LC comments on draft-cotton-rfc4020bis-01.txt

Eric Rosen <erosen@cisco.com> Thu, 29 August 2013 19:25 UTC

Return-Path: <erosen@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71E9911E8150 for <ietf@ietfa.amsl.com>; Thu, 29 Aug 2013 12:25:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.443
X-Spam-Level:
X-Spam-Status: No, score=-10.443 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, SUBJECT_FUZZY_TION=0.156]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vou-DXNPzNtr for <ietf@ietfa.amsl.com>; Thu, 29 Aug 2013 12:24:54 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) by ietfa.amsl.com (Postfix) with ESMTP id 2D20A11E814C for <ietf@ietf.org>; Thu, 29 Aug 2013 12:24:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5557; q=dns/txt; s=iport; t=1377804294; x=1379013894; h=from:to:subject:reply-to:date:message-id; bh=ZPu+o7fmPOCEicec4HuF/TBq+42g39fVqt31ze6+ZDA=; b=agbSebOKKqUQf1UsyUmz+uXvWjnSdyqtwyqAT9USqbVKxQzN+rJ6HOCg LIscm6UBIO8t+c20YCN5T4UWeSDygkZHUOtX9ky+SxjmGVt/CDBc6g6Ll zO0yC6E2PcfXIXQOr7JroH2/7CrSuVip/82TDEdHE/kmysYjAu8He8Gwv g=;
X-IronPort-AV: E=Sophos;i="4.89,985,1367971200"; d="scan'208";a="253394269"
Received: from rcdn-core2-1.cisco.com ([173.37.113.188]) by rcdn-iport-6.cisco.com with ESMTP; 29 Aug 2013 19:24:53 +0000
Received: from erosen-linux.cisco.com (erosen-linux.cisco.com [161.44.70.34]) by rcdn-core2-1.cisco.com (8.14.5/8.14.5) with ESMTP id r7TJOqCA025297 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 29 Aug 2013 19:24:53 GMT
Received: from erosen-linux (localhost.localdomain [127.0.0.1]) by erosen-linux.cisco.com (8.13.8/8.13.8) with ESMTP id r7TJOq4c021728; Thu, 29 Aug 2013 15:24:52 -0400
From: Eric Rosen <erosen@cisco.com>
To: ietf@ietf.org
Subject: LC comments on draft-cotton-rfc4020bis-01.txt
X-Mailer: MH-E 8.3.1; nmh 1.5; GNU Emacs 24.3.1
Date: Thu, 29 Aug 2013 15:24:52 -0400
Message-ID: <21727.1377804292@erosen-linux>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: erosen@cisco.com
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Aug 2013 19:25:00 -0000

I think the procedures proposed in this draft could be simplified a bit if
we'd just focus on the actual issue, viz., that the implementation and
deployment of a new specification is completely decoupled from the progress
of that specification through the standards process.  Once any significant
deployment has begun, the codepoints used by that deployment become de facto
unavailable for future use.  The only real issue is whether we want that
codepoint usage to be recorded in a public place, or whether we want to
pretend officially that the codepoints aren't used, and just let the
conflicts arise in the field.

>From this perspective, I think the following procedures are problematic:

- Section 2, point d:  early allocation is conditioned upon whether there is
  sufficient interest in early (pre-RFC) implementation and deployment in
  the community as judged by working group chairs or ADs.

  What the WG chairs and ADs really have to judge is whether failure to
  issue an early allocation is likely to result in de facto allocation of
  a codepoint, with consequent conflicts in the future.

  Of course, there have also been many cases where the codepoint is already
  in significant deployment before any "official" request for it has been
  made; WG chairs and ADs should take notice of this fact.

- Section 3.1, step 6: "IANA makes an allocation from the appropriate
  registry, marking it as 'Temporary', valid for a period of one year from
  the date of allocation.  The date of first allocation the date of expiry
  should also be recorded in the registry and made visible to the public."

  What is the point of marking it as "temporary"?  Once the codepoint is
  placed into use, it is not any more or less temporary than any other
  codepoint; the codepoint is unavailable for future reuse as long as the
  deployments.  Any codepoint that is no longer in use can of course be
  reused, even if its allocation is not marked "temporary".

  I do not understand the idea of making the allocation "expire" after just
  one year.  Are the deployments going to disappear after one year?  If not,
  then the codepoint allocation will not expire after one year.

- Section 3.3: "If early allocations expire before the document progresses
  to the point where IANA normally makes allocations, the authors and WG
  chairs may repeat the process in section 3.1 to request renewal of the
  code points.  At most, one renewal request may be made; thus, authors
  should choose carefully when the original request is to be made."

  First, it is not up to the authors to "choose carefully" when the original
  request is to be made.  At a certain point in the implementation process,
  the codepoint is needed.  Failure to get the codepoint soon enough will
  just cause the implementors to make up their own codepoint, which will
  invariably leak out into deployment.  

  Second, there is no reason whatsoever to put a two-year limit on the early
  allocation, unless one expects that the deployments using it will
  magically disappear after two years.

  I've seen a number of IETF standardization efforts lag six or seven years
  beyond the actual deployment of the standard.

  It might be worthwhile for the WG chairs to ask every few years whether
  the proposed use of a codepoint has been abandoned, but without some
  assurance that the codepoint will never be used as specified, there is no
  sense declaring it to be expired.

- Section 3.1: "Note that Internet-Drafts should not include a specific
  value of a code point until this value has been formally allocated by
  IANA."

  To me, this seems entirely counter-productive.  Failure to publicize the
  codepoint you're deploying doesn't solve or prevent any problems.  To the
  contrary, including the codepoint values you're using helps to find
  conflicts.

- Section 5: "There is a significant concern that the procedures in this
  document could be used as an end-run on the IETF process to achieve code
  point allocation when an RFC will not be published."

  This concern only makes sense when the codepoint is being requested by
  another SDO. If it's being requested by a vendor (or set of vendors),
  well, no vendor will tell it's customers "sorry, you can't have this
  feature because IETF hasn't allocated a codepoint".

  The real concern is the opposite -- folks will try to delay the allocation
  of a codepoint, in order to prevent their quicker competitors from gaining
  an advantage.  But this only leads to the use of codepoints that are not
  officially allocated.
  
My concrete suggestions for improving the draft would be:

- Emphasize that WG chairs and ADs should base their approval of a request
  on the likelihood that an unofficial codepoint will otherwise get
  allocated (or the fact that it is already in use).

- Eliminate the "temporary" and "automatic expiry" features, aldn eliminate
  the need to refresh a request after one year.

- Eliminate the requirement that an i-d not specify a codepoint value until
  IANA has allocated it

I also think it would be better if the draft stated explicitly that
deployment and standardization are completely decoupled, and that pre-RFC
deployments are a normal and common practice.

The ultimate solution to codepoint allocation problems is to require that
new protocols avoid the use of codepoint fields that contain 8 or fewer
bits.  But perhaps that's not within the scope of this draft.