Skip to main content

Brotli Compressed Data Format
draft-alakuijala-brotli-11

Yes

(Barry Leiba)

No Objection

(Alia Atlas)
(Alvaro Retana)
(Deborah Brungard)
(Mirja Kühlewind)
(Suresh Krishnan)
(Terry Manderson)

Note: This ballot was opened for revision 08 and is now closed.

Alexey Melnikov Former IESG member
(was Discuss) Yes
Yes (2016-05-05 for -10) Unknown
Note for IESG: The reason why IESG is reviewing this document is because the IANA registration requires IETF Consensus RFC.

Thank you for addressing my DISCUSS points.
Barry Leiba Former IESG member
Yes
Yes (for -08) Unknown

                            
Alia Atlas Former IESG member
No Objection
No Objection (for -10) Unknown

                            
Alissa Cooper Former IESG member
No Objection
No Objection (2016-05-04 for -09) Unknown
Agree with Stephen's point about the IPR declaration.
Alvaro Retana Former IESG member
No Objection
No Objection (for -10) Unknown

                            
Ben Campbell Former IESG member
No Objection
No Objection (2016-05-04 for -09) Unknown
Has there been an answer to the question in Paul Kyzivat's Gen-ART review about whether this draft is the authoritative specification?
Benoît Claise Former IESG member
No Objection
No Objection (2016-05-02 for -09) Unknown
Two valid questions asked by Dan Romascanu in his OPS DIR review:

I believe the document is 'Almost Ready' for publication. I am no expert in compression, but my impression is that the document is clear and precise in defining the algorithm and the flow of operations on compression or decompression. From an operational point of view I have however two reservations:

-          There is no justification of any kind (mathematical proof, measurement results, etc.) that supports the claims that the performance resulting from the application of the algorithms results in ‘with an efficiency comparable to the best currently available general-purpose compression methods’. Even so, if the resulting performance is only ‘comparable’ with existing methods, why define a new one and publish it in an RFC?

-          There is no information or recommendations about the applicability of this format (what type of platforms, or network protocols) or documented results of its deployment – when should a software developer use it? Where should a network operator or IT manager apply it or activate it if available?
Deborah Brungard Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Jari Arkko Former IESG member
(was Discuss) No Objection
No Objection (2016-05-20 for -10) Unknown
For what it is worth, I do believe words in the document to the effect that the specification is intended to be complete and sufficient for implementing the format would be helpful.
Joel Jaeggli Former IESG member
No Objection
No Objection (2016-04-16 for -08) Unknown
dan romascanu performed the opsdir review.
Kathleen Moriarty Former IESG member
No Objection
No Objection (2016-05-04 for -10) Unknown
I agree with Stephen's comment requesting more references in the security considerations section to help readers/implementers.
Mirja Kühlewind Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Stephen Farrell Former IESG member
No Objection
No Objection (2016-05-03 for -09) Unknown
- The IPR declaration confused me a bit. Do we know if it
is saying that any implementation of the RFC for any
purpose is RF or if it only means that RF applies to W3C
stuff? (What's confusing is the last bit where it says
the company "provides a W3C RF commitment" which is just
a bit of an odd thing to see in an IETF IPR declaration.)
Note: I think this is ok, as-is, but it's not entirely
clear to me. If the folks who made the IPR declaration
wanted to clarify that might be good, but I don't think
it's absolutely needed.

- The security considerations could do with some more
references, at least one to a zip bomb and one to the
crime attack. I think those would help some
readers/implementers get the issues better.

- I think it'd have been good to add a section on when
the authors think it's a good and bad idea to use this
algorithm.  For example, would it make sense to ever use
this for arbitrary (but not random) binary data? I don't
mean a full analysis, but just some basic guidance. Not a
big deal, but including that might avoid some repetition
later on, esp if there are places where we know now that
one ought not use this.

- I agree with Alexey's discuss point #1.
Suresh Krishnan Former IESG member
No Objection
No Objection (for -10) Unknown

                            
Terry Manderson Former IESG member
No Objection
No Objection (for -09) Unknown