Re: [Idr] [Technical Errata Reported] RFC4271 (5000)

"Alvaro Retana (aretana)" <aretana@cisco.com> Wed, 19 April 2017 17:56 UTC

Return-Path: <aretana@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45936129B95 for <idr@ietfa.amsl.com>; Wed, 19 Apr 2017 10:56:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LkuzA9RSDpLC for <idr@ietfa.amsl.com>; Wed, 19 Apr 2017 10:56:18 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 423DC129B5C for <idr@ietf.org>; Wed, 19 Apr 2017 10:56:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5280; q=dns/txt; s=iport; t=1492624574; x=1493834174; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=RAyCCTlBe69sDyYKUYXAzSis4uW6Y3Zmbd9gfVwXRto=; b=CseUuoPR9dXK/vNGEgkj48IL7rf/KiA4s7AqTzgZfALtX9PEQiK4ckEx z9wujPe7hqEp0NQWoGxqwsTXhxIOiAy54V+3ZfNrl6TlkzFrBavzVU/xL x05FlpM85ZP7W4bVzg+vsPfNRMBuoSjtUEDY0s46MaqVx5y0Yb0PjC8mK U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0APAQCco/dY/5RdJa1CGhkBAQEBAQEBAQEBAQcBAQEBAYNUYYELB4NgihWnRYIPLIV4AhqDaj8YAQIBAQEBAQEBax0LhRYGIxFFEAIBCBoCJgICAjAVEAIEDgWKGQ4xqXqCJoslAQEBAQEBAQEBAQEBAQEBAQEBAQEBHYELhUiBXSuBZIEKgTyBXIRFLoIxBYkzEYgOhGyGcQGJdokFggCFMYoblBABHzgVcGMVGjsBhFQMEIFjdQETh3SBDQEBAQ
X-IronPort-AV: E=Sophos;i="5.37,222,1488844800"; d="scan'208";a="234925295"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Apr 2017 17:56:13 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-12.cisco.com (8.14.5/8.14.5) with ESMTP id v3JHuD9C006224 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 19 Apr 2017 17:56:13 GMT
Received: from xch-aln-002.cisco.com (173.36.7.12) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Wed, 19 Apr 2017 12:56:12 -0500
Received: from xch-aln-002.cisco.com ([173.36.7.12]) by XCH-ALN-002.cisco.com ([173.36.7.12]) with mapi id 15.00.1210.000; Wed, 19 Apr 2017 12:56:12 -0500
From: "Alvaro Retana (aretana)" <aretana@cisco.com>
To: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC4271 (5000)
Thread-Index: AQHSuTOd8PN01POB30ic6dAk5zAQWaHNCtGA
Date: Wed, 19 Apr 2017 17:56:12 +0000
Message-ID: <88AF5CD0-3DA4-4CD0-877B-39925DC7D5F0@cisco.com>
References: <20170419173711.71458B814DA@rfc-editor.org>
In-Reply-To: <20170419173711.71458B814DA@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1f.0.170216
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.117.15.6]
Content-Type: text/plain; charset="utf-8"
Content-ID: <94AEAB7BE7CFC44B96B3CFF5FE6B050F@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/OoxowKOvWYH8ZKDITCwqIi8WsgE>
Subject: Re: [Idr] [Technical Errata Reported] RFC4271 (5000)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 17:56:21 -0000

[Cutting the distribution a little.]

[John: thanks for filing this report.]

idr WG:

As you know, changes to rfc4271 should be handled with care.  And this case is no exception.

Even if “MAY NOT” is not an rfc2119 keyword as “MAY”, “MUST NOT”, and others are, it doesn’t give me a great feeling to change it for one that is – among other things because the meaning of “MAY” and “MUST” is so different.  Of course, making me feel good is not the purpose of rfc2119… ;-)

Having said that, it is important that rfc4271 faithfully represent what the WG intended.  In this case, even though John didn’t say it explicitly, I would agree with him in considering that implementers may have already interpreted the text with the intent to not use the routes further.

I would like to get input from the WG as to the best way to handle this report.  I would specially like to hear from implementers, but all input is welcome.

The options are:

a. s/MAY NOT/may not
b. s/MAY NOT/MUST NOT
c. Rejecting the report.
d. Something else…

I will wait at least a week before proceeding.

Thanks!

Alvaro.



On 4/19/17, 1:37 PM, "RFC Errata System" <rfc-editor@rfc-editor.org> wrote:

The following errata report has been submitted for RFC4271,
"A Border Gateway Protocol 4 (BGP-4)".

--------------------------------------
You may review the report below and at:
http://www.rfc-editor.org/errata_search.php?rfc=4271&eid=5000

--------------------------------------
Type: Technical
Reported by: John Scudder <jgs@juniper.net>

Section: 9.1.1

Original Text
-------------
      If the route is learned from an external peer, then the local BGP
      speaker computes the degree of preference based on preconfigured
      policy information.  If the return value indicates the route is
      ineligible, the route MAY NOT serve as an input to the next phase
      of route selection; otherwise, the return value MUST be used as
      the LOCAL_PREF value in any IBGP readvertisement.


Corrected Text
--------------
      If the route is learned from an external peer, then the local BGP
      speaker computes the degree of preference based on preconfigured
      policy information.  If the return value indicates the route is
      ineligible, the route MUST NOT serve as an input to the next phase
      of route selection; otherwise, the return value MUST be used as
      the LOCAL_PREF value in any IBGP readvertisement.


Notes
-----
The original text uses "MAY NOT" capitalized as if it were an RFC 2119 keyword. However, RFC 2119 does not have any defined meaning for "MAY NOT". If a reader were to interpret this text as suggesting it is optional -- meaning, in effect, "the route MAY serve as an input to the next phase of route selection" -- that would be wrong and potentially problematic.

The minimal correction would be to use lower-case "may not", which makes the proper meaning reasonably clear. However, the English construct "may not" is notoriously ambiguous, therefore the proposed correction is "MUST NOT".

Instructions:
-------------
This erratum is currently posted as "Reported". If necessary, please
use "Reply All" to discuss whether it should be verified or
rejected. When a decision is reached, the verifying party  
can log in to change the status and edit the report, if necessary. 

--------------------------------------
RFC4271 (draft-ietf-idr-bgp4-26)
--------------------------------------
Title               : A Border Gateway Protocol 4 (BGP-4)
Publication Date    : January 2006
Author(s)           : Y. Rekhter, Ed., T. Li, Ed., S. Hares, Ed.
Category            : DRAFT STANDARD
Source              : Inter-Domain Routing
Area                : Routing
Stream              : IETF
Verifying Party     : IESG