[Last-Call] Opsdir last call review of draft-ietf-taps-arch-17

Dhruv Dhody via Datatracker <noreply@ietf.org> Fri, 14 April 2023 16:07 UTC

Return-Path: <noreply@ietf.org>
X-Original-To: last-call@ietf.org
Delivered-To: last-call@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E5480C15C2BB; Fri, 14 Apr 2023 09:07:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Dhruv Dhody via Datatracker <noreply@ietf.org>
To: ops-dir@ietf.org
Cc: draft-ietf-taps-arch.all@ietf.org, last-call@ietf.org, taps@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 10.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <168148846192.47763.727387687690530301@ietfa.amsl.com>
Reply-To: Dhruv Dhody <dd@dhruvdhody.com>
Date: Fri, 14 Apr 2023 09:07:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/ijkQhWRrGkWfS-cxx_2ylPrEEGA>
Subject: [Last-Call] Opsdir last call review of draft-ietf-taps-arch-17
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Apr 2023 16:07:42 -0000

Reviewer: Dhruv Dhody
Review result: Has Issues

# OPSDIR review of draft-ietf-taps-arch

I have reviewed this document as part of the Operational directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in the last-call may be
included in AD reviews during the IESG review.  Document editors and WG chairs
should treat these comments just like any other last-call comments.

The document is clear and well-written. The motivation is described well. The
architecture is clean. I have some nits and queries apart from a request to
consider adding text related to Operations.

## Operational Consideration

The document lacks any operational/manageability considerations. I am unsure
how much of the guidance from RFC 5706 would be relevant for API architecture.
I would urge authors to think if any operational/manageability considerations
need to be highlighted here or in the other documents. For instance (feel free
to disregard if they do not make sense) -

- Any guidelines to control and configure the API layer or the Implementations?
Anything on configuring System Policy?

- Any guidance on the co-existence of Socket API as well as the new Transport
API? I don't see an issue but you are the expert!

- Are there any changes in how would application locate issues with transport
sessions? In the event handling is there a need to also highlight errors for
instance?

- ...

## Nits

- If you wish, you can avoid expanding API, it is well known as per
https://www.rfc-editor.org/materials/abbrev.expansion.txt

- Unnecessary comma at "not consistent, and varies depending" (section 1)

- A comma is missing between ignore and prefer at "Preference: A preference to
prohibit, avoid, ignore prefer or require a specific Transport Feature."
(section 1.4)

- Not all abbreviations in Figure 2 are exempted from expansion on first use.
Maybe you can add and expand them in Section 1.4.

- Add suitable reference for "User Timeout Option for TCP" (section 3.2)

- Expand STUN, and ICE on first use.

- Does this needs to be MUST NOT - "A Transport Services system must not
automatically fall back from secure protocols to insecure protocols..."
(section 6)

## Queries

- Why a SHOULD here instead of MUST? In which case it would be acceptable to
race a non-identical protocol stack?

````
A Transport Services implementation SHOULD
only race Protocol Stacks where the transport
security protocols within the stacks are
identical.
````

- How long is the cached state maintained? Are there any requirements or
suggestions that need to be provided?

Thanks!
Dhruv

---

*In case of bad formatting, see this message at -
https://notes.ietf.org/draft-ietf-taps-arch?view*