Re: [Hipsec] Last Call: <draft-ietf-hip-rfc4843-bis-05.txt> (An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers Version 2 (ORCHIDv2)) to Proposed Standard

S Moonesamy <sm+ietf@elandsys.com> Mon, 23 June 2014 17:33 UTC

Return-Path: <sm@elandsys.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD6491B2B9F for <hipsec@ietfa.amsl.com>; Mon, 23 Jun 2014 10:33:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.441
X-Spam-Level:
X-Spam-Status: No, score=-2.441 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, RP_MATCHES_RCVD=-0.651, T_DKIM_INVALID=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d_m6Va_pR7X3 for <hipsec@ietfa.amsl.com>; Mon, 23 Jun 2014 10:33:25 -0700 (PDT)
Received: from mx.ipv6.elandsys.com (mx.ipv6.elandsys.com [IPv6:2001:470:f329:1::1]) by ietfa.amsl.com (Postfix) with ESMTP id C6D5B1B2B96 for <hipsec@ietf.org>; Mon, 23 Jun 2014 10:33:24 -0700 (PDT)
Received: from SUBMAN.elandsys.com ([197.224.135.167]) (authenticated bits=0) by mx.elandsys.com (8.14.5/8.14.5) with ESMTP id s5NHX44f021520 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 23 Jun 2014 10:33:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=opendkim.org; s=mail2010; t=1403544797; x=1403631197; bh=mLAk79eiGNIhMHLT1FTkI3MQ6mgDIoBhXWAx+eYIQ9U=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=wiGtimUsEwjBgTmfDyT868r9Pic0h0rqf0m6iwHJ1mutV4ruaW89NJDbFoXNUS17f 7twL0kJ9BF16bn1AByaUm19XDl81cMo4M9ECraem6Xlr+9X3XA6MOC0KYPK0gEQKxm hAuyfd0fEK6PCCCeb0YbA1qqK+qpqJxgekC9o8ew=
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=elandsys.com; s=mail; t=1403544797; x=1403631197; i=@elandsys.com; bh=mLAk79eiGNIhMHLT1FTkI3MQ6mgDIoBhXWAx+eYIQ9U=; h=Date:To:From:Subject:Cc:In-Reply-To:References; b=wRns70ZDSZvX3ptT6eUxqohMGxDloC5SIJt5R+5yX9FkRtXSqg5KtCJYijqK9HvqQ 2I8JUn31cIckyh/moVkLUg/MAcjQViGC8XFDJMjbEAAegabek/0YHmResU23mQ765I bu451bIjSCOQCkitE4qm7ry+oUy4HusZCiYYFxzM=
Message-Id: <6.2.5.6.2.20140623102349.0c2c19b0@elandnews.com>
X-Mailer: QUALCOMM Windows Eudora Version 6.2.5.6
Date: Mon, 23 Jun 2014 10:32:49 -0700
To: Julien Laganier <julien.ietf@gmail.com>
From: S Moonesamy <sm+ietf@elandsys.com>
In-Reply-To: <CAE_dhju4kfj=YXjJN-rMXDNd-zLy4zLawf_2jcBh26CiFSJ99A@mail.g mail.com>
References: <20140528160426.31345.98483.idtracker@ietfa.amsl.com> <6.2.5.6.2.20140607073853.0b975758@resistor.net> <CAE_dhju4kfj=YXjJN-rMXDNd-zLy4zLawf_2jcBh26CiFSJ99A@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Archived-At: http://mailarchive.ietf.org/arch/msg/hipsec/rWRg6_CoFpDh0Sh24oVonDfepP0
X-Mailman-Approved-At: Sun, 29 Jun 2014 23:51:18 -0700
Cc: HIP <hipsec@ietf.org>, Francis Dupont <fdupont@isc.org>
Subject: Re: [Hipsec] Last Call: <draft-ietf-hip-rfc4843-bis-05.txt> (An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers Version 2 (ORCHIDv2)) to Proposed Standard
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jun 2014 17:33:27 -0000

Hi Julien,

{Ted, sorry for the slow reply]

At 07:24 19-06-2014, Julien Laganier wrote:
>s/the authors/the IETF/ ?

Yes.

>HIP _was_ an experiment supported by ORCHIDs. The experiment has
>concluded and HIP is going to proposed standard, requiring a propose
>standard ORCHID, so the sixth paragraph can be adapted accordingly:
>
>OLD:
>
>ORCHIDs are
>    designed to address this situation: to allow people to experiment
>    with protocol stack extensions, such as secure overlay routing, HIP,
>    or Mobile IP privacy extensions, without requiring them to update
>    their applications.  The goal is to facilitate large-scale
>    experiments with minimum user effort.
>
>
>NEW:
>
>ORCHIDs are
>    designed to address this situation: to allow people to implement
>    protocol stack extensions, such as secure overlay routing, HIP,
>    or Mobile IP privacy extensions, without requiring them to update
>    their applications.  The goal is to facilitate large-scale
>    deployments with minimum user effort.

Ok.


> > In Section 3:
> >
> >   "Router software MUST NOT include any special handling code for
> >    ORCHIDs.  In other words, the non-routability property of ORCHIDs, if
> >    implemented, MUST be implemented via configuration and NOT by
> >    hardwired software code.  At this time, it is RECOMMENDED that the
> >    default router configuration not handle ORCHIDs in any special way.
> >    In other words, there is no need to touch existing or new routers due
> >    to ORCHIDs.  If such a reason should later appear, for example, due
> >    to a faulty implementation leaking ORCHIDs to the IP layer, the
> >    prefix can be and should be blocked by a simple configuration rule."
> >
> > There is, in my opinion, excessive usage of RFC 2119 key words in 
> the above.
> > I suggest using RFC 2119 key words for the main points.
>
>Specific suggestions would be welcome w.r.t. to what is excessive, and
>the proposed remedy.

The second RFC 2119 requirement restates the requirement in the first 
sentence.  There is then a RFC 2119 recommendation.  I am short of 
time or else I would have verified some RFCs to see how this was 
previously tackled.  I suggest having a requirement (if you want to 
have one) which states that there must be a configuration knob and 
define a default setting.  You could keep the rest of the text as an 
explanation to the reader.

>IANA considerations will be clarified based on the forthcoming IANA review.

Ok.

>This provides useful information on the need for an allocation for
>the time being, and I believe can be edited as you suggest as an
>editorial change during AUTH48 once the draft has been approved by
>IESG.

That's an unusual usage of AUTH48.  I'll defer to the Responsible 
Area Director.

Regards,
S. Moonesamy