Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-requirements-16: (with DISCUSS and COMMENT)

"Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com> Thu, 27 July 2017 20:41 UTC

Return-Path: <ncamwing@cisco.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 808561321A3; Thu, 27 Jul 2017 13:41:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.522
X-Spam-Level:
X-Spam-Status: No, score=-14.522 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hZM-7xGIy9Cn; Thu, 27 Jul 2017 13:41:21 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 983421321A2; Thu, 27 Jul 2017 13:41:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10178; q=dns/txt; s=iport; t=1501188081; x=1502397681; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=zerlnnKJmb//CLyo6zS/M5J0cUckAxUBm7G0bSVym9c=; b=STgXRYRiXsp4AEL/BYyTXquUzj2Wh/BGcYvN5RPmxD+ovsjBuQfxTFKG Mxb3JCTqFmdSI352FX6cyscVeDVFX7nz9dYxeRrGzlJoLL7/ZOYV+So+B cKxG71EV3tz8Ga2z0yxqy1v+mFd9uPIktNfxbbWRJDdUb4H2iGVokwuSr U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AOAgA3T3pZ/5NdJa1dGQEBAQEBAQEBAQEBBwEBAQEBg1pkbScHn0YilgoOggSFRwIag0tBFgECAQEBAQEBAWsohRgBAQEBAgEjEUUQAgEGAhgCAiYCAgIwFRACBAoEBYonCJIgnWSCJos/AQEBAQEBAQEBAQEBAQEBAQEBIIELgh2FLisLgm6EQAESAQeDKzCCMQEEiWOHA48AApQjggyFUoN4hmaVcQEmByp/C3cVSRIBhQMcGYFOdodPgSOBDgEBAQ
X-IronPort-AV: E=Sophos;i="5.40,421,1496102400"; d="scan'208";a="462534944"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Jul 2017 20:41:20 +0000
Received: from XCH-RTP-011.cisco.com (xch-rtp-011.cisco.com [64.101.220.151]) by rcdn-core-11.cisco.com (8.14.5/8.14.5) with ESMTP id v6RKfJJZ005253 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 27 Jul 2017 20:41:20 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-011.cisco.com (64.101.220.151) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Thu, 27 Jul 2017 16:41:18 -0400
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1210.000; Thu, 27 Jul 2017 16:41:18 -0400
From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
To: Ben Campbell <ben@nostrum.com>
CC: The IESG <iesg@ietf.org>, "draft-ietf-sacm-requirements@ietf.org" <draft-ietf-sacm-requirements@ietf.org>, Karen O'Donoghue <odonoghue@isoc.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Ben Campbell's Discuss on draft-ietf-sacm-requirements-16: (with DISCUSS and COMMENT)
Thread-Index: AQHS7pIhjU8zcKr1zUmvwgnJ3MxZwqI40NuAgCWDq4CABSp7gIAAhXWAgAQdeoA=
Date: Thu, 27 Jul 2017 20:41:18 +0000
Message-ID: <362BE9B7-AA1C-4B2E-9318-423CFED3F820@cisco.com>
References: <149849144588.31865.17392511624418268107.idtracker@ietfa.amsl.com> <D00CDC54-8CC1-454A-B475-8EB90348483E@cisco.com> <F0D28EA6-FFF8-4CDE-9715-3CB00B86104E@nostrum.com> <644C5859-6C9B-49A2-858A-43242777FD8D@cisco.com> <3B998144-4527-4683-8EC7-2933C40E5AAF@nostrum.com>
In-Reply-To: <3B998144-4527-4683-8EC7-2933C40E5AAF@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.1a.0.160910
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.155.84.63]
Content-Type: text/plain; charset="utf-8"
Content-ID: <5915C7AE5FF44743A191FFD04E1113FB@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/wwdmO_X0WuDIJqxRUJXOgewBBY4>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-requirements-16: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jul 2017 20:41:23 -0000

Hi Ben,

Apologies for the delays, catching up on emails again.  Reciprocating and cutting to relevant points to discuss below:

On 7/24/17, 3:50 PM, "Ben Campbell" <ben@nostrum.com> wrote:

    Thank; see inline. As before, I’ve deleted sections that do not seem to need further discussion.
    
    > On Jul 24, 2017, at 4:53 PM, Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com> wrote:
    > 
    > Hi Ben,
    > See my hopefully more clear responses below…also, please let me know if you are amenable to the suggested updates so that I can do another revision (would rather wait in case you suggest more changes….) -Thanks	
    > 
    > On 7/21/17, 12:59 AM, "Ben Campbell" <ben@nostrum.com> wrote:
    > 
    >    Hi, thanks for the response. Comments inline. I removed text that doesn’t seem to need further discussion.
    > 
    >    Ben.
    > 
    >> On Jun 27, 2017, at 8:06 PM, Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com> wrote:
    >> 
    >> Thanks for resending Ben!  Some comments and responses below:
    >> 
    >> On 6/26/17, 8:37 AM, "Ben Campbell" <ben@nostrum.com> wrote:
    >>   ----------------------------------------------------------------------
    >>   DISCUSS:
    >>   ----------------------------------------------------------------------
    >> 
    >>   (Resending because I forgot to hit the "send email" button this first time. No
    >>   other change.)
    >> 
    >>   The SACM charter requires the group to " whenever reasonable and possible,
    >>   reuse existing protocols, mechanisms, information and data models. " If that is
    >>   reflected anywhere in the requirements, I missed it. (which is possible.) In
    >>   particular, I think section 2.6 needs to include requirements to favor use of
    >>   existing "transfer protocols".  (As written, T-001 seems almost tailored to
    >>   counter arguments to "just use HTTP".)
    >> [NCW] “Whenever reasonable and possible” imho is subjective, while we discussed 
    >> existing data models and protocols such as OVAL, IF-MAP, IODEF, YANG,
    >> etc.  The group concluded that it was best to include the phrase rather than call
    >> out the ones raised in the group as new ones have arisen (e.g. leveraging SWID
    >> and I think there is one to potentially use ROLIE).
    >> 
    > 
    >    I’m not sure I understand your response, and I see that version 17 did not add anything to the requirement language. Do you argue that there are no need for requirements to prefer existing mechanisms? I don’t expect a requirement to reuse any particular mechanism by name, but I think these requirements are incomplete without some explicit bias towards existing technologies.
    > 
    >    Or you do you mean to argue that the analysis of potential existing technologies has already been completed?
    > [NCW] My response was to suggest that no change was needed as the group could not agree to a “preferred list” but rather, not cite any in the requirements so as not to preclude other standards.  Also, to your last point, the analysis has not really been completed.  SACM is also in the process of updating its charter and in the new charter, the work defined is going to be more prescriptive to the technologies that will be sought.
    > At this point, I don’t think it makes sense to call out preferred mechanisms in the requirements draft as the group is already evaluating applicability of existing ones to consider (some of which were not mentioned at the time the requirements document was evolving and other new ones being developed in other groups @IETF can be candidates).
    
    I think we are talking past each other. I am not asking for this document to call out specific technologies. I am asking for it to contain a requirement to prefer existing IETF technologies over creating new mechanisms from scratch. It doesn’t need to enumerate “preferred” technologies to do that, and such a requirement should still allow the working group to create new mechanisms if no existing mechanism can fulfill the requirements.
[NCW] Ah, got it.  While I am not sure how it can be a MUST requirement, I can try to add a SHOULD. How about we add a requirement that reads:
  “T-006 Transfer Protocol adoption: SACM SHOULD where possible, leverage and use existing IETF transfer protocols versus defining new ones.  For example,  where YANG [RFC6020] is used as a data model and a REST interface is desired, RESTCONF [RFC8040] MUST be used.”
    
    > 
    >    […]
    > 
    >>   ----------------------------------------------------------------------
    >>   COMMENT:
    >>   ———————————————————————————————————
    >> 
    > 
    >    […]
    >> 
    >>   - g-001: "SACM MUST allow
    >>       implementations to use their own extensions; either proprietary data
    >>       models, protocols or extensions to SACM data models or protocols
    >>       could be used though they are not considered to be SACM compliant."
    >> 
    >>   That seems to say that SACM must allow extensions, but those extensions would
    >>   not be considered compliant. That seems like a contradiction. As worded with
    >>   the MUST, it seems like it says SACM cannot prevent implementations from doing
    >>   non-interoperable things.
    >> [NCW] I would expect proprietary extensions to not be interoperable, but
    >> the SACM elements to be compliant (I think this is true, for example of RADIUS
    >> and the RADIUS defined AVPs enabling interop between implementations vs proprietary ones).
    >> 
    > 
    >    So this is probably pedantic, but I’m still confused when you say that something is must be allowed but is not compliant. That seems like a contradiction.
    > [NCW] I am open to suggestions to lessen confusion!  Would it improve readability and intent if the sentence were to be removed?
    
    Would it capture the idea to say that SACM must allow for both standardized and proprietary extensions? (leaving out any mention of non-compliance).
[NCW] Yes, that works as well….I can make that adjustment.
    
> 
    >> 
    >>   - ARCH-004: "The fact that a centralized or
    >>       decentralized deployment is used SHOULD be invisible to a consumer."
    >>   Can you elaborate on why? Might not a consumer want to consider the nature of a
    >>   data source?
    >> [NCW] Yes, which is why it is a SHOULD….that is a consumer may not care or, to your
    >> point, want to know the nature of the data source (and provenance).
    > 
    >    I suggest a sentence or two to that effect.
    > [NCW] Suggested change to the last sentence to read: “As a consumer may or may not desire to explicitly know the data source, knowledge of a centralized or decentralized deployment SHOULD be invisible to a consumer.”
    
    I don’t think that helps, as it seems to say suggest that the consumer might want this but you shouldn’t give it to them. How about something like the following:
    
    "The fact that a centralized or decentralized deployment is used SHOULD be invisible to a consumer. However, there may be cases where the producer chooses
      to include that information due to consumer preference."
[NCW] That works as well….I can make that adjustment.