Skip to main content

Host Identity Protocol-Based Overlay Networking Environment (HIP BONE) Instance Specification for REsource LOcation And Discovery (RELOAD)
draft-ietf-hip-reload-instance-10

Yes

(Ted Lemon)

No Objection

(Barry Leiba)
(Jari Arkko)
(Martin Stiemerling)
(Pete Resnick)
(Richard Barnes)
(Sean Turner)
(Stewart Bryant)

Recuse

(Gonzalo Camarillo)

Note: This ballot was opened for revision 09 and is now closed.

Ted Lemon Former IESG member
Yes
Yes (for -09) Unknown

                            
Adrian Farrel Former IESG member
No Objection
No Objection (2013-10-09 for -09) Unknown
I know that the HIP charter curtails the WG to work on Experimental
documents, but I would have liked this document to be clearer about the
parameters of the experiment that it describes. What are the walls
around the garden? How does it avoid impacting "the Internet"? What
things are the experimenters asked to look out for? What explicit
experimentation should be attempted (e.g., varying parameters)? How
will the WG judge the success or otherwise of the experiment?

It is by no means mandatory to include such a commentary, but it would
make the document so much more valuable.
Barry Leiba Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Brian Haberman Former IESG member
No Objection
No Objection (2013-10-09 for -09) Unknown
I agree with Sean and Spencer that the security model/approach should be clearer.
Jari Arkko Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Martin Stiemerling Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Pete Resnick Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Richard Barnes Former IESG member
No Objection
No Objection (for -09) Unknown

                            
Sean Turner Former IESG member
(was Discuss) No Objection
No Objection () Unknown

                            
Spencer Dawkins Former IESG member
(was Discuss) No Objection
No Objection (2013-10-11) Unknown
Thank you for responding so quickly to my Discuss concern, and thank you even more for coming up with a suggested resolution that was better than my suggestion.
Stephen Farrell Former IESG member
No Objection
No Objection (2013-10-10 for -09) Unknown
I'm not sure I follow how this works entirely but it seems
like a fine thing with which to experiment.

Am I right that an application running on a RELOAD HIP BONE
couldn't easily interoperate with an application using a
"standard" RELOAD configuration, i.e. that uses TLS to
secure its connections to the RELOAD servers? If so, that
seems a pity but it'd be good to explain that in the draft
maybe (and why that's ok).

I agree with Sean and Spencer's discusses. Couldn't you make
the use of ENCRYPTED mandatory and not just RECOMMENDED?
Stewart Bryant Former IESG member
No Objection
No Objection (2013-10-10 for -09) Unknown

                            
Gonzalo Camarillo Former IESG member
Recuse
Recuse (for -09) Unknown