Re: [spring] Spirit and Letter of the Law (was: Question about SRv6 Insert function)

Ron Bonica <rbonica@juniper.net> Fri, 06 September 2019 03:26 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B821120850; Thu, 5 Sep 2019 20:26:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i3sEbYGigSYG; Thu, 5 Sep 2019 20:26:30 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7AE812081C; Thu, 5 Sep 2019 20:26:30 -0700 (PDT)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x863PHql007260; Thu, 5 Sep 2019 20:26:21 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=DG+HxoDtHB0AmU5U8uYpMUzhPqFzNb0oW12wr6aMPdw=; b=lQiiL2O82qDKmp0+7AOKV8oEv2jZ7LhaLrN6kWUmp/Dq6XyDuZiPcfEpIJzNkSaK5E5H EsYw4B6vJVz1+K7FMMEqhZ8N+3JcNBfvUxFMusVmy/aDhtsH2inEdPlM6Db3t0GmiUgf VD/E/X8SCdLXXK0AqylPQZNC96f5wvpdNSfrV3akWbW1RfRcRNTcsPcxsvKu4zYtjhR3 dd+qrfGDUNB3htDST5NTiXWvAniH2CaKkiF1vaHE464TLxMUxlr70OQ6Zz3WKM3FBomN C9PcAd/BdXzW0yYf8DwDzldYq2Aw3H9eG8FptS7rTrjuuu1xEY3WDdujvbIJeCya8wfE 5g==
Received: from nam04-bn3-obe.outbound.protection.outlook.com (mail-bn3nam04lp2054.outbound.protection.outlook.com [104.47.46.54]) by mx0a-00273201.pphosted.com with ESMTP id 2utqg3axpn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 05 Sep 2019 20:26:20 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eJkA53IkCOfF2uCgz0RyvLKcjVjYpHldZn/5HE2HoPn8uX5N58sygFkefWk/uI0cD6/5Z3p9+ISzqTzhfyBxmnnAPCuH/1Ubmy2EEpGhJ9CQNaeaoZGjOMXQBlZcfavIva8VvAi7AlLGJkxK009i5IJjd/X47PNaUf0Kf0Pbq2E2LzJp87RN07VF5Ha5uhncZq44xhbzNQm+bcJLbFUggaxy7ftei5aZmR7p3QsCSZvNv3OlpEXimTcbgsoag80iVYW2A/ex/1Uyj+hm7lmFgxan9Fg7Sfc/BhTee3dM8/iKQcjGvJR8qk+VbSckeD6suQhi7ciQ7nqWGNVZuicafQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DG+HxoDtHB0AmU5U8uYpMUzhPqFzNb0oW12wr6aMPdw=; b=XeghcnctHCvYKjeb5UbC3hs5zqRvK/nQSDjlGo96Q6vco7sKpk1ot91ox+2E3PTdfo83N9W4fPUqpDBOfbrFobOTF7NWqpG8S2Xova2Av9unoMvzI+xmLRJ0gh2fyUvoBuUK3TlFyx5weyF+ioAo5Z+UPodBAdyzIu5eJGm9CUk8/F2YUahUUI3i60jUJKNF2fvb7bJdwdYJlAyeUOROfQ493dpTYkL/aYLCqZ0BzboKvLizZogcxn0t6EH2jVsshIUpmBXZ0x+1q7hwVZEPL+RTreLTtXoc9EeWs9Oa9iyn+GLvieD6qiSakjqpmhoNvnLWWFPgvxuBN2YJIQwhpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
Received: from BYAPR05MB5463.namprd05.prod.outlook.com (20.177.185.144) by BYAPR05MB6101.namprd05.prod.outlook.com (20.178.54.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2241.10; Fri, 6 Sep 2019 03:26:17 +0000
Received: from BYAPR05MB5463.namprd05.prod.outlook.com ([fe80::f4f2:f284:d49a:890a]) by BYAPR05MB5463.namprd05.prod.outlook.com ([fe80::f4f2:f284:d49a:890a%4]) with mapi id 15.20.2263.005; Fri, 6 Sep 2019 03:26:17 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Ole Troan <otroan@employees.org>
CC: Fernando Gont <fernando@gont.com.ar>, Suresh Krishnan <suresh.krishnan@gmail.com>, "spring@ietf.org" <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>, draft-voyer-6man-extension-header-insertion <draft-voyer-6man-extension-header-insertion@ietf.org>, draft-ietf-spring-srv6-network-programming <draft-ietf-spring-srv6-network-programming@ietf.org>
Thread-Topic: Spirit and Letter of the Law (was: Question about SRv6 Insert function)
Thread-Index: AdVjS14TVsuRj78sSeu1r8rfsn3VOQAdy3cAACNNuMA=
Content-Class:
Date: Fri, 06 Sep 2019 03:26:17 +0000
Message-ID: <BYAPR05MB5463B34EF99C363E707C3D9DAEBA0@BYAPR05MB5463.namprd05.prod.outlook.com>
References: <BYAPR05MB54637FEAE1518F83977D274FAEB80@BYAPR05MB5463.namprd05.prod.outlook.com> <538732E2-915B-4952-A439-F4678FCC21B2@employees.org>
In-Reply-To: <538732E2-915B-4952-A439-F4678FCC21B2@employees.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=rbonica@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2019-09-06T03:26:15.5153137Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Business Use Only; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=9ec84035-009a-49b9-8fde-b34565e8c4ba; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-originating-ip: [66.129.241.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4682da84-a858-4f58-01f3-08d73279fad5
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:BYAPR05MB6101;
x-ms-traffictypediagnostic: BYAPR05MB6101:
x-microsoft-antispam-prvs: <BYAPR05MB6101AD0BA45ACC17B522D20CAEBA0@BYAPR05MB6101.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0152EBA40F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39860400002)(396003)(376002)(346002)(136003)(366004)(199004)(189003)(51444003)(13464003)(316002)(229853002)(256004)(64756008)(71190400001)(66946007)(4326008)(2906002)(71200400001)(76116006)(14444005)(86362001)(66476007)(66446008)(66556008)(99286004)(561944003)(8936002)(54906003)(3846002)(25786009)(6116002)(52536014)(33656002)(26005)(8676002)(476003)(186003)(81166006)(81156014)(486006)(6506007)(53546011)(55016002)(66066001)(9686003)(6436002)(66574012)(11346002)(14454004)(76176011)(7696005)(446003)(6916009)(7736002)(6246003)(478600001)(102836004)(305945005)(74316002)(53936002)(5660300002); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB6101; H:BYAPR05MB5463.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: aFGCea9lwH/JMum45+1mvLF4P1P874wl8bwYevpTmA7TofjQcMelpektgmdDaZ1HZCu4fUe/2XsDQDAddwg5NUupJ/0UhtXHjP0WWUG5q7TNVDl78g57siPw7ECLrXLFqP2Xe5yyEiK0JyuKEU1GP38BwysGQ9w8VpxsxqfXFyCVz53uIbpcmiE3Y6ujvwTQlP8uMa40EUvLBJbCem62doyOubljLeAmasIc1Lu3Nyb3jTqmGgqhwCNpehSDNo0l76o/f4S0hQkz7t33RLowO33MyZwAg3hX1UkJzThnC4ZgdpGxIyhJ4XH/ldDYXui6SJ/kKyEDnF5eoxnyPvRVBIvoP4VTwZ8y1ff9+IGySv4bpseBQBjFwWQ1Q0peIffD5QsK7x2cSS9Wpw1Sle4PgfaAOlohijJNwdeIp56E6MI=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 4682da84-a858-4f58-01f3-08d73279fad5
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Sep 2019 03:26:17.5050 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: thu36VosisEiVGo8IMezi7S8nlMDUBvoXw0RP8Zo8GSpZuYFHCcBtsN4LTRFANGW+6lV3zmghk3GjJ6Lq5zhnA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6101
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.70,1.0.8 definitions=2019-09-06_02:2019-09-04,2019-09-06 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 bulkscore=0 adultscore=0 mlxscore=0 lowpriorityscore=0 spamscore=0 clxscore=1015 priorityscore=1501 phishscore=0 impostorscore=0 malwarescore=0 mlxlogscore=999 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1906280000 definitions=main-1909060037
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/yIU-Vqsn6zwo2U8BOyWpqHuBb5U>
Subject: Re: [spring] Spirit and Letter of the Law (was: Question about SRv6 Insert function)
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Sep 2019 03:26:32 -0000

Ole,

The IETF does not write de jure standards. At the same time, it must not blithely progress proposals that ignore existing standards. We need to find a balance.

Generally speaking, proposals that conform to the spirit and letter of existing standards are better than proposals that deviate. This is a matter of hygiene. However, exemptions might be granted.

IMHO, a WG can progress a proposal that deviates from existing standards if all of the following conditions are met:

1) The proposal documents the deviation
2) The proposal explores alternative solutions that do not deviate
3) The proposal explains either a) that alternative solutions do not exist, or b) why alternative solutions are not viable
4) The proposal describes the possibly limited deployment environment in which it is applicable
5) The WG cannot demonstrate any risk associated the deviation in the described deployment environment

A naïve reading of your message, below, suggests that we fixate on Condition #5, ignoring conditions #1 - #4. I'm pretty sure that wasn't your intent. If it were, our new process lead us into some bad places.

Like you, I want to avoid legalistic readings of existing standards. This is why I talk about the "spirit and letter" of a standard. For example, assume the following:

- An existing standard defines a mechanism for doing something
- A new proposal reinvents that wheel without sufficient motivation

The new proposal does not violate the letter of the existing standard, but it does violate its spirit.

Clearly, the barriers to progressing a draft that violates the letter of an existing standard should be higher than the barriers to progressing a draft that violates the spirit of an existing standard. 

                                                                                                  Ron



Juniper Business Use Only

-----Original Message-----
From: Ole Troan <otroan@employees.org> 
Sent: Thursday, September 5, 2019 4:19 AM
To: Ron Bonica <rbonica@juniper.net>
Cc: Fernando Gont <fernando@gont.com.ar>; Suresh Krishnan <suresh.krishnan@gmail.com>; spring@ietf.org; 6man@ietf.org; draft-voyer-6man-extension-header-insertion <draft-voyer-6man-extension-header-insertion@ietf.org>; draft-ietf-spring-srv6-network-programming <draft-ietf-spring-srv6-network-programming@ietf.org>
Subject: Re: Spirit and Letter of the Law (was: Question about SRv6 Insert function)

Dear Ron,

The IETF is not writing de jure standards.
In fact reality is quite different, and the Internet evolves the way it does somewhat independently of what documents the IETF produces.
In fact I know of no networking products (or deployments) that follow the intent and spirit of RFC8200. I challenge to point me to one! ;-)

Let me quote Tony Li's response to Fernando's escalation email to the architecture list:

"The fact of the matter is that the IETF is completely helpless to prevent such things. 
True, it can block standardization, but if the market wants it, the market will drive it and all that the IETF does is to make itself irrelevant to the process."

My suggestion to Fernando was to argue the issues on technical merit.
Can you please explain why you don't do that?

- Does it break end to end transparency?
- Can end host protect their traffic with encryption or do the proposed mechanisms break that?
- How is PMTUD, ICMP errors, AH being handled?
- Does it break intereroperability?

Best regards,
Ole


> On 4 Sep 2019, at 20:27, Ron Bonica <rbonica@juniper.net> wrote:
> 
> Ole,
> 
> Yes, a deep breath and some introspection are always a good thing.
> 
> First, I think that we need to make a distinction between the "spirit" and "letter" of the law. Next, we need to make a statement regarding good engineering practice.
> 
> RFC 8200 mandates some things. For example, In an IPv6 header, the source address must precede the destination address. Any attempt to reverse those two would violate the letter of the law.
> 
> By contrast, RFC 8200 strongly suggests other things. For example, transit nodes should not insert or delete extension headers. In general, these suggestions should be heeded. But exemptions can be granted, on a case-by-case basis, given that the motivation is strong, the risk is minimal, and there are no viable alternatives.
> 
> For better or worse, RFC 8200 does not use RFC 2119 language. So it is difficult to distinguish between the spirit and letter of the law. I think that is the genesis of the current debate.
> 
> Beyond that, we need to make a statement regarding good engineering practice. If a technology violates the spirit of RFC 8200 once, with good reason, that is fine. If it violates the spirit of RFC 8200 twice, we should all start asking questions. If it violates the spirit of RFC 8200 three times, and promises to do so again in the future, we should start to question whether that technology is building on RFC 8200 or trying to redefine it.
>                                                                                             
> Ron
> 
> 
> 
> Juniper Business Use Only
> 
> -----Original Message-----
> From: Ole Troan <otroan@employees.org>
> Sent: Wednesday, September 4, 2019 2:58 AM
> To: Fernando Gont <fernando@gont.com.ar>
> Cc: Suresh Krishnan <suresh.krishnan@gmail.com>; Ron Bonica 
> <rbonica@juniper.net>; spring@ietf.org; 6man@ietf.org; 
> draft-voyer-6man-extension-header-insertion 
> <draft-voyer-6man-extension-header-insertion@ietf.org>; 
> draft-ietf-spring-srv6-network-programming 
> <draft-ietf-spring-srv6-network-programming@ietf.org>
> Subject: Re: Question about SRv6 Insert function
> 
> [ snip ]
> I would prefer that we calmed down a bit on the protocol policing.
> 
> [ snip ]