Skip to main content

Minutes for APPSAWG at IETF-88
minutes-88-appsawg-1

Meeting Minutes ART Area General Applications Working Group (appsawg) WG
Date and time 2013-11-04 17:00
Title Minutes for APPSAWG at IETF-88
State Active
Other versions plain text
Last updated 2013-12-08

minutes-88-appsawg-1
IETF 88 -- Vancouver, CA
Minutes of the APPSAWG and APPAREA joint meeting
09:00-11:30, Georgia B

Murray Kucherawy and Salvatore Loreto, co-chairs
Mark Nottingham scribing
John Levine taking minutes

- Called To Order -

1) Administrivia

Blue sheets, note well, jabber room, agenda bashing, etc.

- APPSAWG Section -

2) Document status update

Two documents have been published: Webfinger (RFCxxxx) and
Authentication-Results (RFC7001).

Two documents (xml-mediatypes and json-merge-patch) have cleared WGLC, but
received almost no reviews, so they are in limbo until we can get clear
consensus that they're ready to go.

The malformed-mail draft has cleared IETF LC.  There are two directorate
reviews that need to be addressed and then it can go to IESG Evaluation.

Four documents are still in WG development: multipart-form-data,
rrvs-header-field, sieve-duplicate, and uri-get-off-my-lawn.

3) Mini-charters experiment

We have had a few documents where the authors go dormant for protracted
periods.  We have had complaints that we have too many live documents which
makes it hard for participants to follow relevant discussions.  We have also
observed that occasionally discussion of a document can run out of scope, and
sometimes we can't muster enough reviewers to justify sending a document to the
IESG.

We are considering the idea of having a "mini-charter" when work is brought to
the WG.  This is not meant to be as heavyweight as a full chartering process,
but rather to establish an understanding between the chairs and authors about
who will drive the work, who will be doing reviews and providing comments,
limit scope of discussion, appropriate early reviews and liaisons, etc., before
the document becomes a WG item.  This would be recorded in the WG wiki.

Mark Nottingham expressed enthusiastic support.  There was no other recorded
response.  The WG chairs will try this as an experiment.

4) RRVS Header Field draft

The original mechanism for doing the work described in this draft was to add
and check for a header field.  The impetus for using this mechanism is the
reality that in the wild, adding an checking for header fields is far simpler
to deploy than an SMTP extension, even though the latter is the architecturally
superior approach.  At the same time, the MT-Priority extension published
earlier is an SMTP extension with support for a header field to "tunnel" the
request through non-participating servers; Alexey (the author of that work)
concurs that it's easier in things like Outlook to do header fields versus
extensions.  Barry Leiba agrees that it's easier, but it's still to be avoided;
do the extension and, if you hit a server that doesn't participate, you have to
bail.

Dave Crocker asks if that means MIME should be an extension; Barry says MIME is
a format, not a protocol.

Keith Moore says SMTP extensions are to be used for transport, while content
meta-data goes in header fields or MIME structure, because messages have a life
of their own after transport is complete, and transport-specific context should
not be included when the message is forwarded.  Also, email encryption should
be mandatory for all hops, and if we have to negotiate it on a hop-by-hop
basis, it won't get adopted.  We should be moving toward encryption.

John Levine: Theologically, this should be done as an extension.  However,
given the motivation for this work, I don't see much point in inventing an
extension if almost nobody is going to implement it.  I would be interested in
hearing from large mail providers what they are implementing or plan to
implement.  We may just need to codify existing practice, which so far is just
the header field.

Derek Atkins: It would be really nice to be able to do OTR for email.

The authors will figure out where to go from here.

5) multipart/form-data history and status

[Larry Masinter's slides]

Larry requests more participation, and also comments on using github for source
control and change management.

Keith Moore applauds the effort, but has concerns about writing a Standards
Track document to capture reality, rather than say what reality should be. 
Larry agrees in general, but has been sympathetic to some of the choices that
have been made in the document.  Keith says we should really believe the choice
made is the right thing to do before allowing the work to advance.

John Klensin supports Keith, and also has concerns about non-ASCII header field
names.

Mark Nottingham asks if this work has been discussed with any W3C teams or
working groups.  Larry has discussed it with many individuals but doesn't know
what their roles are.  Mark suggests looping in the W3C liaison.

Keith Moore RFC2047 is completely inappropriate for representing strings in
general, and I object to their use in this work.  Larry notes that the document
currently asks receivers to be liberal in what they expect, but does make it
clear what the preference is.  Keith remains concerned with interoperability.

John Klensin reiterates that some of the above issues are the ones he had in
mind with his comment above.

Larry points out (again) that this document isn't done yet.  Keith indicates
that he thinks this is worthwhile work, but these issues require attention. 
Larry solicits the WG for help, or even a co-author.  Mark will provide liaison
services with the W3C in support of this work.  Dave Thaler volunteered to
develop and run test cases.

6) URI structure

[Mark Nottingham's slides]

Ted Hardie thinks this is good work.  Given recent work by Dave Thaler as well
as RFC4395bis, he believes there needs to be a scope expansion here, that
includes scheme registration material and other advice about minting URI
schemes so that people do things that fit the syntax.  This would be a good use
of mini-charters; such a thing would involve taking all of these documents as
input and covers the ground of all three.  Given the scope creep, he volunteers
to work on the result.  Mark is concerned with the added risk; this is already
a tightly scoped piece of work and an easy win.  Also, this draft currently
references the W3C Web Architecture document.  There was discussion between
them about the costs and benefits of Ted's suggestion.

Eliot Lear agrees with Ted in that we don't have a good traffic record on "do
not" documents.  It's much better to have a specific alternative to propose. 
Apart from that it reads pretty well.  The "who this document is for" section
seems too bureaucratic; Eliot will provide text.  Also, the use of
"applications" probably means "application specifications" throughout. 
Finally, the document appears to proscribe the use of future schemas; was that
intentional?  Mark will clarify on all of these points.  Eliot asks if this
advice has been tested for URI schemes other than http.  Back on the point of
including good advice is very hard to get right in a BCP-level document.

Tim Bray observes that if this document had existed already, he'd have been
able to use it regularly over the last five years; it will be equally useful
when it appears.  My instinct is to say "just do it", and if there's further
additional scope to be covered, it can reference this.  We should publish this
as soon as possible.

John Klensin agrees, noting that we understand this very well for HTTP but
possibly not for other schemes is a really bad idea.  Mark thinks this is not a
strong concern since there has been thought given to this issue already, but we
should do due diligence and make sure before proceeding.  John points out that
the URN WG has been stuck sometimes in this problem space.  Possibly an
applicability statement alongside this might be useful indicating which things
have been tested, and which spaces are still reasonably described as unknown.

7) URI scheme registration process

[Dave Thaler's slides]

Keith Moore hopes we can make the process faster and more lightweight, given
the evidence presented here.  Perhaps the process could be more visible, e.g.,
review process state change notices.  He also thinks the URI syntax is
over-constrained as currently documented; it was possibly HTTP-centric when
designed.

Mark Nottingham is glad these questions are being asked.  The HTTP header field
registry and link relations registry have the same problems.  The happiana
group had some of the same ideas, but it lost momentum.  He wonders whether
APPSAWG or some other WG should do some IANA registry cleanup work.  He wonders
if there are other solutions; we have a proliferation of URI schemes that
belong to only a single application.  Perhaps we need a master scheme with
sub-options for "app launch" or something like that.

Alex Mayerhofer suggests that maybe the IETF is too stringent on what we allow,
and people don't always get what they want or expect out of the process.

Larry Masinter points out that these days, with a registered protocol handler
and the idea of modular handlers, the registry may be outdated.  HTML 5.1 has
registered content handlers as well.  This is more a symptom of how
applications get deployed rather than laziness on the part of people that don't
want to register their schemes.

Brian Dickson asked how many different types of structures were found out of
the 75 surveyed?  Dave replied that in some cases this wasn't obvious; probably
a handful.  Brian suggests that a validation front-end for new submissions
would work, where not only the name is checked but also parts of the
submission.  Things that are out-of-the-ordinary could be subjected to full
review, others could be fast-tracked.

Tony Hansen asked if Michelle Cotton [IANA] has been consulted about any of our
options.  Michelle says IANA simply follows the rules put in place in the RFCs.
 Expert review is responsible for the "delay period".  We could make the
registries first-come-first-served with a syntax checker; it merely needs to be
specified.  She is willing to work with happiana again if that would be helpful.

John Klensin doesn't think we should look at this as an opportunity to look at
all registries.  He suggests creative thinking.  We might instead find ways to
contribute to the Wikipedia registry, for example.

Phillip Hallam-Baker advocates for having a single point of registration for
SRV, well-known, and a URI scheme.  It would be nice if all three were in sync
for a single app.  However, existing products may not respond if something is
registered under an existing scheme.  We should also make it possible to use
opaque URIs (e.g., PGP fingerprints); this would allow things like launching
apps that are signed under a particular key.

- APPAREA General Meeting -

1) New WGs

Ralph Droms presented for DNSSD.
Ulrich Herberg presented for 6LO.
Jon Peterson presented for STIR.

2) BoFs

Heather Flanagan presented about RFCFORM.
Sean Turner presented about PERPASS.
Scott Hollenbeck presented about EPPEXT.

3) HOMENET

Pete Resnick asked the meeting for guidance about how to get Applications Area
attention on work earlier.  HOMENET, for example, exists in APP space, but its
first document drew a large number of DISCUSSes.  It's clear that it has no APP
attention so far despite earlier requests for same.

Dave Crocker mentions this is not the first time this issue has come up. 
Previous attempts have involved requests to us from other WGs, and we have been
really incompetent at providing it.  This is entirely our fault.  Pete concurs;
the HOMENET people did a reasonable job given the information they had (which
was none).  Dave says we need a discussion in APP about how to advise lower
layers; as a group, we don't have a clue how to give advice.

John Klensin mostly agrees with Dave, but suggests there's another dynamic
going on here: Sometimes WGs in other layers come along and ask for APPs clue,
and we provide it, but sometimes we're told "We have vendors in the room, we
know what we're doing, please go away."  There's a tension here, and he
believes this part of it is an IESG issue.  Pete says we need to be told when
they come up so the IESG can intervene.

Keith Moore says the people interested in doing APP things are not always the
same as the people who want to review the work of other WGs.  We might do well
to identify which people are in which groups.  Pete points out that this is not
about review, but about consultation.  Keith doesn't think we should not single
out HOMENET; this is a long-standing problem.  We need to change this.

Eliot Lear wonders if Pete applied his proposed consensus criteria to this
particular case.  Pete didn't observe the problem until it was before the IESG.

Sean Turner points out that the Security ADs regularly deploy SECDIR people to
working groups, and they often get ignored.  All they can do is report back. 
When that happens, advise your AD so they can get involved.

Joe Hildebrand says he runs into this when mentoring junior engineers within
his own organization.  When asked to intervene in the dispute, he declines but
rather advises the engineer to learn to be persuasive and helps with that. 
This takes patience with both parties.

Pete suggests empowering APPs people who go to other WGs by being explicitly
supportive of such people, and helping them present their points in persuasive
ways.  We can perhaps use the Applications Area Directorate for this purpose.

4) Applications Area Security

XMPP: [Peter Saint-Andre slides]

Roen Mae[?] regarding multi-tenant environments: One option is extended client
hello, which gives a server an opportunity to decide which certificate to hand
back.  Peter says we have that capability in XMPP, but hosting providers don't
always have (or want to have) the private keys for the domains they host.

Dave Crocker confirmed that there will still be cleartext in the servers.  He
also expressed concern about having a flag day; Peter feels this is less of a
concern for a smaller network like XMPP (versus, say, email) but they want to
do something drastic, and they can pull back if they find they need to.

Phillip Hallam-Baker points out that XMPP doesn't have a way to say "connect
securely, or not at all" and this would be a useful addition.

Matt Miller supports the comment that we have to start somewhere, so a flag day
is our path forward.

Email use of TLS: [John Levine slides]

Email use of crypto: [Alexey Melnikov slides]

Requiring email encryption: [Keith Moore slides]

SIP security status: [Jon Peterson slide]

HTTP security: [Mark Nottingham slides]

Discussion about how to organize the work:

Stephen Farrell says the work should go ahead.  He's not sure if SIP is in the
same state as all the others, but otherwise strongly advises us to get started
and not wait for a BoF in March.  Paul Hoffman concurs.

Keith Moore would like to see all related work to be appropriately clustered
into dedicated working groups.

Dave Crocker can't imagine doing all of this in one WG would do very well.  TLS
does lots of different things, each appropriate for different concerns, and
it's not clear we understand for which problems we want to apply TLS.  We could
deploy it everywhere and not solve the right problems.  What we ought to have
is a common statement of the threats we want to address.

Phillip Hallam-Baker notes that the Government of Brazil is holding meetings to
create an organization to secure the Internet.  He likes Keith's idea of a
draft that sets the bar for a particular protocol.  We should do this for other
major protocols.

Franck Martin agrees with Dave; we have been doing opportunistic TLS for email,
but it's not obvious why.  For things like DKIM, do we need to revisit which
keys and what key sizes are being used?  For Authentication-Results, why can't
we also indicate the results of TLS processing?

Joe Hildebrand believes there are several patterns that applications follow, so
having guidance for new protocols developed in the future based on what we've
seen in these patterns would be very useful.  It doesn't seem necessary to have
a dedicated effort around each protocol given the similarities between some of
them.

Stephen Farrell reiterates that there are lots of people willing to do stuff,
and we should let them do that.

Tony Hansen agrees with the notion that STARTTLS isn't sufficient, and we
should use the TLS port for them instead.  He wonders if STARTTLS was a bad
experiment, and maybe we should recommend the TLS port for all protocols. 
Keith Moore points out that the model has changed in the last 20 years or so. 
Joe Hildebrand points out that we don't have a plain text option in some cases.

- Adjourned -