Re: [Gen-art] Gen-art LC review of draft-ietf-dime-ovli-08 - with summary
Elwyn Davies <elwynd@dial.pipex.com> Wed, 05 August 2015 05:21 UTC
Return-Path: <elwynd@dial.pipex.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3777D1B2BB0 for <gen-art@ietfa.amsl.com>; Tue, 4 Aug 2015 22:21:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HsJkC2fJHzIa for <gen-art@ietfa.amsl.com>; Tue, 4 Aug 2015 22:21:29 -0700 (PDT)
Received: from b.painless.aa.net.uk (b.painless.aa.net.uk [IPv6:2001:8b0:0:30::51bb:1e34]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 579031B2B0F for <gen-art@ietf.org>; Tue, 4 Aug 2015 22:21:29 -0700 (PDT)
Received: from ppp118-208-154-27.lns20.bne7.internode.on.net ([118.208.154.27] helo=[192.168.1.7]) by b.painless.aa.net.uk with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.77) (envelope-from <elwynd@dial.pipex.com>) id 1ZMr8p-0002Kg-5x; Wed, 05 Aug 2015 06:21:28 +0100
Message-ID: <55C19D41.4030508@dial.pipex.com>
Date: Wed, 05 Aug 2015 15:21:05 +1000
From: Elwyn Davies <elwynd@dial.pipex.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: Steve Donovan <srdonovan@usdonovans.com>, General area reviewing team <gen-art@ietf.org>, Ben Campbell <ben@nostrum.com>
References: <55B11713.1020100@dial.pipex.com> <55C0AECB.6060408@usdonovans.com>
In-Reply-To: <55C0AECB.6060408@usdonovans.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/gen-art/yQjPPgGEGtJNLN8e9zAhSTIiass>
Cc: draft-ietf-dime-ovli.all@tools.ietf.org
Subject: Re: [Gen-art] Gen-art LC review of draft-ietf-dime-ovli-08 - with summary
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Aug 2015 05:21:33 -0000
Hi, Steve and Ben. Thanks for the responses. I take it Appendix C is being fed to the bit bucket, which is fair enough, so no more issues there. Otherwise it looks mostly done. A couple of comments inline below. I'll look out for a new version when I return from the Outback in a couple of weeks. Cheers, Elwyn (just on his way to Darwin). On 04/08/2015 22:23, Steve Donovan wrote: > Elwyn, > > Please see my responses inline. > > Regards, > > Steve > > On 7/23/15 11:32 AM, Elwyn Davies wrote: >> I am the assigned Gen-ART reviewer for this draft. For background on >> Gen-ART, please see the FAQ at >> >> <http://wiki.tools.ietf.org/area/gen/trac/wiki/GenArtfaq>. >> >> Please resolve these comments along with any other Last Call comments >> you may receive. >> >> Document: draft-ietf-dime-ovli-08.txt >> Reviewer: Elwyn Davies >> Review Date: 2015/07/23 >> IETF LC End Date: 2015/07/27 >> IESG Telechat date: (if known) - >> >> Summary: Ready with nits. A very well written document - thanks. >> Some minor issues with out-of-date or OBE'd statements that need a >> bit of tweaking. > SRD> Thanks, we had a good group of people working on it. >> >> Major issues: >> >> Minor issues: >> s4.2: >> Is there a need for and consequently how would one either cancel the >> current abatement algorithm or select a different one? I guess this >> might happen if the reacting node that was running the algorithm went >> away or itself became overloaded. However I I have no idea whether >> this is a reasonable question! OK.. well I see in s5.1.1 that the >> abatement algorithm can be changed... a pointer in s4.2 would be >> useful. But could it be turned off? > SRD> OK. So... how would one turn it off if that was allowed/wanted/possible? >> >> Appendix A.3: The statements in this appendix are not 'future >> proof'. Referring to ongoing actions of the DIME WG will have little >> value in the future. Maybe something like "There is an expectation >> that <these developments> will occur and can be integrated with the >> features described in this document." > SRD> Good suggestion. OK >> >> Appendix C.1, para 1: There are some tense and past/future issues in >> this section - It is now mid 2015 and this para refers in the future >> to 'end of 2014'. Please rewrite to reflect current actualité and in >> a way that will be relevant when this is published as an RFC. > SRD> I propose removing Appendix C in its entirety. This seems to be consensus! > >> >> Appendix C.5: >>> C.5. No New Vulnerabilities >>> >>> The working group believes that DOIC is compliant with the >>> requirement to avoid introducing new vulnerabilities. However, this >>> requirement may warrant an early security expert review. >> Hmm! I fear that it would difficult to consider this draft 'ready' >> if there is no reasonable consensus that it hasn't introduced any new >> vulnerabilities. Has the security expert review actually happened? > SRD> No, a security expert review has not happened, other then > Stephen's review. Ben Campbell added: > Also, the point of the statement that the "working group believes..." > is to show working group consensus. The early review mention was > merely to try to be extra diligent. And while an _early_ review didn't > happen, I think the fact that Stephen is now the responsible AD serves > a similar purpose. > > Thanks! > > Ben. Stephen is surely a security expert so we'll leave it to him :-) >> >>> REQ 13: The solution MUST NOT introduce substantial additional work >>> for a node in an overloaded state. For example, a >>> requirement for an overloaded node to send overload >>> information every time it received a new request would >>> introduce substantial work. >>> >>> *Not Compliant*. DOIC does in fact encourage an overloaded >>> node to send an OLR in every response. The working group >>> that other mechanisms to ensure that every relevant node >>> receives an OLR would create even more work. ****[Note: >>> This >>> needs discussion.]**** >> Has this discussion occurred? Does the WG have consensus that this >> derogation from the requirements is acceptable? > SRD> Yes, there is consensus on the mechanism as defined. Fair enough. Do you think a comment about this decision in the body would help? Particularly to make sure that an overloaded node does the minimum possible. >> >> Nits/editorial comments: This is all pretty much agreed.. couple of points still below. >> >> General: s/i.e./i.e.,/ g; s/e.g./e.g.,/g >> General: Consistent use of "non-supporting" vs "non supporting" (lots >> of places) > SRD> Ok. >> >> s2, Host-Routed Requests: >> Expand acronym AVP (first use). > SRD> Ok. >> >> s5.2.1.1: >>> A host-type OCS entry is identified by the pair of >>> application-id and >>> the node's DiameterIdentity. >>> >>> A realm-type OCS entry is identified by the pair of application-id >>> and realm. >> The application-id, DiameterIdentity and realm presumably come from >> the various messages taht are being piggybacked on. A reference to >> the relevant section of the RFC that gives definitions of these (and >> which messages to get them from) would be helpful. Later... this >> issue is partially resolved by s7.3. A pointer to that section would >> be desirable. s7.3 needs a reference to where the relevant messages >> are defined. > SRD> I agree that a pointer to section 7.3 would be helpful. >> >> s5.2.1.4, last para: >>> A reporting node MUST keep an OCS entry with a validity duration of >>> zero ("0") for a period of time long enough to ensure that any non- >>> expired reacting node's OCS entry created as a result of the >>> overload >>> condition in the reporting node is deleted. >> Is it possible to offer any guidance on what constitutes 'long enough'? > SRD> Long enough is based on when all of the expiration timers in OLRs > sent by the reporting node have expired. This is, in essence, what it > already says. >> >> s5.2.2 (in Note): >>> Any extension >>> that defines a new abatement treatment must also defined the >>> interaction of the new abatement treatment with existing >>> treatments. >> s/defined/define/ > SRD> Agreed. >> >> s5.3, paras 2, 3, 5, 7 (but probably not the MUST NOT in para 6): >> In line with the text in the previous comment, I think s/MUST/must/, >> s/MAY/may/ - they are not things the protocol does > SRD> I'm agreeable to this change if the rest of the DIME group is ok. >> >> s7: >> Pointers are needed to the RFC sections that define the data types >> and the AVP syntax definition structure used in this section. > SRD> This is in the table in section 7.8. Sorry - this is just an internal pointer - I think there needs to be pointers to (?) parts of RFC 6733 where the data types (e.g. Unsigned64) and the AVP syntax used for the definitions themselves are defined. >> >> s7.3 - see comments on s5.2.1.1 above > SRD> See above comment. >> >> s8, para 6: s/Diameter identity/DiameterIdentity/ (possibly) > SRD> I'm don't see the need for the change. It's already talking > about the Destination-Host AVP, which carries the DiameterID. This is > just prose for saying that. Alright. I'll live with this. >> >> s9.2: It doesn't seem obvious to me that the values are supposed to >> have names in the registry. Surely s/b >> (e.g.) >> Feature Vector Entry Name >> Feature Vector Entry Value >> Specification... > SRD> I'm open to guidance on this. I don't have a lot of experience > in defining IANA requirements. >> >> s10.3, last para: >>> Requirement 28 [RFC7068] indicates that the overload control >>> solution >>> cannot assume that all Diameter nodes in a network are trusted, and >>> that malicious nodes not be allowed to take advantage of the >>> overload >>> control mechanism to get more than their fair share of service. >> I can't parse the last phrase of this (from "and that malicious..." >> onwards. I know what you mean.. >> Suggest s/trusted, and that/trusted. It also requires that/ > SRD> Ok. >> >> s10.4, last para: >>> At the time of this writing, the DIME working group is studying >>> requirements for adding end-to-end security features >>> [I-D.ietf-dime-e2e-sec-req] to Diameter. >> This statement has pretty much been OBE'd. the draft is in WG last >> call. I take it we can assume that the draft knows what is being >> specified: thus >>> These features, when they >>> become available, might make it easier to establish trust in non- >>> adjacent nodes for overload control purposes. >> It should be possible to make a more concrete statement here. > SRD> The work on e2e security is still in a requirements stage. As > such, we don't yet know what is being specified. At least take the WG out of the text. >> >> >> >> App C.1, para 1: s/normative references/a normative reference/ > SRD> I am proposing removing all of appendix C. OK > >> >> App D.1, para 1: s/identity/entity/ (I think) > SRD> Agreed. >
- [Gen-art] Gen-art LC review of draft-ietf-dime-ov… Elwyn Davies
- Re: [Gen-art] Gen-art LC review of draft-ietf-dim… Steve Donovan
- Re: [Gen-art] Gen-art LC review of draft-ietf-dim… Ben Campbell
- Re: [Gen-art] Gen-art LC review of draft-ietf-dim… Elwyn Davies
- Re: [Gen-art] Gen-art LC review of draft-ietf-dim… Steve Donovan
- Re: [Gen-art] Gen-art LC review of draft-ietf-dim… Jari Arkko