Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Pieter Vandepitte <pieter.vandepitte@dnsbelgium.be> Fri, 06 July 2018 12:05 UTC

Return-Path: <pieter.vandepitte@dnsbelgium.be>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D0D8128CF3 for <regext@ietfa.amsl.com>; Fri, 6 Jul 2018 05:05:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dnsbelgium.be
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qb9FnaoXGl_k for <regext@ietfa.amsl.com>; Fri, 6 Jul 2018 05:05:01 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40132.outbound.protection.outlook.com [40.107.4.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99096126DBF for <regext@ietf.org>; Fri, 6 Jul 2018 05:05:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=dnsbelgium.be; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kSD/h5EAbF4n5plCLPJQ6AdjUJcx+xmBoMNN9n5Suqs=; b=sJBpv4eGDpxEAvfzvlIgcmHOhbFkM3VgQ6JzlZM/r1fwMSP+6pbF4ThaziIGZLepzzWiocP0IisE/gDSFhluEhzWPwAukg7lsZ9kvGHM7seFNDuhZwie+X8it1YKO5VoOHlyqCBdYSkGiE3IrRj8z9oIMPH5X2iX/oXoBr9uRs8=
Received: from HE1PR0601MB1930.eurprd06.prod.outlook.com (10.166.123.140) by HE1PR0601MB2538.eurprd06.prod.outlook.com (10.168.96.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.930.21; Fri, 6 Jul 2018 12:04:56 +0000
Received: from HE1PR0601MB1930.eurprd06.prod.outlook.com ([fe80::987a:1199:ef19:df89]) by HE1PR0601MB1930.eurprd06.prod.outlook.com ([fe80::987a:1199:ef19:df89%5]) with mapi id 15.20.0930.016; Fri, 6 Jul 2018 12:04:56 +0000
From: Pieter Vandepitte <pieter.vandepitte@dnsbelgium.be>
To: Registration Protocols Extensions <regext@ietf.org>
Thread-Topic: [regext] REGEXT Interim Meeting (2018JUN05) Notes
Thread-Index: AQHUFSGN77hQpmXsc0ygH1M+JLENBg==
Date: Fri, 06 Jul 2018 12:04:55 +0000
Message-ID: <A834418E-F9C3-4A19-B5A6-F98618FE3661@dnsbelgium.be>
Accept-Language: nl-BE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=pieter.vandepitte@dnsbelgium.be;
x-originating-ip: [2a02:1802:5f:fff1::100]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; HE1PR0601MB2538; 7:Rc9UZbpDDvEzcyI3r0B+nv5FBqsYI4B3Hx61x/opUOvZisgnb+u4KlqjFlGvW76dk1X0LdIjDywJOQ6fB3Z1n29Yo3Ocngtea8RIJCNQmwmviJQb/67BOCFagqKXIbaV6pfq2CBmUUfCXk1J6qbeugPNMwRYN/qEYPHkg0rlI5XIJowJvzQbBXdkHa117SVmYBBLdl+uYGQAgi3FhR0+VkmKA/XS/PgqIY2idlP8oOF/zicuJWpmOvSLTXdinn6t
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b10747cb-c0e8-4ec2-9666-08d5e338b072
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(5600053)(711020)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(2017052603328)(7153060)(49563074)(7193020); SRVR:HE1PR0601MB2538;
x-ms-traffictypediagnostic: HE1PR0601MB2538:
x-microsoft-antispam-prvs: <HE1PR0601MB25389E052B4093E674CB5829E2470@HE1PR0601MB2538.eurprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(131327999870524)(246761809553906)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(102415395)(6040522)(2401047)(5005006)(8121501046)(3231254)(944501410)(52105095)(3002001)(10201501046)(93006095)(93001095)(149027)(150027)(6041310)(20161123564045)(2016111802025)(20161123558120)(20161123562045)(20161123560045)(6072148)(6043046)(201708071742011)(7699016); SRVR:HE1PR0601MB2538; BCL:0; PCL:0; RULEID:; SRVR:HE1PR0601MB2538;
x-forefront-prvs: 0725D9E8D0
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(396003)(376002)(136003)(39840400004)(346002)(49754004)(189003)(199004)(51444003)(6506007)(256004)(46003)(8936002)(14454004)(229853002)(81156014)(102836004)(8676002)(99936001)(81166006)(861006)(36756003)(7736002)(44832011)(106356001)(478600001)(105586002)(790700001)(14444005)(733005)(476003)(2616005)(6436002)(82746002)(83716003)(6116002)(486006)(6486002)(99286004)(53386004)(316002)(6306002)(551934003)(74482002)(6246003)(5250100002)(25786009)(54556002)(53936002)(54896002)(236005)(2906002)(6512007)(606006)(186003)(68736007)(53546011)(6916009)(97736004)(86362001)(2900100001)(5660300001)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:HE1PR0601MB2538; H:HE1PR0601MB1930.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:3; A:1;
received-spf: None (protection.outlook.com: dnsbelgium.be does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 2vMvwivz6ackPwO9Lt/zHkABna7JbrGb/y+8B9HThgemIOAat64ou508mfwUDQeLBdT1AO8zt6k0eFIoLEJixE2m91pPTzKUibMA7ZoF/l92vsJ242RGJG6lOfu8RFTmnsG6XwDwTD+L5F271kx9yb4lQ5lBWh/4tjxsPShn0CgLu1IOZjSjwrodP+PEVFHYOy4uDlHhwx6NVGfGzDUywk1coRS9qbC3prtHBJsSUDkTlauVwdYGiAJhRIGTvYt/kuwT0bYYtJk7DjcxiXB/3TZC4dkpkDEVkzQgmBOGlourqmJC78tqgv8pOHvoLuNXqzT2/HdM6yndZsh+M3szVUiAmLS0U9l7MnNv+rADNDw=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/related; boundary="_004_A834418EF9C34A19B5A6F98618FE3661dnsbelgiumbe_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: dnsbelgium.be
X-MS-Exchange-CrossTenant-Network-Message-Id: b10747cb-c0e8-4ec2-9666-08d5e338b072
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jul 2018 12:04:55.9105 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 695195de-c0cb-4478-9204-2a861e60e59c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0601MB2538
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/q0SbF7ulxUAB--bV0qt7K1SKZf0>
Subject: Re: [regext] REGEXT Interim Meeting (2018JUN05) Notes
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jul 2018 12:05:10 -0000

Short question regarding the validate extension:

Isn’t the purpose of the validate extension to do what actually transactions are meant for? Ultimately the goal of the validate extension is to check whether a group of commands are possible: create some contacts, link the contacts to a domain with a specific role.
Why not trying to add a layer on top of EPP to enable transactions? Start a transaction, add commands to a transaction, execute a transaction with either commit or auto roll back?
I think that would lead to a much simpler model and could easily deal with other objects and other extensions.

Thoughts?

Pieter


--
Pieter Vandepitte
Product Expert
+32 16 28 49 70
www.dnsbelgium.be<http://www.dnsbelgium.be>

[DNS_PUNT_Belgium_RGB]



From: regext <regext-bounces@ietf.org> on behalf of Roger D Carney <rcarney@godaddy.com>
Date: Tuesday 3 July 2018 at 20:04
To: Registration Protocols Extensions <regext@ietf.org>
Subject: [regext] REGEXT Interim Meeting (2018JUN05) Notes

Sorry about the tardiness, please enjoy, see everyone in a couple weeks.

Meeting started at 11:06 (UTC-5)

Attendees: Roger Carney, James Gould, Jody Kolker, Jim Galvin

Agenda
1.    Validate draft (comments, concerns, implementations)
2.    Registry Mapping
a.    Continue the lively discussion that was started in London
b.    Policy Extension Review: how a server implements an extension, the SHOULD(s), MAY(s), etc.

Jim Galvin mentioned that co-chairs have been discussing milestones and updated charter with AD (Adam). Hopefully circulate new Charter to the group next week. Planning two meetings for IETF-102.

James Gould said that he has started implementing the Validate draft in their SDK. I mentioned that Nominet has already implemented.

We started out discussing the Validate draft, specifically the questions James Gould posted to the list Monday June 4, 2018, copied below:

1.    I don’t see the purpose of the <validate:cd> element in the check command..  Initially, I thought the <validate:cd> may support a list within a list (e.g., <validate:contact>), but that is not the case.  There is also a little confusion with the use of <validate:cd> in both the check command and response.  My recommendation is to remove the <validate:cd> element from the check command and simply move all its sub-elements to sub-elements of the <validate:contact> element. [Interim] Interesting for removal, post to list.
2.    Is the extension meant to validate the contact details of existing contacts by contact id and also non-existent contacts based on the contact details, by contact type and by tld?  [Interim] Yes, both scenarios. For “new” contacts pass all data, don’t try to short cut it with only id, if only id is passed server will assume it is an existing contact. Change response validate:cd to include TLD and contact type attributes. Discussed the preferences of smaller payload versus complicated payload, went with simpler. Add a new section to 2.0 describing validate:id (Need to have response pass back contact type and tld).
a.    If both cases are true, then wouldn’t you have a choice of referencing the contact by identifier for an existing contact or defining the contact attributes for a non-existing contact?
b.    Also, what if you desire to use the same contact information for multiple contact types for a tld?

  1.  Do you need to replicate the same attributes for each contact type?  [Interim] Simple method would
  2.  It may be better to define a single contact (existing with contact identifier) or contact attributes for non-existing with the list of contact types.  I imagine that you always want to validate a contact within the scope of a tld.  [Interim] Interesting, thoughts?
3.    I view definition of only the check command and response with many contacts and with extensibility via the kv elements as somewhat non-optimal.  Other options include:
a.    Instead of supporting multiple contacts in an individual command, why not support the check or info of an individual contact with attribute extensibility via command / response extensions.  Yes, you can validate only a single contact with multiple target types and a tld at a time, but you get to use existing contact command / response extensions to define the additional contact attributes without having to use key / value pairs.  [Interim] One goal is to pass in multiple contacts and validate as a whole
b.    Create a validate command / response extension of the contact mapping that extends the contact create to function as a no-op with the additional attributes used to validate usage of the contact (e.g., object - domain, contact types, tld), which would define a validate contact validate create command.  The contact info could have been extended by the validate extension to function as a validate usage command with the usage attributes consistent with the contact validate create command (e.g., object – domain, contact types, tld).  In this case, the contact commands can be directly extended by the validate extension. [Interim] So does key/value make sense here. Can this validate extension be able to be extended with other extensions (e..g. registry has a VAT extension instead of this)?
4.    Each element needs to be fully described..  I include some examples below:
a.    <validate:contact> element does not define the required “contactType” or “tld” attributes.  [Interim] Add more descriptions
b.    There is no description of any of the <validate:cd> sub-elements in the check command or response. [Interim] Add more descriptions
5.    Wouldn’t be better to include a required “valid” attribute in the check response <validate:cd> element with an optional reason and reason language similar to the domain check response?  I’m not sure if there is a real need to define a whole list of validity errors using the list of <validate:kv> elements.  It may be good enough to short circuit the validation by simply saying yes or no and if no a human readable reason.  There would be no need for the <validate:response> element or the <validate:kv> elements.  [Interim] Should the response look more like a check response (result, and free form text response if invalid)? I like the draft format better but I understand the consistency part
6.    I don’t recommend directly referencing the urn:ietf:params:xml:ns:contact-1.0 elements, since it adds a direct dependency to inclusion of the contact XML schema and namespace for a subset of the elements that are really specific to the validate mapping.  I would prefer for the validate XML schema to stand on its own by only referring to epp and eppcom, with no cross references to contact.  This would mean copying and pasting elements directly from the contact XML schema into the validate XML schema, which is an inconvenient, but makes it easier to implement.  [Interim] There has been discussion on list on this topic, continued discussion will be good.

We did not make it to the Registry Mapping discussions.