Re: [Rfcplusplus] labeling/experiments/ and ramifications

Eric Rescorla <ekr@rtfm.com> Wed, 04 July 2018 17:02 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: rfcplusplus@ietfa.amsl.com
Delivered-To: rfcplusplus@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C127F12DD85 for <rfcplusplus@ietfa.amsl.com>; Wed, 4 Jul 2018 10:02:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ppHceRNkieww for <rfcplusplus@ietfa.amsl.com>; Wed, 4 Jul 2018 10:02:55 -0700 (PDT)
Received: from mail-yw0-x22b.google.com (mail-yw0-x22b.google.com [IPv6:2607:f8b0:4002:c05::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A69612777C for <rfcplusplus@ietf.org>; Wed, 4 Jul 2018 10:02:55 -0700 (PDT)
Received: by mail-yw0-x22b.google.com with SMTP id y203-v6so2121690ywd.9 for <rfcplusplus@ietf.org>; Wed, 04 Jul 2018 10:02:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=Fjs49tOIxfQBxCeNGcxDGWI8eXsok4PQIAOx63TQ/cQ=; b=1YIHYO8XIblBfoKhsoQfXfvJc1FYFMSeat88P3dyG/danbinOVB/BZoJTC1rWROTwy AQLN0mddzT/6n2KBuZ++LJbpddso7wrtbJOw3Mj3WSdaqAzyPFbJ9fQ+beF9xmezmNxg 0BGkWYkIIlwv3M39ShcwclJfI9zdDRyBHCET/6bjaB7Oi8fgRRag/fC8N834I18y2DEJ smDzyq3QC9IP97XYu9Ad/YjPZ4UQRmlbERjDEiShWceCuiecqyZI03YLHI0vZhaR6Zh5 NghmwHVM6xqdjgWSgzzm2KTEPpSOtf4NO0H2mlorcnqIxeI2W7lu4DeKkUKl8k5JK16g QloQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=Fjs49tOIxfQBxCeNGcxDGWI8eXsok4PQIAOx63TQ/cQ=; b=Ig5m5BEuEfCue5HBLE4ZJ3J2zYnD7gI8P5LVpw5W6whyqAFQMsVkI9Y/IyqPBMF2Sd x8PExo9x2bVwbHgGeZW5xrrR0CPp12/hVwhE2IdRHIRxw7xoEc5s3CPIQMqDHgE8SEXZ HPzaMlNGzK6dF+iFia5K9BIXA5RQwsgbr3DELVXc1lcPhMVQeYAddDF8lizjgcS66jZY o6bPc9/UnvZvJcuAjcS+Yr9WSRnkt4bn587loityup6mCvfZywSieyp+V4IO7xJJqAfa aAIba2aLR698/3HYWmwuwVf+UdxOO2c0OMJ1eOvX+zueFkgfULQOH2tHEMnBTAQcxV6C 3F9A==
X-Gm-Message-State: APt69E1+XW/tlPlEVVh/zxhYeEInApvlgU8AtkAbq9dCprJJb+4qswgE qVWrC6C34SwJzINCbzNXxWg4dkUx33ncWz8yZ3r8mus2foY=
X-Google-Smtp-Source: AAOMgpczixpzqA6jlyUX86gtgDqwHeAcu79NYE56I6ytW6tCOafTAoljyZ7kNaNaxxDRctUFDxlXx3WCva+sXB/I2nY=
X-Received: by 2002:a0d:f286:: with SMTP id b128-v6mr1293428ywf.489.1530723774205; Wed, 04 Jul 2018 10:02:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a81:6b83:0:0:0:0:0 with HTTP; Wed, 4 Jul 2018 10:02:13 -0700 (PDT)
In-Reply-To: <be67344f-bb7f-f6c3-dff2-9c777e472b2e@cisco.com>
References: <f609948a-9240-3fe4-8538-e694aab1edb0@cisco.com> <CABcZeBMo3VFZWMVfGrYV_LLD0oHSQJQV20uhoO2KsV-7HWdGnw@mail.gmail.com> <be67344f-bb7f-f6c3-dff2-9c777e472b2e@cisco.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Wed, 04 Jul 2018 10:02:13 -0700
Message-ID: <CABcZeBMmGb=WyvL2L5U05LeTcDPeXBxf5N-21tTwPLsP__PSNw@mail.gmail.com>
To: Eliot Lear <lear@cisco.com>
Cc: rfcplusplus@ietf.org
Content-Type: multipart/alternative; boundary="000000000000cf95b205702f6680"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rfcplusplus/V02-uajBmie7WtZdKVPIkqBLHTg>
Subject: Re: [Rfcplusplus] labeling/experiments/ and ramifications
X-BeenThere: rfcplusplus@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: For discussion of the RFC++ BoF proposal and related ideas <rfcplusplus.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rfcplusplus>, <mailto:rfcplusplus-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rfcplusplus/>
List-Post: <mailto:rfcplusplus@ietf.org>
List-Help: <mailto:rfcplusplus-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rfcplusplus>, <mailto:rfcplusplus-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jul 2018 17:02:58 -0000

On Wed, Jul 4, 2018 at 6:22 AM, Eliot Lear <lear@cisco.com> wrote:

> Hi Eric,
> On 04.07.18 14:52, Eric Rescorla wrote:
>
>
>
> On Wed, Jul 4, 2018 at 1:10 AM, Eliot Lear <lear=40cisco.com@dmarc.ietf.
> org> wrote:
>
>>   So do encryption algorithms.  WRT what EKR said, it seems better to
>> have the algorithm documented than not, if it is being used.  The test: is
>> it really being used?
>>
>
> I want to narrow my response to this point: what we've done in TLS is
> allow code point registration with any stable reference, internal or
> external. This includes an I-D. We didn't make this change primarily in
> order to address the issues raised by this BOF, but I do think it was a
> good change. Can you explain why you don't think that this suffices?
>
> I wasn't really thinking in terms of code points when I wrote that, but
> since you asked: "Any stable reference" sounds fine.  Journal references in
> the face of scribd and DOIs are pretty cool these days.   A nit: we don't
> normally count I-Ds in that group, and the boiler plate explains why:
>
>    Internet-Drafts are draft documents valid for a maximum of six months
>    and may be updated, replaced, or obsoleted by other documents at any
>    time.  It is inappropriate to use Internet-Drafts as reference
>    material or to cite them other than as "work in progress."
>
>
> They are not intended to be stable references.  One way we know this to be
> the case is that they may not be normatively referenced, and most notably,
> they're supposed to expire, and can be rev'd leading to some amount of
> confusion if you then don't do another code point assignment.
>

I am aware of this boilerplate, but I don't think it comports well with the
way we actually handle IDs, which is that they stick around on the IETF
site forever. Remember, the only purpose here is that when you see the code
point on the Internet, you know what it means. As for the reving issue,
that's addressed by referring to a specific version.

I would note that
https://datatracker.ietf.org/doc/draft-ietf-tls-iana-registry-updates/
encodes this practice and it's currently in the RFC-Ed queue, so if you
object, you ought to do it soon.


> What I was thinking about: I'm not sure that this is just about a code
> point reference.  It's also about providing access to information by which
> others can assess the value of the algorithm.  Yes, there are other venues,
> but as you yourself pointed out, there really hasn't been any harm in
> having the algorithm published as an RFC:
>
>
> It does seem to me that for
>> national algorithms, they will be in the libraries anyway because
>> they will be mandatory procurement requirements.
>
>
> That's certainly an understandable prediction, but I haven't found it to
> be true in practice.
>
>
> Not a great demonstration of brand dilution, right?
>

Well, maybe. We got requests to implement these, and the fact that they
were RFCs and in some cases standards track RFCs was, IIRC, used as an
argument. However, we also felt we could say "no". However, I've also seen
algorithms in libraries (including NSS) mostly because someone decided to
do as much as was in some set of RFCs, so practices differ, even within
projects.

-Ekr