Re: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)
Bob Briscoe <ietf@bobbriscoe.net> Mon, 04 December 2023 23:45 UTC
Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA29DC14F683; Mon, 4 Dec 2023 15:45:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SORwE7AE90_u; Mon, 4 Dec 2023 15:45:15 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80D56C14F603; Mon, 4 Dec 2023 15:45:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=In-Reply-To:From:References:Cc:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=keAjBCUBPlCWtbwwsVqAvT2aDB7L9CckbuK79H816Cc=; b=ALBa6HqzNFRhYoHfb/daAfZ2dg nBmo5kwVw+HN9ZGzghplvcl/i1YNGVaomCfvqPPBKTQtTMUBcI4AWPp0q0zRSbDWIA3TAPRL1NWxq hSimqS+zgJxcPSnqCHo7ZSBLPaYDgWXuQt2LX5UCGMt+iVcvaTS9I7Ptc3E9KDp5nHvIc+uYZrvI1 BhHntitWosz9oiAe/8hsIpCe8TsAuXc3dwrKtCxavfLCgrzelK0TA/bEnYmkCn163nr1PiKX8ZHSp x+gIWnfxUMmYTYF7hVzzeK2aHtj+faRUYzmj81iKXdL7VI/BoHxubcPu3cVhckXxSXO76gIB73W8Z IfdwhzSQ==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:55384 helo=[192.168.1.8]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.96.2) (envelope-from <ietf@bobbriscoe.net>) id 1rAIcj-0007Fs-0n; Mon, 04 Dec 2023 23:45:09 +0000
Content-Type: multipart/alternative; boundary="------------ljsrzubTFK4Z0pLtUgUKqOyX"
Message-ID: <1a8ea310-24c5-4e5c-a702-2e2330dac3b8@bobbriscoe.net>
Date: Mon, 04 Dec 2023 23:45:08 +0000
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, The IESG <iesg@ietf.org>
Cc: "gorry@erg.abdn.ac.uk" <gorry@erg.abdn.ac.uk>, "tsvwg@ietf.org" <tsvwg@ietf.org>, "tsvwg-chairs@ietf.org" <tsvwg-chairs@ietf.org>, "draft-ietf-tsvwg-rfc6040update-shim@ietf.org" <draft-ietf-tsvwg-rfc6040update-shim@ietf.org>
References: <170083120422.39897.10773838518629428052@ietfa.amsl.com> <cd0b649c-5566-4a8f-8540-c1eb066b0f0a@bobbriscoe.net> <BY5PR11MB4196C8061E68201A85DF8566B586A@BY5PR11MB4196.namprd11.prod.outlook.com>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <BY5PR11MB4196C8061E68201A85DF8566B586A@BY5PR11MB4196.namprd11.prod.outlook.com>
X-MagicSpam-TUUID: 6a4f5c16-ef25-4459-a4a8-17e00afc6ba7
X-MagicSpam-SUUID: daf3a949-d8b8-4bbd-8cae-ab6626ded8d4
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/0xpwCUviMGj5SQx2LUwnKIcJt6E>
Subject: Re: [tsvwg] Robert Wilton's No Objection on draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Dec 2023 23:45:19 -0000
Rob, Thx for persevering with me. I agree with you, now that I understand it's about allowing non-manual approaches. I'll use your proposed text. Bob On 04/12/2023 13:25, Rob Wilton (rwilton) wrote: > > Hi Bob, > > Please see inline … > > *From:*Bob Briscoe <ietf@bobbriscoe.net> > *Sent:* Friday, December 1, 2023 11:31 PM > *To:* Rob Wilton (rwilton) <rwilton@cisco.com>; The IESG <iesg@ietf.org> > *Cc:* gorry@erg.abdn.ac.uk; tsvwg@ietf.org; tsvwg-chairs@ietf.org; > draft-ietf-tsvwg-rfc6040update-shim@ietf.org > *Subject:* Re: [tsvwg] Robert Wilton's No Objection on > draft-ietf-tsvwg-rfc6040update-shim-21: (with COMMENT) > > Robert, Thank you for these thoughts. Pls see [BB] > > On 24/11/2023 13:06, Robert Wilton via Datatracker wrote: > > Robert Wilton has entered the following ballot position for > > draft-ietf-tsvwg-rfc6040update-shim-21: No Objection > > When responding, please keep the subject line intact and reply to all > > email addresses included in the To and CC lines. (Feel free to cut this > > introductory paragraph, however.) > > Please refer tohttps://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ > > for more information about how to handle DISCUSS and COMMENT positions. > > The document, along with other ballot positions, can be found here: > > https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc6040update-shim/ > > ---------------------------------------------------------------------- > > COMMENT: > > ---------------------------------------------------------------------- > > Hi, > > Thanks for this document, I found it interesting to read. A couple of minor > > comments for you to consider: > > (1) p 5, sec 4. Making a non-ECN Tunnel Ingress Safe by Configuration > > Whether or not an ingress implementation claims compliance with > > RFC 6040, RFC 4301 or RFC3168, when the outer tunnel header is IP > > (v4 or v6), if possible, the operator MUST configure the ingress > > to zero the outer ECN field in any of the following cases: > > As a minor comment, I wonder whether RFCs should be specifying requirements on > > people (i.e., operators), or whether it would be better to place the > > requirement on the deployment. > > > [BB] We (the WG) had to work out how to navigate this particularly > tricky balancing act. The following paras at the end of §3 were > intended to explain: > > However, the ECN field is a non-optional part of the IP header (v4 > and v6). So any implementation that creates an outer IP header has > to give the ECN field some value. There is only one safe value a > tunnel ingress can use if it does not know whether the egress > supports propagation of the ECN field; it has to clear the ECN > field in any outer IP header to 0b00. > > However, an RFC has no jurisdiction over implementations that > choose not to comply with it or cannot comply with it, including > all those implementations that predated the RFC. Therefore it > would have been unreasonable to add such a requirement to RFC > 6040. Nonetheless, to ensure safe propagation of the ECN field > over tunnels, it is reasonable to add requirements on operators, > to ensure they configure their tunnels safely (where possible). > > > Perhaps your suggestion has taken this all into account, so you're > suggesting that placing the requirement on the deployment would be > better than on the operator (of the deployment). Perhaps, but I always > prefer the active to the passive. "A deployment of an ingress SHOULD > be configured to zero the outer," is less clear than, "The operator > SHOULD configure the ingress to zero the outer." > > */[Rob Wilton (rwilton)] /* > > */I was perhaps thinking of something more like: /**//* > *//*if possible, the ingress device SHOULD be configured to > zero the outer ECN field in any of the following cases: > > *//* > > */This text has the benefit of applying no matter how the > configuration came into effect, e.g., perhaps it is being configured > via a controller, or even as part of a configuration template produced > by a controller manufacturer./* > > / > / > FWIW, I'm not sure what the problem is with placing requirements on > people. I've seen drafts 'corrected' when they place requirements on > implementers, rather than implementations. But is this practice > actually documented anywhere, or is there any rationale to support it? > I'm always willing to learn if there is. > > */[Rob Wilton (rwilton)] /* > > */Placing the requirement on the person seems to unnecessarily > constrain compliance to only where a person is actively involved in > the process. Is that the goal here? I.e., does the requirement still > apply if the action is being taken by a machine, code, or some other > automation?/* > > *//* > > */Ultimately, I think that it doesn’t matter who takes the action, > what really matters is how the protocol behaves and hence that is why > I believe that it is more precise to place the constraints on the > required resultant effect, not on the person/action to achieve that > effect./* > > *//* > > */But this is also a non-blocking comment. I.e., you can keep the > text in the active tense if you wish, and I suspect folks will manage > to infer the actual underlying intent. /* > > (2) p 10, sec 6.1.1. L2TP (v2 and v3) ECN Extension > > L2TP maintainers are RECOMMENDED to implement the ECN extension to > > L2TPv2 and L2TPv3 defined in Section 6.1.1.2 below, in order to > > provide the benefits of ECN [RFC8087], whenever a node within an L2TP > > tunnel becomes the bottleneck for an end-to-end traffic flow. > > Similarly to my previous comment, should the RFC 2119 requirement be placed on > > the maintainers, or should it be placed on an updated versions of L2TP? > > > [BB] Here, I agree with you. Proposed replacement text: > > > Implementation of the ECN extension to L2TPv2 and L2TPv3 defined in Section > 6.1.1.2 below is RECOMMENDED, in order to provide the benefits of ECN... > > > Similarly, with the identically structured requirements in the GRE and > AMT sections. > > Thank you. > > > Bob > > */[Rob Wilton (rwilton)] /* > > */Regards,/* > > */Rob/* > > > > Regards, > > Rob > > > > -- > ________________________________________________________________ > Bob Briscoehttp://bobbriscoe.net/ -- ________________________________________________________________ Bob Briscoehttp://bobbriscoe.net/
- [tsvwg] Robert Wilton's No Objection on draft-iet… Robert Wilton via Datatracker
- Re: [tsvwg] Robert Wilton's No Objection on draft… Bob Briscoe
- Re: [tsvwg] Robert Wilton's No Objection on draft… Rob Wilton (rwilton)
- Re: [tsvwg] Robert Wilton's No Objection on draft… Bob Briscoe