Re: [sfc] Murray Kucherawy's Discuss on draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)
"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 15 July 2021 12:52 UTC
Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 360573A0E7A;
Thu, 15 Jul 2021 05:52:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001,
RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id QHjkmYi8sY2s; Thu, 15 Jul 2021 05:52:38 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id DEEC03A0E76;
Thu, 15 Jul 2021 05:52:37 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
by maila2.tigertech.net (Postfix) with ESMTP id 4GQZ5x2XgBz6G9ds;
Thu, 15 Jul 2021 05:52:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com;
s=2.tigertech; t=1626353557;
bh=ooZCR25L1WhC2Wp1quX/i8LsdOVrklCYIlO9sVV2zLg=;
h=Subject:To:Cc:References:From:Date:In-Reply-To:From;
b=muOp7qQQ0qXPVteaxtepk8n9jzmKYK590snoMk0eSpc9hVPLHoCnj6nvWMUMeX/qs
5Ov9RyfOag4mttjtJhL8g9j4F+B5EDGT2eMqL6twqZ1lnbSwQj/vNGNs2M1aFL0LtU
302UKM79zYIJV9AX86KB0CSKEl2wR9CBvfkBfHbc=
X-Quarantine-ID: <ThXj3ZsXq3g3>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.23.64] (50-233-136-230-static.hfc.comcastbusiness.net
[50.233.136.230])
(using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits))
(No client certificate requested)
by maila2.tigertech.net (Postfix) with ESMTPSA id 4GQZ5w44q6z6G7qD;
Thu, 15 Jul 2021 05:52:36 -0700 (PDT)
To: Murray Kucherawy <superuser@gmail.com>, The IESG <iesg@ietf.org>
Cc: gregimirsky@gmail.com, draft-ietf-sfc-nsh-integrity@ietf.org, sfc@ietf.org
References: <162632962077.15354.4548212112967523910@ietfa.amsl.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <c12c1db0-a7bf-ba50-c73d-dcf24b92f695@joelhalpern.com>
Date: Thu, 15 Jul 2021 08:52:34 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101
Thunderbird/78.11.0
MIME-Version: 1.0
In-Reply-To: <162632962077.15354.4548212112967523910@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/yC-3dN6jvyxZNZY9EYz3XIUlJMs>
Subject: Re: [sfc] Murray Kucherawy's Discuss on
draft-ietf-sfc-nsh-integrity-06: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Jul 2021 12:52:42 -0000
The whole point of the earlier discussion is that this is an optional extension. The fact that if you do it, it is mandatory to do it as described does not make this mandatory for implementations of 8300. None of the words in this document have that effect. if the IESG wants to retroactively change 8300, that may be one of the few things that could actually cause the working group to engage, as folks were strongly against mandating the support for this. Yours, Joel On 7/15/2021 2:13 AM, Murray Kucherawy via Datatracker wrote: > Murray Kucherawy has entered the following ballot position for > draft-ietf-sfc-nsh-integrity-06: Discuss > > When responding, please keep the subject line intact and reply to all > email addresses included in the To and CC lines. (Feel free to cut this > introductory paragraph, however.) > > > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html > for more information about DISCUSS and COMMENT positions. > > > The document, along with other ballot positions, can be found here: > https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-integrity/ > > > > ---------------------------------------------------------------------- > DISCUSS: > ---------------------------------------------------------------------- > > Enough other Area Directors have said, and I agree, that this should officially > update RFC 8300, so I'd like to have the discussion. In particular, given that > this was identified as a gap in RFC 8300, and since I don't see any explicit > statement that this is meant to be an optional extension, shouldn't it be an > update? > > > ---------------------------------------------------------------------- > COMMENT: > ---------------------------------------------------------------------- > > Only nits to add, given the thorough treatment already given by others: > > Section 4.1.2: "The first level of assurance where all NSH data ..." -- add > "is" before "where"? And the same issue in the next paragraph. > > Section 5.2: s/Coves/Covers/ > > > > _______________________________________________ > sfc mailing list > sfc@ietf.org > https://www.ietf.org/mailman/listinfo/sfc >
- [sfc] Murray Kucherawy's Discuss on draft-ietf-sf… Murray Kucherawy via Datatracker
- Re: [sfc] Murray Kucherawy's Discuss on draft-iet… mohamed.boucadair
- Re: [sfc] Murray Kucherawy's Discuss on draft-iet… Joel M. Halpern
- Re: [sfc] Murray Kucherawy's Discuss on draft-iet… Murray S. Kucherawy