Re: Referencing material behind a paywall

Brian E Carpenter <brian.e.carpenter@gmail.com> Mon, 10 December 2018 21:49 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44B8013123F for <ietf@ietfa.amsl.com>; Mon, 10 Dec 2018 13:49:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 18VzSbJ1be8E for <ietf@ietfa.amsl.com>; Mon, 10 Dec 2018 13:49:33 -0800 (PST)
Received: from mail-pl1-x634.google.com (mail-pl1-x634.google.com [IPv6:2607:f8b0:4864:20::634]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5506413123C for <ietf@ietf.org>; Mon, 10 Dec 2018 13:49:33 -0800 (PST)
Received: by mail-pl1-x634.google.com with SMTP id a14so5859575plm.12 for <ietf@ietf.org>; Mon, 10 Dec 2018 13:49:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=ktgBNSXWzey35PeT/5begnH15LpxqC1UdoTXo+3upAM=; b=KlgDqMh0Uc6apa9keOQYERurFxBMmczJhrkiISkOM6u78hJDf5Zuan5cRiuXoPdC+v n95ZJ6E2d3W/505meg5LbzgOZY4am3/AsueXHR8eOiJkQ32a3MJMk8E6crcz8IzVZl+M FlQyzWhxZY7t30sfZpV1wnwLxxiHtRL+WLRuZndhUbugCYYEYeabknVLfvXALIYazHOS sTlhle5P0q4JhKoB6GGsxvB8x+tFa+XARVQGy8hyMzo9+jOhPILRgqltM9meKdhsKXUE sO8fUGTp11GFp1ZVNBGiGdattVnGVkkJdv9P9UBxPZnfjUe9GBUOiO3DY6PuU1IQx/uG NELA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ktgBNSXWzey35PeT/5begnH15LpxqC1UdoTXo+3upAM=; b=Ed8GCWBOvpMRNMaDwdmNCGEmZdpFABQmWVhDO2c3iUZpA6Xzl5D2vCs2fED+gUArbi 18825f2uH/5xd/zSQjtxlDd01ux7+d2bnEE4TiRZoMUfjTPHEeFjivDPFvn5tdbNeR/s nW3AKmnJT4B4VM6OeOJkMfGbpajgTkH79LX2z0WpYQdVjVHH8fGkE46z7B1X44S1evkE V7jdpqFsE5XLZtCXVx6o5gAq3DhzTqS0l7n9dxjjsQei46vEw4O8TKWm38rwtxQdf8P9 jacUADGA3NUoJYLLsGqimGJcItVD2xjoUU75n16EqgFZJTkNA8adgFHWxrMQFMrPa/du x4/w==
X-Gm-Message-State: AA+aEWb1bSvzgQppSIrBo+RvcxoIYoTUGpfgQWvk5l6sBN2efYBMZJXu 9aocVjZh32BFODpLq3knjLCyh0RD9yc=
X-Google-Smtp-Source: AFSGD/WAdu6XZ3+wKoIkUuFvkb8ID3HaPAl3h4uA1w6VKC8ejl4EQA+XDapLDEj2jY6sB8uwhbBq+Q==
X-Received: by 2002:a17:902:142:: with SMTP id 60mr14065641plb.330.1544478572612; Mon, 10 Dec 2018 13:49:32 -0800 (PST)
Received: from [192.168.178.30] ([118.148.76.40]) by smtp.gmail.com with ESMTPSA id e23sm18587725pfh.68.2018.12.10.13.49.30 for <ietf@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 10 Dec 2018 13:49:31 -0800 (PST)
Subject: Re: Referencing material behind a paywall
To: ietf@ietf.org
References: <0f2e01d48e72$b9581340$2c0839c0$@olddog.co.uk> <674294a6-29fc-691e-9feb-0a885c8756d4@rfc-editor.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <34a6aea4-82ab-4c95-4537-afcc6e12b162@gmail.com>
Date: Tue, 11 Dec 2018 10:49:27 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.3
MIME-Version: 1.0
In-Reply-To: <674294a6-29fc-691e-9feb-0a885c8756d4@rfc-editor.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/IL_0oNoEwbb7DqqITDOt5gYf4i8>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Dec 2018 21:49:36 -0000

On 2018-12-11 09:41, Heather Flanagan wrote:
<snip>
> 
> Hello all,
> 
> In general, I think having an open standard normatively reference 
> paywalled material is a terrible idea. That said, at the IESG meeting in 
> Bangkok, we discussed this a bit. Ekr offered an interesting proposal 
> that would have this kind of reference be treated in a fashion similar 
> to IPR declarations. I am waiting to see a more concrete proposal along 
> these lines--and discuss it with the other streams to see if it can 
> apply to all--before I put anything in a future style guide.

I think we all agree it's a terrible idea, but the problem isn't new
and is covered for standards track documents by RFC2026 section 7.1
"Use of External Specifications". Payment isn't mentioned, but one
of the problem areas then (and ever since) was membership-required
documents, which is much the same thing as a paywall.

A register of external specifications and how to access them seems
like a good idea, as long as it remains consistent with the intent
of RFC2026. Note that RFC2026 requires that external *proprietary*
specs adhere to the IETF IPR disclosure policy.

    Brian

> 
> -Heather
> 
> 
>> -----Original Message-----
>> From: Satya Mohanty (satyamoh) <satyamoh@cisco.com>
>> Sent: 07 December 2018 17:12
>> To: Adrian Farrel <adrian@olddog.co.uk>; rtg-dir@ietf.org
>> Cc: draft-ietf-bess-evpn-df-election-framework.all@ietf.org; ietf@ietf.org; bess@ietf.org
>> Subject: Re: Rtgdir last call review of draft-ietf-bess-evpn-df-election-framework-06
>>
>> Hi Adrian,
>>
>> Thank you very much for your detailed review and comments.
>> We will take care of all the nits that you have pointed out and include the reference to the IEEE/ACM TON paper (the link you have pointed out is indeed correct).
>>
>> However, I had one query. Most of the time research journal/conference papers will be behind a paywall and there may not be a free cached copy available online.
>> How do we get across this problem?
>>
>> Best,
>> --Satya
>>
>> On 12/7/18, 7:20 AM, "Adrian Farrel" <adrian@olddog.co.uk> wrote:
>>
>>      Reviewer: Adrian Farrel
>>      Review result: Has Nits
>>      
>>      Hello,
>>      I have been selected as the Routing Directorate reviewer for this draft. The
>>      Routing Directorate seeks to review all routing or routing-related drafts as
>>      they pass through IETF last call and IESG review, and sometimes on special
>>      request. The purpose of the review is to provide assistance to the Routing ADs.
>>      For more information about the Routing Directorate, please see
>>      ?http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir Although these comments
>>      are primarily for the use of the Routing ADs, it would be helpful if you could
>>      consider them along with any other IETF Last Call comments that you receive,
>>      and strive to resolve them through discussion or by updating the draft.
>>      
>>      Document: draft-ietf-bess-evpn-df-election-framework-06.txt
>>      Reviewer: Adrian Farrel
>>      Review Date: 2018-12-07
>>      IETF LC End Date: 2018-12-18
>>      Intended Status: Standards Track
>>      
>>      Summary:
>>      
>>      This document is basically ready for publication, but has nits that should be
>>      considered prior to publication.
>>      
>>      Comments:
>>      
>>      This document addresses issues in the default election algorithm used for
>>      Designated Forwarder Election in EVPN (RFC 7432 and RFC 8124) by defining a new
>>      election algorithm and a capability to influence the election result for a
>>      VLAN, depending on the state of the associated Attachment Circuit.
>>      
>>      This is an exceptionally clear and well written document. The authors and the
>>      working group are to be congratulated.
>>      
>>      During my review I observed a number of small issues and editorial nits. I
>>      don't believe any of these is cause for discussion in the working group, but it
>>      would be sensible to resolve them before publication.
>>      
>>      Thanks and Happy Christmas,
>>      Adrian
>>      --
>>      It's Christmas.
>>      Buy someone you love a book of fairy tales.
>>      https://www.feedaread.com/profiles/8604/
>>      Available from your favourite online bookseller.
>>      Or contact me to receive a signed copy by mail.
>>      
>>      ===
>>      
>>      Major Issues:
>>       No major issues found
>>      
>>      ===
>>      
>>      Minor Issues:
>>      
>>      HRW1999 is provided as a normative reference, and from the text I can
>>      see why. But no URL (stable or otherwise) is given for the reference.
>>      Using my favorite search engine, I looked for and found a copy of
>>      the referenced document on the IEEE site behind a paywall. I don't
>>      think that will do at all. However, there is a version at
>>      https://www.microsoft.com/en-us/research/wp-content/uploads/2017/02/HRW98.pdf
>>      That appears to be dated 1998, but otherwise could be the same paper.
>>      
>>      ---
>>      
>>      When I read in Section 3...
>>      
>>         In addition, since the specification in EVPN
>>         [RFC7432] does leave several questions open as to the precise final
>>         state machine behavior of the DF election, section 3.1 describes
>>         precisely the intended behavior.
>>      
>>      ... I wondered whether this document is updating 7432 in that respect.
>>      
>>      Other features later in the document (such as section 5) confirm this.
>>      
>>      ---
>>      
>>      Notwithstanding the mention of backward compatiblity in section 6, I
>>      think it would be a good idea to include a very short section 3.2.1.
>>      
>>      3.2.1.  Backward Compatibility
>>      
>>         Legacy implementations (i.e., those that predate this specification)
>>         will not advertise the DF Election Extended Community.  That means
>>         that all other participating PEs will not receive DF preferences and
>>         will revert to the defailt algorithm without AC-Influenced DF
>>         Election.
>>      
>>         Similarly, a legacy implementation receiving a DF Election Extended
>>         Community will ignore it and will continue to use the default
>>         algorithm.
>>      
>>      ---
>>      
>>      On first reading, I missed an important subtlty in 3.2. The paragraph...
>>      
>>           - Otherwise if even a single advertisement for the type-4 route is
>>             not received with the locally configured DF Alg and capability,
>>             the default DF Election algorithm (modulus) algorithm MUST be
>>             used as in [RFC7432].
>>      
>>      ...is really important because it handles what to do if different
>>      participating PEs disagree about which algorithm to use.  Your text is
>>      perfectly fine and adequate, but the "locally configured" sort of hid
>>      it from me first time around.
>>      
>>      Maybe add a sentence to the end of the bullet point to say...
>>      
>>      "This procedure handles the case where participating PEs disagree about
>>      the DF algorithm and capability to apply."
>>      
>>      ---
>>      
>>      Section 4 introduces 8124 for the first time. It's good that this is
>>      applicable to private wire EVPN as well as 7432 EVPN. Maybe bring this
>>      into focus in the Introducion?
>>      
>>      It does make me wonder whether you are also updating 8124.
>>      
>>      ---
>>      
>>      I think section 7 is good. Since you note that the "unfair" situation
>>      may be created maliciously, should you note that there is also scope for
>>      a downgrade attach where the advertisement from one PE is hidden, the
>>      preferred algorithm is modified to any unexpected value, or any
>>      unexpected bit in the capabilities bitfield is set? I think such an
>>      attack assumes either a subversion of the PE (perhaps via its
>>      configuration) or modification of the BGP message. Thus, it is not a
>>      probable if adequate existing security mechanisms are used.
>>      
>>      ===
>>      
>>      Nits:
>>      
>>      The RFC Editor will require that the first section in the document is
>>      the Introduction.
>>      
>>      ---
>>      
>>      You use VNI and I-SID without expansion.
>>      
>>      ---
>>      
>>      2.1
>>      s/proposes/defines/
>>      
>>      ---
>>      
>>      2.3
>>      s/procedure Generally,/procedure.  Generally,/
>>      
>>      ---
>>      
>>      3.2 has
>>      
>>         For the DF election procedures to be consistent and unanimous, it is
>>         necessary that all the participating PEs agree on the DF Election
>>         algorithm and capabilities to be used.
>>      
>>      This is exactly the type of statement I was hoping for when I opened the
>>      document, so thanks. But... :-)
>>      
>>      This depends slightly on the definition of "all participating PEs". You
>>      don't need all PEs in the EVPN to use the same algorithm, only the PEs
>>      that share multi-homing connections.
>>      
>>      You also use the term in 2.1 and other places in the document, so
>>      perhaps I am worrying too much.
>>      
>>      ---
>>      
>>      4.
>>      s/the state of the server states/the server states./
>>      s/on Unix utilities rand and srand/on the Unix utilities rand and srand/
>>      
>>      ---
>>      
>>      I am not sure why you describe Wrand2 in section 4.2 because you
>>      immediately decide to not use it. Maybe you can just describe Wrand and
>>      observe that does the job?
>>      
>>      ---
>>      
>>      4.2
>>         s/HRW solves the disadvantage/HRW solves the disadvantages/
>>      
>>      
>>      
>>
>>
> 
>