RE: [Gen-art] Gen-ART Review of draft-ietf-bfd-base-08

"Eric Gray" <eric.gray@ericsson.com> Wed, 07 May 2008 18:27 UTC

Return-Path: <ietf-bounces@ietf.org>
X-Original-To: ietf-archive@megatron.ietf.org
Delivered-To: ietfarch-ietf-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 517CC28C6D0; Wed, 7 May 2008 11:27:37 -0700 (PDT)
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 327AC3A7090; Wed, 7 May 2008 11:27:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 16obk7Hie2kf; Wed, 7 May 2008 11:27:31 -0700 (PDT)
Received: from imr2.ericy.com (imr2.ericy.com [198.24.6.3]) by core3.amsl.com (Postfix) with ESMTP id 86B183A6DBA; Wed, 7 May 2008 11:26:40 -0700 (PDT)
Received: from eusrcmw750.eamcs.ericsson.se (eusrcmw750.exu.ericsson.se [138.85.77.50]) by imr2.ericy.com (8.13.1/8.13.1) with ESMTP id m47IQBbZ017080; Wed, 7 May 2008 13:26:11 -0500
Received: from eusrcmw721.eamcs.ericsson.se ([138.85.77.21]) by eusrcmw750.eamcs.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Wed, 7 May 2008 13:26:11 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Gen-art] Gen-ART Review of draft-ietf-bfd-base-08
Date: Wed, 07 May 2008 13:26:09 -0500
Message-ID: <941D5DCD8C42014FAF70FB7424686DCF0303CD50@eusrcmw721.eamcs.ericsson.se>
In-Reply-To: <9FBD0156-77A6-4156-AB2F-1E5E13D69A86@cisco.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Gen-art] Gen-ART Review of draft-ietf-bfd-base-08
Thread-Index: AciwatKgCNeV/W6jTMyhoQlepcuT4wAAd7dw
References: <02f901c8ac06$7650d7d0$ce7da40c@china.huawei.com> <9FBD0156-77A6-4156-AB2F-1E5E13D69A86@cisco.com>
From: Eric Gray <eric.gray@ericsson.com>
To: David Ward <dward@cisco.com>, Spencer Dawkins <spencer@wonderhamster.org>
X-OriginalArrivalTime: 07 May 2008 18:26:11.0511 (UTC) FILETIME=[D36DDC70:01C8B06F]
Cc: Jeffrey Haas <jhaas@pfrc.org>, Ross Callon <rcallon@juniper.net>, General Area Review Team <gen-art@ietf.org>, ietf@ietf.org, dkatz@juniper.net
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: ietf-bounces@ietf.org
Errors-To: ietf-bounces@ietf.org

David,

	I agree with Spencer on the point of "system thoughts"
verses "system states."  This may appear to be a style issue,
but it is actually simply a matter of trying to be as precise
as the language allows.  Who knows what a system "thinks"?
But it should be clear if a system is in an appropriate state.

	On the next issue, I don't understand your argument: are
you saying that you believe it is necessary to explicitly say
that "defending against operator error is out of scope"?

	Finally, Spencer's (last?) comment on use of "stronger"
is (again) not a stylistic one, but an attempt to squeeze the
little bit of precision that can be achieved in English.  It
is apparent that you believe you are saying "Using SHA1 is 
believed to have stronger security properties than MD5" (as
indeed is suggested by Spencer), but you are not (exactly).
Change the statement to "drinking milk, as opposed to chewing
rocks, leads to stonger bones" and you will see that what you
have said makes no explicit comparison between SHA1 and MD5 
(or milk and rocks, in my example).  Because the statement is
already in passive voice (whose belief is this?), and is vague
enough as it is, then we should try to fix as much of it as we 
can.

--
Eric Gray
Principal Engineer
Ericsson  

> -----Original Message-----
  --- [SNIP] ---
> 
> >   packet to the correct BFD session after it is looped back to the
> >   sender.  The contents are otherwise outside the scope of this
> >   specification.
> >
> > 6.6. Demand Mode
> >
> >   Demand mode is requested independently in each direction by virtue
of
> >   a system setting the Demand (D) bit in its BFD Control packets.
The
> >   Demand bit can only be set if both systems think the session is
up.
> >
> > Spencer (clarity): this doesn't seem quite right to me, because the

> > statement requires that my system knows what the other system  
> > thinks. Is it correct to say "a system can only set the Demand bit  
> > when a session has transitioned to UP"? It might be preferable to  
> > delete the second sentence, because the following text explains  
> > this in greater detail, anyway.
> >
> 
> DW: This appears to be a style comment on "is up" vs "has  
> transitioned to UP," right?
> 
> 
> >   The system receiving the Demand bit ceases the periodic
transmission
> >   of BFD Control packets.  If both systems are operating in Demand
> >   mode, no periodic BFD Control packets will flow in either
direction.
> >
> >   Note that this mechanism requires that the Detection Time
negotiated
> >   is greater than the round trip time between the two systems, or
the
> >   Poll mechanism will always fail.  Enforcement of this requirement
is
> >   outside the scope of this specification.
> >
> > Spencer (clarity): you're not describing a requirement, you're  
> > describing a constraint. Perhaps "Note that this mechanism will  
> > always fail unless the Detection Time negotiated is greater than  
> > the round trip time between the two systems", and drop the second  
> > sentence?
> >
> 
> DW: What we are trying to state is that BFD cannot keep an operator  
> from making a configuration error. There is a constraint due to  
> physics and a requirement that it be adhered to and ... BFD can't  
> stop anyone from doing something stupid. "Enforcing the requirement  
> to meet the constraint ..." may be clearer language although a nit.
> 
  --- [SNIP] ---

> >   transmission rate and/or the Detection Time).
> >
> > Security Considerations
> >
> >   Using SHA1 rather than MD5 is believed to have stronger security
> >   properties.  All comments about MD5 in this section also apply to
> >
> > Spencer (clarity): "stronger than"? would this be correct if it  
> > said "Using SHA1 is believed to have stronger security properties  
> > than MD5"?
> >
> >   SHA1.
> >
> 
> 
> DW: This seems a style choice.
> 
> 
> Many thanks for your thorough review.
> 
> -DWard
> _______________________________________________
> Gen-art mailing list
> Gen-art@ietf.org
> https://www.ietf.org/mailman/listinfo/gen-art
> 
_______________________________________________
IETF mailing list
IETF@ietf.org
https://www.ietf.org/mailman/listinfo/ietf