Re: [regext] AD Review: draft-ietf-regext-rdap-object-tag

"Hollenbeck, Scott" <shollenbeck@verisign.com> Tue, 05 June 2018 13:39 UTC

Return-Path: <shollenbeck@verisign.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F63813107E for <regext@ietfa.amsl.com>; Tue, 5 Jun 2018 06:39:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.3
X-Spam-Level:
X-Spam-Status: No, score=-4.3 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rza01h8s-sUz for <regext@ietfa.amsl.com>; Tue, 5 Jun 2018 06:39:31 -0700 (PDT)
Received: from mail1.verisign.com (mail1.verisign.com [72.13.63.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB352131092 for <regext@ietf.org>; Tue, 5 Jun 2018 06:39:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=5404; q=dns/txt; s=VRSN; t=1528205968; h=from:to:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version:subject; bh=pYl7E1unmbICVJkWfW3sQcNcxHSr9eIISqag8RSI7Sg=; b=NKipRSBH7tSpSW+BXM6tlZ6P+q7WSeBtZBZgqLeLVp5h/38zDM502blS UjYnUd3DU4rujvRMMphW8y3ehhyxsYnUE416MQTy9d96sdAzoo+lgEsoW anfd+DxgZ+iHrA+rWiAgXGK/B0GGWnWQOL3iRK8FJsejrIPaM8x3QDvGz x8MZf3edtkbJhxDpeFnSK22dByQXTyY3e00sq5FvnuDX0MbMjHiF6bCnS NKG8cFgRqiL4J486zTdK+VilbMVbh9pufjUuGpqrQ8WwQj+Q4uRkAbdF8 TOxQd+awMdpQHgYA+cQApnaHqafm0FFwcyXRP3uO70+SI/Ipp2fgRwb+D g==;
X-IronPort-AV: E=Sophos;i="5.49,478,1520899200"; d="scan'208";a="6875543"
IronPort-PHdr: 9a23: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
X-IPAS-Result: A2FyAQB5kRZb/zCZrQpcHAEBAQQBAQoBAYQlgScKg26IBI5mgySRJ4F4CyMLhD4CF4IrNBgBAgEBAQEBAQIBAQKBBAyCNSIRS1wBAQEBAQEjAkAwAQEBAQIBHQYRSgcEAgEIEQQBAQMCBiACAgIwFQgIAgQBEgiDHIF3F6cDghyIQIFjBQkBgQGJDD6BD4MMhF0Ygn4wgiQCh0eRJwMGAoVqijODeIJjhQOJeIcAAgICAgQFAhSBQYILcIMThXyKUm+OKYEZAQE
Received: from BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) by BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1466.3; Tue, 5 Jun 2018 09:39:26 -0400
Received: from BRN1WNEXCAS02.vcorp.ad.vrsn.com (10.173.152.206) by BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1466.3 via Frontend Transport; Tue, 5 Jun 2018 09:39:26 -0400
Received: from BRN1WNEXMBX01.vcorp.ad.vrsn.com ([::1]) by brn1wnexcas02.vcorp.ad.vrsn.com ([::1]) with mapi id 14.03.0301.000; Tue, 5 Jun 2018 09:39:26 -0400
From: "Hollenbeck, Scott" <shollenbeck@verisign.com>
To: "'adam@nostrum.com'" <adam@nostrum.com>, "'regext@ietf.org'" <regext@ietf.org>, "'draft-ietf-regext-rdap-object-tag@tools.ietf.org'" <draft-ietf-regext-rdap-object-tag@tools.ietf.org>
Thread-Topic: [EXTERNAL] AD Review: draft-ietf-regext-rdap-object-tag
Thread-Index: AQHT/FxLdLmfnN2VW0ql9MkVfL8Ea6RRpD/A
Date: Tue, 05 Jun 2018 13:39:25 +0000
Message-ID: <831693C2CDA2E849A7D7A712B24E257F7FA73B18@BRN1WNEXMBX01.vcorp.ad.vrsn.com>
References: <7426e645-9de3-20ed-f4c4-7e1f46703233@nostrum.com>
In-Reply-To: <7426e645-9de3-20ed-f4c4-7e1f46703233@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/Vx-Q8bFb5m8ukX6ow5kVfL5_Mac>
Subject: Re: [regext] AD Review: draft-ietf-regext-rdap-object-tag
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jun 2018 13:39:34 -0000

> -----Original Message-----
> From: Adam Roach <adam@nostrum.com>
> Sent: Monday, June 04, 2018 7:32 PM
> To: regext@ietf.org; draft-ietf-regext-rdap-object-tag@tools.ietf.org
> Subject: [EXTERNAL] AD Review: draft-ietf-regext-rdap-object-tag
>
> I've reviewed the document draft-ietf-regext-rdap-object-tag in
> preparation for placing it into IETF last call. The mechanism and document
> generally look good and useful; however, I have some concerns about its
> URL synthesis.
>
> The mechanical synthesis of URLs as described in this document contravenes
> the requirements of BCP 190, section 2.3. Ordinarily, I would consider
> this a showstopper and ask the working group to adjust handling to match
> BCP 190 requirements (e.g., using RFC 6570 URI Templates). Because this
> specification simply builds upon RFC 7484 techniques for performing URI
> synthesis, however, forcing such a change would result in an incongruity
> that I understand might cause deployment issues.

Thanks for the review, Adam. I'm a little confused, though. RFC 7484 doesn't talk about URI synthesis - it describes registries and registration practices for data that can be used by RDAP clients to find servers. RFC 7482 describes how the URLs for RDAP queries are structured. My document includes the URLs and path segments from 7482 only as examples.

> Nonetheless, I request that the working group consider whether the use of
> something like RFC 6570 would be appropriate for the mechanism described
> this document. Please also understand that other area directors may note
> and object to this type of URL synthesis during IESG processing. Chairs:
> please let me know when you believe working group consideration of this
> issue is complete.

Maybe I'm missing something, but since this document isn't focused on URI synthesis I don't see how 6570 is applicable *unless* we're revisiting 7482. What this document describes is a practice for RDAP entity identifier construction so that clients can use information contained in that structure to bootstrap entity queries. That is, "when you create entity identifiers you should stick this thing on the end to make it easier for clients to find the associated server".

> --------------------------------------------------------------------------
> -
>
> I also have one question about an example in section 2:
>
>  >  For example, if the base RDAP URL
>  >  "https://example.com/rdap/" is associated with service provider
> >  "YYYY" in an IANA registry, an RDAP client will parse a tagged entity
> >  identifier "XXXX-YYYY" into distinct handle ("XXXX") and service
> >  provider ("YYYY") identifiers.  The service provider identifier
> >  "YYYY" is used to query an IANA registry to retrieve the base RDAP
> >  URL "https://example.com/rdap/".  The base RDAP URL is concatenated
> >  to the entity handle to create a complete RDAP query path segment of
> >  "https://example.com/rdap/entity/XXXX-YYYY".
>
> I read the text as calling for implementors to concatenate "XXXX-YYYY"
> to the
> end of the IANA-registered base URL ("https://example.com/rdap/"),
> resulting in "https://example.com/rdap/XXXX-YYYY". The example instead
> shows "https://example.com/rdap/entity/XXXX-YYY". Is the inclusion of
> "entity/" in this example an error?

No, it's not an error. That’s the path segment that 7482 describes for entity queries. I can see how my text above might be confusing, though, so how about this wording instead?

OLD:
"The base RDAP URL is concatenated to the entity handle to create a complete RDAP query path segment of "https://example.com/rdap/entity/XXXX-YYYY""

NEW:
"The RDAP query URL is formed using the base RDAP URL and entity path segment described in Section 3.1.5 of RFC 7482, using "XXXX-YYY" as the value of the handle identifier. The complete RDAP query URL becomes "https://example.com/rdap/entity/XXXX-YYYY"."

Scott