Host Identity Protocol-Based Overlay Networking Environment (HIP BONE) Instance Specification for REsource LOcation And Discovery (RELOAD)
draft-ietf-hip-reload-instance-10
Yes
(Ted Lemon)
No Objection
(Barry Leiba)
(Jari Arkko)
(Martin Stiemerling)
(Pete Resnick)
(Richard Barnes)
(Sean Turner)
(Stewart Bryant)
Recuse
(Gonzalo Camarillo)
Note: This ballot was opened for revision 09 and is now closed.
Ted Lemon Former IESG member
Yes
Yes
(for -09)
Unknown
Adrian Farrel Former IESG member
No Objection
No Objection
(2013-10-09 for -09)
Unknown
I know that the HIP charter curtails the WG to work on Experimental documents, but I would have liked this document to be clearer about the parameters of the experiment that it describes. What are the walls around the garden? How does it avoid impacting "the Internet"? What things are the experimenters asked to look out for? What explicit experimentation should be attempted (e.g., varying parameters)? How will the WG judge the success or otherwise of the experiment? It is by no means mandatory to include such a commentary, but it would make the document so much more valuable.
Barry Leiba Former IESG member
No Objection
No Objection
(for -09)
Unknown
Brian Haberman Former IESG member
No Objection
No Objection
(2013-10-09 for -09)
Unknown
I agree with Sean and Spencer that the security model/approach should be clearer.
Jari Arkko Former IESG member
No Objection
No Objection
(for -09)
Unknown
Martin Stiemerling Former IESG member
No Objection
No Objection
(for -09)
Unknown
Pete Resnick Former IESG member
No Objection
No Objection
(for -09)
Unknown
Richard Barnes Former IESG member
No Objection
No Objection
(for -09)
Unknown
Sean Turner Former IESG member
(was Discuss)
No Objection
No Objection
()
Unknown
Spencer Dawkins Former IESG member
(was Discuss)
No Objection
No Objection
(2013-10-11)
Unknown
Thank you for responding so quickly to my Discuss concern, and thank you even more for coming up with a suggested resolution that was better than my suggestion.
Stephen Farrell Former IESG member
No Objection
No Objection
(2013-10-10 for -09)
Unknown
I'm not sure I follow how this works entirely but it seems like a fine thing with which to experiment. Am I right that an application running on a RELOAD HIP BONE couldn't easily interoperate with an application using a "standard" RELOAD configuration, i.e. that uses TLS to secure its connections to the RELOAD servers? If so, that seems a pity but it'd be good to explain that in the draft maybe (and why that's ok). I agree with Sean and Spencer's discusses. Couldn't you make the use of ENCRYPTED mandatory and not just RECOMMENDED?
Stewart Bryant Former IESG member
No Objection
No Objection
(2013-10-10 for -09)
Unknown
Gonzalo Camarillo Former IESG member
Recuse
Recuse
(for -09)
Unknown