Re: [P2PSIP] Breaking RELOAD [was Re: Identity certificate segregation]
Marc Petit-Huguenin <petithug@acm.org> Sun, 17 July 2011 06:14 UTC
Return-Path: <petithug@acm.org>
X-Original-To: p2psip@ietfa.amsl.com
Delivered-To: p2psip@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 7B84621F86AD for <p2psip@ietfa.amsl.com>;
Sat, 16 Jul 2011 23:14:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.591
X-Spam-Level:
X-Spam-Status: No, score=-102.591 tagged_above=-999 required=5 tests=[AWL=0.009,
BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sn41rMAvwROV for
<p2psip@ietfa.amsl.com>; Sat, 16 Jul 2011 23:14:00 -0700 (PDT)
Received: from implementers.org (implementers.org
[IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with
ESMTP id 2DF2B21F869E for <p2psip@ietf.org>;
Sat, 16 Jul 2011 23:14:00 -0700 (PDT)
Received: from [IPv6:2001:55c:4c15:5f80:213:d4ff:fe04:3e08] (unknown
[IPv6:2001:55c:4c15:5f80:213:d4ff:fe04:3e08]) by implementers.org (Postfix)
with ESMTPS id 9D2E82199E; Sun, 17 Jul 2011 08:12:16 +0200 (CEST)
Message-ID: <4E227DA3.8010603@acm.org>
Date: Sat, 16 Jul 2011 23:13:55 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US;
rv:1.9.2.18) Gecko/20110626 Iceowl/1.0b2 Icedove/3.1.11
MIME-Version: 1.0
To: Bruce Lowekamp <bbl@lowekamp.net>
References: <BANLkTikuy8qpZ42Zod1YK2+iYv1ib6=Yag@mail.gmail.com> <1307629878.30919.87.camel@toedo> <4DF0FD49.3020505@acm.org> <1307641649.5184.17.camel@santeles> <4E00F7CE.7080402@acm.org> <4E0DB3EC.1040705@ericsson.com> <B3E5E380-1759-4B9A-9556-CEC4E6383D59@cisco.com> <4E207F1C.9080500@acm.org> <B6B03151-D0EA-4357-A9CF-746E59796B5D@cisco.com> <4E21D49F.9000100@acm.org>
<CAEOK=onUfCGkRbcTKcrKPKQBojnxMiCCbcEKW99Dq7=eiP9e9w@mail.gmail.com>
In-Reply-To: <CAEOK=onUfCGkRbcTKcrKPKQBojnxMiCCbcEKW99Dq7=eiP9e9w@mail.gmail.com>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Cc: P2PSIP WG <p2psip@ietf.org>
Subject: Re: [P2PSIP] Breaking RELOAD [was Re: Identity certificate
segregation]
X-BeenThere: p2psip@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Peer-to-Peer SIP working group discussion list <p2psip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/p2psip>,
<mailto:p2psip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/p2psip>
List-Post: <mailto:p2psip@ietf.org>
List-Help: <mailto:p2psip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2psip>,
<mailto:p2psip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Jul 2011 06:14:01 -0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This was general remarks about the whole process, which I especially dislike. On 07/16/2011 06:47 PM, Bruce Lowekamp wrote: > On Sat, Jul 16, 2011 at 2:12 PM, Marc Petit-Huguenin <petithug@acm.org> wrote: > On 07/16/2011 09:41 AM, Cullen Jennings wrote: >>>> >>>> I think all the people that implemented early version know that changes can, >>>> and will, break backwards compatibility. I don't recall very many places >>>> where I used this as augment for one way or another. I recall some places >>>> where it was 6 of one of half a dozen of the other and it made no fundamental >>>> difference to the protocol so we decided to go which what was already >>>> implemented. > > Well, I kind of disagree here. The problem is that *future* implementers will > not have access to the whole history of the development of the RELOAD protocol > when trying to decipher the specification. The RELOAD specification is *not* > developer friendly (but it is not specific to this spec). I am still not saying > that a protocol must be developer-friendly, just that the text describing it > should be, and that when it makes no fundamental difference to the protocol, > making it easier for future developers should have priority over not breaking > compatibility. > > >> While I think we're a bit late in the process for a wholesale rewrite >> (we've done it about twice), if you have specific suggestions on >> editorial issues that would make it clearer, please make them now >> while we might be able to adjust some of the text. > > >>>> That said some types of changes are very easy to move into a fully >>>> operational deployed DHT. Others are not. For example, a change that you can >>>> detect the version number and then just have the software do the right things >>>> is pretty easy particularly if both the new code and old code can exist in >>>> the ring at the same time. A change where every device in the ring needs to >>>> get a new certificate and you can' have a mixed ring with the old and new >>>> certificates at the same time is not easy to deploy. > > I still do not see this as a good reason to stop fixing stuff in the protocol. > What is the point of having internet *drafts* if they are to be considered as > standard track RFCs? > >> There are quite a few people who want to build things on top of it, >> and it needs to not be a moving target for that to happen. >> Presumably, if a significant amount of practical experience shows >> things need to be changed, extensions and/or a v2.0 can be done. But >> right now the lack of a v1.0 is blocking other people's work. > >> Bruce > > >>>> >>>> To the point of this specific proposal for change. This fundamentally changes >>>> the security model and nearly every part of this protocol that has anything >>>> to do with security - which is most of it. The suggestions is several years >>>> late - it was many years ago that this WG made the decision about what the >>>> general security model was doing to be. If people want this, it seems like a >>>> fine thing to do in version 2.0 of the protocol. Thought my previous email >>>> suggested that one could look at doing it in an extension, closer examination >>>> of that makes me think there would be some real hard problems in trying to do >>>> that as it requires all the security component to be re-thought and >>>> redesigned. > > OK, now we agree. > >>>> Given the current level of energy in the WG, that would take >>>> several years to happen. I have pretty much zero interest in doing that, I'd >>>> like to actually have an RFC for this in the next year instead of several >>>> years from now. As practical improvement of the protocol, I have not seen a >>>> single use case proposed where this improves things so much we can actually >>>> do something interesting that we can no do with the current proposal. >>>> >>>> >>>> >>>> On Jul 15, 2011, at 10:55 , Marc Petit-Huguenin wrote: >>>> >>>> On 07/07/2011 03:34 PM, Cullen Jennings wrote: >>>>>>> >>>>>>> This would break all the current deployments and implementation and not >>>>>>> just in a way where some new software would need to be pushed out - all >>>>>>> new certificates would need to be issues. From my point of view, this >>>>>>> is too late for this change and instead it could be addressed with an >>>>>>> extension. >>>> >>>> About this "breaking current deployment" thing, it seems to me that anyway >>>> when RELOAD will be published as an RFC, the version number with be >>>> incremented to 1.0 (0x0a), so implementations of the RFC will *not* be >>>> compatible with *any* of the current implementations. And because of this, I >>>> really do not understand why the authors of RELOAD are fighting so hard to >>>> not break things that will be broken anyway - there was multiple instances of >>>> things that could have been improved in the document but stayed because of >>>> this (the fragment bit is one example of this). Having been there multiple >>>> times I really understand the plight of early implementers but I would never >>>> ever use this as a justification to keep useless stuff in a protocol. What >>>> should have been done is simply to increment the version each time a new >>>> version of the draft would have broken interoperability - and we had the >>>> possibility to do that 8 times (versions 0.1 to 0.9). >>>> >>>>>>> >>>>>>> On Jul 1, 2011, at 5:47 AM, Gonzalo Camarillo wrote: >>>>>>> >>>>>>>> Hi, >>>>>>>> >>>>>>>> please, let me know whether or not these modifications will be >>>>>>>> included in the base draft at this point. >>>>>>>> >>>> >>>> [...] >>>> >>>>> > >>>> Cullen Jennings For corporate legal information go to: >>>> http://www.cisco.com/web/about/doing_business/legal/cri/index.html - -- Marc Petit-Huguenin Personal email: marc@petit-huguenin.org Professional email: petithug@acm.org Blog: http://blog.marc.petit-huguenin.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk4ifaIACgkQ9RoMZyVa61fPIgCfXHENMbCurA48yDa8luqfDruT Ih0AoIgCzBWIRssi3kvGwSMLZLBa8i05 =6UXw -----END PGP SIGNATURE-----
- [P2PSIP] draft-ietf-p2psip-base publication to be… David A. Bryan
- Re: [P2PSIP] draft-ietf-p2psip-base publication t… Marc Petit-Huguenin
- Re: [P2PSIP] draft-ietf-p2psip-base publication t… Cullen Jennings
- Re: [P2PSIP] draft-ietf-p2psip-base publication t… Diego Suarez
- [P2PSIP] Identity certificate segregation [was Re… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Gonzalo Camarillo
- Re: [P2PSIP] Identity certificate segregation [wa… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Cullen Jennings
- Re: [P2PSIP] Identity certificate segregation [wa… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Gonzalo Camarillo
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez
- [P2PSIP] Breaking RELOAD [was Re: Identity certif… Marc Petit-Huguenin
- Re: [P2PSIP] Breaking RELOAD [was Re: Identity ce… Cullen Jennings
- Re: [P2PSIP] Breaking RELOAD [was Re: Identity ce… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Identity certificate segregation [wa… Bruce Lowekamp
- Re: [P2PSIP] Breaking RELOAD [was Re: Identity ce… Bruce Lowekamp
- Re: [P2PSIP] Breaking RELOAD [was Re: Identity ce… Marc Petit-Huguenin
- Re: [P2PSIP] Identity certificate segregation [wa… Diego Suarez