Re: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header

Bob Briscoe <ietf@bobbriscoe.net> Tue, 26 July 2016 08:18 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E47A812D697 for <tsvwg@ietfa.amsl.com>; Tue, 26 Jul 2016 01:18:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xiaeE1FmXn8J for <tsvwg@ietfa.amsl.com>; Tue, 26 Jul 2016 01:18:53 -0700 (PDT)
Received: from server.dnsblock1.com (server.dnsblock1.com [85.13.236.178]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FA7412D606 for <tsvwg@ietf.org>; Tue, 26 Jul 2016 01:18:53 -0700 (PDT)
Received: from 157.251.114.87.dyn.plus.net ([87.114.251.157]:53502 helo=[192.168.0.6]) by server.dnsblock1.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from <ietf@bobbriscoe.net>) id 1bRxZj-0004Bh-4u; Tue, 26 Jul 2016 09:18:51 +0100
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
References: <5794CE1E.5020608@bobbriscoe.net> <CAKKJt-f=h8CJcc4J0cJkyDzBp+P_7JgWCZzKdJLpg=zQOj-DhA@mail.gmail.com>
From: Bob Briscoe <ietf@bobbriscoe.net>
Message-ID: <57971CEA.2020008@bobbriscoe.net>
Date: Tue, 26 Jul 2016 09:18:50 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0
MIME-Version: 1.0
In-Reply-To: <CAKKJt-f=h8CJcc4J0cJkyDzBp+P_7JgWCZzKdJLpg=zQOj-DhA@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------040606020504070407090506"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server.dnsblock1.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: server.dnsblock1.com: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: server.dnsblock1.com: in@bobbriscoe.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/f_-3lU2vCzWEDyACyv2M9n4n6d8>
Cc: tsvwg IETF list <tsvwg@ietf.org>
Subject: Re: [tsvwg] Wanted: recovering IETF process wonk to explain the "Updates:" header
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2016 08:18:56 -0000

Spencer,

Thanks. Applying this advice to this particular draft confirms (for me 
at least) that we are updating these tunnel RFCs.

Writing the specific text updates for each one is proving to be a useful 
exercise. For instance with L2TPv3, it is specified as a generic 
encapsulation of many different L2 protocols that may in turn 
encapsulate IP or any other L3 protocol. And the outer is also a generic 
packet switched network header, with IP as just one possibility. So 
there isn't really a place that talks about the specific case where the 
outer is IP, and the encapsulated L3 is also IP. Even though that is by 
far the most common case. Whatever, I'm gradually working it all out.


Bob


On 25/07/16 17:57, Spencer Dawkins at IETF wrote:
> Hi, Bob,
>
> On Sun, Jul 24, 2016 at 9:18 AM, Bob Briscoe <ietf@bobbriscoe.net 
> <mailto:ietf@bobbriscoe.net>> wrote:
>
>     Spencer,
>
>     I searched for " recovering IETF process wonk" and a link to your
>     biography was ranked top {Note 1}.
>
>     I'm looking for incontrovertible advice on whether I am correct to
>     place various long-standing tunnelling RFCs in the updates header
>     of this draft:
>     https://tools.ietf.org/html/draft-briscoe-tsvwg-rfc6040bis
>
>
> As a RIPW (my own words, FWIW), I don't think incontrovertible advice 
> exists for this. A variety of IESGs have had a variety of opinions 
> about Updates over time, and even with every IESG there's likely a 
> range of opinions. I am told in another e-mail that the RFC Series 
> Advisory Group was talking about the definition of Updates (and the 
> even more dreaded Obsoletes) in Berlin last week, so , this is not an 
> exact science. But, since you ask me, I'm the responsible AD and I 
> have an opinion.
>
> My opinion is that you can say Updates for RFC FOO if you want 
> everyone who implements RFC FOO to implement your draft, too. But 
> rather than leave you with my vague opinion, I'd say that if you Tell 
> The Reader what your draft is updating in RFC FOO and why, it will be 
> a lot easier for reviewers to figure out whether the Updates header is 
> legit.
>
> Sometimes that's obvious. Maybe you're correcting something that has 
> already resulted in an Errata being accepted - RFC FOO says "meat" 
> when it should have said "potato".
>
> Sometimes it's less obvious, especially when (as I believe the case is 
> here) RFC FOO didn't say anything about "potato" at all, but anyone 
> implementing RFC FOO needs to know whether to add potatoes.
>
> So, your explanation, that RFC FOO said "cook dinner" and didn't give 
> all the details an implementer needs, would be very helpful, no matter 
> what the Updates header turns out to say.
>
> Does that help?
>
> Thanks,
>
> Spencer
>
>     I believe it cannot be claimed that these RFCs did not already
>     specify how to process the ECN field, because it is not possible
>     to encapsulate a packet with a new IP header without creating a
>     new ECN field.
>     Therefore, to my mind, definition of ECN field propagation is an
>     update not an optional addition to these RFCs (as I said in
>     response to Mirja in tsvwg on Friday).
>
>     To be clear about the implications of this decision, if the IESG
>     eventually approves rfc6040bis as an RFC, if it states that it
>     updates L2TPv3 (for instance), I believe it would mean that an
>     implementation of L2TPv3 could no longer claim to comply with the
>     L2TPv3 spec [RFC3931] until it had implemented ECN propagation
>     compliant with RFC6040.
>
>     Cheers
>
>
>     Bob
>
>     PS. Thanks for the advice to state explicitly how the text of each
>     RFC could be updated.
>     Will do.
>
>     {Note 1}: I was initially worried that an RFC I co-authored was
>     ranked second, but I was relieved to discover that we had used all
>     those words in a purely technical context: the RFC talked about
>     packet *process*ing and *recovering* keys and C.K. *Wong* was a
>     cited author.
>
>     -- 
>     ________________________________________________________________
>     Bob Briscoe http://bobbriscoe.net/
>
>

-- 
________________________________________________________________
Bob Briscoe                               http://bobbriscoe.net/