> Section 9.2: I am not sure that the last row of Table 4 is needed.  At
>>> the front of the section, say that the valid range is 0 to 2^32-1.
>>>
>>> My preference was to state the max/invalid range in the table as CBOR
>>> integers are definitely 64-bit, and it felt a bit unclear your
>>> suggested way
>>> round.  Let me give it another try and see how it feels...
>>>
>>>
>>> Appendix A: It would take less space in this document to define DIGIT
>>> than to explain where to find the definition.  Adding "DIGIT = %x30-39"
>>> make the ABNF complete.
>>>
>>> +1.  I thought I was being more "correct" by referring to the ABNF
>>> sources,
>>> but I share your preference to a self-contained definition.
>>>
>>>
>>>
>>> Nits:
>>>
>>> Abstract: s/These updates update and clarify/These updates clarify/
>>>
>>> Section 3.4.2: s/ipn URIs of this form are termed "LocalNode ipn URIs"/
>>>                  /This form of ipn URI is termed a "LocalNode ipn URI"/
>>>
>>> Section 5: s/The IRTF standardisation of the experimental BPv6/
>>>              /The IRTF BPv6 experimental specification/
>>>              (The IRTF does not publish standards.)
>>>
>>> Section 5.5: s/they MUST NOT/
>>>                /"private use" node numbers associated with Default
>>> Allocator MUST NOT/
>>>
>>> Section 7.2: s/where-by/whereby/
>>>
>>> Section 7.2: s/hop by hop/hop-by-hop/
>>>
>>> All good catches!
>>>
>>> I will update and push out a new version shortly, but I will hold until
>>> after the weekend in case other reviews come back quickly, as I don't
>>> want
>>> to disturb any in-progress reviews with rapid churn.
>>>
>>> Cheers,
>>>
>>> Rick
>>>
>>>
>>>
> _______________________________________________
> dtn mailing list
> dtn@ietf.org
> https://www.ietf.org/mailman/listinfo/dtn
> This message is intended only for the recipient(s) named above. It may contain proprietary information and/or protected content. Any unauthorised disclosure, use, retention or dissemination is prohibited. If you have received this e-mail in error, please notify the sender immediately. ESA applies appropriate organisational measures to protect personal data, in case of data privacy queries, please contact the ESA Data Protection Officer (dpo@esa.int).