Re: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header

"Black, David" <david.black@emc.com> Mon, 25 July 2016 21:17 UTC

Return-Path: <david.black@emc.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D329412DA3E for <tsvwg@ietfa.amsl.com>; Mon, 25 Jul 2016 14:17:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.02
X-Spam-Level:
X-Spam-Status: No, score=-2.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=emc.com header.b=uUHyxEMa; dkim=pass (1024-bit key) header.d=emc.com header.b=MQMtsLOg
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 17hurnOym752 for <tsvwg@ietfa.amsl.com>; Mon, 25 Jul 2016 14:17:41 -0700 (PDT)
Received: from esa2.dell-outbound.iphmx.com (esa2.dell-outbound.iphmx.com [68.232.149.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 812A912DA3B for <tsvwg@ietf.org>; Mon, 25 Jul 2016 14:17:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=emc.com; i=@emc.com; q=dns/txt; s=jan2013; t=1469481461; x=1501017461; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=EZp/1VlkXOPyhjfGqlMsRxH6EzBi255hQ5x9hUko/sI=; b=uUHyxEMa6KG79f+wecssJ/S0hXSqVTh7pSIF88xu/ecbNOQs0SixHNCQ rjlk99EtCd1cKaJ5QjspB6UwP9Fmh2vQ6TKQoXhs4FVH+oMzTZQ6Sm66n B+Sl5M5d+OXQ0JvcbNvTqmXKe0926FAwW2UIwwpK6nqz6pnAFGRUaV1sA I=;
Received: from mailuogwhop.emc.com ([168.159.213.141]) by esa2.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Jul 2016 02:17:28 +0500
Received: from maildlpprd06.lss.emc.com (maildlpprd06.lss.emc.com [10.253.24.38]) by mailuogwprd01.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id u6PLHPCw015712 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 25 Jul 2016 17:17:27 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd01.lss.emc.com u6PLHPCw015712
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1469481447; bh=HiQtCugcAZLH9NGq4OOCqVNXz1Q=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=MQMtsLOgYCHV/JxE5xDFT1Pbr4zwGxD3FkeuqZ0YhRyhKulzUr5QPi/MhZA+wouQQ 6FDwcCFScU8eftKmY3dJ9MrnXmUeTL/hDCvhEP704ZK+YqTUAZVvReerlB9RTUNPQU Mxjrt6CXRt7udzzy63eRmCV64ybKtFCAXGH8YjLU=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd01.lss.emc.com u6PLHPCw015712
Received: from mailusrhubprd54.lss.emc.com (mailusrhubprd54.lss.emc.com [10.106.48.19]) by maildlpprd06.lss.emc.com (RSA Interceptor); Mon, 25 Jul 2016 17:15:29 -0400
Received: from MXHUB309.corp.emc.com (MXHUB309.corp.emc.com [10.146.3.35]) by mailusrhubprd54.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id u6PLH5QR019877 (version=TLSv1.2 cipher=AES128-SHA256 bits=128 verify=FAIL); Mon, 25 Jul 2016 17:17:05 -0400
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB309.corp.emc.com ([10.146.3.35]) with mapi id 14.03.0266.001; Mon, 25 Jul 2016 17:17:04 -0400
From: "Black, David" <david.black@emc.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, Bob Briscoe <ietf@bobbriscoe.net>
Thread-Topic: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header
Thread-Index: AQHR5pWdjXFYU+pohk+sXghMUA/6+KApoxcg
Date: Mon, 25 Jul 2016 21:17:04 +0000
Message-ID: <CE03DB3D7B45C245BCA0D243277949362F607F4E@MX307CL04.corp.emc.com>
References: <5794CE1E.5020608@bobbriscoe.net> <CAKKJt-f=h8CJcc4J0cJkyDzBp+P_7JgWCZzKdJLpg=zQOj-DhA@mail.gmail.com>
In-Reply-To: <CAKKJt-f=h8CJcc4J0cJkyDzBp+P_7JgWCZzKdJLpg=zQOj-DhA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.66.59.62]
Content-Type: multipart/alternative; boundary="_000_CE03DB3D7B45C245BCA0D243277949362F607F4EMX307CL04corpem_"
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd54.lss.emc.com
X-RSA-Classifications: public
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/3nMq4Sig4kF0dfGoScdeaW2WH9g>
Cc: tsvwg IETF list <tsvwg@ietf.org>
Subject: Re: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jul 2016 21:17:44 -0000

Bob,

As one of your WG chairs, and shepherd for this draft,  I think the important consideration is this (from your email):

> To be clear about the implications of this decision, if the IESG eventually approves rfc6040bis as an RFC, if it states that it
> updates L2TPv3 (for instance), I believe it would mean that an implementation of L2TPv3 could no longer claim to comply
> with the L2TPv3 spec [RFC3931] until it had implemented ECN propagation compliant with RFC6040.

Getting to the point where such approval  is a good possibility requires (IMHO) significant outreach to the affected WGs & Areas in advance, and a strong rationale for why imposing RFC 6040 compliance is important enough to break compliance of a lot of implementations.  I see no such rationale in your draft (https://tools.ietf.org/html/draft-briscoe-tsvwg-rfc6040bis) - I suggest adding that rationale, starting with a pointer to  Section 5.3 of  RFC 6040, although I don’t think the PCN-based discussion there is likely to provide sufficient motivation.

Thanks, --David

From: tsvwg [mailto:tsvwg-bounces@ietf.org] On Behalf Of Spencer Dawkins at IETF
Sent: Monday, July 25, 2016 12:57 PM
To: Bob Briscoe
Cc: tsvwg IETF list
Subject: Re: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header

Hi, Bob,

On Sun, Jul 24, 2016 at 9:18 AM, Bob Briscoe <ietf@bobbriscoe.net<mailto:ietf@bobbriscoe.net>> wrote:
Spencer,

I searched for " recovering IETF process wonk" and a link to your biography was ranked top {Note 1}.

I'm looking for incontrovertible advice on whether I am correct to place various long-standing tunnelling RFCs in the updates header of this draft:
https://tools.ietf.org/html/draft-briscoe-tsvwg-rfc6040bis

As a RIPW (my own words, FWIW), I don't think incontrovertible advice exists for this. A variety of IESGs have had a variety of opinions about Updates over time, and even with every IESG there's likely a range of opinions. I am told in another e-mail that the RFC Series Advisory Group was talking about the definition of Updates (and the even more dreaded Obsoletes) in Berlin last week, so , this is not an exact science. But, since you ask me, I'm the responsible AD and I have an opinion.

My opinion is that you can say Updates for RFC FOO if you want everyone who implements RFC FOO to implement your draft, too. But rather than leave you with my vague opinion, I'd say that if you Tell The Reader what your draft is updating in RFC FOO and why, it will be a lot easier for reviewers to figure out whether the Updates header is legit.

Sometimes that's obvious. Maybe you're correcting something that has already resulted in an Errata being accepted - RFC FOO says "meat" when it should have said "potato".

Sometimes it's less obvious, especially when (as I believe the case is here) RFC FOO didn't say anything about "potato" at all, but anyone implementing RFC FOO needs to know whether to add potatoes.

So, your explanation, that RFC FOO said "cook dinner" and didn't give all the details an implementer needs, would be very helpful, no matter what the Updates header turns out to say.

Does that help?

Thanks,

Spencer

I believe it cannot be claimed that these RFCs did not already specify how to process the ECN field, because it is not possible to encapsulate a packet with a new IP header without creating a new ECN field.
Therefore, to my mind, definition of ECN field propagation is an update not an optional addition to these RFCs (as I said in response to Mirja in tsvwg on Friday).

To be clear about the implications of this decision, if the IESG eventually approves rfc6040bis as an RFC, if it states that it updates L2TPv3 (for instance), I believe it would mean that an implementation of L2TPv3 could no longer claim to comply with the L2TPv3 spec [RFC3931] until it had implemented ECN propagation compliant with RFC6040.

Cheers


Bob

PS. Thanks for the advice to state explicitly how the text of each RFC could be updated.
Will do.

{Note 1}: I was initially worried that an RFC I co-authored was ranked second, but I was relieved to discover that we had used all those words in a purely technical context: the RFC talked about packet *process*ing and *recovering* keys and C.K. *Wong* was a cited author.

--
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/