Re: [Lsr] [Technical Errata Reported] RFC8919 (6630)

John Scudder <jgs@juniper.net> Tue, 10 May 2022 16:19 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16366C159522 for <lsr@ietfa.amsl.com>; Tue, 10 May 2022 09:19:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.673
X-Spam-Level:
X-Spam-Status: No, score=-7.673 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.575, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=pVOAGhOu; dkim=pass (1024-bit key) header.d=juniper.net header.b=f/u3EA61
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HvEvk8A_ACct for <lsr@ietfa.amsl.com>; Tue, 10 May 2022 09:19:43 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92883C1594BB for <lsr@ietf.org>; Tue, 10 May 2022 09:19:43 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 24AAVvUv003255; Tue, 10 May 2022 09:19:40 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=ok8JrWFv4hajKlOXFM7YRzrR1E7504fatUug9bXNmLg=; b=pVOAGhOuMxbuv5CLGgTuZsNBWeIJCJkE0oyxyKXbRt8AMdUV9bHE651laXlSh7ZBMg8Z G+TFmo8L+b3wm5IQzOpJhKWxo4UHg04lZJ1e8PXJPaC6ZTdqv+MJ8onTHciReCsznjy1 lxYhhIwnEVuaMz0DFi/X+uZDEdyCZneZ1kt8a8edd8ATeMkNBSti9K3iwuY2jY82MncU QtItcCvYDLZA44SnmGLLniRH/5U/ku1BJiOX6VdVDtEWomOGV1ASvKd3VlQIPpdQnQ8X UT/d/+L55DjIIUv3gdo2hCMD+d6ec8It9wrmD6f/MmoFkvsSLb9xaNSPPmsUZ9EJHZR7 sg==
Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam08lp2040.outbound.protection.outlook.com [104.47.74.40]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3fypcj8sca-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 10 May 2022 09:19:40 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ns46vdoVew55xTHJ+YiMk637si6s4fpLi3MjnzBTSE1bkfRI/Bx4ZDHNBsS59bYbP4MHPnCRFJ9TmOWRteofvH3YqoY8dynxZGfTRi/lf9NI4d80QGf4Vr7DS1dcniPnXUfq/xToGGhYnd+Rl/LzDQfhweHhTcqUc7Duh+vq9UZgiYu7n3qAQ5bhAP+H6L1iEgtORV14nK91mJPMIrayLnTZj4V9OluXr0nKebpAO0ZEc5aBuHiutqDAQUeZTP5CifRNe2kz4VMpkVc7QWkCdu3oZPn4XijmV18495bXVqePCmkfY4KnAqbVsfSoe7r0a3mjPx3jPwkcbpXXMSl6pQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ok8JrWFv4hajKlOXFM7YRzrR1E7504fatUug9bXNmLg=; b=E83nzCrfQsM9Mhxkc3Z0PeHRpl3z3sDNZrn8lg+m7DVChEd//Inu3RsUWhjsvK7oIzMnMVtpP8BHFyr+9ZOpd0xoqNs7vLg8SWz9TXIe0tE2VrY5/vynaoMFZFFincxTPzf1FWwDRcKlfVg30jEKMJeo7galZe/13cH4ToB73w/pglabnnrgVhoGciHf3Y+41MPFvVCZ4fuTTdy1CEjE6/igeKNJaWYEy+JBQKIkGmzX8Pqi1cPhU1WOQQWKv28GIk17wShbsfRMPnibLooVzT1MtB2Qhprsuir3mScwdlPCsN3exzNsuE9j6zMOI3p+1MGBcwgX5jzJ5pBenuUOvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ok8JrWFv4hajKlOXFM7YRzrR1E7504fatUug9bXNmLg=; b=f/u3EA61Jik2JtQm8RG9+qZPOiX1kKnHJgC4vAxA3OSSUJpwxo3+7d0Y1ux9fbJrHfbL9OiN/CJYsCecPMKXMbVATCOkxsfYEt4FZiNFoRrxrWALGXS1zS5vTtbBCYT8e9U9TOmFcc5EGb8MkOY+S9T53MNMAYc4He/QJGcoaVY=
Received: from MN2PR05MB6109.namprd05.prod.outlook.com (2603:10b6:208:c4::20) by BYAPR05MB6280.namprd05.prod.outlook.com (2603:10b6:a03:cf::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.12; Tue, 10 May 2022 16:19:37 +0000
Received: from MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::fc4c:13b7:a19d:5367]) by MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::fc4c:13b7:a19d:5367%7]) with mapi id 15.20.5250.012; Tue, 10 May 2022 16:19:37 +0000
From: John Scudder <jgs@juniper.net>
To: "Acee Lindem (acee)" <acee@cisco.com>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
CC: "Peter Psenak (ppsenak)" <ppsenak@cisco.com>, "stefano@previdi.net" <stefano@previdi.net>, "wim.henderickx@nokia.com" <wim.henderickx@nokia.com>, John E Drake <jdrake@juniper.net>, "aretana.ietf@gmail.com" <aretana.ietf@gmail.com>, "martin.vigoureux@nokia.com" <martin.vigoureux@nokia.com>, "chopps@chopps.org" <chopps@chopps.org>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: [Technical Errata Reported] RFC8919 (6630)
Thread-Index: AQHYZIm+JdgIRpmaU021vzwA8kjSbw==
Date: Tue, 10 May 2022 16:19:37 +0000
Message-ID: <7D49EECC-6B94-4FB4-A8CD-255132A41179@juniper.net>
References: <20210705214721.1124AF40759@rfc-editor.org> <AD71204D-0864-4894-AC5E-F64C19BAA2F0@cisco.com>
In-Reply-To: <AD71204D-0864-4894-AC5E-F64C19BAA2F0@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.80.82.1.1)
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fb3346ab-393e-4693-028e-08da32a0e0d6
x-ms-traffictypediagnostic: BYAPR05MB6280:EE_
x-microsoft-antispam-prvs: <BYAPR05MB6280CAAA0391A445420AF9A4AAC99@BYAPR05MB6280.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6109.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(5660300002)(36756003)(54906003)(2616005)(6512007)(6506007)(33656002)(186003)(53546011)(26005)(110136005)(2906002)(66446008)(64756008)(66946007)(8676002)(76116006)(66476007)(91956017)(66556008)(4326008)(122000001)(38070700005)(71200400001)(83380400001)(8936002)(6486002)(86362001)(966005)(166002)(38100700002)(316002)(508600001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: YjrLahmaeH1sHJUW3olgj7vDEE2f6oOzeXuOalc5P6yz4x8c9AiMnMOtqCR0y60PIzo0gY72/idEE9c/ntFfYjz50SZ6nu8Xoo4FfaRuWMakZyXeSh4seth/oiu8SasRXM5e9jr+k4OaDBmQDr7KeBigz3nnNILLVUm8RsUFjEQGBEFuN/IBCmBz7GSBYzO5yASg7AGL5TORD6AfnKcfbyK3XsfZuUCHp1b5AaGm7z+H3gqNJ+UXzZdxqZh19fUe8uqEZCg5S25T1Q7ZCuJwGL3uBdxoK9yQYv8mQ4gnerjs8TQVKMIrHos0yKFjdfyIGL84ip7wzpDc10QrOGK/gW+DpuAh8vJAH4E8GdzzQ6B2cO/zOrHakSyiiR0qQDFSN5x9SMi2EhOoHEwpZg/zkpNuugHfirWCycywTHCUd9PVkr0B+k/L7+qEF/DjSE+CGX2bfEspkooXozJPE3/0VFv4h+VU2y19sdW3CJfjN0I6oX94SDt1Dv01cllLbPKWiVrj2xenvqn6X69c4nhuLGyFZCeGUmwmyMu7MuSJmSDwp//pPTgR3JSUbVrKcpswdnvZimdSkBBk7LTFqItqN67zR0L7x3qb+03MgPylebWZYrtgEfKurYb3vsD0Nrgvv2rkCbhOVtayj74w+pJ5UqaH26grG31zypzVO27uvSpZIkSBv79OYKrg238x9zhtSFSn3SBeTJJ6G36gUoUJzVNSj7+7hZWc6h4Vutm0nDx3+lff0lgPjMLFeez5EE+OV6Bm2LBqVSRlvbGcMJQPiZl4HJVQKWVl92CTkF7G0VutMzEdAY7ctlfylww+42T7pZ1n9yzo3YSqip3FZ3/Ux/A+GJq3DWdqs/Snj4ybdpaa+gLTrZUMPXFisWpux2BKkXywX7Sq/N4Ukgf210cHSHBTKrcv0hU2R50rW5hLYreILmj7Lgc5vIoU7vYyay9vKL4hHMWXho+oSkFTOBE2Hrs57wAZinrLbcBfXOtpUEeBRsS3VMxWl6G/HXc2XuyOMEb50buT9RNwihBZeFm+Jna3EynAwimE6bkqqfroT0QjDhEBCVgQmNqfyblkMyzB5dGVah5VWzoPkMO/RbH0ndgAbLtPiAiWCX0fvA9eHKr5bZeWbuHmOxuJPKwkQjOm/nDXTDjvfGIQLdVOH9vm9RZo4F47WAzl+ObekI2b5qytzYypu8gXtygtsV7LC0ZGe7JFz0wTuaIrue+/Tc+LQHNO7VlG0RBBs96qBSSn3A552SAU6gJKSiXnCyAO80jbWdVlqOsti1VIVrjFpzcu+ZCAXygyw1tc9n/WW6bN2PXFf5rq8I4zS3gyW0o6Aw61+ghEpEtleB6hXIAgy7Qd8XiIh78NGXPN4Slkw3o1VWf3Vepknu2VJgBcUY4Ib79n8zWlCsSYeAJmZIYtL7BsTfZ7/n8BYJUq3FL+gjAPyiuc3YNleBiWAONptrFTQDSdxPkR6FeTAghalA0YqKBe1ShhhOZtC75bh3vWWsuWDR3VCTs8yaq/VE1FtWnNE16Y9QYSIBm2/xBWqGKsyJ0HpJiMmFZuSJldgIbzwncLGgE3Jyy1j8y5WFCtwycq6aDu4ieJvBsNvCLmlTPuGUfDT7etu20b2uv2pfjzN2F+3pcCxzR24VE1/TkkXLiI+dYIbaOET2EJPv7u6kRStXqnTeMerQlAgfwSeOkIhC7+fFXkFHNJZ4DAUgPajVqu9q6ddG5Vne18+JOJ6P2sTPxaEA+QpJX4q39SmqFSRxlJbKs=
Content-Type: multipart/alternative; boundary="_000_7D49EECC6B944FB4A8CD255132A41179junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR05MB6109.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fb3346ab-393e-4693-028e-08da32a0e0d6
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2022 16:19:37.3999 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rxoUydvbIWVxxjLqeKgJoWXmmaun2Q01BTkTmbEeAVEybAjwi9f5foMj9YdYp5M/
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6280
X-Proofpoint-GUID: W7tYqwFdY-Wr219-JaSqPtic8YiIstvG
X-Proofpoint-ORIG-GUID: W7tYqwFdY-Wr219-JaSqPtic8YiIstvG
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.858,Hydra:6.0.486,FMLib:17.11.64.514 definitions=2022-05-10_04,2022-05-10_01,2022-02-23_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 lowpriorityscore=0 adultscore=0 spamscore=0 impostorscore=0 bulkscore=0 phishscore=0 mlxlogscore=999 malwarescore=0 clxscore=1011 suspectscore=0 priorityscore=1501 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2205100071
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/Ifxf7xcBYapWRNj8sQ0QagmKFLQ>
Subject: Re: [Lsr] [Technical Errata Reported] RFC8919 (6630)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 May 2022 16:19:48 -0000

-rfc-editor

Hi All,

This kind of erratum requires careful consideration and I’d appreciate it if the WG were to weigh in. In particular, without reviewing the RFC and mailing list carefully (which I’ve not yet done, but will) it’s unclear to me if the proposed erratum meets this criterion:

“Errata are meant to fix "bugs" in the specification and should not be used to change what the community meant when it approved the RFC.” [1]

So to verify this erratum we’d need one of two things:

1. A solid reason why the erratum is a straight-up bug. An example of an erratum where this is unambiguously true is https://www.rfc-editor.org/errata/eid6866, where the RFC refers to a YANG leaf that simply doesn’t exist.
   At first reading, the present erratum isn’t obviously a bug.

2. Clear and unambiguous evidence in the written record (mainly, the mailing list archives) that the WG consensus was for what the erratum says, and not for the text in the RFC. Importantly, the authors’ saying “that is not what was intended” isn’t good enough to establish this. What must be established is what the WG had consensus for.

The bar is intentionally high for introducing changes to RFCs via the errata process. If neither of the above criteria can be fulfilled then I have to mark the erratum as rejected. In that case the recourse would be to write and process a short RFC that updates RFC 8919.

Thanks,

—John

[1] https://www.ietf.org/about/groups/iesg/statements/processing-errata-ietf-stream/

On Jul 6, 2021, at 4:27 PM, Acee Lindem (acee) <acee@cisco.com<mailto:acee@cisco.com>> wrote:


LSR WG,

This Errata is an outcome of the Flex-Algorithm discussion - is there any further comment?

Thanks,
Acee

On 7/5/21, 5:48 PM, "RFC Errata System" <rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>> wrote:

   The following errata report has been submitted for RFC8919,
   "IS-IS Application-Specific Link Attributes".

   --------------------------------------
   You may review the report below and at:
   https://urldefense.com/v3/__https://www.rfc-editor.org/errata/eid6630__;!!NEt6yMaO-gk!V8pyJglE5nwp2XEvvZFMfNsgQt2U2UKisYFncXzo7IFZNV_oakn0wjZ0Ak22xg$

   --------------------------------------
   Type: Technical
   Reported by: Les Ginsberg <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>

   Section: GLOBAL

   Original Text
   -------------
   Section 4.2:
   OLD

   If the SABM or UDABM Length in the Application Identifier Bit Mask
   is greater than 8, the entire sub-TLV MUST be ignored.

   (Later in Section 4.2)
   OLD

   If link attributes are advertised associated with zero-length
   Application Identifier Bit Masks for both standard applications and
   user-defined applications, then any standard application and/or any
   user-defined application is permitted to use that set of link
   attributes so long as there is not another set of attributes
   advertised on that same link that is associated with a non-zero-length
   Application Identifier Bit Mask with a matching Application Identifier
   Bit set.

   Section 6.2
   OLD

   Link attribute advertisements associated with zero-length Application
   Identifier Bit Masks for both standard applications and user-defined
   applications are usable by any application, subject to the
   restrictions specified in Section 4.2. If support for a new
   application is introduced on any node in a network in the presence
   of such advertisements, these advertisements are permitted to
   be used by the new application. If this is not what is intended,
   then existing advertisements MUST be readvertised with an explicit
   set of applications specified before a new application is introduced.


   Corrected Text
   --------------
   Section 4.2
   NEW

   If the SABM or UDABM Length in the Application Identifier Bit Mask
   is greater than 8, the entire sub-TLV MUST be ignored.

   When SABM or UDABM Length is non-zero and the L-flag is NOT set, all
   applications specified in the bit mask MUST use the link attribute
   advertisements in the sub-TLV.

   (Later in Section 4.2)
   NEW

   Link attributes MAY be advertised associated with zero-length
   Application Identifier Bit Masks for both standard applications and
   user-defined applications. Such link attribute advertisements MUST be
   used by standard applications and/or user defined applications when
   no link attribute advertisements with a non-zero-length Application
   Identifier Bit Mask and a matching Application Identifier Bit set are
   present for a given link. Otherwise, such link attribute advertisements
   MUST NOT be used.

   Section 6.2
   NEW

   Link attributes MAY be advertised associated with zero-length
   Application Identifier Bit Masks for both standard applications and
   user-defined applications. Such link attribute advertisements MUST be
   used by standard applications and/or user defined applications when
   no link attribute advertisements with a non-zero-length Application
   Identifier Bit Mask and a matching Application Identifier Bit set are
   present for a given link. Otherwise, such link attribute advertisements
   MUST NOT be used.

   Notes
   -----
   RFC 8919 defines advertising link attributes with zero
   length Standard Application Bit Mask (SABM) and zero length User
   Defined ApplicationBit Mask (UDABM) as a means of advertising link
   attributes that can be used by any application. However, the text uses
   the word "permitted", suggesting that the use of such advertisements
   is "optional". Such an interpretation could lead to interoperability
   issues and is not what was intended.

   The replacement text below makes explicit the specific conditions when
   such advertisements MUST be used and the specific conditions under
   which they MUST NOT be used.

   Instructions:
   -------------
   This erratum is currently posted as "Reported". If necessary, please
   use "Reply All" to discuss whether it should be verified or
   rejected. When a decision is reached, the verifying party
   can log in to change the status and edit the report, if necessary.

   --------------------------------------
   RFC8919 (draft-ietf-isis-te-app-19)
   --------------------------------------
   Title               : IS-IS Application-Specific Link Attributes
   Publication Date    : October 2020
   Author(s)           : L. Ginsberg, P. Psenak, S. Previdi, W. Henderickx, J. Drake
   Category            : PROPOSED STANDARD
   Source              : Link State Routing
   Area                : Routing
   Stream              : IETF
   Verifying Party     : IESG