Skip to main content

Narrative Minutes interim-2024-iesg-03 2024-02-01 15:00
narrative-minutes-interim-2024-iesg-03-202402011500-00

Meeting Narrative Minutes Internet Engineering Steering Group (iesg) IETF
Date and time 2024-02-01 15:00
Title Narrative Minutes interim-2024-iesg-03 2024-02-01 15:00
State (None)
Other versions plain text
Last updated 2024-02-23

narrative-minutes-interim-2024-iesg-03-202402011500-00
INTERNET ENGINEERING STEERING GROUP (IESG)
Narrative minutes for the 2024-02-01 IESG Teleconference

These are not an official record of the meeting.
Narrative Scribe: Liz Flynn, Secretariat

1. Administrivia
1.1 Roll call

ATTENDEES
---------------------------------
Andrew Alston (Liquid Intelligent Technologies) /  Routing Area
Amanda Baber (ICANN) / IANA Liaison
Jenny Bui (AMS) / IETF Secretariat
Roman Danyliw (CERT/SEI) / Security Area
Dhruv Dhody (Huawei) / IAB Liaison
Martin Duke (Google) / Transport Area
Lars Eggert (Mozilla) / IETF Chair, General Area
Liz Flynn (AMS) / IETF Secretariat
Sandy Ginoza (AMS) / RFC Editor Liaison
Jim Guichard (Futurewei Technologies) / Routing Area
Mahesh Jethanandani (Arrcus) / Incoming Operations and Management Area
Erik Kline (Aalyria Technologies) / Internet Area
Murray Kucherawy (Meta) / Applications and Real-Time Area
Mirja Kuehlewind (Ericsson) / IAB Chair
Warren Kumari (Google) / Operations and Management Area
Cindy Morgan (AMS) / IETF Secretariat
Francesca Palombini (Ericsson) / Applications and Real-Time Area
Zaheduzzaman (Zahed) Sarker (Nokia) / Transport Area
John Scudder (Juniper) / Routing Area
Orie Steele (Transmute) / Incoming Applications and Real-Time Area
Gunter Van de Velde (Nokia) / Incoming Routing Area
Éric Vyncke (Cisco) / Internet Area
Robert Wilton (Cisco Systems) / Operations and Management Area
Paul Wouters (Aiven) /  Security Area

REGRETS
---------------------------------
Jay Daley / IETF Executive Director
Sabrina Tanamal (ICANN) / IANA Liaison

OBSERVERS
---------------------------------
Deb Cooley
Suresh Krishnan
Eliot Lear
Greg Wood

1.2 Bash the agenda

Liz: Does anyone have anything to add to today's agenda? Any other changes?

1.3 Approval of the minutes of past telechats

Liz: Does anyone have an objection to the minutes of the January 18 IESG
Teleconference being approved? I'm hearing no objection, so those are approved
and we'll post them in the public archive.

Does anyone have an objection to the narrative minutes of the January 18 IESG
Teleconference being approved? I'm hearing no objection, so those are approved
and we'll post them in the public archive.

1.4 List of remaining action items from last telechat

   * DESIGNATED EXPERTS NEEDED

     o Roman Danyliw to find designated experts for RFC 9447, ACME
       Authority Token Challenge Types" [IANA #1281679].

Liz: We have a management item at the end of the call to approve an expert for
this registry, so we'll mark this as provisionally done.

     o Robert Wilton to find designated experts for RFC 9487 (Export of
       Segment Routing over IPv6 Information in IP Flow Information Export
       (IPFIX))[IANA #1287238].

Liz: We have a management item at the end of the call to approve an expert for
this registry, so we'll mark this as provisionally done.

   * OPEN ACTION ITEMS

     o Warren Kumari and Murray Kucherawy to follow up on a bis document for
       RFC 8126 regarding designated experts.

Murray: Barry won't have time to get to this solo, so we're going to create a
Github project to collaborate on this with IANA and it will be in progress very
soon.

     o Andrew Alston to email the RSWG regarding document authorship/
       editorship with regards to the number of authors listed.

Andrew: In progress.

     o Lars Eggert and Warren Kumari to 1) draft a revision of RFC 4858,
       2) draft a revised IESG Statement on Document Shepherds (original
       statement October 2010), and 3) update the WG Chairs wiki to point
       to the new IESG Statement.

Lars: In progress.

2. Protocol actions
2.1 WG submissions
2.1.1 New items

 o draft-ietf-netconf-crypto-types-29  - IETF stream
   YANG Data Types and Groupings for Cryptography (Proposed Standard)
   Token: Robert Wilton

Liz: We have some Discusses in the tracker; do we need to discuss those today?

Rob: I don't think so, unless someone else wants to. I think Kent is responding
to issues. Roman or Paul, do you want to discuss?

Roman: No, my only comment is I think the hidden thing is a thread through a
number of the documents.

Rob: I was talking to Paul offline about that, trying to manage keys in TPMs
versus YANG semantics where there's an expectation all the configuration is
complete. I think that's a bit as to why these hidden keys have turned up, you
still need to be able to complete the configuration but you don't want to put
the private keys in. I think that's a running theme that's trying to get around
some of the YANG or NETCONF restrictions.

Roman: Yeah, there's an architectural thing. I think it comes up in someone's
Discuss on one of the other documents, where there's a semantics being
described here. I've thought of these YANG documents as describing this XML
blob, this data model for stuff. There's a whole bunch of additional semantics
in the keystore document about how you manage things, now there's multiple
APIs, these expectations with TPMs, and I thought we were only talking about a
data model but now we're talking about handling it.  That was a little
confusing.

Rob: I think it's a limitation of trying to get flexibility in there. In some
cases you want to be able to configure these keys and you might encrypt them.
You want to have that flexibility and you want to define the data model
correctly that says if you have one of these keys you need to have both of
these bits, you can't have half a key. At the same time, when you're then
reporting on that and exposing it, you don't want to expose this data. So it's
a bit icky. There are discussions happening about whether we should change the
YANG architecture to address this but there are different views on that. I'm
not sure there is long term consensus on where to go. Where I ended up is the
data model should accurately reflect the way things are and what's expected to
be there. Protocol issues, we'll have to see how we handle those in future and
further discussions are required. I think it's important to get these documents
done.

Paul: The way I read them was the considerations are purely for how to do
things in the management configuration. The security for managing the
configuration itself and not so much for generic uses that are enabled by these
configurations. That's how I interpreted these advisory things like if you
encrypt your configuration file, don't do it with a weak key.

Rob: The bit it's falling afoul of is this idea that YANG validates
configuration and it's complete, so all the references are complete. If you're
referencing how to use a particular keystore then it has to exist, and if you
reference a key in that keystore you have to know it exists. Traditionally YANG
says that reference has to appear in that configuration and that's the bit it's
falling over on. Does that help, or have I just confused things?

Roman: I have less concerns about this one because I think it's possible to
explain the hidden. I think it's the other one I'm more worried about.

Rob: I'll leave Kent to drive this since he has the background, and if more
conversation is needed, I'm happy to drive those.

Liz: Rob, will this require a Revised I-D?

Rob: Almost certainly, yes.

Liz: To save ourselves a step later, there's a downref here to RFC 7093. Once
this is approved, do you want us to go ahead and add that to the downref
registry?

Rob: I don't think so, we can just have it the once.

Francesca: This was Last Called, so the IESG doesn't need to approve it - the
question is just whether to add it to the registry, which I think is no.

Rob: Oh. Yes, that's right.

Liz: Thank you.

 o draft-ietf-netconf-keystore-30  - IETF stream
   A YANG Data Model for a Keystore (Proposed Standard)
   Token: Robert Wilton

Liz: We have some Discusses in the tracker; do we need to discuss those today?

Rob: Roman, Paul?

Roman: This is where we got into the architectural questions, where there were
discussions in Section 3 about other APIs and it wasn't clear to me what that
API was and what it had to do with YANG. It just gave me pause that we're
providing normative requirements on the existence of these APIs and they seem
underspecified. I think I pointed out in what ways you might want to do that.

Rob: My assumption is that this is about upgrading those trust stores and key
stores out of bound. So effectively you're not using YANG, but some other
process on the device.

Roman: One thing I didn't understand with the YANG document was it seemed like
we were talking about a repository of keys, but the way I read the text was
that a management interface fronted some store, but then language about what
store it needed to be in, which suggested there were multiple stores. Then I
was wondering if this is the YANG interface for a TPE API, but no because it
seemed there was another API. A little architectural clarity would have helped
me.

Rob: Okay. We'll see if Kent can address those.

Roman: My bigger question, not on this one, is I've never seen a YANG document
that talked about backup and restore procedures. Is that a thing we should be
putting in mandatory operational considerations or do you feel like this one is
really special?

Éric V: I raised the same concern, because it's going beyond a data model and
talking about operation. They will change the title to include operation.

Rob: To answer your question, Roman, I think this one is special. The vast
majority of yang models are just defining configuration. Here it's because you
are storing particular keys, they're more sensitive. Or the other one that
comes up in this document is trying to transfer configuration between devices
and how you do that in a secure way.

Roman: Part of it is, I'm not the expert, but I've heard about it in SUIT,
RATS, and TEEP. If we're really talking about forklifting keys across TEEs, I
don't know whether we've used enough language here, but we do say we support
that.

Paul: If you look at it from a point of view of a configuration file you need
to migrate to another unit, that's really what it's talking about. The
encryption keys become a complication. Maybe it should just only say to take
care if you do this and leave out the details about restore and backup. Another
document could specify that if they wanted to. Just saying, remember, if
something in your configuration is encrypted, it's not a usable configuration
when you migrate it until you have the keys that belong to it.

Rob: Maybe. I think the key is you're going to use the TPM keys to sign some
things, but that's not enough and having a separate step allows you to make
your configuration more portable. I think the approach you're suggesting is
quite useful that it could go into a separate document.

Roman: My concern is it started invoking APIs that have particular functions,
and then it seemed to intimate that those APIs need to exist in certain places.
I never understood what those APIs are, who's providing them, and where they
needed to be. I don't know whether a layer on top of the TEE, a layer on top of
some open SSL library, or some network based API.

Rob: My expectation there is that that's out of scope and this document
shouldn't specify what the API is, just that if it's done out of band, here's
what you need to account for. Maybe that can be clearer.

Liz: I'm guessing this might be a Revised I-D as well?

Rob: Yes, thanks.

 o draft-ietf-netconf-trust-anchors-23  - IETF stream
   A YANG Data Model for a Truststore (Proposed Standard)
   Token: Robert Wilton

Liz: We have a Discuss in the tracker; do we need to discuss that today?

Rob: It sounds like the feedback here is similar. Is there anything different,
Roman, on this one?

Roman: Same thing. Nothing new here.

Rob: Okay. Then I think we're done for this one and it can also be Revised I-D
Needed. Thank you everyone for the reviews.

 o draft-ietf-suit-mud-07  - IETF stream
   Strong Assertions of IoT Network Access Requirements (Proposed
   Standard)
   Token: Roman Danyliw

Liz: We have some Discusses in the tracker; do we need to discuss those today?

Roman: I just wanted to briefly go over everything. Thank you everyone for all
the reviews. Éric, correct me if I'm wrong, we talked about things in email.
We'll get the edits on the update for you. Rob, I'd like the authors to respond
to you on that consideration. For me, we can put it in the operational
considerations and that seems editorial, but you have a tangible concern here
so we can work on that. Is that a good understanding?

Rob: Sort of. I had some offline discussion with Eliot who's not an author on
this document but he's playing in the space. It sounds like from Eliot's
comments that he thinks the concerns are sort of valid but doesn't think they
should be addressed here. Which is fine with me. This is future work mostly and
maybe a little bit more text here. I think an operational section would be
helpful just in terms of directing people. I think it's minor changes.

Roman: Okay. Éric, we traded some email, did you want to talk more about
anything?

Éric V: As long as there is an update coming, I'm all set.

Roman: So that brings us to the procedural observation, Francesca. I don't know
how that didn't get generated in the Last Call text, so thank you for adding
that.

Francesca: No worries. It was added after the Last Call, that's why it wasn't
there. It was probably a response to a Last Call comment. We should just
approve it and then I can remove the Discuss.

Roman: Thank you for pointing it out. What do we do, just agree here?

Liz: Any objections to approving this downref for RFC 9334? Okay, we'll call
that good to go. The second part of that question is do we want to add that to
the downref registry?

Roman: I don't want to add it to the downref registry. I'd like to see it used
a little more.

Liz: Okay, so that downref is approved but not added to the registry. I'm
guessing we're going Revised I-D Needed here?

Roman: We sure are, thank you.

 o draft-ietf-lsr-ospfv3-extended-lsa-yang-28  - IETF stream
   YANG Model for OSPFv3 Extended LSAs (Proposed Standard)
   Token: John Scudder

Liz: We have a Discuss in the tracker; do we need to discuss that today?

John:  Roman, I saw that Acee had replied and I haven't had a lot of time to
review but it looked like you could summarize his reply as yes, once somebody
gets the ability to write to the OSPF config there's no end of mischief they
can get into, and are we really going to require every YANG model that touches
the routing protocols to enumerate every possible thing you can do to a routing
protocol, or is it enough to have that in the base?

Roman: There were two things I read in the feedback. One is something on the
order of, no one would do it this way because you'd need to do these other
things. That may be true but I thought the definition of a security
consideration for a yang module would be if someone in fact were to do it. To
your point of enumerating this each and every time, I'm sympathetic to that but
part of why I chose to Discuss it instead of leaving it alone is that there is
a declarative statement that says if you mess with this it results in denial of
service. But it doesn't just do that, it could possibly be these other things.
It's an inconsistency to say you don't need to repeat that but you call out one
attack, that's weird because it's not suggesting the others. I was surprised
that in the references to the underlying specs, no one said those things. That
seemed odd to me that in none of the chain of anything in OSPF that someone
bothered to point out you could mess with these. I'm happy to find some common
ground here but it seems like if you say denial of service you should say a few
more words.

John: That's fair. It sounds like we can probably finish that off in email with
Acee. Thanks. This should go in AD Followup.

 o draft-ietf-drip-auth-46  - IETF stream
   DRIP Entity Tag Authentication Formats & Protocols for Broadcast
   Remote ID (Proposed Standard)
   Token: Éric Vyncke

Liz: This document was deferred by Paul, so it will return on the next telechat.

Éric V: Of course, there is no problem, Paul, just to be clear. I prefer a deep
and qualified review.

Paul: I really just ran out of time, apologies.

Éric V: It's no problem.

 o draft-ietf-lamps-x509-policy-graph-04  - IETF stream
   Updates to X.509 Policy Validation (Proposed Standard)
   Token: Roman Danyliw

Liz: This is the only document today that doesn't have any Discusses, so unless
there's an objection now, we can approve this. I'm hearing no objections, so
one document is approved.

Éric V: Do you have an explanation for why it went so fast? One year between
the -00 and the acceptance. I think that's a record, I've never seen it so fast.

Paul: I believe this was the vulnerability announced at the last IETF?

Roman: This went to SECDISPATCH initially because there were some
vulnerabilities in some libraries and the question was where to go. It ended up
in LAMPS and we moved it fast because there were vulnerabilities. I think
there's even CV references in the document.

Éric V: Thanks for the explanation.

Liz: This one is approved. Roman, is this ready to go?

Roman: I have not had a chance to look at all the comments so I just want to
make sure there's nothing else there. Can we put it in AD Followup? Thanks for
the reviews, everyone.

2.1.2 Returning items

 o draft-ietf-netconf-https-notif-14  - IETF stream
   An HTTPS-based Transport for YANG Notifications (Proposed Standard)
   Token: Robert Wilton

Liz: We have a Discuss for this document; do we want to discuss this now?

Rob: I don't think so. I think John and Mahesh have agreed what the changes
should be. I think we're good to go once there's a new version posted.

Liz: Great, so we'll put this in Revised I-D Needed because there's a revision
coming.

Rob: Yes. Thanks all for the reviews.

2.2 Individual submissions
2.2.1 New items

 NONE

2.2.2 Returning items

 NONE

2.3 Status changes
2.3.1 New items

 NONE

2.3.2 Returning items

 NONE

3. Document actions
3.1 WG submissions
3.1.1 New items

 o draft-ietf-6man-sids-05  - IETF stream
   Segment Identifiers in SRv6 (Informational)
   Token: Erik Kline

Liz: We have some Discusses here; do we need to discuss these today?

Erik K: I think we probably should. I'd like to level set that this is a 6MAN
document, it's not a full security review for SRv6, it's not a SPRING document,
it's not an SRv6 ops document about how to operationalize SRv6 security. I
realize SRv6 brings up a lot of feelings for people but this is just a 6man
document in response to some SPRING work. I'd like to maintain some context
there. I did see there were some comments that came in overnight and I haven't
read them all.

Jim: Mine is the quickest. I had a couple of exchanges with Suresh and he
satisfied mine, so my Discuss will come off once the document is updated. That
leaves John and Andrew.

Erik K: I've seen some ongoing discussions with Suresh and it looks like he has
changes queued up.

John: Similar in my case. We're close enough I don't think i'll have to keep
holding the Discuss after he pushes the next version.

Andrew: From my side I have a number of issues. Firstly, in my view this
document tries to say it's an IPv6 address but it's not an IPv6 address. It
comes across like quantum network where you have multiple states depending on
which way you view it and that creates a problem. Secondly, if you say that a
SID is not an IPv6 address, that creates a direct conflict with 8402. If you
claim that it is an IPv6 address, yes it does. In my discussions with Suresh, I
said to him I'd be far happier if this document explained that a SID is not an
IPv6 address. But it does say that, except 8402 explicitly states that a SID is
an IPv6 address. Then we get to the opposite position where we say if this is
an IPv6 address that automatically brings 8200 into scope and this document
explicitly says that these SIDs don't conform. Either way you create a
situation where you now have a lack of clarity. There's a solution. We can bis
8402 that states a SID is an IPv6 address. At that point, this document would
be fine. But until you do that you have direct conflicts in both directions.

Erik K: This document clarifies that a SID is an IPv6 address. There hasn't
been any statement to the contrary. What it's saying is that it's not a 4291
address. Which is an IPv6 address that has to be assigned to an interface. It
is an IPv6 address and that has always been the case. This document does not
change that, it just says this is one of the types of IPv6 addresses that does
not necessarily have to be assigned to an interface per the architecture of
4291.

Jim: I have to be honest, I'm a little bit annoyed about the whole thing. This
has been beaten to death for God knows how long on all of the mailing lists. If
you look on the wire, you can't tell whether it's an IPv6 address or not. If I
can figure a route with some code that allows me to do a funky thing with an
IPv4 address, if I look on the wire it's an IPv4 address. It's just semantics
going around and around and around and we've been over this. I don't know how
many emails we've had in 6MAN and SPRING on this very subject. I just don't see
what we're trying to achieve here. The document seemed pretty clear to me and
the wording in 8402 is pretty clear that it's an IPv6 address, just not
assigned to an interface.

Warren: From the abstract, the document says "Due to this underlying use of
IPv6, Segment Identifiers (SIDs) used by SRv6 can resemble IPv6 addresses and
behave like them while exhibiting slightly different behaviors in some
situations." "can resemble IPv6 addresses" clearly is not "is an IPv6 address."
The assertion that these are IPv6 addresses is….

Erik K: That should probably say "resemble 4291 addresses."

Warren: There are a bunch of other places throughout the document where it does
similar things. In my Abstain comment I said this dances around whether or not
it's an address a whole bunch. I abstained because I think much of the document
is fairly awful, but at least it's trying to make the problem slightly better
by lumping all of this together in one potentially more easily filtered group.
I don't think it's clear as to whether it's an address or not.

John: To add to Warren's point, I was on team 'this is good enough' in terms of
IP addresses but after hearing Erik say clearly they are IP addresses, and
looking at the plain English of the document, I think we really do have a
problem here. I'm moving in the direction of supporting Andrew's.

Éric V: What would you do, John, about the DNS 64 addresses? they are not real
IPv6 addresses assigned to an interface either.

John: That's not what this document is about.

[crosstalk]

Warren: … nat 64 addresses say these are synthesized things which are mapped to
v4 addresses. I think SRv6 just said there's this field and ew decided to shove
something that looks like an IPv6 address in it and people can forward on it.
That would be a lot better than trying to play both sides of the coin.

Andrew: I have to agree and I also have to say that in the case of nat 64,
different situation, different story. If I saw the same thing and I went
through it, I can't remember if I was around when that was done, but if I saw
the same thing I'd possibly say the same thing. I look at these documents as a
document that has come before the iesg and my evaluation is that this document
is handwaving around the addresses. I do not believe it is clear these things
are or aren't v6 addresses. If they aren't, then there's possibly a problem
with 8200. If they are, there's  a problem with 8402. We've got to fix one or
the other.

Paul: It would be nice to have stronger language to say it's a band-aid and not
a proper fix. It could say this is a band-aid, please put it on, but look at
avoiding this problem altogether. That's why after reading Warren's abstain I
sort of agreed with him, but put the band-aid on because we're bleeding.

Erik K: I think the ether type stuff or other recommendations might be out of
scope for a 6MAN document. Let me ask Suresh if he wants to jump in here.

Suresh: Thanks Erik. I understand the concern. This document does not state
that it's an IPv6 address. I think the irregular part is there might be an
issue with 8402, but it's not fixable in this document. Let me go back and go
through our reasoning. Like Erik said, it doesn't follow 4291. So that's really
where the issue is. We talked about nat 64 as well. The nodes that don't do nat
64, they treat them as IPv6 addresses. They don't know these things are
synthesized. For anybody outside the domain, they are no different than any
other IPv6 address. So that is the inherent duality of this thing. There's
people who follow the SRv6 pack who do different things with it but the people
who don't understand it are just going through the island of people who don't
understand this. That's nothing different from an IPv6 address. Imagine
somebody had a v4 packet in it, and the nat64 doesn't, the people on the v6 nat
don't care, right? If there's wording where I can make that clearer, I thought
I'd covered that by saying there are transit nodes. The nodes that don't do
SRv6, treat them like IPv6 addresses. I think it covers both the cases, but if
we can strengthen the text, that's okay. For nodes that don't do IPv6, these
are not distinguishable from IPv6 addresses. They are IPv6 addresses. So that's
the part Erik brought up. Outside the domain it's a plain IPv6 address.

Jim: in the abstract, perhaps just removing the text that says resembles an
IPv6 address is all that this needs.

Andrew: No, because it goes further than that. For one thing it states that
these addresses are not assigned to hosts. That conflicts directly with 8402.

Jim: That's a different issue. Let's deal with one issue at a time. It seems to
me that in the abstract you could change that wording to remove 'resembles
IPv6' and that gets rid of the ambiguity.

Suresh: Sure, that's fine. And if you want stronger text, Andrew, to say that
this should not be assigned on an interface, I think we can add that too. It
says it's not assigned but we can say it cannot be assigned too.

Erik K: No, that would conflict with SPRING.

Andrew: 8402 explicitly states that hosts may be part of the SR delay. This
document explicitly says the exact opposite.

Erik K: No, it shouldn't. It just says the're not 4291 IPv6 addressing
architecture style addresses. They may not be assigned; it doesn't mean they
can't be. They're not required to be. We already have this other quantum
concept.

Warren: "While looking at the transit nodes, it becomes apparent that these
addresses are used purely for forwarding and not for packet delivery to end
hosts."

Suresh: Correct.

Andrew: Furthermore, it also says "It is clear that this format for SRv6 SIDs
is not compliant with the requirements set forth in RFC4291 for IPv6 addresses
but it is also clear that SRv6 SIDs are not intended for assignment onto
interfaces on end hosts." That directly conflicts with 8402.

Erik K: There are SIDs that can be assigned to interfaces. Adjacency SIDs.

Jim: Yes.

[crosstalk]

Warren: I think the bit I quoted is incorrect, because you can use these
addresses for packet delivery to end hosts. We just said end hosts can
participate and often do. Many cloud providers, as an example, do segment
routing type stuff to the host. The host is the thing that understands the
complex path it wants to send the packet around.

Erik K: Not SR aware end hosts.

Warren: I think having a prefix is really useful. I just don't really know if
the rest of the text around this as justification improves the situation. I
think it adds confusion.

Andrew: That's my problem. I'm not disputing that a prefix would be useful, I'm
saying this document as it stands in my view creates a lot more confusion
because you can end up with this weird quantum state address thing.

Warren: I do also want to say I think Suresh did an incredibly good job of
trying to thread the needle.

Andrew:  Don't get me wrong. Suresh, I appreciate the document. It is what it
is.

Warren: Suresh is in a difficult position and huge props to him for managing to
get it this close. It's huge to try to clarify specs which to me seem to be in
conflict.

Suresh: To be frank, we need to work with the previous deviations, like nat64
and all that. We can't just say all those things that have gone through the
IETF process are wrong. That's part of threading the needle. We've done things
like this before, and this is why this duality exists. And we've done this.
Warren, you know about this thing that says routing not being [slash 64?]. This
needed to be said, because that was not clear to a lot of people outside the
inside baseball paradigm. Everything here is strictly true. I understand the
discomfort that it doesn't give a clear answer, but this is as close as I think
we can get, saying that it doesn't follow 4291. If there's something that needs
to be done with 8402, I think we should do it. Maybe we can come up with an
update for that. But not on this document. I think it's bad precedent to say in
this document that something in another area's document is wrong. We won't say
someone doing a 256 calculation on the address inst allowed because they're not
following the address architecture.

Warren: If it didn't have the bit in the abstract saying they look like IPv6
addresses but aren't, and if it took out the bit saying they can't be used for
packet delivery to end hosts, that would go a long way towards making me less
twitchy. Because they look like a duck and quack like a duck, we're pretending
they're ducks. I'm only abstaining; I'm intentionally not blocking it.

Erik K: Are there some edits that would change you from Abstain to another
position?

Warren: [laughing] Delete sections 1 through 4 and just allocate a global
prefix for SIDs and then I'd ballot yes? Obviously that's not reasonable.

Andrew: As I said, if 8402 said these things weren't v6 addresses, I'd have
almost no problem. While there's that conflict, I am going to need to give this
long and serious consideration as to what could potentially change my mind. At
the moment, I don't know the answer to that. I do see conflicts here and I do
not believe the argument that because we've done strange things in the past is
ever sufficient justification to do more. I'll never buy into that argument.

Warren: What if the document explicitly noted that 8402…

Andrew: [crosstalk] If the document said 8402 is wrong, I'd be good with it.

Warren: The right way to fix that is new consensus.

Erik K: There might be a way to punch up the nat64 dual analogy where if you
know what it is, you know what it is, and if you don't it's a v6 address you
forward, to basically say that' show SRv6 sids operate. This is not a past
action justifying a future action, there's past precedent justifying slightly
more recent past precedent, not future action. This has already happened.

Warren: Although 8402 strongly implies or states that these are an address, in
many environments it's more that they act like an address. Something like how
they are treated in the real world.

Andrew: If you say these things are v6 addresses out there on the Internet, you
imply they are safe v6 addresses. They're not, because the moment they get
somewhere that doesn't see them as v6 addresses, they suddenly become something
else. Suresh, that's snot a problem with your document, it's a problem with
SRv6, that an address is suddenly a funky quantum thing. This document seems to
confuse the issue rather than resolve it. If there was a way to assign a prefix
without creating further confusion, that would be wonderful.

Suresh: I like Warren's suggestion. I can work on some text to talk about what
8402 says and what it means in an operational network. If you're willing to go
in that direction, I think I can work on some text.

Andrew: We can certainly take that offline and work on it.

Lars: This sounds like an excellent topic to use the informal for. We haven't
used them lately. If you want to invite Suresh or anyone else, invite them, and
let's hopefully make some progress.

Erik K: Thanks everyone for reviewing and commenting, and to Suresh for being
here.

Warren: Seriously, thank you very much Suresh for trying. It's hugely important
that we get this sorted out. And thanks Erik for trying to carry it.

Andrew: Thank you to both of you.

Erik K: Pretty clearly Revised I-D Needed, I think.

3.1.2 Returning items

 NONE

3.2 Individual submissions via AD
3.2.1 New items

 NONE

3.2.2 Returning items

 NONE

3.3 Status changes
3.3.1 New items

 NONE

3.3.2 Returning items

 NONE

3.4 IRTF and Independent Submission stream documents
3.4.1 New items

 o conflict-review-irtf-hrpc-guidelines-00
   IETF conflict review for draft-irtf-hrpc-guidelines
     draft-irtf-hrpc-guidelines-20
     Guidelines for Human Rights Protocol and Architecture
   Considerations (IRTF: Informational)
   Token: Paul Wouters

Liz: We have a Discuss here; do we want to discuss this now?

Paul: Briefly, yes. I'm not sure what Roman's concern is when they list some
examples of work they have done.

Roman: My observation is that there's a reference there to a repository that
makes recommendations on IETF stream protocols. That minimally seems that it's
not entirely clean. I'm not saying there's an issue, but we're already
providing commentary here on in-flight protocols. What I didn't do was actually
take a look at whether the recommendations conflict with what the documents
currently say. If we're in that situation, that seems a little problematic.

Paul: The link is to a live document, because it's in Gitlab. I don't think you
can say how it will be five minutes from now. It's more a principle matter.

Roman: Yes. We're now in editorial vs conflict review. I think the answer is
just remove that link which changes nothing. But my concern is the situation
we're setting up is we're publishing through a reference that seems to be
argued as the basis of the document, recommendations on in-flight IETF
protocols and some of them are published. I think that is a conflict. What am I
missing here?

Paul: I see it more as a historic link giving some background of things they've
done in the past to help protocols.

Roman: And I would agree with that, except the text in those references says
the recommendation is to do the following. So if there was just an observation
that we ran an HRPC evaluation on protocols, here's the mismatch we found, that
would be perfect. But the text goes further and says as a result of this
review, here are the recommended changes. That's where I think the line is
crossed.

Paul: I think that's fair. I'll look into more details in the reference and
I'll talk to the authors and we can return this item on the next telechat.

Liz: Sure. There's no AD Followup state for conflict reviews so we'll just
leave this in IESG Evaluation where it is while you work on it.

 o conflict-review-farinacci-lisp-lispers-net-nat-00
   IETF conflict review for draft-farinacci-lisp-lispers-net-nat
     draft-farinacci-lisp-lispers-net-nat-07
     lispers.net LISP NAT-Traversal Implementation Report (ISE:
   Informational)
   Token: Éric Vyncke

Liz: We have a Discuss here; do we want to discuss this now?

Éric V: Yes, thank you everyone for reviewing it. Martin and Paul, this was my
first concern when I saw this. We just approved the rechartering of the LISP WG
containing a NAT work item. So it's documenting an experiment. This is kind of
the way ISE is sometimes used. I have no hard feelings anyway, but I think I
saw Eliot on the call earlier, so if you would like to add something you may.

Eliot: Good afternoon. I don't really want to add too much here other than to
say I took thai draft on in part because the topic this covers was sort of dead
in the LISP WG. they have since rechartered, but this was well underway before
that. Even in the rechartering, if you look at the draft that's referenced, it
hasn't been updated for three years. I'm not in a hurry, I don't think Dino is
in a tremendous hurry, but what I don't want to do is be unfair to him in that
just because something is chartered in a WG doesn't mean anything actually
happens. I don't want to drag him out too long. That's my main thought, there's
always an opportunity to defer, and I shouldn't say much more.

Lars: We've had cases like this in the past. Basically we can tell the RFC
Editor to not publish this on the independent stream until the IETF work item
is out. That means Dino will have to wait. That's exactly why we have these
conflict reviews, it's end-run protection. It would have been different if LISP
hadn't rechartered to work on this; now we have actual IETF work chartered in
the space so I don't think anything should be published in the independent
stream while this is still pending.

Martin: [garbled] While I agree this is an unfortunate situation that's a
little unfair to him, we can't publish anything until after the consensus
document.

Éric V: That makes sense. How do we proceed? I've never heard of this before.

Lars: This happened ten years ago where we would have rejected stuff from WGs
go to the ISE, and because WGs are slow, they were able to potentially get
their RFC from the rejected proposal first. That was the whole reason why this
conflict review was instantiated in the first place. Before, the ISE could just
publish whenever. This is not quite the same case, because it's not like
someone maliciously wants to do this, they just have done this and the IETF
changed its mind. The optics are similar. My preference would be to do the same
thing we've done before and basically hold this for update. And ideally add
text to the ISE stream document that says 'here's the IETF document in this
space.' We can do that with an IESG note as well.

Éric V: So basically we remove the conflict and send it back to ISE?

Lars: I guess I need to have a chat with the RPC. This has not been done in a
while. I think we basically told the RFC Editor don't publish this as an RFC
until this other draft from the IETF is also with you, and basically treat them
as a cluster. I don't know if they have any running code for how this works
anymore.

Eliot: If I may, 5744 covers that. I think what you're talking about is your
third option: "The IESG has concluded that publication could potentially
disrupt IETF work in WG X and recommends not publishing the document at this
time." You Can send it back to me like that. All I ask in return as we go
through this process is if nobody updates that draft for a good long while, 
I'm going to send it back to you for another review and I expect a better
answer at that point.

Lars: It would need to get off the charter. Just because a WG is slow is not a
reason to let something go. But we can have that discussion once it's in that
state and I'm off the IESG.

Eliot: Thank you everyone.

Martin: Is this NAT thing really going to happen, Jim? Do you have a sense of
that?

Jim: It looks like it's going to happen. A lot of the recharter in LISP was to
cover things they've pretty much already done and get them in scope. I'd need
to go look at the NAT one specifically.

Lars: That was one of the items I asked them to cut. Remember there was a long
shopping list and for every single thing I asked if they were really going to
do it, and they said yes. So now they need to deliver.

Jim: I'm keeping my eye on it.

Éric V: Okay, so I will change the conflict text then and can we approve it at
the next telechat?

Liz: If you want we can just leave it in IESG Evaluation for now and give
Martin and Paul a chance to clear their Discusses, and then we can bring it
back for next time.

 o conflict-review-cuiling-dnsop-sm2-alg-00
   IETF conflict review for draft-cuiling-dnsop-sm2-alg
     draft-cuiling-dnsop-sm2-alg-15
     SM2 Digital Signature Algorithm for DNSSEC (ISE: Informational)
   Token: Roman Danyliw

Liz: There are no Discusses here, so unless there's an objection, this conflict
review is ready to go back to the ISE. I'm hearing no objection, so this is
approved and ready to go.

Roman: I think we're good to go here. We polished it already.

Liz: Then we can call this approved and we'll send it.

3.4.2 Returning items

 NONE

4. Working Group actions
4.1 WG creation
4.1.1 Proposed for IETF review

 NONE

4.1.2 Proposed for approval

 o Network Management Operations (nmop)

Liz: There are no blocking comments, so unless there's an objection now, this
is approved.

Rob: Thanks everyone. I've merged in the latest comments already. We just need
to change the email address from what it is now to NMOP. What's the order of
operations there?

Cindy: We need to create a new NMOP list. Do we just announce the new list and
have people sign up themselves, or do we move everyone from the existing list?

Rob: Ideally we'd just move everyone over, if that's allowed.

Cindy: We have done that recently, so we can. We will create the new mailing
list, move folks over, close the old list and retain the archive, and then
announce the new WG.

4.2 WG rechartering
4.2.1 Under evaluation for IETF review

 NONE

4.2.2 Proposed for approval

 NONE

5. IAB news we can use

Roman: In the spirit of bringing outside people in to brief the IAB, in
February there will be some expertise on UN activities that may have an impact
on IETF work. That's going to be February 28 and I don't have information on
the speakers but I think that might be interesting. That's it.

6. Management issues

6.1 [IANA #1281679] Designated experts for RFC 9447, ACME Authority Token
Challenge Types" (Roman Danyliw)

Liz: Roman has identified Mary Barnes as an expert. Does anyone have an
objection to naming Mary as the expert? I'm hearing no objection, so we'll send
the official note to IANA.

6.2 [IANA #1352987] Acceptance of media type registration from standards
organization MIDI Manufacturers Association (IANA)

Liz: We've received this request from the MIDI Manufacturers Association; has
anyone had a chance to look at this for more information?

Murray: I did. I don't have any objection.

Francesca: It's not really an objection, but I insist often in drafts that the
request is sent to the media types mailing list, and this wasn't. I know it's
not mandatory, so I'm okay with approving it, but should we make it so that
it's more visible?

Lars: If we want to make this a thing, maybe we can ask IANA to forward it when
they get a request.

Amanda: We are currently copying the list on the expert review requests.

Lars: So this should have gone to the list?

Amanda: We don't send it to the experts until we get acceptance of the
organization. So if this is approved, we'll send it to the experts and the list.

Francesca: How much more work is it to ask IANA to send this to the list before
it gets to the IESG? I don't want to add work for you guys.

Murray: I want to make sure we're doing that for the right reasons. The
decision about adding them to the list is an IESG decision. The decision about
whether this is a sane media type request is an expert decision. I'm having a
hard time figuring out what the right order is.

Lars: This is the request for a decision on whether we want to, in the future,
accept registrations from them without having to go to the IESG. Amanda, it
would be good if you could highlight that in the action items you put on the
agenda in the future so that we're not constantly getting this confused. We're
supposed to vet the organization, whether they're a legit standards body. In my
book, this one seems to be.

Murray: This comes up from time to time as what's the point of the IESG looking
at these? The point is that we want to decide if there's going to be a lot of
activity from this potential SDO, should the IAB create a liaison, should we
pay more attention to the source of these registrations, is there something
here we should pay attention to. It's like a one time chance to think about it.
Should that come ahead of the registration? That's the part I'm wondering
about. And we don't want the experts to worry about that.

Lars: If I recall correctly the RFC doesn't allow us to just approve the
request if it's from another SDO. This is one that Barry was going to fix. At
the moment, we cannot just say yes to the request if it comes from another SDO,
we need to also approve them, which is a little bit backwards if we don't
expect another request from them. We're going to disentangle that at some point
but it hasn't happened yet.

Murray: something for me and Orie to look into, I guess. I think this one is
fine to approve. We can figure out the process later.

Francesca: Sounds good.

Orie: On the topic of order, is there some conversation on the list we're
expecting to have been valuable prior to making this decision? Are we lacking
information from some conversation on the list that would cause us to ask the
list first?

Lars: Not really. Typically the way this goes is we google them. Do they
actually publish specifications, is this just a technical marketing thing or is
it an actual SDO with something we'd consider a spec we could reference?
Whether the request is sane is another piece of information that goes into the
decision. If they don't look like a real proper SDO and the request doesn't
really make sense, that's two strikes.

Orie: For our side then, we're just basically vetting the entity and approving
them without objection. It seems like we can just keep doing that until we want
to do something else.

Murray: There is this intended component from the people who sent this up that
they want to have a stopgap opportunity to create a liaison or something else.
Once we approve them, we're not going to hear about them anymore. Of course,
they left us no criteria about what the definition for a bona fide SDO is. We
just have the current context and what we've approved in the past. We have used
this to pick off someone who claims SDO status that's just a guy with a website.

Orie: Is it really true that we never hear about them at all, or do we hear
about them on the list relative to what new registrations they want?

Murray: By we I mean the IESG is never presented with the question to create a
liaison with them. They can register stuff all they want.

Orie: And we'd still become aware if there was evidence there was a problem,
right?

Murray: If you happen to be watching the media types list, yes. The IESG is not
going to be told about anything once this gets approved.

Orie: Understood.

Liz: So for this one, I don't think anyone was actually objecting to processing
this media request and adding this organization to the standards tree, so we'll
go ahead and send that official note to IANA.

6.3 [IANA #1353885] Acceptance of media type registration from standards
organization Trust Over IP Foundation Technology Stack Working Group -2 (TSWG)
(IANA)

Liz: Has anyone had a chance to look at this one?

Murray: I did not see this one prior to the call so I don't have an opinion yet.

Lars: I looked at this and I've come across this foundation before. I have some
mild question marks. Specifically, I tried to read the request they're making
and I can't figure out what this is. The words don't make any sense to me. I
don't know if it's because I'm not in the space. Can someone review this?

Orie: I'm familiar with this. I hadn't seen this specific request prior to the
meeting so I'd want to review it, but I have a lot of background on what I
think this is.

Liz: So do we want to hold this one until the next telechat and give folks more
time to review?

Roman: I think that's a safe thing to do.

Liz: Great, so we will leave this right here and you'll have two more weeks to
look it over.

6.4 [IANA #1287238] Designated experts for RFC 9487 (Export of Segment Routing
over IPv6 Information in IP Flow Information Export (IPFIX)) (Rob Wilton)

Liz: Rob has identified two individuals and a list as experts for this
registry. Is there any objection to approving them?

Francesca: Why is this a list and not individuals?

Rob: This list has the experts for the other IPFIX registries, so I'm doing
what's been done before.

Francesca: It feels a little strange that we're putting a list where we might
not know the individuals or the individuals on it might change.

Lars: Can we name the experts without the list?

Rob: Then this one would be the odd one out for the IPFIX registries; the
others are all listed the same way. In general I think pushing this stuff onto
a list from individuals is a good idea.

Amanda: This is a private list, so it consists only of the IE doctors. They
were all designated by the IESG. I don't recall why we're not listing them
individually here, but we can certainly change that.

Francesca: That would be fine by me, so I can see the names. I don't have
anything against approving them as experts, it's just strange to approve a list.

Lars: For the other ones, I'd list them by name as well. They can use the list
to discuss amongst themselves, that's fine, but the experts should be actually
named in what the IESG manages.

Amanda: Okay, we'll update that.

Liz: Okay, so it sounds like there's no actual objection, we just want to list
out these individuals.

Rob: Will Amanda also take an action to change the other IPFIX ones?

Amanda: Yes, we can do that.

Rob: Okay, as long as they're consistent I'm fine.

Liz: I think we have what we need.

7. Any Other Business (WG News, New Proposals, etc.)

Liz: Two reminders from me. First, if you haven't yet filled in the Doodle for
retreat dates, please do so. Second, the final BOF approval deadline is
tomorrow and we'll be discussing the BOF final approvals next week during the
informal telechat time slot, so we'll definitely have an informal next week.

Andrew: The discussion on the document we had today, I've also put that on the
agenda for next week. Do you think it's better I push that to the next
informal, or will we have the time next week?

Liz: It's up to you, I don't know how much more discussion time the BOFs need
or if that will go quickly. But the week after next will be the agenda conflict
resolution, so we probably will not have extra discussion time then.

Andrew: I think I'm going to leave it scheduled for next week then.

Warren: No objection from me. I've had a lot of long discussions with the DNSOP
chairs and the DELEG proponents and I think things are looking good for them
for a WG-forming BOF in the ops area to work on the deleg proposal. If anyone
would like to chat to me about that, please do reach out to me.